CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-1493
|
A vulnerability was found in Max Secure Anti Virus Plus 19.0.2.1. It has been rated as problematic. This issue affects the function 0x220019 in the library MaxProctetor64.sys of the component IoControlCode Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223379.
|
https://vuldb.com/?id.223379
|
2023-03-18T20:20:48.073Z
|
2023-03-18T23:00:05.752Z
|
2023-10-21T09:35:15.509Z
|
{'Vendor': 'Max Secure', 'Product': 'Anti Virus Plus', 'Versions': '19.0.2.1'}
|
CVE-2023-1169
|
The OoohBoi Steroids for Elementor plugin for WordPress is vulnerable to missing authorization due to a missing capability check on the 'file_uploader_callback' function in versions up to, and including, 2.1.4. This makes it possible for subscriber-level attackers to upload image attachments to the site.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/c56ed896-9267-49e6-a207-fe5362fe18cd?source=cve
|
2023-03-03T19:08:15.506Z
|
2023-06-09T05:33:32.336Z
|
2023-06-09T05:33:32.336Z
|
{'Vendor': 'ooohboi', 'Product': 'OoohBoi Steroids for Elementor', 'Versions': '*'}
|
CVE-2023-1539
|
Improper Restriction of Excessive Authentication Attempts in GitHub repository answerdev/answer prior to 1.0.6.
|
https://huntr.dev/bounties/b4df67f4-14ea-4051-97d4-26690c979a28
|
2023-03-21T00:00:00
|
2023-03-21T00:00:00
|
2023-04-26T00:00:00
|
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
|
CVE-2023-1186
|
A vulnerability has been found in FabulaTech Webcam for Remote Desktop 2.8.42 and classified as problematic. This vulnerability affects the function 0x222010/0x222018 in the library ftwebcam.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-222358 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.222358
|
2023-03-06T07:09:24.663Z
|
2023-03-06T07:09:57.318Z
|
2023-10-21T07:33:13.410Z
|
{'Vendor': 'FabulaTech', 'Product': 'Webcam for Remote Desktop', 'Versions': '2.8.42'}
|
CVE-2023-1885
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
https://huntr.dev/bounties/bce84c02-abb2-474f-a67b-1468c9dcabb8
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
2023-12-18T10:20:28.599Z
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-1755
|
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
https://huntr.dev/bounties/882ffa07-5397-4dbb-886f-4626859d711a
|
2023-03-31T00:00:00
|
2023-03-31T00:00:00
|
2023-03-31T00:00:00
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-1305
|
An authenticated attacker can leverage an exposed “box” object to read and write arbitrary files from disk, provided those files can be parsed as yaml or JSON. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec.
|
https://docs.divvycloud.com/changelog/23321-release-notes
|
2023-03-09T22:23:15.209Z
|
2023-03-21T16:51:43.225Z
|
2023-03-21T16:51:43.225Z
|
{'Vendor': 'Rapid7', 'Product': 'InsightCloudSec', 'Versions': '0'}
|
CVE-2023-1610
|
A vulnerability, which was classified as critical, has been found in Rebuild up to 3.2.3. Affected by this issue is some unknown functionality of the file /project/tasks/list. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223742 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.223742
|
2023-03-23T18:41:46.050Z
|
2023-03-23T20:00:06.354Z
|
2023-10-21T11:08:40.796Z
|
{'Vendor': 'n/a', 'Product': 'Rebuild', 'Versions': '3.2.0, 3.2.1, 3.2.2, 3.2.3'}
|
CVE-2023-1240
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
|
https://huntr.dev/bounties/a24f57a4-22e3-4a17-8227-6a410a11498a
|
2023-03-07T00:00:00
|
2023-03-07T00:00:00
|
2023-03-07T00:00:00
|
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
|
CVE-2023-1754
|
Improper Neutralization of Input During Web Page Generation in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
https://huntr.dev/bounties/529f2361-eb2e-476f-b7ef-4e561a712e28
|
2023-03-31T00:00:00
|
2023-03-31T00:00:00
|
2023-04-26T00:00:00
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-1304
|
An authenticated attacker can leverage an exposed getattr() method via a Jinja template to smuggle OS commands and perform other actions that are normally expected to be private methods. This issue was resolved in the Managed and SaaS deployments on February 1, 2023, and in version 23.2.1 of the Self-Managed version of InsightCloudSec.
|
https://docs.divvycloud.com/changelog/23321-release-notes
|
2023-03-09T22:23:14.145Z
|
2023-03-21T16:45:49.560Z
|
2023-03-21T16:45:49.560Z
|
{'Vendor': 'Rapid7', 'Product': 'InsightCloudSec', 'Versions': '0'}
|
CVE-2023-1611
|
A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea
|
https://bugzilla.redhat.com/show_bug.cgi?id=2181342
|
2023-03-23T00:00:00
|
2023-04-03T00:00:00
|
2023-07-23T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'unknown'}
|
CVE-2023-1241
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
|
https://github.com/answerdev/answer/commit/90bfa0dcc7b49482f1d1e31aee3ab073f3c13dd9
|
2023-03-07T00:00:00
|
2023-03-07T00:00:00
|
2023-03-07T00:00:00
|
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
|
CVE-2023-1492
|
A vulnerability was found in Max Secure Anti Virus Plus 19.0.2.1. It has been declared as problematic. This vulnerability affects the function 0x220019 in the library MaxProc64.sys of the component IoControlCode Handler. The manipulation of the argument SystemBuffer leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-223378 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.223378
|
2023-03-18T20:20:37.430Z
|
2023-03-18T22:31:03.586Z
|
2023-10-21T09:34:02.324Z
|
{'Vendor': 'Max Secure', 'Product': 'Anti Virus Plus', 'Versions': '19.0.2.1'}
|
CVE-2023-1168
|
An authenticated remote code execution vulnerability
exists in the AOS-CX Network Analytics Engine. Successful
exploitation of this vulnerability results in the ability to
execute arbitrary code as a privileged user on the underlying
operating system, leading to a complete compromise of the
switch running AOS-CX.
