CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-1829 | A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root.
We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28 | 2023-04-04T10:32:43.055Z | 2023-04-12T11:16:59.101Z | 2023-04-12T11:37:42.774Z | {'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '3.8'} |
CVE-2023-1983 | A vulnerability was found in SourceCodester Sales Tracker Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/products/manage_product.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-225530 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.225530 | 2023-04-11T16:30:38.677Z | 2023-04-11T17:00:04.951Z | 2023-10-22T09:33:01.785Z | {'Vendor': 'SourceCodester', 'Product': 'Sales Tracker Management System', 'Versions': '1.0'} |
CVE-2023-1254 | A vulnerability has been found in SourceCodester Health Center Patient Record Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file birthing_print.php. The manipulation of the argument birth_id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222484. | https://vuldb.com/?id.222484 | 2023-03-07T14:53:50.732Z | 2023-03-07T14:54:30.691Z | 2023-10-21T07:42:58.843Z | {'Vendor': 'SourceCodester', 'Product': 'Health Center Patient Record Management System', 'Versions': '1.0'} |
CVE-2023-1311 | A vulnerability, which was classified as critical, was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. This affects an unknown part of the file large.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222699. | https://vuldb.com/?id.222699 | 2023-03-10T07:39:02.739Z | 2023-03-10T07:39:49.218Z | 2023-10-21T08:03:44.471Z | {'Vendor': 'SourceCodester', 'Product': 'Friendly Island Pizza Website and Ordering System', 'Versions': '1.0'} |
CVE-2023-1741 | A vulnerability was found in jeecg-boot 3.5.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file SysDictMapper.java of the component Sleep Command Handler. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224629 was assigned to this vulnerability. | https://vuldb.com/?id.224629 | 2023-03-30T19:01:43.863Z | 2023-03-30T21:00:06.950Z | 2023-10-21T14:08:44.794Z | {'Vendor': 'n/a', 'Product': 'jeecg-boot', 'Versions': '3.5.0'} |
CVE-2023-1192 | A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service. | https://access.redhat.com/security/cve/CVE-2023-1192 | 2023-03-06T08:43:46.689Z | 2023-11-01T19:01:47.336Z | 2023-11-01T19:01:47.336Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''} |
CVE-2023-1468 | A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipulation of the argument date_from/date_to leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-223327. | https://vuldb.com/?id.223327 | 2023-03-17T11:44:14.789Z | 2023-03-17T11:45:24.209Z | 2023-10-21T09:14:30.706Z | {'Vendor': 'SourceCodester', 'Product': 'Student Study Center Desk Management System', 'Versions': '1.0'} |
CVE-2023-1038 | A vulnerability classified as critical has been found in SourceCodester Online Reviewer Management System 1.0. Affected is an unknown function of the file /reviewer_0/admins/assessments/pretest/questions-view.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221796. | https://vuldb.com/?id.221796 | 2023-02-26T11:51:24.731Z | 2023-02-26T11:51:42.552Z | 2023-10-20T22:13:49.444Z | {'Vendor': 'SourceCodester', 'Product': 'Online Reviewer Management System', 'Versions': '1.0'} |
CVE-2023-1891 | The Accordion & FAQ WordPress plugin before 1.9.9 does not escape various generated URLs, before outputting them in attributes when some notices are displayed, leading to Reflected Cross-Site Scripting | https://wpscan.com/vulnerability/4e5d993f-cc20-4b5f-b4c8-c13004151828 | 2023-04-05T16:55:31.123Z | 2023-06-27T13:17:16.610Z | 2023-06-27T13:17:16.610Z | {'Vendor': 'Unknown', 'Product': 'Accordion & FAQ', 'Versions': '0'} |
CVE-2023-1487 | A vulnerability, which was classified as problematic, has been found in Lespeed WiseCleaner Wise System Monitor 1.5.3.54. This issue affects the function 0x9C40208C/0x9C402000/0x9C402084/0x9C402088/0x9C402004/0x9C4060C4/0x9C4060CC/0x9C4060D0/0x9C4060D4/0x9C40A0DC/0x9C40A0D8/0x9C40A0DC/0x9C40A0E0 in the library WiseHDInfo64.dll of the component IoControlCode Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-223373 was assigned to this vulnerability. | https://vuldb.com/?id.223373 | 2023-03-18T20:02:47.861Z | 2023-03-18T21:00:04.837Z | 2023-10-21T09:27:56.355Z | {'Vendor': 'Lespeed', 'Product': 'WiseCleaner Wise System Monitor', 'Versions': '1.5.3.54'} |
CVE-2023-1690 | A vulnerability, which was classified as problematic, has been found in SourceCodester Earnings and Expense Tracker App 1.0. This issue affects some unknown processing of the file LoginRegistration.php?a=register_user. The manipulation of the argument fullname leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-224309 was assigned to this vulnerability. | https://vuldb.com/?id.224309 | 2023-03-28T21:07:19.947Z | 2023-03-29T10:31:04.384Z | 2023-10-21T13:58:59.394Z | {'Vendor': 'SourceCodester', 'Product': 'Earnings and Expense Tracker App', 'Versions': '1.0'} |
CVE-2023-1385 | Improper JPAKE implementation allows offline PIN brute-forcing due to the initialization of random values to a known value, which leads to unauthorized authentication to amzn.lightning services.
This issue affects:
Amazon Fire TV Stick 3rd gen versions prior to 6.2.9.5.
