CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-1829
A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28
2023-04-04T10:32:43.055Z
2023-04-12T11:16:59.101Z
2023-04-12T11:37:42.774Z
{'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '3.8'}
CVE-2023-1983
A vulnerability was found in SourceCodester Sales Tracker Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/products/manage_product.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-225530 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.225530
2023-04-11T16:30:38.677Z
2023-04-11T17:00:04.951Z
2023-10-22T09:33:01.785Z
{'Vendor': 'SourceCodester', 'Product': 'Sales Tracker Management System', 'Versions': '1.0'}
CVE-2023-1254
A vulnerability has been found in SourceCodester Health Center Patient Record Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file birthing_print.php. The manipulation of the argument birth_id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222484.
https://vuldb.com/?id.222484
2023-03-07T14:53:50.732Z
2023-03-07T14:54:30.691Z
2023-10-21T07:42:58.843Z
{'Vendor': 'SourceCodester', 'Product': 'Health Center Patient Record Management System', 'Versions': '1.0'}
CVE-2023-1311
A vulnerability, which was classified as critical, was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. This affects an unknown part of the file large.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222699.
https://vuldb.com/?id.222699
2023-03-10T07:39:02.739Z
2023-03-10T07:39:49.218Z
2023-10-21T08:03:44.471Z
{'Vendor': 'SourceCodester', 'Product': 'Friendly Island Pizza Website and Ordering System', 'Versions': '1.0'}
CVE-2023-1741
A vulnerability was found in jeecg-boot 3.5.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file SysDictMapper.java of the component Sleep Command Handler. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224629 was assigned to this vulnerability.
https://vuldb.com/?id.224629
2023-03-30T19:01:43.863Z
2023-03-30T21:00:06.950Z
2023-10-21T14:08:44.794Z
{'Vendor': 'n/a', 'Product': 'jeecg-boot', 'Versions': '3.5.0'}
CVE-2023-1192
A use-after-free flaw was found in smb2_is_status_io_timeout() in CIFS in the Linux Kernel. After CIFS transfers response data to a system call, there are still local variable points to the memory region, and if the system call frees it faster than CIFS uses it, CIFS will access a free memory region, leading to a denial of service.
https://access.redhat.com/security/cve/CVE-2023-1192
2023-03-06T08:43:46.689Z
2023-11-01T19:01:47.336Z
2023-11-01T19:01:47.336Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''}
CVE-2023-1468
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipulation of the argument date_from/date_to leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-223327.
https://vuldb.com/?id.223327
2023-03-17T11:44:14.789Z
2023-03-17T11:45:24.209Z
2023-10-21T09:14:30.706Z
{'Vendor': 'SourceCodester', 'Product': 'Student Study Center Desk Management System', 'Versions': '1.0'}
CVE-2023-1038
A vulnerability classified as critical has been found in SourceCodester Online Reviewer Management System 1.0. Affected is an unknown function of the file /reviewer_0/admins/assessments/pretest/questions-view.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221796.
https://vuldb.com/?id.221796
2023-02-26T11:51:24.731Z
2023-02-26T11:51:42.552Z
2023-10-20T22:13:49.444Z
{'Vendor': 'SourceCodester', 'Product': 'Online Reviewer Management System', 'Versions': '1.0'}
CVE-2023-1891
The Accordion & FAQ WordPress plugin before 1.9.9 does not escape various generated URLs, before outputting them in attributes when some notices are displayed, leading to Reflected Cross-Site Scripting
https://wpscan.com/vulnerability/4e5d993f-cc20-4b5f-b4c8-c13004151828
2023-04-05T16:55:31.123Z
2023-06-27T13:17:16.610Z
2023-06-27T13:17:16.610Z
{'Vendor': 'Unknown', 'Product': 'Accordion & FAQ', 'Versions': '0'}
CVE-2023-1487
A vulnerability, which was classified as problematic, has been found in Lespeed WiseCleaner Wise System Monitor 1.5.3.54. This issue affects the function 0x9C40208C/0x9C402000/0x9C402084/0x9C402088/0x9C402004/0x9C4060C4/0x9C4060CC/0x9C4060D0/0x9C4060D4/0x9C40A0DC/0x9C40A0D8/0x9C40A0DC/0x9C40A0E0 in the library WiseHDInfo64.dll of the component IoControlCode Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-223373 was assigned to this vulnerability.
https://vuldb.com/?id.223373
2023-03-18T20:02:47.861Z
2023-03-18T21:00:04.837Z
2023-10-21T09:27:56.355Z
{'Vendor': 'Lespeed', 'Product': 'WiseCleaner Wise System Monitor', 'Versions': '1.5.3.54'}
CVE-2023-1690
A vulnerability, which was classified as problematic, has been found in SourceCodester Earnings and Expense Tracker App 1.0. This issue affects some unknown processing of the file LoginRegistration.php?a=register_user. The manipulation of the argument fullname leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-224309 was assigned to this vulnerability.
https://vuldb.com/?id.224309
2023-03-28T21:07:19.947Z
2023-03-29T10:31:04.384Z
2023-10-21T13:58:59.394Z
{'Vendor': 'SourceCodester', 'Product': 'Earnings and Expense Tracker App', 'Versions': '1.0'}
CVE-2023-1385
Improper JPAKE implementation allows offline PIN brute-forcing due to the initialization of random values to a known value, which leads to unauthorized authentication to amzn.lightning services. This issue affects: Amazon Fire TV Stick 3rd gen versions prior to 6.2.9.5. Insignia TV with FireOS 7.6.3.3.