|
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-004.txt
|
2023-03-03T16:58:46.073Z
|
2023-03-21T20:22:09.558Z
|
2023-03-22T04:38:44.935401Z
|
{'Vendor': 'Hewlett Packard Enterprise (HPE)', 'Product': 'Aruba CX 10000 Switch Series, Aruba CX 9300 Switch Series, Aruba CX 8400 Switch Series, Aruba CX 8360 Switch Series, Aruba CX 8325 Switch Series, Aruba CX 8320 Switch Series, Aruba CX 6400 Switch Series, Aruba CX 6300 Switch Series, Aruba CX 6200F Switch Series', 'Versions': 'AOS-CX 10.10.xxxx: 10.10.1020 and below., AOS-CX 10.09.xxxx: 10.09.1020 and below., AOS-CX 10.08.xxxx: 10.08.1070 and below., AOS-CX 10.06.xxxx: 10.06.0230 and below.'}
|
CVE-2023-1538
|
Observable Timing Discrepancy in GitHub repository answerdev/answer prior to 1.0.6.
|
https://github.com/answerdev/answer/commit/813ad0b9894673b1bdd489a2e9ab60a44fe990af
|
2023-03-21T00:00:00
|
2023-03-21T00:00:00
|
2023-03-21T00:00:00
|
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
|
CVE-2023-1187
|
A vulnerability was found in FabulaTech Webcam for Remote Desktop 2.8.42 and classified as problematic. This issue affects some unknown processing in the library ftwebcam.sys of the component Global Variable Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222359.
|
https://vuldb.com/?id.222359
|
2023-03-06T07:09:29.942Z
|
2023-03-06T07:09:59.304Z
|
2023-10-21T07:34:26.550Z
|
{'Vendor': 'FabulaTech', 'Product': 'Webcam for Remote Desktop', 'Versions': '2.8.42'}
|
CVE-2023-1884
|
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
https://huntr.dev/bounties/dda73cb6-9344-4822-97a1-2e31efb6a73e
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-1353
|
A vulnerability, which was classified as problematic, was found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. Affected is an unknown function of the file verification.php. The manipulation of the argument txtvaccinationID leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222852.
|
https://vuldb.com/?id.222852
|
2023-03-11T17:39:57.531Z
|
2023-03-11T17:41:39.477Z
|
2023-10-21T08:13:29.897Z
|
{'Vendor': 'SourceCodester', 'Product': 'Design and Implementation of Covid-19 Directory on Vaccination System', 'Versions': '1.0'}
|
CVE-2023-1703
|
Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.20.
|
https://huntr.dev/bounties/d12d105c-18fa-4d08-b591-b0e89e39eec1
|
2023-03-29T00:00:00
|
2023-03-29T00:00:00
|
2023-03-29T00:00:00
|
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
|
CVE-2023-1216
|
Use after free in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker who had convienced the user to engage in direct UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html
|
2023-03-07T00:41:17.514Z
|
2023-03-07T21:42:16.442Z
|
2023-03-07T21:42:16.442Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'}
|
CVE-2023-1646
|
A vulnerability was found in IObit Malware Fighter 9.4.0.776. It has been declared as critical. This vulnerability affects the function 0x8018E000/0x8018E004 in the library IMFCameraProtect.sys of the component IOCTL Handler. The manipulation leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. VDB-224026 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.224026
|
2023-03-26T20:12:29.000Z
|
2023-03-26T22:31:03.470Z
|
2023-10-21T13:37:02.485Z
|
{'Vendor': 'IObit', 'Product': 'Malware Fighter', 'Versions': '9.4.0.776'}
|
CVE-2023-1095
|
In nf_tables_updtable, if nf_tables_table_enable returns an error, nft_trans_destroy is called to free the transaction object. nft_trans_destroy() calls list_del(), but the transaction was never placed on a list -- the list head is all zeroes, this results in a NULL pointer dereference.
|
https://bugzilla.redhat.com/show_bug.cgi?id=2173973
|
2023-02-28T00:00:00
|
2023-02-28T00:00:00
|
2023-02-28T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Linux kernel netfilter subsystem.', 'Versions': 'Fixed in 6.0-rc1'}
|
CVE-2023-1996
|
A reflected Cross-site Scripting (XSS) vulnerability in Release 3DEXPERIENCE R2018x through Release 3DEXPERIENCE R2023x allows an attacker to execute arbitrary script code.
|
https://www.3ds.com/vulnerability/advisories
|
2023-04-12T09:28:12.107Z
|
2023-05-19T16:37:20.133Z
|
2023-07-12T07:19:15.343Z
|
{'Vendor': 'Dassault Systèmes', 'Product': '3DEXPERIENCE', 'Versions': 'Release 3DEXPERIENCE R2018x - All levels, Release 3DEXPERIENCE R2019x - All levels, Release 3DEXPERIENCE R2020x Golden, Release 3DEXPERIENCE R2021x Golden, Release 3DEXPERIENCE R2022x Golden, Release 3DEXPERIENCE R2023x Golden'}
|
CVE-2023-1979
|
The Web Stories for WordPress plugin supports the WordPress built-in functionality of protecting content with a password. The content is then only accessible to website visitors after entering the password. In WordPress, users with the "Author" role can create stories, but don't have the ability to edit password protected stories. The vulnerability allowed users with said role to bypass this permission check when trying to duplicate the protected story in the plugin's own dashboard, giving them access to the seemingly protected content. We recommend upgrading to version 1.32 or beyond commit ad49781c2a35c5c92ef704d4b621ab4e5cb77d68 https://github.com/GoogleForCreators/web-stories-wp/commit/ad49781c2a35c5c92ef704d4b621ab4e5cb77d68
|
https://github.com/GoogleForCreators/web-stories-wp/commit/ad49781c2a35c5c92ef704d4b621ab4e5cb77d68
|
2023-04-11T13:40:52.885Z
|
2023-05-08T16:28:53.574Z
|
2023-05-08T16:28:53.574Z
|
{'Vendor': 'Google', 'Product': 'Web Stories for WordPress', 'Versions': '0'}
|
CVE-2023-1580
|
Uncontrolled resource consumption in the logging feature in Devolutions Gateway 2023.1.1 and earlier allows an attacker to cause a denial of service by filling up the disk and render the system unusable.