Insignia TV with FireOS 7.6.3.3. | https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/ | 2023-03-14T09:59:35.119Z | 2023-05-03T12:33:31.872Z | 2023-05-03T12:33:31.872Z | {'Vendor': 'Amazon', 'Product': 'Fire TV Stick 3rd gen', 'Versions': '6.2.9.4'} |
CVE-2023-1805 | The Product Catalog Feed by PixelYourSite WordPress plugin before 2.1.1 does not sanitise and escape the page parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/46b4582f-7651-4b74-a00b-1788587ecfa8 | 2023-04-03T12:58:18.522Z | 2023-05-02T07:04:54.297Z | 2023-05-02T07:04:54.297Z | {'Vendor': 'Unknown', 'Product': 'Product Catalog Feed by PixelYourSite', 'Versions': '0'} |
CVE-2023-1556 | A vulnerability was found in SourceCodester Judging Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file summary_results.php. The manipulation of the argument main_event_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223549 was assigned to this vulnerability. | https://vuldb.com/?id.223549 | 2023-03-22T09:54:47.276Z | 2023-03-22T10:31:03.237Z | 2023-10-21T09:52:20.000Z | {'Vendor': 'SourceCodester', 'Product': 'Judging Management System', 'Versions': '1.0'} |
CVE-2023-1106 | Cross-site Scripting (XSS) - Reflected in GitHub repository flatpressblog/flatpress prior to 1.3. | https://github.com/flatpressblog/flatpress/commit/5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1 | 2023-03-01T00:00:00 | 2023-03-02T00:00:00 | 2023-03-02T00:00:00 | {'Vendor': 'flatpressblog', 'Product': 'flatpressblog/flatpress', 'Versions': 'unspecified'} |
CVE-2023-1413 | The WP VR WordPress plugin before 8.2.9 does not sanitise and escape some parameters before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/6938fee5-3510-45e6-8112-c9e2b30f6881 | 2023-03-15T14:48:18.738Z | 2023-04-17T12:17:47.151Z | 2023-04-17T12:17:47.151Z | {'Vendor': 'Unknown', 'Product': 'WP VR', 'Versions': '0'} |
CVE-2023-1043 | A vulnerability was found in MuYuCMS 2.2. It has been classified as problematic. Affected is an unknown function of the file /editor/index.php. The manipulation of the argument dir_path leads to relative path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221802 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.221802 | 2023-02-26T12:20:14.773Z | 2023-02-26T12:20:47.327Z | 2023-10-20T22:19:55.840Z | {'Vendor': 'n/a', 'Product': 'MuYuCMS', 'Versions': '2.2'} |
CVE-2023-1940 | A vulnerability classified as critical was found in SourceCodester Simple and Beautiful Shopping Cart System 1.0. This vulnerability affects unknown code of the file delete_user_query.php. The manipulation of the argument user_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225316. | https://vuldb.com/?id.225316 | 2023-04-07T16:36:17.327Z | 2023-04-07T17:31:03.086Z | 2023-10-22T06:27:00.149Z | {'Vendor': 'SourceCodester', 'Product': 'Simple and Beautiful Shopping Cart System', 'Versions': '1.0'} |
CVE-2023-1297 | Consul and Consul Enterprise's cluster peering implementation contained a flaw whereby a peer cluster with service of the same name as a local service could corrupt Consul state, resulting in denial of service. This vulnerability was resolved in Consul 1.14.5, and 1.15.3 | https://discuss.hashicorp.com/t/hcsec-2023-15-consul-cluster-peering-can-result-in-denial-of-service/54515 | 2023-03-09T18:51:51.406Z | 2023-06-02T22:48:28.938Z | 2023-06-02T22:48:28.938Z | {'Vendor': 'HashiCorp', 'Product': 'Consul', 'Versions': '1.14.0, 1.15.0'} |
CVE-2023-1628 | A vulnerability classified as problematic has been found in Jianming Antivirus 16.2.2022.418. Affected is an unknown function in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. VDB-224010 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.224010 | 2023-03-25T10:06:02.177Z | 2023-03-25T11:00:04.340Z | 2023-10-21T11:15:59.895Z | {'Vendor': 'Jianming', 'Product': 'Antivirus', 'Versions': '16.2.2022.418'} |
CVE-2023-1782 | HashiCorp Nomad and Nomad Enterprise versions 1.5.0 up to 1.5.2 allow unauthenticated users to bypass intended ACL authorizations for clusters where mTLS is not enabled. This issue is fixed in version 1.5.3. | https://discuss.hashicorp.com/t/hcsec-2023-12-nomad-unauthenticated-client-agent-http-request-privilege-escalation/52375 | 2023-03-31T14:50:56.892Z | 2023-04-05T19:10:52.697Z | 2023-04-05T19:10:52.697Z | {'Vendor': 'HashiCorp', 'Product': 'Nomad', 'Versions': '1.5.0'} |
CVE-2023-1278 | A vulnerability, which was classified as problematic, has been found in IBOS up to 4.5.5. Affected by this issue is some unknown functionality of the file mobil/index.php. The manipulation of the argument accesstoken leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-222608. | https://vuldb.com/?id.222608 | 2023-03-08T18:18:07.070Z | 2023-03-08T18:19:19.712Z | 2023-10-21T07:47:51.503Z | {'Vendor': 'n/a', 'Product': 'IBOS', 'Versions': '4.5.0, 4.5.1, 4.5.2, 4.5.3, 4.5.4, 4.5.5'} |
CVE-2023-1151 | A vulnerability was found in SourceCodester Electronic Medical Records System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file administrator.php of the component Cookie Handler. The manipulation of the argument userid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222163. | https://vuldb.com/?id.222163 | 2023-03-02T06:22:53.208Z | 2023-03-02T06:31:04.911Z | 2023-10-21T07:19:48.311Z | {'Vendor': 'SourceCodester', 'Product': 'Electronic Medical Records System', 'Versions': '1.0'} |
CVE-2023-1501 | A vulnerability, which was classified as critical, was found in RockOA 2.3.2. This affects the function runAction of the file acloudCosAction.php.SQL. The manipulation of the argument fileid leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223401 was assigned to this vulnerability. | https://vuldb.com/?id.223401 | 2023-03-19T18:43:32.334Z | 2023-03-19T20:00:05.695Z | 2023-10-21T09:43:47.764Z | {'Vendor': 'n/a', 'Product': 'RockOA', 'Versions': '2.3.2'} |
CVE-2023-1852 | A vulnerability classified as problematic was found in SourceCodester Online Payroll System 1.0. This vulnerability affects unknown code of the file /admin/deduction_edit.php. The manipulation of the argument description leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-224992. | https://vuldb.com/?id.224992 | 2023-04-05T05:50:16.403Z | 2023-04-05T07:40:11.360Z | 2023-10-21T17:02:10.103Z | {'Vendor': 'SourceCodester', 'Product': 'Online Payroll System', 'Versions': '1.0'} |
CVE-2023-1917 | The PowerPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in versions up to, and including, 10.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: A partial fix for the issue was introduced in version 10.0.1, and an additional patch (version 10.0.2) was released to address a workaround. | https://www.wordfence.com/threat-intel/vulnerabilities/id/44583cb7-bc32-4e62-8431-f5f1f6baeff2?source=cve | 2023-04-06T19:10:31.104Z | 2023-06-09T05:33:15.873Z | 2023-06-09T05:33:15.873Z | {'Vendor': 'amandato', 'Product': 'PowerPress Podcasting plugin by Blubrry', 'Versions': '*'} |
CVE-2023-1014 | Improper Protection for Outbound Error Messages and Alert Signals vulnerability in Virames Vira-Investing allows Account Footprinting.This issue affects Vira-Investing: before 1.0.84.86.