https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/
2023-03-14T09:59:35.119Z
2023-05-03T12:33:31.872Z
2023-05-03T12:33:31.872Z
{'Vendor': 'Amazon', 'Product': 'Fire TV Stick 3rd gen', 'Versions': '6.2.9.4'}
CVE-2023-1805
The Product Catalog Feed by PixelYourSite WordPress plugin before 2.1.1 does not sanitise and escape the page parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/46b4582f-7651-4b74-a00b-1788587ecfa8
2023-04-03T12:58:18.522Z
2023-05-02T07:04:54.297Z
2023-05-02T07:04:54.297Z
{'Vendor': 'Unknown', 'Product': 'Product Catalog Feed by PixelYourSite', 'Versions': '0'}
CVE-2023-1556
A vulnerability was found in SourceCodester Judging Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file summary_results.php. The manipulation of the argument main_event_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223549 was assigned to this vulnerability.
https://vuldb.com/?id.223549
2023-03-22T09:54:47.276Z
2023-03-22T10:31:03.237Z
2023-10-21T09:52:20.000Z
{'Vendor': 'SourceCodester', 'Product': 'Judging Management System', 'Versions': '1.0'}
CVE-2023-1106
Cross-site Scripting (XSS) - Reflected in GitHub repository flatpressblog/flatpress prior to 1.3.
https://github.com/flatpressblog/flatpress/commit/5f23b4c2eac294cc0ba5e541f83a6f8a26f9fed1
2023-03-01T00:00:00
2023-03-02T00:00:00
2023-03-02T00:00:00
{'Vendor': 'flatpressblog', 'Product': 'flatpressblog/flatpress', 'Versions': 'unspecified'}
CVE-2023-1413
The WP VR WordPress plugin before 8.2.9 does not sanitise and escape some parameters before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/6938fee5-3510-45e6-8112-c9e2b30f6881
2023-03-15T14:48:18.738Z
2023-04-17T12:17:47.151Z
2023-04-17T12:17:47.151Z
{'Vendor': 'Unknown', 'Product': 'WP VR', 'Versions': '0'}
CVE-2023-1043
A vulnerability was found in MuYuCMS 2.2. It has been classified as problematic. Affected is an unknown function of the file /editor/index.php. The manipulation of the argument dir_path leads to relative path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221802 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.221802
2023-02-26T12:20:14.773Z
2023-02-26T12:20:47.327Z
2023-10-20T22:19:55.840Z
{'Vendor': 'n/a', 'Product': 'MuYuCMS', 'Versions': '2.2'}
CVE-2023-1940
A vulnerability classified as critical was found in SourceCodester Simple and Beautiful Shopping Cart System 1.0. This vulnerability affects unknown code of the file delete_user_query.php. The manipulation of the argument user_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225316.
https://vuldb.com/?id.225316
2023-04-07T16:36:17.327Z
2023-04-07T17:31:03.086Z
2023-10-22T06:27:00.149Z
{'Vendor': 'SourceCodester', 'Product': 'Simple and Beautiful Shopping Cart System', 'Versions': '1.0'}
CVE-2023-1297
Consul and Consul Enterprise's cluster peering implementation contained a flaw whereby a peer cluster with service of the same name as a local service could corrupt Consul state, resulting in denial of service. This vulnerability was resolved in Consul 1.14.5, and 1.15.3
https://discuss.hashicorp.com/t/hcsec-2023-15-consul-cluster-peering-can-result-in-denial-of-service/54515
2023-03-09T18:51:51.406Z
2023-06-02T22:48:28.938Z
2023-06-02T22:48:28.938Z
{'Vendor': 'HashiCorp', 'Product': 'Consul', 'Versions': '1.14.0, 1.15.0'}
CVE-2023-1628
A vulnerability classified as problematic has been found in Jianming Antivirus 16.2.2022.418. Affected is an unknown function in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. VDB-224010 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224010
2023-03-25T10:06:02.177Z
2023-03-25T11:00:04.340Z
2023-10-21T11:15:59.895Z
{'Vendor': 'Jianming', 'Product': 'Antivirus', 'Versions': '16.2.2022.418'}
CVE-2023-1782
HashiCorp Nomad and Nomad Enterprise versions 1.5.0 up to 1.5.2 allow unauthenticated users to bypass intended ACL authorizations for clusters where mTLS is not enabled. This issue is fixed in version 1.5.3.
https://discuss.hashicorp.com/t/hcsec-2023-12-nomad-unauthenticated-client-agent-http-request-privilege-escalation/52375
2023-03-31T14:50:56.892Z
2023-04-05T19:10:52.697Z
2023-04-05T19:10:52.697Z
{'Vendor': 'HashiCorp', 'Product': 'Nomad', 'Versions': '1.5.0'}
CVE-2023-1278
A vulnerability, which was classified as problematic, has been found in IBOS up to 4.5.5. Affected by this issue is some unknown functionality of the file mobil/index.php. The manipulation of the argument accesstoken leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-222608.
https://vuldb.com/?id.222608
2023-03-08T18:18:07.070Z
2023-03-08T18:19:19.712Z
2023-10-21T07:47:51.503Z
{'Vendor': 'n/a', 'Product': 'IBOS', 'Versions': '4.5.0, 4.5.1, 4.5.2, 4.5.3, 4.5.4, 4.5.5'}
CVE-2023-1151
A vulnerability was found in SourceCodester Electronic Medical Records System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file administrator.php of the component Cookie Handler. The manipulation of the argument userid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222163.
https://vuldb.com/?id.222163
2023-03-02T06:22:53.208Z
2023-03-02T06:31:04.911Z
2023-10-21T07:19:48.311Z
{'Vendor': 'SourceCodester', 'Product': 'Electronic Medical Records System', 'Versions': '1.0'}
CVE-2023-1501
A vulnerability, which was classified as critical, was found in RockOA 2.3.2. This affects the function runAction of the file acloudCosAction.php.SQL. The manipulation of the argument fileid leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223401 was assigned to this vulnerability.