|
https://devolutions.net/security/advisories/DEVO-2023-0007
|
2023-03-22T16:19:10.855Z
|
2023-03-22T17:49:11.291Z
|
2023-04-02T18:49:20.069507Z
|
{'Vendor': 'Devolutions', 'Product': 'Gateway', 'Versions': '0'}
|
CVE-2023-1715
|
A logic error when using mb_strpos() to check for potential XSS payload in Bitrix24 22.0.300 allows attackers to bypass XSS sanitisation via placing HTML tags at the begining of the payload.
|
https://starlabs.sg/advisories/23/23-1715/
|
2023-03-30T09:16:12.108Z
|
2023-11-01T09:03:05.343Z
|
2023-11-01T09:03:05.343Z
|
{'Vendor': 'Bitrix24', 'Product': 'Bitrix24', 'Versions': '0'}
|
CVE-2023-1345
|
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the queue_posts function. This makes it possible for unauthenticated attackers to modify the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/d16fa590-1409-4f04-b8b7-0cce17412a5f
|
2023-03-10T18:50:10.054Z
|
2023-03-10T19:07:23.931Z
|
2023-03-10T19:07:23.931Z
|
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
|
CVE-2023-1650
|
The AI ChatBot WordPress plugin before 4.4.7 unserializes user input from cookies via an AJAX action available to unauthenticated users, which could allow them to perform PHP Object Injection when a suitable gadget is present on the blog
|
https://wpscan.com/vulnerability/7d7fe498-0aa3-4fa7-b560-610b42b2abed
|
2023-03-27T09:16:48.102Z
|
2023-05-08T13:58:12.709Z
|
2023-05-08T13:58:12.709Z
|
{'Vendor': 'Unknown', 'Product': 'AI ChatBot', 'Versions': '0'}
|
CVE-2023-1200
|
A vulnerability was found in ehuacui bbs. It has been declared as problematic. This vulnerability affects unknown code. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The identifier of this vulnerability is VDB-222388.
|
https://vuldb.com/?id.222388
|
2023-03-06T15:49:24.589Z
|
2023-03-06T15:49:43.418Z
|
2023-10-21T07:40:32.433Z
|
{'Vendor': 'ehuacui', 'Product': 'bbs', 'Versions': 'n/a'}
|
CVE-2023-1980
|
Two factor
authentication
bypass on login in Devolutions Remote Desktop Manager 2022.3.35 and earlier allow user to cancel the two factor authentication via the application user interface and open entries.
|
https://devolutions.net/security/advisories/DEVO-2023-0009
|
2023-04-11T13:57:51.445Z
|
2023-04-11T17:44:15.373Z
|
2023-04-24T13:13:29.808Z
|
{'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'}
|
CVE-2023-1129
|
The WP FEvents Book WordPress plugin through 0.46 does not ensures that bookings to be updated belong to the user making the request, allowing any authenticated user to book, add notes, or cancel booking on behalf of other users.
|
https://wpscan.com/vulnerability/d40479de-fb04-41b8-9fb0-41b9eefbd8af
|
2023-03-01T18:23:38.681Z
|
2023-04-24T18:30:52.240Z
|
2023-04-24T18:30:52.240Z
|
{'Vendor': 'Unknown', 'Product': 'WP FEvents Book', 'Versions': '0'}
|
CVE-2023-1579
|
Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64.
|
https://sourceware.org/bugzilla/show_bug.cgi?id=29988
|
2023-03-22T00:00:00
|
2023-04-03T00:00:00
|
2023-09-30T09:06:15.292635
|
{'Vendor': 'n/a', 'Product': 'binutils', 'Versions': 'unknown'}
|
CVE-2023-1596
|
The tagDiv Composer WordPress plugin before 4.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
|
https://wpscan.com/vulnerability/cada9be9-522a-4ce8-847d-c8fff2ddcc07
|
2023-03-23T09:58:56.210Z
|
2023-05-15T12:15:36.699Z
|
2023-05-15T12:15:36.699Z
|
{'Vendor': 'Unknown', 'Product': 'tagDiv Composer', 'Versions': '0'}
|
CVE-2023-1312
|
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.19.
|
https://huntr.dev/bounties/2a64a32d-b1cc-4def-91da-18040d59f356
|
2023-03-10T00:00:00
|
2023-03-10T00:00:00
|
2023-03-10T00:00:00
|
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
|
CVE-2023-1742
|
A vulnerability was found in IBOS 4.5.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file /?r=report/api/getlist of the component Report Search. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-224630 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.224630
|
2023-03-30T19:08:00.703Z
|
2023-03-30T21:31:03.698Z
|
2023-10-21T14:09:57.912Z
|
{'Vendor': 'n/a', 'Product': 'IBOS', 'Versions': '4.5.5'}
|
CVE-2023-1257
|
An attacker with physical access to the affected Moxa UC Series devices can initiate a restart of the device and gain access to its BIOS. Command line options can then be altered, allowing the attacker to access the terminal. From the terminal, the attacker can modify the device’s authentication files to create a new user and gain full access to the system.
|
https://www.cisa.gov/uscert/ics/advisories/icsa-22-333-04
|
2023-03-07T16:16:20.728Z
|
2023-03-07T16:54:21.053Z
|
2023-03-07T16:54:21.053Z
|
{'Vendor': 'MOXA', 'Product': 'UC-8580 Series', 'Versions': 'V1.1'}
|
CVE-2023-1607
|
A vulnerability was found in novel-plus 3.6.2. It has been classified as critical. This affects an unknown part of the file /common/sysFile/list. The manipulation of the argument sort leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223737 was assigned to this vulnerability.