| https://www.usom.gov.tr/bildirim/tr-23-0183 | 2023-02-24T14:12:38.300Z | 2023-03-30T08:17:03.971Z | 2023-04-06T05:43:36.670Z | {'Vendor': 'Virames', 'Product': 'Vira-Investing', 'Versions': '0'} |
CVE-2023-1444 | A vulnerability was found in Filseclab Twister Antivirus 8. It has been rated as critical. This issue affects the function 0x8011206B in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223289 was assigned to this vulnerability. | https://vuldb.com/?id.223289 | 2023-03-17T06:33:05.214Z | 2023-03-17T06:33:20.430Z | 2023-10-21T08:52:33.040Z | {'Vendor': 'Filseclab', 'Product': 'Twister Antivirus', 'Versions': '8'} |
CVE-2023-1281 | Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root.
This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.
| https://kernel.dance/#ee059170b1f7e94e55fa6cadee544e176a6e59c2 | 2023-03-08T20:18:23.204Z | 2023-03-22T13:18:55.460Z | 2023-03-22T13:18:55.460Z | {'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '4.14'} |
CVE-2023-1794 | A vulnerability was found in SourceCodester Police Crime Record Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/casedetails.php of the component GET Parameter Handler. The manipulation of the argument id with the input "><script>alert(233)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224746 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.224746 | 2023-04-02T06:49:12.209Z | 2023-04-02T08:00:05.737Z | 2023-10-21T14:30:42.099Z | {'Vendor': 'SourceCodester', 'Product': 'Police Crime Record Management System', 'Versions': '1.0'} |
CVE-2023-1844 | The Subscribe2 plugin for WordPress is vulnerable to unauthorized access to email functionality due to a missing capability check when sending test emails in versions up to, and including, 10.40. This makes it possible for author-level attackers to send emails with arbitrary content and attachments to site users. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c34ce601-5cf9-433f-bc9d-5c705eba6b08?source=cve | 2023-04-04T21:01:11.671Z | 2023-06-28T02:34:23.370Z | 2023-06-28T02:34:23.370Z | {'Vendor': 'wedevs', 'Product': 'Subscribe2 – Form, Email Subscribers & Newsletters', 'Versions': '*'} |
CVE-2023-1517 | Cross-site Scripting (XSS) - DOM in GitHub repository pimcore/pimcore prior to 10.5.19. | https://huntr.dev/bounties/82adf0dd-8ebd-4d15-9f91-6060c8fa5a0d | 2023-03-20T00:00:00 | 2023-03-20T00:00:00 | 2023-03-20T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-1147 | Cross-site Scripting (XSS) - Stored in GitHub repository flatpressblog/flatpress prior to 1.3. | https://huntr.dev/bounties/187f5353-f866-4d26-a5ba-fca378520020 | 2023-03-02T00:00:00 | 2023-03-02T00:00:00 | 2023-03-02T00:00:00 | {'Vendor': 'flatpressblog', 'Product': 'flatpressblog/flatpress', 'Versions': 'unspecified'} |
CVE-2023-1452 | A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability. | https://vuldb.com/?id.223297 | 2023-03-17T06:50:23.089Z | 2023-03-17T06:50:37.037Z | 2023-10-21T09:02:18.715Z | {'Vendor': 'n/a', 'Product': 'GPAC', 'Versions': '2.3-DEV-rev35-gbbca86917-master'} |
CVE-2023-1002 | A vulnerability, which was classified as problematic, has been found in MuYuCMS 2.2. This issue affects some unknown processing of the file index.php. The manipulation of the argument file_path leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221735. | https://vuldb.com/?id.221735 | 2023-02-24T07:41:58.194Z | 2023-02-24T07:42:30.614Z | 2023-10-20T21:57:57.770Z | {'Vendor': 'n/a', 'Product': 'MuYuCMS', 'Versions': '2.2'} |
CVE-2023-1901 | The bluetooth HCI host layer logic not clearing a global reference to a semaphore after synchronously sending HCI commands may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer.