https://vuldb.com/?id.223401
2023-03-19T18:43:32.334Z
2023-03-19T20:00:05.695Z
2023-10-21T09:43:47.764Z
{'Vendor': 'n/a', 'Product': 'RockOA', 'Versions': '2.3.2'}
CVE-2023-1852
A vulnerability classified as problematic was found in SourceCodester Online Payroll System 1.0. This vulnerability affects unknown code of the file /admin/deduction_edit.php. The manipulation of the argument description leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-224992.
https://vuldb.com/?id.224992
2023-04-05T05:50:16.403Z
2023-04-05T07:40:11.360Z
2023-10-21T17:02:10.103Z
{'Vendor': 'SourceCodester', 'Product': 'Online Payroll System', 'Versions': '1.0'}
CVE-2023-1917
The PowerPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in versions up to, and including, 10.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: A partial fix for the issue was introduced in version 10.0.1, and an additional patch (version 10.0.2) was released to address a workaround.
https://www.wordfence.com/threat-intel/vulnerabilities/id/44583cb7-bc32-4e62-8431-f5f1f6baeff2?source=cve
2023-04-06T19:10:31.104Z
2023-06-09T05:33:15.873Z
2023-06-09T05:33:15.873Z
{'Vendor': 'amandato', 'Product': 'PowerPress Podcasting plugin by Blubrry', 'Versions': '*'}
CVE-2023-1014
Improper Protection for Outbound Error Messages and Alert Signals vulnerability in Virames Vira-Investing allows Account Footprinting.This issue affects Vira-Investing: before 1.0.84.86.
https://www.usom.gov.tr/bildirim/tr-23-0183
2023-02-24T14:12:38.300Z
2023-03-30T08:17:03.971Z
2023-04-06T05:43:36.670Z
{'Vendor': 'Virames', 'Product': 'Vira-Investing', 'Versions': '0'}
CVE-2023-1444
A vulnerability was found in Filseclab Twister Antivirus 8. It has been rated as critical. This issue affects the function 0x8011206B in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223289 was assigned to this vulnerability.
https://vuldb.com/?id.223289
2023-03-17T06:33:05.214Z
2023-03-17T06:33:20.430Z
2023-10-21T08:52:33.040Z
{'Vendor': 'Filseclab', 'Product': 'Twister Antivirus', 'Versions': '8'}
CVE-2023-1281
Use After Free vulnerability in Linux kernel traffic control index filter (tcindex) allows Privilege Escalation. The imperfect hash area can be updated while packets are traversing, which will cause a use-after-free when 'tcf_exts_exec()' is called with the destroyed tcf_ext. A local attacker user can use this vulnerability to elevate its privileges to root. This issue affects Linux Kernel: from 4.14 before git commit ee059170b1f7e94e55fa6cadee544e176a6e59c2.
https://kernel.dance/#ee059170b1f7e94e55fa6cadee544e176a6e59c2
2023-03-08T20:18:23.204Z
2023-03-22T13:18:55.460Z
2023-03-22T13:18:55.460Z
{'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '4.14'}
CVE-2023-1794
A vulnerability was found in SourceCodester Police Crime Record Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/casedetails.php of the component GET Parameter Handler. The manipulation of the argument id with the input "><script>alert(233)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224746 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224746
2023-04-02T06:49:12.209Z
2023-04-02T08:00:05.737Z
2023-10-21T14:30:42.099Z
{'Vendor': 'SourceCodester', 'Product': 'Police Crime Record Management System', 'Versions': '1.0'}
CVE-2023-1844
The Subscribe2 plugin for WordPress is vulnerable to unauthorized access to email functionality due to a missing capability check when sending test emails in versions up to, and including, 10.40. This makes it possible for author-level attackers to send emails with arbitrary content and attachments to site users.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c34ce601-5cf9-433f-bc9d-5c705eba6b08?source=cve
2023-04-04T21:01:11.671Z
2023-06-28T02:34:23.370Z
2023-06-28T02:34:23.370Z
{'Vendor': 'wedevs', 'Product': 'Subscribe2 – Form, Email Subscribers & Newsletters', 'Versions': '*'}
CVE-2023-1517
Cross-site Scripting (XSS) - DOM in GitHub repository pimcore/pimcore prior to 10.5.19.
https://huntr.dev/bounties/82adf0dd-8ebd-4d15-9f91-6060c8fa5a0d
2023-03-20T00:00:00
2023-03-20T00:00:00
2023-03-20T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-1147
Cross-site Scripting (XSS) - Stored in GitHub repository flatpressblog/flatpress prior to 1.3.
https://huntr.dev/bounties/187f5353-f866-4d26-a5ba-fca378520020
2023-03-02T00:00:00
2023-03-02T00:00:00
2023-03-02T00:00:00
{'Vendor': 'flatpressblog', 'Product': 'flatpressblog/flatpress', 'Versions': 'unspecified'}
CVE-2023-1452
A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability.
https://vuldb.com/?id.223297
2023-03-17T06:50:23.089Z
2023-03-17T06:50:37.037Z
2023-10-21T09:02:18.715Z
{'Vendor': 'n/a', 'Product': 'GPAC', 'Versions': '2.3-DEV-rev35-gbbca86917-master'}
CVE-2023-1002
A vulnerability, which was classified as problematic, has been found in MuYuCMS 2.2. This issue affects some unknown processing of the file index.php. The manipulation of the argument file_path leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221735.
https://vuldb.com/?id.221735
2023-02-24T07:41:58.194Z
2023-02-24T07:42:30.614Z
2023-10-20T21:57:57.770Z
{'Vendor': 'n/a', 'Product': 'MuYuCMS', 'Versions': '2.2'}
CVE-2023-1901
The bluetooth HCI host layer logic not clearing a global reference to a semaphore after synchronously sending HCI commands may allow a malicious HCI Controller to cause the use of a dangling reference in the host layer, leading to a crash (DoS) or potential RCE on the Host layer.