|
https://vuldb.com/?id.223737
|
2023-03-23T18:33:07.539Z
|
2023-03-23T19:31:03.194Z
|
2023-10-21T11:05:01.299Z
|
{'Vendor': 'n/a', 'Product': 'novel-plus', 'Versions': '3.6.2'}
|
CVE-2023-1484
|
A vulnerability was found in xzjie cms up to 1.0.3 and classified as critical. This issue affects some unknown processing of the file /api/upload. The manipulation of the argument uploadFile leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-223367.
|
https://vuldb.com/?id.223367
|
2023-03-18T08:44:23.312Z
|
2023-03-18T10:00:05.087Z
|
2023-10-21T09:24:16.776Z
|
{'Vendor': 'xzjie', 'Product': 'cms', 'Versions': '1.0.0, 1.0.1, 1.0.2, 1.0.3'}
|
CVE-2023-1892
|
Cross-site Scripting (XSS) - Reflected in GitHub repository sidekiq/sidekiq prior to 7.0.8.
|
https://huntr.dev/bounties/e35e5653-c429-4fb8-94a3-cbc123ae4777
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
2023-04-21T00:00:00
|
{'Vendor': 'sidekiq', 'Product': 'sidekiq/sidekiq', 'Versions': '7.0.4, unspecified'}
|
CVE-2023-1938
|
The WP Fastest Cache WordPress plugin before 1.1.5 does not have CSRF check in an AJAX action, and does not validate user input before using it in the wp_remote_get() function, leading to a Blind SSRF issue
|
https://wpscan.com/vulnerability/92b1c6d8-51db-46aa-bde6-abdfb091aab5
|
2023-04-07T09:44:12.557Z
|
2023-05-30T07:49:14.686Z
|
2023-05-30T07:49:14.686Z
|
{'Vendor': 'Unknown', 'Product': 'WP Fastest Cache', 'Versions': '0'}
|
CVE-2023-1191
|
A vulnerability classified as problematic has been found in fastcms. This affects an unknown part of the file admin/TemplateController.java of the component ZIP File Handler. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-222363.
|
https://vuldb.com/?id.222363
|
2023-03-06T07:21:24.612Z
|
2023-03-06T07:21:45.248Z
|
2023-10-21T07:39:19.257Z
|
{'Vendor': 'n/a', 'Product': 'fastcms', 'Versions': 'n/a'}
|
CVE-2023-1386
|
A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with SUID or SGID, none of these privileged bits are correctly dropped. As a result, in rare circumstances, this flaw could be used by malicious users in the guest to elevate their privileges within the guest and help a host local user to elevate privileges on the host.
|
https://access.redhat.com/security/cve/CVE-2023-1386
|
2023-03-14T10:31:59.556Z
|
2023-07-24T15:19:25.843Z
|
2024-01-23T10:47:17.587Z
|
{'Vendor': 'n/a', 'Product': 'qemu', 'Versions': ''}
|
CVE-2023-1693
|
The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality.
|
https://consumer.huawei.com/en/support/bulletin/2023/4/
|
2023-03-29T09:29:51.236Z
|
2023-05-20T14:12:33.342Z
|
2023-05-20T14:12:33.342Z
|
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.1.0'}
|
CVE-2023-1369
|
A vulnerability was found in TG Soft Vir.IT eXplorer 9.4.86.0. It has been rated as problematic. This issue affects the function 0x82730088 in the library VIRAGTLT.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 9.5 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222875.
|
https://vuldb.com/?id.222875
|
2023-03-13T07:48:22.653Z
|
2023-03-13T09:00:05.427Z
|
2023-10-21T08:26:55.375Z
|
{'Vendor': 'TG Soft', 'Product': 'Vir.IT eXplorer', 'Versions': '9.4.86.0'}
|
CVE-2023-1739
|
A vulnerability was found in SourceCodester Simple and Beautiful Shopping Cart System 1.0 and classified as critical. This issue affects some unknown processing of the file upload.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224627.
|
https://vuldb.com/?id.224627
|
2023-03-30T18:55:20.890Z
|
2023-03-30T20:31:04.713Z
|
2023-10-21T14:06:18.412Z
|
{'Vendor': 'SourceCodester', 'Product': 'Simple and Beautiful Shopping Cart System', 'Versions': '1.0'}
|
CVE-2023-1943
|
Privilege Escalation in kOps using GCE/GCP Provider in Gossip Mode.
|
https://github.com/kubernetes/kops/issues/15539
|
2023-04-07T20:38:48.430Z
|
2023-10-11T23:01:50.876Z
|
2023-10-11T23:01:50.876Z
|
{'Vendor': 'Kubernetes', 'Product': 'kops', 'Versions': '0, 1.25.3, 1.26.0, 1.26.2'}
|
CVE-2023-1410
|
Grafana is an open-source platform for monitoring and observability.
Grafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip.
The stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized.
An attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description.
Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix.
|
https://grafana.com/security/security-advisories/cve-2023-1410/
|
2023-03-15T11:11:52.860Z
|
2023-03-23T07:48:56.246Z
|
2023-04-04T10:16:07.471Z
|
{'Vendor': 'Grafana', 'Product': 'Grafana', 'Versions': '8.0.0, 9.0.0, 9.3.0'}
|
CVE-2023-1040
|
A vulnerability, which was classified as critical, has been found in SourceCodester Online Graduate Tracer System 1.0. Affected by this issue is some unknown functionality of the file tracking/admin/add_acc.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-221798 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.221798
|
2023-02-26T11:54:43.175Z
|
2023-02-26T11:55:02.741Z
|
2023-10-20T22:16:16.292Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Graduate Tracer System', 'Versions': '1.0'}
|
CVE-2023-1555
|
An issue has been discovered in GitLab affecting all versions starting from 15.2 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1. A namespace-level banned user can access the API.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/398587
|
2023-03-22T09:18:21.197Z
|
2023-09-01T10:01:36.711Z
|
2023-09-01T10:01:36.711Z
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '15.2, 16.2, 16.3'}
|
CVE-2023-1105
|
External Control of File Name or Path in GitHub repository flatpressblog/flatpress prior to 1.3.