| https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xvvm-8mcm-9cq3 | 2023-04-05T22:11:42.140Z | 2023-07-10T04:37:33.126Z | 2023-07-10T04:37:33.126Z | {'Vendor': 'zephyrproject-rtos', 'Product': 'Zephyr', 'Versions': '*'} |
CVE-2023-1686 | A vulnerability was found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file bsenordering/admin/category/index.php of the component GET Parameter Handler. The manipulation of the argument view with the input <script>alert(233)</script> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224243. | https://vuldb.com/?id.224243 | 2023-03-28T20:31:44.835Z | 2023-03-29T07:00:06.029Z | 2023-10-21T13:54:06.598Z | {'Vendor': 'SourceCodester', 'Product': 'Young Entrepreneur E-Negosyo System', 'Versions': '1.0'} |
CVE-2023-1393 | A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later. | https://www.openwall.com/lists/oss-security/2023/03/29/1 | 2023-03-14T00:00:00 | 2023-03-30T00:00:00 | 2023-07-23T00:00:00 | {'Vendor': 'n/a', 'Product': 'xorg-server', 'Versions': 'xorg-server 21.1.8'} |
CVE-2023-1669 | The SEOPress WordPress plugin before 6.5.0.3 unserializes user input provided via the settings, which could allow high-privilege users such as admin to perform PHP Object Injection when a suitable gadget is present. | https://wpscan.com/vulnerability/fb8791f5-2879-431e-9afc-06d5839e4b9d | 2023-03-28T10:05:02.936Z | 2023-05-02T07:04:55.190Z | 2023-05-02T07:04:55.190Z | {'Vendor': 'Unknown', 'Product': 'SEOPress', 'Versions': '0'} |
CVE-2023-1239 | Cross-site Scripting (XSS) - Reflected in GitHub repository answerdev/answer prior to 1.0.6. | https://huntr.dev/bounties/3a22c609-d2d8-4613-815d-58f5990b8bd8 | 2023-03-07T00:00:00 | 2023-03-07T00:00:00 | 2023-03-07T00:00:00 | {'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'} |
CVE-2023-1110 | The Yellow Yard Searchbar WordPress plugin before 2.8.12 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks | https://wpscan.com/vulnerability/1830e829-4a43-4d98-8214-eecec6bef694 | 2023-03-01T08:49:54.602Z | 2023-08-16T11:03:26.120Z | 2023-08-16T11:03:26.120Z | {'Vendor': 'Unknown', 'Product': 'Yellow Yard Searchbar', 'Versions': '0'} |
CVE-2023-1540 | Observable Response Discrepancy in GitHub repository answerdev/answer prior to 1.0.6. | https://huntr.dev/bounties/d8d6c259-a0f2-4209-a3b0-ecbf3eb092f4 | 2023-03-21T00:00:00 | 2023-03-21T00:00:00 | 2023-03-21T00:00:00 | {'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'} |
CVE-2023-1813 | Inappropriate implementation in Extensions in Google Chrome prior to 112.0.5615.49 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html | 2023-04-03T20:48:52.391Z | 2023-04-04T21:39:34.424Z | 2023-04-04T21:39:34.424Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'} |
CVE-2023-1956 | A vulnerability classified as critical was found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=delete_img of the component Image Handler. The manipulation of the argument path leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225343. | https://vuldb.com/?id.225343 | 2023-04-08T06:29:49.194Z | 2023-04-08T10:00:07.965Z | 2023-10-22T06:42:51.234Z | {'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'} |
CVE-2023-1055 | A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP tries to decode the userPassword attribute instead of the userCertificate attribute which could lead into sensitive information leaked. An attacker with a local account where the cockpit-389-ds is running can list the processes and display the hashed passwords. The highest threat from this vulnerability is to data confidentiality. | https://bugzilla.redhat.com/show_bug.cgi?id=2173517#c0 | 2023-02-27T00:00:00 | 2023-02-27T00:00:00 | 2023-07-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'Red Hat Directory Server', 'Versions': '11 and 12'} |
CVE-2023-1405 | The Formidable Forms WordPress plugin before 6.2 unserializes user input, which could allow anonymous users to perform PHP Object Injection when a suitable gadget is present. | https://wpscan.com/vulnerability/8c727a31-ff65-4472-8191-b1becc08192a/ | 2023-03-14T18:26:01.211Z | 2024-01-16T15:56:18.763Z | 2024-01-16T15:56:18.763Z | {'Vendor': 'Unknown', 'Product': 'Formidable Forms', 'Versions': '0'} |
CVE-2023-1541 | Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6. | https://huntr.dev/bounties/8fd891c6-b04e-4dac-818f-9ea30861cd92 | 2023-03-21T00:00:00 | 2023-03-21T00:00:00 | 2023-03-21T00:00:00 | {'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'} |
CVE-2023-1812 | Out of bounds memory access in DOM Bindings in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html | 2023-04-03T20:48:52.262Z | 2023-04-04T21:39:34.328Z | 2023-04-04T21:39:34.328Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'} |
CVE-2023-1957 | A vulnerability, which was classified as critical, has been found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this issue is some unknown functionality of the file /classes/Master.php?f=save_sub_category of the component Subcategory Handler. The manipulation of the argument sub_category leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225344. | https://vuldb.com/?id.225344 | 2023-04-08T06:29:53.848Z | 2023-04-08T10:31:03.498Z | 2023-10-22T06:44:04.372Z | {'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'} |
CVE-2023-1054 | A vulnerability was found in SourceCodester Music Gallery Site 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/?page=user/manage. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-221820. | https://vuldb.com/?id.221820 | 2023-02-27T10:43:21.398Z | 2023-02-27T10:43:51.919Z | 2023-10-21T07:02:43.355Z | {'Vendor': 'SourceCodester', 'Product': 'Music Gallery Site', 'Versions': '1.0'} |