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-xvvm-8mcm-9cq3
2023-04-05T22:11:42.140Z
2023-07-10T04:37:33.126Z
2023-07-10T04:37:33.126Z
{'Vendor': 'zephyrproject-rtos', 'Product': 'Zephyr', 'Versions': '*'}
CVE-2023-1686
A vulnerability was found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file bsenordering/admin/category/index.php of the component GET Parameter Handler. The manipulation of the argument view with the input <script>alert(233)</script> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224243.
https://vuldb.com/?id.224243
2023-03-28T20:31:44.835Z
2023-03-29T07:00:06.029Z
2023-10-21T13:54:06.598Z
{'Vendor': 'SourceCodester', 'Product': 'Young Entrepreneur E-Negosyo System', 'Versions': '1.0'}
CVE-2023-1393
A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later.
https://www.openwall.com/lists/oss-security/2023/03/29/1
2023-03-14T00:00:00
2023-03-30T00:00:00
2023-07-23T00:00:00
{'Vendor': 'n/a', 'Product': 'xorg-server', 'Versions': 'xorg-server 21.1.8'}
CVE-2023-1669
The SEOPress WordPress plugin before 6.5.0.3 unserializes user input provided via the settings, which could allow high-privilege users such as admin to perform PHP Object Injection when a suitable gadget is present.
https://wpscan.com/vulnerability/fb8791f5-2879-431e-9afc-06d5839e4b9d
2023-03-28T10:05:02.936Z
2023-05-02T07:04:55.190Z
2023-05-02T07:04:55.190Z
{'Vendor': 'Unknown', 'Product': 'SEOPress', 'Versions': '0'}
CVE-2023-1239
Cross-site Scripting (XSS) - Reflected in GitHub repository answerdev/answer prior to 1.0.6.
https://huntr.dev/bounties/3a22c609-d2d8-4613-815d-58f5990b8bd8
2023-03-07T00:00:00
2023-03-07T00:00:00
2023-03-07T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-1110
The Yellow Yard Searchbar WordPress plugin before 2.8.12 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/1830e829-4a43-4d98-8214-eecec6bef694
2023-03-01T08:49:54.602Z
2023-08-16T11:03:26.120Z
2023-08-16T11:03:26.120Z
{'Vendor': 'Unknown', 'Product': 'Yellow Yard Searchbar', 'Versions': '0'}
CVE-2023-1540
Observable Response Discrepancy in GitHub repository answerdev/answer prior to 1.0.6.
https://huntr.dev/bounties/d8d6c259-a0f2-4209-a3b0-ecbf3eb092f4
2023-03-21T00:00:00
2023-03-21T00:00:00
2023-03-21T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-1813
Inappropriate implementation in Extensions in Google Chrome prior to 112.0.5615.49 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
2023-04-03T20:48:52.391Z
2023-04-04T21:39:34.424Z
2023-04-04T21:39:34.424Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
CVE-2023-1956
A vulnerability classified as critical was found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=delete_img of the component Image Handler. The manipulation of the argument path leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225343.
https://vuldb.com/?id.225343
2023-04-08T06:29:49.194Z
2023-04-08T10:00:07.965Z
2023-10-22T06:42:51.234Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
CVE-2023-1055
A flaw was found in RHDS 11 and RHDS 12. While browsing entries LDAP tries to decode the userPassword attribute instead of the userCertificate attribute which could lead into sensitive information leaked. An attacker with a local account where the cockpit-389-ds is running can list the processes and display the hashed passwords. The highest threat from this vulnerability is to data confidentiality.
https://bugzilla.redhat.com/show_bug.cgi?id=2173517#c0
2023-02-27T00:00:00
2023-02-27T00:00:00
2023-07-26T00:00:00
{'Vendor': 'n/a', 'Product': 'Red Hat Directory Server', 'Versions': '11 and 12'}
CVE-2023-1405
The Formidable Forms WordPress plugin before 6.2 unserializes user input, which could allow anonymous users to perform PHP Object Injection when a suitable gadget is present.
https://wpscan.com/vulnerability/8c727a31-ff65-4472-8191-b1becc08192a/
2023-03-14T18:26:01.211Z
2024-01-16T15:56:18.763Z
2024-01-16T15:56:18.763Z
{'Vendor': 'Unknown', 'Product': 'Formidable Forms', 'Versions': '0'}
CVE-2023-1541
Business Logic Errors in GitHub repository answerdev/answer prior to 1.0.6.
https://huntr.dev/bounties/8fd891c6-b04e-4dac-818f-9ea30861cd92
2023-03-21T00:00:00
2023-03-21T00:00:00
2023-03-21T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-1812
Out of bounds memory access in DOM Bindings in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
2023-04-03T20:48:52.262Z
2023-04-04T21:39:34.328Z
2023-04-04T21:39:34.328Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
CVE-2023-1957
A vulnerability, which was classified as critical, has been found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this issue is some unknown functionality of the file /classes/Master.php?f=save_sub_category of the component Subcategory Handler. The manipulation of the argument sub_category leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225344.
https://vuldb.com/?id.225344
2023-04-08T06:29:53.848Z
2023-04-08T10:31:03.498Z
2023-10-22T06:44:04.372Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
CVE-2023-1054
A vulnerability was found in SourceCodester Music Gallery Site 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/?page=user/manage. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-221820.