|
https://github.com/flatpressblog/flatpress/commit/5d5c7f6d8f072d14926fc2c3a97cdd763802f170
|
2023-03-01T00:00:00
|
2023-03-01T00:00:00
|
2023-03-01T00:00:00
|
{'Vendor': 'flatpressblog', 'Product': 'flatpressblog/flatpress', 'Versions': 'unspecified'}
|
CVE-2023-1806
|
The WP Inventory Manager WordPress plugin before 2.1.0.12 does not sanitise and escape the message parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrators.
|
https://wpscan.com/vulnerability/38d99c7d-2d10-4910-b95a-1cb545b813c4
|
2023-04-03T13:41:59.220Z
|
2023-05-08T13:58:13.983Z
|
2023-05-08T13:58:13.983Z
|
{'Vendor': 'Unknown', 'Product': 'WP Inventory Manager', 'Versions': '0'}
|
CVE-2023-1294
|
A vulnerability was found in SourceCodester File Tracker Manager System 1.0. It has been classified as critical. Affected is an unknown function of the file /file_manager/login.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222648.
|
https://vuldb.com/?id.222648
|
2023-03-09T14:38:40.214Z
|
2023-03-09T14:39:23.579Z
|
2023-10-21T07:53:58.183Z
|
{'Vendor': 'SourceCodester', 'Product': 'File Tracker Manager System', 'Versions': '1.0'}
|
CVE-2023-1017
|
An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context.
|
https://trustedcomputinggroup.org/wp-content/uploads/TCGVRT0007-Advisory-FINAL.pdf
|
2023-02-24T16:02:22.626Z
|
2023-02-28T18:02:27.064Z
|
2023-02-28T19:09:18.722Z
|
{'Vendor': 'Trusted Computing Group', 'Product': 'TPM2.0', 'Versions': '1.59'}
|
CVE-2023-1447
|
A vulnerability, which was classified as problematic, has been found in SourceCodester Medicine Tracker System 1.0. Affected by this issue is some unknown functionality of the file app/?page=medicines/manage_medicine. The manipulation of the argument name/description with the input <script>alert('2')</script> leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-223292.
|
https://vuldb.com/?id.223292
|
2023-03-17T06:38:46.165Z
|
2023-03-17T06:39:45.927Z
|
2023-10-21T08:56:12.617Z
|
{'Vendor': 'SourceCodester', 'Product': 'Medicine Tracker System', 'Versions': '1.0'}
|
CVE-2023-1851
|
A vulnerability classified as problematic has been found in SourceCodester Online Payroll System 1.0. This affects an unknown part of the file /admin/employee_add.php. The manipulation of the argument of leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224991.
|
https://vuldb.com/?id.224991
|
2023-04-05T05:50:11.217Z
|
2023-04-05T07:39:29.593Z
|
2023-10-21T17:00:56.862Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Payroll System', 'Versions': '1.0'}
|
CVE-2023-1152
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Utarit Information Technologies Persolus allows SQL Injection. This issue affects Persolus: before 2.03.93.
|
https://www.usom.gov.tr/bildirim/tr-23-0154-2
|
2023-03-02T15:43:10.230Z
|
2023-03-17T08:21:19.538Z
|
2023-03-17T08:37:15.219Z
|
{'Vendor': 'Utarit Information Technologies', 'Product': 'Persolus', 'Versions': '0'}
|
CVE-2023-1502
|
A vulnerability was found in SourceCodester Alphaware Simple E-Commerce System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file function/edit_customer.php. The manipulation of the argument firstname/mi/lastname with the input a' RLIKE SLEEP(5) AND 'dAbu'='dAbu leads to sql injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. VDB-223406 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.223406
|
2023-03-20T07:28:03.847Z
|
2023-03-20T08:00:04.628Z
|
2023-10-21T09:45:00.936Z
|
{'Vendor': 'SourceCodester', 'Product': 'Alphaware Simple E-Commerce System', 'Versions': '1.0'}
|
CVE-2023-1797
|
A vulnerability classified as critical was found in OTCMS 6.0.1. Affected by this vulnerability is an unknown functionality of the file sysCheckFile.php?mudi=sql. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224749 was assigned to this vulnerability.
|
https://vuldb.com/?id.224749
|
2023-04-02T07:27:18.541Z
|
2023-04-02T09:00:07.864Z
|
2023-10-21T14:34:21.879Z
|
{'Vendor': 'n/a', 'Product': 'OTCMS', 'Versions': '6.0.1'}
|
CVE-2023-1328
|
A vulnerability was found in Guizhou 115cms 4.2. It has been classified as problematic. Affected is an unknown function of the file /admin/content/index. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222738 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.222738
|
2023-03-10T16:41:17.723Z
|
2023-03-10T16:42:19.180Z
|
2023-10-21T08:07:23.940Z
|
{'Vendor': 'Guizhou', 'Product': '115cms', 'Versions': '4.2'}
|
CVE-2023-1282
|
The Drag and Drop Multiple File Upload PRO - Contact Form 7 Standard WordPress plugin before 2.11.1 and Drag and Drop Multiple File Upload PRO - Contact Form 7 with Remote Storage Integrations WordPress plugin before 5.0.6.4 do not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high-privilege users such as admins.
|
https://wpscan.com/vulnerability/8a9548c5-59ea-46b0-bfa5-a0f7a259351a
|
2023-03-08T20:34:25.298Z
|
2023-04-17T12:17:42.385Z
|
2023-04-17T12:17:42.385Z
|
{'Vendor': 'Unknown', 'Product': 'Drag and Drop Multiple File Upload PRO - Contact Form 7 Standard', 'Versions': '2.0.0'}
|
CVE-2023-1778
|
This vulnerability exists in GajShield Data Security Firewall firmware versions prior to v4.28 (except v4.21) due to insecure default credentials which allows remote attacker to login as superuser by using default username/password via web-based management interface and/or exposed SSH port thereby enabling remote attackers to execute arbitrary commands with administrative/superuser privileges on the targeted systems.