CVE-2023-1404 | The Weaver Show Posts Plugin for WordPress is vulnerable to stored Cross-Site Scripting due to insufficient escaping of the profile display name in versions up to, and including, 1.6. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c8647c44-4879-4895-bd07-19f7d62a7326?source=cve | 2023-03-14T17:37:30.276Z | 2023-06-09T05:33:33.172Z | 2023-06-09T05:33:33.172Z | {'Vendor': 'wpweaver', 'Product': 'Weaver Show Posts', 'Versions': '*'} |
CVE-2023-1687 | A vulnerability classified as problematic has been found in SourceCodester Simple Task Allocation System 1.0. Affected is an unknown function of the file LoginRegistration.php?a=register_user. The manipulation of the argument Fullname leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-224244. | https://vuldb.com/?id.224244 | 2023-03-28T20:37:39.117Z | 2023-03-29T08:00:06.721Z | 2023-10-21T13:55:19.783Z | {'Vendor': 'SourceCodester', 'Product': 'Simple Task Allocation System', 'Versions': '1.0'} |
CVE-2023-1392 | A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. Affected by this vulnerability is the function save_menu. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222979. | https://vuldb.com/?id.222979 | 2023-03-14T14:23:15.076Z | 2023-03-14T14:24:13.917Z | 2023-10-21T08:31:48.166Z | {'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'} |
CVE-2023-1668 | A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow. | https://bugzilla.redhat.com/show_bug.cgi?id=2137666 | 2023-03-27T00:00:00 | 2023-04-10T00:00:00 | 2023-11-26T11:06:12.014505 | {'Vendor': 'n/a', 'Product': 'openvswitch', 'Versions': 'unknown'} |
CVE-2023-1238 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6. | https://huntr.dev/bounties/52f97267-1439-4bb6-862b-89b8fafce50d | 2023-03-07T00:00:00 | 2023-03-07T00:00:00 | 2023-03-07T00:00:00 | {'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'} |
CVE-2023-1845 | A vulnerability, which was classified as critical, was found in SourceCodester Online Payroll System 1.0. This affects an unknown part of the file /admin/employee_row.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224985 was assigned to this vulnerability. | https://vuldb.com/?id.224985 | 2023-04-05T05:49:50.618Z | 2023-04-05T06:00:07.498Z | 2023-10-21T16:53:37.892Z | {'Vendor': 'SourceCodester', 'Product': 'Online Payroll System', 'Versions': '1.0'} |
CVE-2023-1516 | RoboDK versions 5.5.3 and prior contain an insecure permission
assignment to critical directories vulnerability, which could allow a
local user to escalate privileges and write files to the RoboDK process
and achieve code execution.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-01 | 2023-03-20T14:20:50.559Z | 2023-03-28T20:34:52.453Z | 2023-03-28T20:34:52.453Z | {'Vendor': 'RoboDK ', 'Product': 'RoboDK ', 'Versions': '0'} |
CVE-2023-1146 | Cross-site Scripting (XSS) - Generic in GitHub repository flatpressblog/flatpress prior to 1.3. | https://huntr.dev/bounties/d6d1e1e2-2f67-4d28-aa84-b30fb1d2e737 | 2023-03-02T00:00:00 | 2023-03-02T00:00:00 | 2023-03-02T00:00:00 | {'Vendor': 'flatpressblog', 'Product': 'flatpressblog/flatpress', 'Versions': 'unspecified'} |
CVE-2023-1453 | A vulnerability was found in Watchdog Anti-Virus 1.4.214.0. It has been rated as critical. Affected by this issue is the function 0x80002008 in the library wsdk-driver.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-223298 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.223298 | 2023-03-17T06:51:33.925Z | 2023-03-17T06:52:10.093Z | 2023-10-21T09:03:31.848Z | {'Vendor': 'Watchdog', 'Product': 'Anti-Virus', 'Versions': '1.4.214.0'} |
CVE-2023-1003 | A vulnerability, which was classified as critical, was found in Typora up to 1.5.5 on Windows. Affected is an unknown function of the component WSH JScript Handler. The manipulation leads to code injection. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.8 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221736. | https://vuldb.com/?id.221736 | 2023-02-24T07:51:22.484Z | 2023-02-24T07:53:26.836Z | 2023-10-20T21:59:11.105Z | {'Vendor': 'n/a', 'Product': 'Typora', 'Versions': '1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.5.5'} |
CVE-2023-1900 | A vulnerability within the Avira network protection feature allowed an attacker with local execution rights to cause an overflow. This could corrupt the data on the heap and lead to a denial-of-service situation.
Issue was fixed with Endpointprotection.exe version 1.0.2303.633 | https://support.norton.com/sp/static/external/tools/security-advisories.html | 2023-04-05T21:22:42.387Z | 2023-04-19T18:47:17.392Z | 2023-04-19T18:47:17.392Z | {'Vendor': 'AVIRA', 'Product': 'Avira Antivirus ', 'Versions': '0'} |
CVE-2023-1795 | A vulnerability was found in SourceCodester Gadget Works Online Ordering System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/products/index.php of the component GET Parameter Handler. The manipulation of the argument view with the input <script>alert(666)</script> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224747. | https://vuldb.com/?id.224747 | 2023-04-02T07:03:55.433Z | 2023-04-02T08:31:03.827Z | 2023-10-21T14:31:55.341Z | {'Vendor': 'SourceCodester', 'Product': 'Gadget Works Online Ordering System', 'Versions': '1.0'} |
CVE-2023-1150 | Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets. | https://cert.vde.com/en/advisories/VDE-2023-005/ | 2023-03-02T05:38:38.812Z | 2023-06-26T06:19:53.942Z | 2023-06-26T06:19:53.942Z | {'Vendor': 'WAGO', 'Product': '750-332', 'Versions': '0'} |