https://vuldb.com/?id.221820
2023-02-27T10:43:21.398Z
2023-02-27T10:43:51.919Z
2023-10-21T07:02:43.355Z
{'Vendor': 'SourceCodester', 'Product': 'Music Gallery Site', 'Versions': '1.0'}
CVE-2023-1404
The Weaver Show Posts Plugin for WordPress is vulnerable to stored Cross-Site Scripting due to insufficient escaping of the profile display name in versions up to, and including, 1.6. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c8647c44-4879-4895-bd07-19f7d62a7326?source=cve
2023-03-14T17:37:30.276Z
2023-06-09T05:33:33.172Z
2023-06-09T05:33:33.172Z
{'Vendor': 'wpweaver', 'Product': 'Weaver Show Posts', 'Versions': '*'}
CVE-2023-1687
A vulnerability classified as problematic has been found in SourceCodester Simple Task Allocation System 1.0. Affected is an unknown function of the file LoginRegistration.php?a=register_user. The manipulation of the argument Fullname leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-224244.
https://vuldb.com/?id.224244
2023-03-28T20:37:39.117Z
2023-03-29T08:00:06.721Z
2023-10-21T13:55:19.783Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Task Allocation System', 'Versions': '1.0'}
CVE-2023-1392
A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. Affected by this vulnerability is the function save_menu. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222979.
https://vuldb.com/?id.222979
2023-03-14T14:23:15.076Z
2023-03-14T14:24:13.917Z
2023-10-21T08:31:48.166Z
{'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'}
CVE-2023-1668
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
https://bugzilla.redhat.com/show_bug.cgi?id=2137666
2023-03-27T00:00:00
2023-04-10T00:00:00
2023-11-26T11:06:12.014505
{'Vendor': 'n/a', 'Product': 'openvswitch', 'Versions': 'unknown'}
CVE-2023-1238
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
https://huntr.dev/bounties/52f97267-1439-4bb6-862b-89b8fafce50d
2023-03-07T00:00:00
2023-03-07T00:00:00
2023-03-07T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-1845
A vulnerability, which was classified as critical, was found in SourceCodester Online Payroll System 1.0. This affects an unknown part of the file /admin/employee_row.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224985 was assigned to this vulnerability.
https://vuldb.com/?id.224985
2023-04-05T05:49:50.618Z
2023-04-05T06:00:07.498Z
2023-10-21T16:53:37.892Z
{'Vendor': 'SourceCodester', 'Product': 'Online Payroll System', 'Versions': '1.0'}
CVE-2023-1516
RoboDK versions 5.5.3 and prior contain an insecure permission assignment to critical directories vulnerability, which could allow a local user to escalate privileges and write files to the RoboDK process and achieve code execution.  
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-01
2023-03-20T14:20:50.559Z
2023-03-28T20:34:52.453Z
2023-03-28T20:34:52.453Z
{'Vendor': 'RoboDK ', 'Product': 'RoboDK ', 'Versions': '0'}
CVE-2023-1146
Cross-site Scripting (XSS) - Generic in GitHub repository flatpressblog/flatpress prior to 1.3.
https://huntr.dev/bounties/d6d1e1e2-2f67-4d28-aa84-b30fb1d2e737
2023-03-02T00:00:00
2023-03-02T00:00:00
2023-03-02T00:00:00
{'Vendor': 'flatpressblog', 'Product': 'flatpressblog/flatpress', 'Versions': 'unspecified'}
CVE-2023-1453
A vulnerability was found in Watchdog Anti-Virus 1.4.214.0. It has been rated as critical. Affected by this issue is the function 0x80002008 in the library wsdk-driver.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-223298 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.223298
2023-03-17T06:51:33.925Z
2023-03-17T06:52:10.093Z
2023-10-21T09:03:31.848Z
{'Vendor': 'Watchdog', 'Product': 'Anti-Virus', 'Versions': '1.4.214.0'}
CVE-2023-1003
A vulnerability, which was classified as critical, was found in Typora up to 1.5.5 on Windows. Affected is an unknown function of the component WSH JScript Handler. The manipulation leads to code injection. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.8 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221736.
https://vuldb.com/?id.221736
2023-02-24T07:51:22.484Z
2023-02-24T07:53:26.836Z
2023-10-20T21:59:11.105Z
{'Vendor': 'n/a', 'Product': 'Typora', 'Versions': '1.5.0, 1.5.1, 1.5.2, 1.5.3, 1.5.4, 1.5.5'}
CVE-2023-1900
A vulnerability within the Avira network protection feature allowed an attacker with local execution rights to cause an overflow. This could corrupt the data on the heap and lead to a denial-of-service situation. Issue was fixed with Endpointprotection.exe version 1.0.2303.633
https://support.norton.com/sp/static/external/tools/security-advisories.html
2023-04-05T21:22:42.387Z
2023-04-19T18:47:17.392Z
2023-04-19T18:47:17.392Z
{'Vendor': 'AVIRA', 'Product': 'Avira Antivirus ', 'Versions': '0'}
CVE-2023-1795
A vulnerability was found in SourceCodester Gadget Works Online Ordering System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/products/index.php of the component GET Parameter Handler. The manipulation of the argument view with the input <script>alert(666)</script> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224747.
https://vuldb.com/?id.224747
2023-04-02T07:03:55.433Z
2023-04-02T08:31:03.827Z
2023-10-21T14:31:55.341Z
{'Vendor': 'SourceCodester', 'Product': 'Gadget Works Online Ordering System', 'Versions': '1.0'}
CVE-2023-1150
Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets.