The vulnerability has been addressed by forcing the user to change their default password to a new non-default password.
|
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0119
|
2023-03-31T11:56:48.453Z
|
2023-04-27T09:33:19.070Z
|
2023-04-28T11:05:32.435Z
|
{'Vendor': 'GajShield', 'Product': 'Data Security Firewall', 'Versions': '4.5, 4.21'}
|
CVE-2023-1902
|
The bluetooth HCI host layer logic not clearing a global reference to a state pointer after handling connection events may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer.
|
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx9g-8fr2-q899
|
2023-04-05T22:24:28.688Z
|
2023-07-10T04:30:14.243Z
|
2023-07-10T04:30:14.243Z
|
{'Vendor': 'zephyrproject-rtos', 'Product': 'Zephyr', 'Versions': '*'}
|
CVE-2023-1451
|
A vulnerability was found in MP4v2 2.1.2. It has been classified as problematic. Affected is the function mp4v2::impl::MP4Track::GetSampleFileOffset of the file mp4track.cpp. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223296.
|
https://vuldb.com/?id.223296
|
2023-03-17T06:48:48.619Z
|
2023-03-17T06:49:07.914Z
|
2023-10-21T09:01:05.519Z
|
{'Vendor': 'n/a', 'Product': 'MP4v2', 'Versions': '2.1.2'}
|
CVE-2023-1514
|
A vulnerability exists in the component RTU500 Scripting interface. When a client connects to a server using TLS, the server presents a certificate. This certificate links a public key to the identity of the service and is signed by a Certification Authority (CA), allowing the client to validate that the remote service can be trusted and is not malicious. If the client does not validate the parameters of the certificate, then attackers could be able to spoof the identity of the service. An attacker could exploit the vulnerability by using faking the identity of a RTU500 device and intercepting the messages initiated via the RTU500 Scripting interface.
|
https://publisher.hitachienergy.com/preview?DocumentId=8DBD000152&languageCode=en&Preview=true
|
2023-03-20T12:32:04.973Z
|
2023-12-19T14:22:37.619Z
|
2023-12-19T14:22:37.619Z
|
{'Vendor': 'Hitachi Energy', 'Product': 'RTU500 Scripting Interface', 'Versions': '1.0.1.30, 1.0.2, 1.1.1'}
|
CVE-2023-1144
|
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
|
2023-03-01T23:26:19.893Z
|
2023-03-27T14:43:11.987Z
|
2023-03-27T14:43:11.987Z
|
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
|
CVE-2023-1847
|
A vulnerability was found in SourceCodester Online Payroll System 1.0 and classified as critical. This issue affects some unknown processing of the file attendance.php. The manipulation of the argument employee leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224987.
|
https://vuldb.com/?id.224987
|
2023-04-05T05:49:56.140Z
|
2023-04-05T06:57:33.916Z
|
2023-10-21T16:56:04.297Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Payroll System', 'Versions': '1.0'}
|
CVE-2023-1390
|
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
|
https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5
|
2023-03-14T00:00:00
|
2023-03-16T00:00:00
|
2023-04-20T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Linux kernel (TIPC kernel module)', 'Versions': 'Fixed in kernel 5.11-rc4'}
|
CVE-2023-1685
|
A vulnerability was found in HadSky up to 7.11.8. It has been declared as critical. This vulnerability affects unknown code of the file /install/index.php of the component Installation Interface. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224242 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.224242
|
2023-03-28T20:30:15.614Z
|
2023-03-29T06:00:06.947Z
|
2023-10-21T13:52:53.427Z
|
{'Vendor': 'n/a', 'Product': 'HadSky', 'Versions': '7.11.0, 7.11.1, 7.11.2, 7.11.3, 7.11.4, 7.11.5, 7.11.6, 7.11.7, 7.11.8'}
|
CVE-2023-1056
|
A vulnerability was found in SourceCodester Doctors Appointment System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /edoc/doctor/patient.php. The manipulation of the argument search12 leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221821 was assigned to this vulnerability.
|
https://vuldb.com/?id.221821
|
2023-02-27T11:06:45.545Z
|
2023-02-27T11:08:22.362Z
|
2023-10-21T07:03:56.503Z
|
{'Vendor': 'SourceCodester', 'Product': 'Doctors Appointment System', 'Versions': '1.0'}
|
CVE-2023-1406
|
The JetEngine WordPress plugin before 3.1.3.1 includes uploaded files without adequately ensuring that they are not executable, leading to a remote code execution vulnerability.
|
https://wpscan.com/vulnerability/2a81b6b1-2339-4889-9c28-1af133df8b65
|
2023-03-14T23:14:31.835Z
|
2023-04-10T13:17:54.722Z
|
2023-04-24T12:09:13.222Z
|
{'Vendor': 'Unknown', 'Product': 'JetEngine', 'Versions': '0'}
|
CVE-2023-1955
|
A vulnerability classified as critical has been found in SourceCodester Online Computer and Laptop Store 1.0. Affected is an unknown function of the file login.php of the component User Registration. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225342 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.225342
|
2023-04-08T06:29:45.793Z
|
2023-04-08T10:00:06.587Z
|
2023-10-22T06:41:38.103Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
|
CVE-2023-1810
|
Heap buffer overflow in Visuals in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
|
2023-04-03T20:48:51.943Z
|
2023-04-04T21:39:33.940Z
|
2023-04-04T21:39:33.940Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
|
CVE-2023-1113
|
A vulnerability was found in SourceCodester Simple Payroll System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file admin/?page=admin of the component POST Parameter Handler. The manipulation of the argument fullname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222073 was assigned to this vulnerability.
|
https://vuldb.com/?id.222073
|
2023-03-01T09:57:27.422Z
|
2023-03-01T09:57:48.233Z
|
2023-10-21T07:16:08.814Z
|
{'Vendor': 'SourceCodester', 'Product': 'Simple Payroll System', 'Versions': '1.0'}
|
CVE-2023-1543
|
Insufficient Session Expiration in GitHub repository answerdev/answer prior to 1.0.6.