CVE-2023-1500 | A vulnerability, which was classified as problematic, has been found in code-projects Simple Art Gallery 1.0. Affected by this issue is some unknown functionality of the file adminHome.php. The manipulation of the argument about_info leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223400. | https://vuldb.com/?id.223400 | 2023-03-19T18:39:26.215Z | 2023-03-19T20:00:04.451Z | 2023-10-21T09:42:34.622Z | {'Vendor': 'code-projects', 'Product': 'Simple Art Gallery', 'Versions': '1.0'} |
CVE-2023-1853 | A vulnerability, which was classified as problematic, has been found in SourceCodester Online Payroll System 1.0. This issue affects some unknown processing of the file /admin/employee_edit.php. The manipulation of the argument of leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224993 was assigned to this vulnerability. | https://vuldb.com/?id.224993 | 2023-04-05T05:50:20.551Z | 2023-04-05T07:40:12.354Z | 2023-10-21T17:03:23.337Z | {'Vendor': 'SourceCodester', 'Product': 'Online Payroll System', 'Versions': '1.0'} |
CVE-2023-1916 | A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x. | https://gitlab.com/libtiff/libtiff/-/issues/536%2C | 2023-04-06T00:00:00 | 2023-04-10T00:00:00 | 2023-12-23T07:06:24.612122 | {'Vendor': 'n/a', 'Product': 'libtiff', 'Versions': 'libtiff versions 4.x and newer are affected'} |
CVE-2023-1015 | null | null | 2023-02-24T14:30:14.032Z | null | 2023-03-10T11:34:38.836Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-1445 | A vulnerability classified as problematic has been found in Filseclab Twister Antivirus 8. Affected is the function 0x80112053 in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. VDB-223290 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.223290 | 2023-03-17T06:35:54.109Z | 2023-03-17T06:36:09.789Z | 2023-10-21T08:53:46.200Z | {'Vendor': 'Filseclab', 'Product': 'Twister Antivirus', 'Versions': '8'} |
CVE-2023-1296 | HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.5.0 did not correctly enforce deny policies applied to a workload’s variables. Fixed in 1.4.6 and 1.5.1. | https://discuss.hashicorp.com/t/hcsec-2023-09-nomad-acls-can-not-deny-access-to-workloads-own-variables/51390 | 2023-03-09T18:50:52.818Z | 2023-03-14T14:45:24.074Z | 2023-03-14T14:45:24.074Z | {'Vendor': 'HashiCorp', 'Product': 'Nomad', 'Versions': '1.5.0, 1.4.0'} |
CVE-2023-1629 | A vulnerability classified as critical was found in JiangMin Antivirus 16.2.2022.418. Affected by this vulnerability is the function 0x222010 in the library kvcore.sys of the component IOCTL Handler. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224011. | https://vuldb.com/?id.224011 | 2023-03-25T10:06:04.861Z | 2023-03-25T11:00:05.644Z | 2023-10-21T11:17:13.073Z | {'Vendor': 'JiangMin', 'Product': 'Antivirus', 'Versions': '16.2.2022.418'} |
CVE-2023-1783 | OrangeScrum version 2.0.11 allows an external attacker to remotely obtain AWS instance credentials. This is possible because the application does not properly validate the HTML content to be converted to PDF.
| https://github.com/Orangescrum/orangescrum/ | 2023-03-31T15:47:22.655Z | 2023-06-23T21:55:48.800Z | 2023-06-23T21:55:48.800Z | {'Vendor': 'Orangescrum', 'Product': 'Orangescrum', 'Versions': '2.0.11'} |
CVE-2023-1279 | An issue has been discovered in GitLab affecting all versions starting from 4.1 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1 where it was possible to create a URL that would redirect to a different project. | https://gitlab.com/gitlab-org/gitlab/-/issues/395437 | 2023-03-08T20:12:30.790Z | 2023-09-01T10:01:41.677Z | 2023-09-01T10:01:41.677Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '4.1, 16.2, 16.3'} |
CVE-2023-1804 | The Product Catalog Feed by PixelYourSite WordPress plugin before 2.1.1 does not sanitise and escape the edit parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrators. | https://wpscan.com/vulnerability/55b28fa6-a54f-4365-9d59-f9e331c1e11b | 2023-04-03T12:58:12.510Z | 2023-05-02T07:04:56.944Z | 2023-05-04T07:38:20.626Z | {'Vendor': 'Unknown', 'Product': 'Product Catalog Feed by PixelYourSite', 'Versions': '0'} |
CVE-2023-1557 | A vulnerability was found in SourceCodester E-Commerce System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /ecommerce/admin/user/controller.php?action=edit of the component Username Handler. The manipulation of the argument USERID leads to improper access controls. The attack may be launched remotely. VDB-223550 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.223550 | 2023-03-22T09:58:40.203Z | 2023-03-22T10:31:04.403Z | 2023-10-21T10:35:43.825Z | {'Vendor': 'SourceCodester', 'Product': 'E-Commerce System', 'Versions': '1.0'} |
CVE-2023-1107 | Cross-site Scripting (XSS) - Stored in GitHub repository flatpressblog/flatpress prior to 1.3. | https://github.com/flatpressblog/flatpress/commit/d3f329496536dc99f9707f2f295d571d65a496f5 | 2023-03-01T00:00:00 | 2023-03-02T00:00:00 | 2023-03-02T00:00:00 | {'Vendor': 'flatpressblog', 'Product': 'flatpressblog/flatpress', 'Versions': 'unspecified'} |
CVE-2023-1412 | An unprivileged (non-admin) user can exploit an Improper Access Control vulnerability in the Cloudflare WARP Client for Windows (<= 2022.12.582.0) to perform privileged operations with SYSTEM context by working with a combination of opportunistic locks (oplock) and symbolic links (which can both be created by an unprivileged user).
After installing the Cloudflare WARP Client (admin privileges required), an MSI-Installer is placed under C:\Windows\Installer. The vulnerability lies in the repair function of this MSI.
ImpactAn unprivileged (non-admin) user can exploit this vulnerability to perform privileged operations with SYSTEM context, including deleting arbitrary files and reading arbitrary file content. This can lead to a variety of attacks, including the manipulation of system files and privilege escalation.