https://cert.vde.com/en/advisories/VDE-2023-005/
2023-03-02T05:38:38.812Z
2023-06-26T06:19:53.942Z
2023-06-26T06:19:53.942Z
{'Vendor': 'WAGO', 'Product': '750-332', 'Versions': '0'}
CVE-2023-1500
A vulnerability, which was classified as problematic, has been found in code-projects Simple Art Gallery 1.0. Affected by this issue is some unknown functionality of the file adminHome.php. The manipulation of the argument about_info leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223400.
https://vuldb.com/?id.223400
2023-03-19T18:39:26.215Z
2023-03-19T20:00:04.451Z
2023-10-21T09:42:34.622Z
{'Vendor': 'code-projects', 'Product': 'Simple Art Gallery', 'Versions': '1.0'}
CVE-2023-1853
A vulnerability, which was classified as problematic, has been found in SourceCodester Online Payroll System 1.0. This issue affects some unknown processing of the file /admin/employee_edit.php. The manipulation of the argument of leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224993 was assigned to this vulnerability.
https://vuldb.com/?id.224993
2023-04-05T05:50:20.551Z
2023-04-05T07:40:12.354Z
2023-10-21T17:03:23.337Z
{'Vendor': 'SourceCodester', 'Product': 'Online Payroll System', 'Versions': '1.0'}
CVE-2023-1916
A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the extractImageSection function in tools/tiffcrop.c, resulting in a denial of service and limited information disclosure. This issue affects libtiff versions 4.x.
https://gitlab.com/libtiff/libtiff/-/issues/536%2C
2023-04-06T00:00:00
2023-04-10T00:00:00
2023-12-23T07:06:24.612122
{'Vendor': 'n/a', 'Product': 'libtiff', 'Versions': 'libtiff versions 4.x and newer are affected'}
CVE-2023-1015
null
null
2023-02-24T14:30:14.032Z
null
2023-03-10T11:34:38.836Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-1445
A vulnerability classified as problematic has been found in Filseclab Twister Antivirus 8. Affected is the function 0x80112053 in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. VDB-223290 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.223290
2023-03-17T06:35:54.109Z
2023-03-17T06:36:09.789Z
2023-10-21T08:53:46.200Z
{'Vendor': 'Filseclab', 'Product': 'Twister Antivirus', 'Versions': '8'}
CVE-2023-1296
HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.5.0 did not correctly enforce deny policies applied to a workload’s variables. Fixed in 1.4.6 and 1.5.1.
https://discuss.hashicorp.com/t/hcsec-2023-09-nomad-acls-can-not-deny-access-to-workloads-own-variables/51390
2023-03-09T18:50:52.818Z
2023-03-14T14:45:24.074Z
2023-03-14T14:45:24.074Z
{'Vendor': 'HashiCorp', 'Product': 'Nomad', 'Versions': '1.5.0, 1.4.0'}
CVE-2023-1629
A vulnerability classified as critical was found in JiangMin Antivirus 16.2.2022.418. Affected by this vulnerability is the function 0x222010 in the library kvcore.sys of the component IOCTL Handler. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224011.
https://vuldb.com/?id.224011
2023-03-25T10:06:04.861Z
2023-03-25T11:00:05.644Z
2023-10-21T11:17:13.073Z
{'Vendor': 'JiangMin', 'Product': 'Antivirus', 'Versions': '16.2.2022.418'}
CVE-2023-1783
OrangeScrum version 2.0.11 allows an external attacker to remotely obtain AWS instance credentials. This is possible because the application does not properly validate the HTML content to be converted to PDF.
https://github.com/Orangescrum/orangescrum/
2023-03-31T15:47:22.655Z
2023-06-23T21:55:48.800Z
2023-06-23T21:55:48.800Z
{'Vendor': 'Orangescrum', 'Product': 'Orangescrum', 'Versions': '2.0.11'}
CVE-2023-1279
An issue has been discovered in GitLab affecting all versions starting from 4.1 before 16.1.5, all versions starting from 16.2 before 16.2.5, all versions starting from 16.3 before 16.3.1 where it was possible to create a URL that would redirect to a different project.
https://gitlab.com/gitlab-org/gitlab/-/issues/395437
2023-03-08T20:12:30.790Z
2023-09-01T10:01:41.677Z
2023-09-01T10:01:41.677Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '4.1, 16.2, 16.3'}
CVE-2023-1804
The Product Catalog Feed by PixelYourSite WordPress plugin before 2.1.1 does not sanitise and escape the edit parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrators.
https://wpscan.com/vulnerability/55b28fa6-a54f-4365-9d59-f9e331c1e11b
2023-04-03T12:58:12.510Z
2023-05-02T07:04:56.944Z
2023-05-04T07:38:20.626Z
{'Vendor': 'Unknown', 'Product': 'Product Catalog Feed by PixelYourSite', 'Versions': '0'}
CVE-2023-1557
A vulnerability was found in SourceCodester E-Commerce System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /ecommerce/admin/user/controller.php?action=edit of the component Username Handler. The manipulation of the argument USERID leads to improper access controls. The attack may be launched remotely. VDB-223550 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.223550
2023-03-22T09:58:40.203Z
2023-03-22T10:31:04.403Z
2023-10-21T10:35:43.825Z
{'Vendor': 'SourceCodester', 'Product': 'E-Commerce System', 'Versions': '1.0'}
CVE-2023-1107
Cross-site Scripting (XSS) - Stored in GitHub repository flatpressblog/flatpress prior to 1.3.