|
https://huntr.dev/bounties/f82388d6-dfc3-4fbc-bea6-eb40cf5b2683
|
2023-03-21T00:00:00
|
2023-03-21T00:00:00
|
2023-03-21T00:00:00
|
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
|
CVE-2023-1534
|
Out of bounds read in ANGLE in Google Chrome prior to 111.0.5563.110 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html
|
2023-03-21T00:43:37.256Z
|
2023-03-21T20:50:56.608Z
|
2023-03-21T20:50:56.608Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.110'}
|
CVE-2023-1164
|
A vulnerability was found in KylinSoft kylin-activation on KylinOS and classified as critical. Affected by this issue is some unknown functionality of the component File Import. The manipulation leads to improper authorization. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.11-23 and 1.30.10-5.p23 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222260.
|
https://vuldb.com/?id.222260
|
2023-03-03T06:54:45.992Z
|
2023-03-03T06:56:06.175Z
|
2023-10-21T07:25:54.270Z
|
{'Vendor': 'KylinSoft', 'Product': 'kylin-activation', 'Versions': 'n/a'}
|
CVE-2023-1867
|
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the save function. This makes it possible for unauthenticated attackers to change the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/4c20db2d-f73d-4e52-a275-ab1975ae4b17?source=cve
|
2023-04-05T13:23:25.433Z
|
2023-04-05T13:23:35.413Z
|
2023-04-05T13:23:35.413Z
|
{'Vendor': 'pluginbuilders', 'Product': 'YourChannel: Everything you want in a YouTube plugin.', 'Versions': '*'}
|
CVE-2023-1888
|
The Directorist plugin for WordPress is vulnerable to an arbitrary user password reset in versions up to, and including, 7.5.4. This is due to a lack of validation checks within login.php. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to reset the password of an arbitrary user and gain elevated (e.g., administrator) privileges.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/01943559-e05b-4dca-b322-d880b2729ee7?source=cve
|
2023-04-05T15:53:10.476Z
|
2023-06-09T05:33:09.400Z
|
2023-06-09T05:33:09.400Z
|
{'Vendor': 'wpwax', 'Product': 'Directorist – WordPress Business Directory Plugin with Classified Ads Listings', 'Versions': '*'}
|
CVE-2023-1922
|
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the wpfc_pause_cdn_integration_ajax_request_callback function. This makes it possible for unauthenticated attackers to change cdn settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/a1743b26-861e-4a61-80de-b8cc82308228?source=cve
|
2023-04-06T19:56:30.928Z
|
2023-04-06T19:56:34.794Z
|
2023-04-07T14:03:36.727Z
|
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
|
CVE-2023-1471
|
The WP Popup Banners plugin for WordPress is vulnerable to SQL Injection via the 'banner_id' parameter in versions up to, and including, 1.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with minimal permissions, such as a subscrber, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/8281cb20-73d3-4ab5-910e-d353b2a5cbd8?source=cve
|
2023-03-17T13:08:06.054Z
|
2023-03-17T13:08:10.311Z
|
2023-03-17T13:08:10.311Z
|
{'Vendor': 'access-keys', 'Product': 'WP Popup Banners', 'Versions': '*'}
|
CVE-2023-1021
|
The amr ical events lists WordPress plugin through 6.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
https://wpscan.com/vulnerability/91d04f96-11b2-46dc-860c-dc6c26360bf3
|
2023-02-24T18:10:30.431Z
|
2023-05-02T07:04:51.880Z
|
2023-05-02T07:04:51.880Z
|
{'Vendor': 'Unknown', 'Product': 'amr ical events lists', 'Versions': '0'}
|
CVE-2023-1308
|
A vulnerability classified as critical has been found in SourceCodester Online Graduate Tracer System 1.0. Affected is an unknown function of the file admin/adminlog.php. The manipulation of the argument user leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222696.
|
https://vuldb.com/?id.222696
|
2023-03-10T07:34:08.398Z
|
2023-03-10T07:35:22.681Z
|
2023-10-21T08:00:04.773Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Graduate Tracer System', 'Versions': '1.0'}
|
CVE-2023-1758
|
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
https://huntr.dev/bounties/0854328e-eb00-41a3-9573-8da8f00e369c
|
2023-03-31T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-1133
|
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a vulnerability in which the Device-status service listens on port 10100/ UDP by default. The service accepts the unverified UDP packets and deserializes the content, which could allow an unauthenticated attacker to remotely execute arbitrary code.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
|
2023-03-01T23:15:47.425Z
|
2023-03-27T14:33:18.921Z
|
2023-03-27T14:33:18.921Z
|
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
|
CVE-2023-1099
|
A vulnerability was found in SourceCodester Online Student Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file eduauth/edit-class-detail.php. The manipulation of the argument editid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-222002 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.222002
|
2023-02-28T20:02:55.025Z
|
2023-02-28T20:03:21.662Z
|
2023-10-21T07:12:29.190Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Student Management System', 'Versions': '1.0'}
|
CVE-2023-1563
|
A vulnerability has been found in SourceCodester Student Study Center Desk Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/assign/assign.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223555.
|
https://vuldb.com/?id.223555
|
2023-03-22T10:33:37.524Z
|
2023-03-22T12:31:03.435Z
|
2023-10-21T10:41:49.723Z
|
{'Vendor': 'SourceCodester', 'Product': 'Student Study Center Desk Management System', 'Versions': '1.0'}
|
CVE-2023-1076
|
A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.
|
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=66b2c338adce580dfce2199591e65e2bab889cff
|
2023-02-27T00:00:00
|
2023-03-27T00:00:00
|
2023-05-03T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Linux kernel', 'Versions': 'unknown'}
|
CVE-2023-1426
|
The WP Tiles WordPress plugin through 1.1.2 does not ensure that posts to be displayed are not draft/private, allowing any authenticated users, such as subscriber to retrieve the titles of draft and privates posts for example. AN attacker could also retrieve the title of any other type of post.