PatchesA new installer with a fix that addresses this vulnerability was released in version 2023.3.381.0. While the WARP Client itself is not vulnerable (only the installer), users are encouraged to upgrade to the latest version and delete any older installers present in their systems.
| https://github.com/cloudflare/advisories/security/advisories/GHSA-hgxh-48m3-3gq7 | 2023-03-15T13:33:23.768Z | 2023-04-05T15:22:56.317Z | 2023-04-05T15:22:56.317Z | {'Vendor': 'Cloudflare', 'Product': 'WARP', 'Versions': '0'} |
CVE-2023-1042 | A vulnerability has been found in SourceCodester Online Pet Shop We App 1.0 and classified as problematic. This vulnerability affects unknown code of the file /pet_shop/admin/orders/update_status.php. The manipulation of the argument oid with the input 1"><script>alert(1111)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221800. | https://vuldb.com/?id.221800 | 2023-02-26T12:00:29.351Z | 2023-02-26T12:00:47.430Z | 2023-10-20T22:18:42.649Z | {'Vendor': 'SourceCodester', 'Product': 'Online Pet Shop We App', 'Versions': '1.0'} |
CVE-2023-1941 | A vulnerability, which was classified as critical, has been found in SourceCodester Simple and Beautiful Shopping Cart System 1.0. This issue affects some unknown processing of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225317 was assigned to this vulnerability. | https://vuldb.com/?id.225317 | 2023-04-07T16:36:19.686Z | 2023-04-07T17:31:04.055Z | 2023-10-22T06:28:13.275Z | {'Vendor': 'SourceCodester', 'Product': 'Simple and Beautiful Shopping Cart System', 'Versions': '1.0'} |
CVE-2023-1691 | Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally. | https://consumer.huawei.com/en/support/bulletin/2023/7/ | 2023-03-29T09:29:47.827Z | 2023-07-06T12:50:39.273Z | 2023-07-06T12:50:39.273Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.0.0, 3.1.0, 2.0.1, 2.0.0'} |
CVE-2023-1384 | The setMediaSource function on the amzn.thin.pl service does not sanitize the "source" parameter allowing for arbitrary javascript code to be run
This issue affects:
Amazon Fire TV Stick 3rd gen versions prior to 6.2.9.5.
Insignia TV with FireOS versions prior to 7.6.3.3. | https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/ | 2023-03-14T09:59:33.421Z | 2023-05-03T12:10:43.924Z | 2023-05-03T12:10:43.924Z | {'Vendor': 'Amazon', 'Product': 'Fire TV Stick 3rd gen', 'Versions': '6.2.9.4'} |
CVE-2023-1193 | A use-after-free flaw was found in setup_async_work in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. This issue could allow an attacker to crash the system by accessing freed work. | https://access.redhat.com/security/cve/CVE-2023-1193 | 2023-03-06T08:46:50.158Z | 2023-11-01T19:10:14.210Z | 2023-11-01T19:10:14.210Z | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': '6.3-rc6'} |
CVE-2023-1469 | The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrator-level access to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: This can potentially be exploited by lower-privileged users if the `Admin Dashboard Access Permission` setting it set for those users to access the dashboard. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b35ee801-f04d-4b22-8238-053b02a6ee0c?source=cve | 2023-03-17T12:31:45.840Z | 2023-03-17T12:31:55.285Z | 2023-03-17T12:31:55.285Z | {'Vendor': 'mra13', 'Product': 'WP Express Checkout (Accept PayPal Payments Easily)', 'Versions': '2.2.8'} |
CVE-2023-1039 | A vulnerability classified as critical was found in SourceCodester Class and Exam Timetabling System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/index3.php of the component POST Parameter Handler. The manipulation of the argument password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221797 was assigned to this vulnerability. | https://vuldb.com/?id.221797 | 2023-02-26T11:52:56.938Z | 2023-02-26T11:53:20.162Z | 2023-10-20T22:15:03.056Z | {'Vendor': 'SourceCodester', 'Product': 'Class and Exam Timetabling System', 'Versions': '1.0'} |
CVE-2023-1890 | The Tablesome WordPress plugin before 1.0.9 does not escape various generated URLs, before outputting them in attributes when some notices are displayed, leading to Reflected Cross-Site Scripting | https://wpscan.com/vulnerability/8ef64490-30cd-4e07-9b7c-64f551944f3d | 2023-04-05T16:55:04.427Z | 2023-05-15T12:15:41.481Z | 2023-05-15T12:15:41.481Z | {'Vendor': 'Unknown', 'Product': 'Tablesome', 'Versions': '0'} |
CVE-2023-1486 | A vulnerability classified as problematic was found in Lespeed WiseCleaner Wise Force Deleter 1.5.3.54. This vulnerability affects the function 0x220004 in the library WiseUnlock64.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223372. | https://vuldb.com/?id.223372 | 2023-03-18T20:02:45.749Z | 2023-03-18T20:31:04.640Z | 2023-10-21T09:26:43.169Z | {'Vendor': 'Lespeed', 'Product': 'WiseCleaner Wise Force Deleter', 'Versions': '1.5.3.54'} |
CVE-2023-1255 | Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM
platform contains a bug that could cause it to read past the input buffer,
leading to a crash.
Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM
platform can crash in rare circumstances. The AES-XTS algorithm is usually
used for disk encryption.
The AES-XTS cipher decryption implementation for 64 bit ARM platform will read
past the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16
byte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext
buffer is unmapped, this will trigger a crash which results in a denial of
service.