https://github.com/flatpressblog/flatpress/commit/d3f329496536dc99f9707f2f295d571d65a496f5
2023-03-01T00:00:00
2023-03-02T00:00:00
2023-03-02T00:00:00
{'Vendor': 'flatpressblog', 'Product': 'flatpressblog/flatpress', 'Versions': 'unspecified'}
CVE-2023-1412
An unprivileged (non-admin) user can exploit an Improper Access Control vulnerability in the Cloudflare WARP Client for Windows (<= 2022.12.582.0) to perform privileged operations with SYSTEM context by working with a combination of opportunistic locks (oplock) and symbolic links (which can both be created by an unprivileged user). After installing the Cloudflare WARP Client (admin privileges required), an MSI-Installer is placed under C:\Windows\Installer. The vulnerability lies in the repair function of this MSI. ImpactAn unprivileged (non-admin) user can exploit this vulnerability to perform privileged operations with SYSTEM context, including deleting arbitrary files and reading arbitrary file content. This can lead to a variety of attacks, including the manipulation of system files and privilege escalation. PatchesA new installer with a fix that addresses this vulnerability was released in version 2023.3.381.0. While the WARP Client itself is not vulnerable (only the installer), users are encouraged to upgrade to the latest version and delete any older installers present in their systems.
https://github.com/cloudflare/advisories/security/advisories/GHSA-hgxh-48m3-3gq7
2023-03-15T13:33:23.768Z
2023-04-05T15:22:56.317Z
2023-04-05T15:22:56.317Z
{'Vendor': 'Cloudflare', 'Product': 'WARP', 'Versions': '0'}
CVE-2023-1042
A vulnerability has been found in SourceCodester Online Pet Shop We App 1.0 and classified as problematic. This vulnerability affects unknown code of the file /pet_shop/admin/orders/update_status.php. The manipulation of the argument oid with the input 1"><script>alert(1111)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221800.
https://vuldb.com/?id.221800
2023-02-26T12:00:29.351Z
2023-02-26T12:00:47.430Z
2023-10-20T22:18:42.649Z
{'Vendor': 'SourceCodester', 'Product': 'Online Pet Shop We App', 'Versions': '1.0'}
CVE-2023-1941
A vulnerability, which was classified as critical, has been found in SourceCodester Simple and Beautiful Shopping Cart System 1.0. This issue affects some unknown processing of the file login.php. The manipulation of the argument username/password leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225317 was assigned to this vulnerability.
https://vuldb.com/?id.225317
2023-04-07T16:36:19.686Z
2023-04-07T17:31:04.055Z
2023-10-22T06:28:13.275Z
{'Vendor': 'SourceCodester', 'Product': 'Simple and Beautiful Shopping Cart System', 'Versions': '1.0'}
CVE-2023-1691
Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally.
https://consumer.huawei.com/en/support/bulletin/2023/7/
2023-03-29T09:29:47.827Z
2023-07-06T12:50:39.273Z
2023-07-06T12:50:39.273Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '3.0.0, 3.1.0, 2.0.1, 2.0.0'}
CVE-2023-1384
The setMediaSource function on the amzn.thin.pl service does not sanitize the "source" parameter allowing for arbitrary javascript code to be run This issue affects: Amazon Fire TV Stick 3rd gen versions prior to 6.2.9.5. Insignia TV with FireOS versions prior to 7.6.3.3.
https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/
2023-03-14T09:59:33.421Z
2023-05-03T12:10:43.924Z
2023-05-03T12:10:43.924Z
{'Vendor': 'Amazon', 'Product': 'Fire TV Stick 3rd gen', 'Versions': '6.2.9.4'}
CVE-2023-1193
A use-after-free flaw was found in setup_async_work in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. This issue could allow an attacker to crash the system by accessing freed work.
https://access.redhat.com/security/cve/CVE-2023-1193
2023-03-06T08:46:50.158Z
2023-11-01T19:10:14.210Z
2023-11-01T19:10:14.210Z
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': '6.3-rc6'}
CVE-2023-1469
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrator-level access to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: This can potentially be exploited by lower-privileged users if the `Admin Dashboard Access Permission` setting it set for those users to access the dashboard.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b35ee801-f04d-4b22-8238-053b02a6ee0c?source=cve
2023-03-17T12:31:45.840Z
2023-03-17T12:31:55.285Z
2023-03-17T12:31:55.285Z
{'Vendor': 'mra13', 'Product': 'WP Express Checkout (Accept PayPal Payments Easily)', 'Versions': '2.2.8'}
CVE-2023-1039
A vulnerability classified as critical was found in SourceCodester Class and Exam Timetabling System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/index3.php of the component POST Parameter Handler. The manipulation of the argument password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221797 was assigned to this vulnerability.
https://vuldb.com/?id.221797
2023-02-26T11:52:56.938Z
2023-02-26T11:53:20.162Z
2023-10-20T22:15:03.056Z
{'Vendor': 'SourceCodester', 'Product': 'Class and Exam Timetabling System', 'Versions': '1.0'}
CVE-2023-1890
The Tablesome WordPress plugin before 1.0.9 does not escape various generated URLs, before outputting them in attributes when some notices are displayed, leading to Reflected Cross-Site Scripting
https://wpscan.com/vulnerability/8ef64490-30cd-4e07-9b7c-64f551944f3d
2023-04-05T16:55:04.427Z
2023-05-15T12:15:41.481Z
2023-05-15T12:15:41.481Z
{'Vendor': 'Unknown', 'Product': 'Tablesome', 'Versions': '0'}
CVE-2023-1486
A vulnerability classified as problematic was found in Lespeed WiseCleaner Wise Force Deleter 1.5.3.54. This vulnerability affects the function 0x220004 in the library WiseUnlock64.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223372.