|
https://wpscan.com/vulnerability/fdd79bb4-d434-4635-bb2b-84d079ecc746
|
2023-03-16T09:45:42.499Z
|
2023-04-10T13:17:55.647Z
|
2023-04-10T13:17:55.647Z
|
{'Vendor': 'Unknown', 'Product': 'WP Tiles', 'Versions': '0'}
|
CVE-2023-1975
|
Insertion of Sensitive Information Into Sent Data in GitHub repository answerdev/answer prior to 1.0.8.
|
https://huntr.dev/bounties/829cab7a-4ed7-465c-aa96-29f4f73dbfff
|
2023-04-11T00:00:00
|
2023-04-11T00:00:00
|
2023-04-11T00:00:00
|
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
|
CVE-2023-1575
|
The Mega Main Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via some of its settings parameters in versions up to, and including, 2.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/a44ce6a3-0a9d-4bce-9251-f3a38b000645?source=cve
|
2023-03-22T13:29:05.763Z
|
2023-03-29T14:19:22.627Z
|
2023-03-29T14:19:22.627Z
|
{'Vendor': 'MegaMain', 'Product': 'Mega Main Menu', 'Versions': '*'}
|
CVE-2023-1125
|
The Ruby Help Desk WordPress plugin before 1.3.4 does not ensure that the ticket being modified belongs to the user making the request, allowing an attacker to close and/or add files and replies to tickets other than their own.
|
https://wpscan.com/vulnerability/e8a4b6ab-47f8-495d-a22c-dcf914dfb58c
|
2023-03-01T15:29:51.344Z
|
2023-05-02T07:04:52.700Z
|
2023-05-02T07:04:52.700Z
|
{'Vendor': 'Unknown', 'Product': 'Ruby Help Desk', 'Versions': '0'}
|
CVE-2023-1826
|
A vulnerability, which was classified as critical, was found in SourceCodester Online Computer and Laptop Store 1.0. This affects an unknown part of the file php-ocls\admin\system_info\index.php. The manipulation of the argument img leads to unrestricted upload. It is possible to initiate the attack remotely. The identifier VDB-224841 was assigned to this vulnerability.
|
https://vuldb.com/?id.224841
|
2023-04-04T08:35:01.639Z
|
2023-04-04T09:00:05.968Z
|
2023-10-21T16:51:11.623Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
|
CVE-2023-1963
|
A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file index.php of the component Search. The manipulation of the argument searchinput leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225359.
|
https://vuldb.com/?id.225359
|
2023-04-09T07:41:37.385Z
|
2023-04-09T08:00:06.739Z
|
2023-10-22T09:26:55.901Z
|
{'Vendor': 'PHPGurukul', 'Product': 'Bank Locker Management System', 'Versions': '1.0'}
|
CVE-2023-1430
|
The FluentCRM - Marketing Automation For WordPress plugin for WordPress is vulnerable to unauthorized modification of data in versions up to, and including, 2.7.40 due to the use of an MD5 hash without a salt to control subscriptions. This makes it possible for unauthenticated attackers to unsubscribe users from lists and manage subscriptions, granted they gain access to any targeted subscribers email address.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/de6da87e-8f7d-4120-8a1b-390ef7733d84?source=cve
|
2023-03-16T12:19:40.945Z
|
2023-06-09T05:33:37.287Z
|
2023-06-09T05:33:37.287Z
|
{'Vendor': 'techjewel', 'Product': 'Email Marketing, Newsletter, Email Automation and CRM Plugin for WordPress by FluentCRM', 'Versions': '2.7.40'}
|
CVE-2023-1060
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in YKM YKM CRM allows Reflected XSS.This issue affects YKM CRM: before 23.03.30.
|
https://www.usom.gov.tr/bildirim/tr-23-0189
|
2023-02-27T11:07:03.550Z
|
2023-03-31T09:02:04.236Z
|
2023-03-31T09:02:04.236Z
|
{'Vendor': 'YKM', 'Product': 'YKM CRM', 'Versions': '0'}
|
CVE-2023-1349
|
A vulnerability, which was classified as problematic, has been found in Hsycms 3.1. Affected by this issue is some unknown functionality of the file controller\cate.php of the component Add Category Module. The manipulation of the argument title leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-222842 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.222842
|
2023-03-11T08:05:17.339Z
|
2023-03-11T08:05:31.504Z
|
2023-10-21T08:08:37.063Z
|
{'Vendor': 'n/a', 'Product': 'Hsycms', 'Versions': '3.1'}
|
CVE-2023-1719
|
Global variable extraction in bitrix/modules/main/tools.php in Bitrix24 22.0.300 allows unauthenticated remote attackers to (1) enumerate attachments on the server and (2) execute arbitrary JavaScript code in the victim's browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via overwriting uninitialised variables.
|
https://starlabs.sg/advisories/23/23-1719/
|
2023-03-30T09:19:45.104Z
|
2023-11-01T09:04:19.695Z
|
2023-11-01T09:04:19.695Z
|
{'Vendor': 'Bitrix24', 'Product': 'Bitrix24', 'Versions': '0'}
|
CVE-2023-1871
|
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the deleteLang function. This makes it possible for unauthenticated attackers to reset the plugin's quick language translation settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/f7ae863c-4638-49ab-bb1f-52346884c3aa?source=cve
|
2023-04-05T13:25:18.361Z
|
2023-04-05T13:25:27.638Z
|
2023-04-05T13:25:27.638Z
|
{'Vendor': 'pluginbuilders', 'Product': 'YourChannel: Everything you want in a YouTube plugin.', 'Versions': '*'}
|
CVE-2023-1488
|
A vulnerability, which was classified as problematic, was found in Lespeed WiseCleaner Wise System Monitor 1.5.3.54. Affected is the function 0x9C40A0D8/0x9C40A0DC/0x9C40A0E0 in the library WiseHDInfo64.dll of the component IoControlCode Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-223374 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.223374
|
2023-03-18T20:02:54.286Z
|
2023-03-18T21:00:06.112Z
|
2023-10-21T09:29:09.540Z
|
{'Vendor': 'Lespeed', 'Product': 'WiseCleaner Wise System Monitor', 'Versions': '1.5.3.54'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.