If an attacker can control the size and location of the ciphertext buffer
being decrypted by an application using AES-XTS on 64 bit ARM, the
application is affected. This is fairly unlikely making this issue
a Low severity one. | https://www.openssl.org/news/secadv/20230419.txt | 2023-03-07T14:56:07.099Z | 2023-04-20T16:14:54.707Z | 2023-04-21T08:18:31.231Z | {'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.1.0, 3.0.0'} |
CVE-2023-1605 | Denial of Service in GitHub repository radareorg/radare2 prior to 5.8.6. | https://huntr.dev/bounties/9dddcf5b-7dd4-46cc-abf9-172dce20bab2 | 2023-03-23T00:00:00 | 2023-03-23T00:00:00 | 2023-03-23T00:00:00 | {'Vendor': 'radareorg', 'Product': 'radareorg/radare2', 'Versions': 'unspecified'} |
CVE-2023-1310 | A vulnerability, which was classified as critical, has been found in SourceCodester Online Graduate Tracer System 1.0. Affected by this issue is some unknown functionality of the file admin/prof.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-222698 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.222698 | 2023-03-10T07:34:14.863Z | 2023-03-10T07:35:25.987Z | 2023-10-21T08:02:31.188Z | {'Vendor': 'SourceCodester', 'Product': 'Online Graduate Tracer System', 'Versions': '1.0'} |
CVE-2023-1740 | A vulnerability was found in SourceCodester Air Cargo Management System 1.0. It has been classified as critical. Affected is an unknown function of the file admin/user/manage_user.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224628. | https://vuldb.com/?id.224628 | 2023-03-30T18:56:34.453Z | 2023-03-30T21:00:05.720Z | 2023-10-21T14:07:31.540Z | {'Vendor': 'SourceCodester', 'Product': 'Air Cargo Management System', 'Versions': '1.0'} |
CVE-2023-1594 | A vulnerability, which was classified as critical, was found in novel-plus 3.6.2. Affected is the function MenuService of the file sys/menu/list. The manipulation of the argument sort leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-223662 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.223662 | 2023-03-23T08:54:55.530Z | 2023-03-23T10:00:06.079Z | 2023-10-21T11:01:21.571Z | {'Vendor': 'n/a', 'Product': 'novel-plus', 'Versions': '3.6.2'} |
CVE-2023-1081 | Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.3.3. | https://huntr.dev/bounties/cf59deed-9d43-4552-acfd-43f38f3aabba | 2023-02-28T00:00:00 | 2023-02-28T00:00:00 | 2023-02-28T00:00:00 | {'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'} |
CVE-2023-1982 | The Front Editor WordPress plugin through 4.0.4 does not sanitize and escape some of its form settings, which could allow high-privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/51987966-8007-4e12-bc2e-997b92054739 | 2023-04-11T15:03:50.109Z | 2023-08-30T14:22:03.333Z | 2023-08-30T14:22:03.333Z | {'Vendor': 'Unknown', 'Product': 'Guest posting / Frontend Posting wordpress plugin', 'Versions': '0'} |
CVE-2023-1652 | A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem. | https://access.redhat.com/security/cve/cve-2023-1652 | 2023-03-27T00:00:00 | 2023-03-29T00:00:00 | 2023-05-11T00:00:00 | {'Vendor': 'n/a', 'Product': 'Linux Kernel', 'Versions': 'Kernel 6.2 RC5'} |
CVE-2023-1202 | Permission bypass when importing or synchronizing entries in User vault
in Devolutions Remote Desktop Manager 2023.1.9 and prior versions allows users with restricted rights to bypass entry permission via id collision. | https://devolutions.net/security/advisories/DEVO-2023-0008 | 2023-03-06T15:52:04.023Z | 2023-03-23T17:12:47.824Z | 2023-04-02T18:49:20.069507Z | {'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'} |
CVE-2023-1717 |
Prototype pollution in bitrix/templates/bitrix24/components/bitrix/menu/left_vertical/script.js in Bitrix24 22.0.300 allows remote attackers to execute arbitrary JavaScript code in the victim’s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via polluting `__proto__[tag]` and `__proto__[text]`.
| https://starlabs.sg/advisories/23/23-1717/ | 2023-03-30T09:17:02.993Z | 2023-11-01T09:03:46.376Z | 2023-11-01T09:03:46.376Z | {'Vendor': 'Bitrix24', 'Product': 'Bitrix24', 'Versions': '0'} |
CVE-2023-1347 | The Customizer Export/Import WordPress plugin before 0.9.6 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present | https://wpscan.com/vulnerability/356a5977-c90c-4fc6-98ed-032d5b27f272 | 2023-03-10T19:12:00.257Z | 2023-05-08T13:58:18.914Z | 2023-05-08T13:58:18.914Z | {'Vendor': 'Unknown', 'Product': 'Customizer Export/Import', 'Versions': '0'} |
CVE-2023-1428 | There exists an vulnerability causing an abort() to be called in gRPC.
The following headers cause gRPC's C++ implementation to abort() when called via http2:
te: x (x != trailers)
:scheme: x (x != http, https)
grpclb_client_stats: x (x == anything)
On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.
| https://github.com/grpc/grpc/commit/2485fa94bd8a723e5c977d55a3ce10b301b437f8 | 2023-03-16T10:47:22.037Z | 2023-06-09T10:46:54.244Z | 2023-06-09T10:46:54.244Z | {'Vendor': 'Google', 'Product': 'gRPC', 'Versions': '1.51'} |
CVE-2023-1582 | A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service. | https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0%40kroah.com/ | 2023-03-22T00:00:00 | 2023-04-05T00:00:00 | 2023-04-05T00:00:00 | {'Vendor': 'n/a', 'Product': 'Linux', 'Versions': 'Linux Kernel prior to Kernel 5.7 RC14'} |
CVE-2023-1078 | A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption. | https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=f753a68980cf4b59a80fe677619da2b1804f526d | 2023-02-27T00:00:00 | 2023-03-27T00:00:00 | 2023-11-05T18:06:14.308401 | {'Vendor': 'n/a', 'Product': 'Linux kernel', 'Versions': 'unknown'} |
CVE-2023-1994 | GQUIC dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file | https://www.wireshark.org/security/wnpa-sec-2023-11.html | 2023-04-11T00:00:00 | 2023-04-12T00:00:00 | 2023-09-17T06:06:30.017563 | {'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.5, >=3.6.0, <3.6.13'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.