https://vuldb.com/?id.223372
2023-03-18T20:02:45.749Z
2023-03-18T20:31:04.640Z
2023-10-21T09:26:43.169Z
{'Vendor': 'Lespeed', 'Product': 'WiseCleaner Wise Force Deleter', 'Versions': '1.5.3.54'}
CVE-2023-1255
Issue summary: The AES-XTS cipher decryption implementation for 64 bit ARM platform contains a bug that could cause it to read past the input buffer, leading to a crash. Impact summary: Applications that use the AES-XTS algorithm on the 64 bit ARM platform can crash in rare circumstances. The AES-XTS algorithm is usually used for disk encryption. The AES-XTS cipher decryption implementation for 64 bit ARM platform will read past the end of the ciphertext buffer if the ciphertext size is 4 mod 5 in 16 byte blocks, e.g. 144 bytes or 1024 bytes. If the memory after the ciphertext buffer is unmapped, this will trigger a crash which results in a denial of service. If an attacker can control the size and location of the ciphertext buffer being decrypted by an application using AES-XTS on 64 bit ARM, the application is affected. This is fairly unlikely making this issue a Low severity one.
https://www.openssl.org/news/secadv/20230419.txt
2023-03-07T14:56:07.099Z
2023-04-20T16:14:54.707Z
2023-04-21T08:18:31.231Z
{'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.1.0, 3.0.0'}
CVE-2023-1605
Denial of Service in GitHub repository radareorg/radare2 prior to 5.8.6.
https://huntr.dev/bounties/9dddcf5b-7dd4-46cc-abf9-172dce20bab2
2023-03-23T00:00:00
2023-03-23T00:00:00
2023-03-23T00:00:00
{'Vendor': 'radareorg', 'Product': 'radareorg/radare2', 'Versions': 'unspecified'}
CVE-2023-1310
A vulnerability, which was classified as critical, has been found in SourceCodester Online Graduate Tracer System 1.0. Affected by this issue is some unknown functionality of the file admin/prof.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-222698 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.222698
2023-03-10T07:34:14.863Z
2023-03-10T07:35:25.987Z
2023-10-21T08:02:31.188Z
{'Vendor': 'SourceCodester', 'Product': 'Online Graduate Tracer System', 'Versions': '1.0'}
CVE-2023-1740
A vulnerability was found in SourceCodester Air Cargo Management System 1.0. It has been classified as critical. Affected is an unknown function of the file admin/user/manage_user.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224628.
https://vuldb.com/?id.224628
2023-03-30T18:56:34.453Z
2023-03-30T21:00:05.720Z
2023-10-21T14:07:31.540Z
{'Vendor': 'SourceCodester', 'Product': 'Air Cargo Management System', 'Versions': '1.0'}
CVE-2023-1594
A vulnerability, which was classified as critical, was found in novel-plus 3.6.2. Affected is the function MenuService of the file sys/menu/list. The manipulation of the argument sort leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-223662 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.223662
2023-03-23T08:54:55.530Z
2023-03-23T10:00:06.079Z
2023-10-21T11:01:21.571Z
{'Vendor': 'n/a', 'Product': 'novel-plus', 'Versions': '3.6.2'}
CVE-2023-1081
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.3.3.
https://huntr.dev/bounties/cf59deed-9d43-4552-acfd-43f38f3aabba
2023-02-28T00:00:00
2023-02-28T00:00:00
2023-02-28T00:00:00
{'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'}
CVE-2023-1982
The Front Editor WordPress plugin through 4.0.4 does not sanitize and escape some of its form settings, which could allow high-privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/51987966-8007-4e12-bc2e-997b92054739
2023-04-11T15:03:50.109Z
2023-08-30T14:22:03.333Z
2023-08-30T14:22:03.333Z
{'Vendor': 'Unknown', 'Product': 'Guest posting / Frontend Posting wordpress plugin', 'Versions': '0'}
CVE-2023-1652
A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.
https://access.redhat.com/security/cve/cve-2023-1652
2023-03-27T00:00:00
2023-03-29T00:00:00
2023-05-11T00:00:00
{'Vendor': 'n/a', 'Product': 'Linux Kernel', 'Versions': 'Kernel 6.2 RC5'}
CVE-2023-1202
Permission bypass when importing or synchronizing entries in User vault in Devolutions Remote Desktop Manager 2023.1.9 and prior versions allows users with restricted rights to bypass entry permission via id collision.
https://devolutions.net/security/advisories/DEVO-2023-0008
2023-03-06T15:52:04.023Z
2023-03-23T17:12:47.824Z
2023-04-02T18:49:20.069507Z
{'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'}
CVE-2023-1717
Prototype pollution in bitrix/templates/bitrix24/components/bitrix/menu/left_vertical/script.js in Bitrix24 22.0.300 allows remote attackers to execute arbitrary JavaScript code in the victim’s browser, and possibly execute arbitrary PHP code on the server if the victim has administrator privilege, via polluting `__proto__[tag]` and `__proto__[text]`.
https://starlabs.sg/advisories/23/23-1717/
2023-03-30T09:17:02.993Z
2023-11-01T09:03:46.376Z
2023-11-01T09:03:46.376Z
{'Vendor': 'Bitrix24', 'Product': 'Bitrix24', 'Versions': '0'}
CVE-2023-1347
The Customizer Export/Import WordPress plugin before 0.9.6 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present
https://wpscan.com/vulnerability/356a5977-c90c-4fc6-98ed-032d5b27f272
2023-03-10T19:12:00.257Z
2023-05-08T13:58:18.914Z
2023-05-08T13:58:18.914Z
{'Vendor': 'Unknown', 'Product': 'Customizer Export/Import', 'Versions': '0'}
CVE-2023-1428
There exists an vulnerability causing an abort() to be called in gRPC.  The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.
https://github.com/grpc/grpc/commit/2485fa94bd8a723e5c977d55a3ce10b301b437f8
2023-03-16T10:47:22.037Z
2023-06-09T10:46:54.244Z
2023-06-09T10:46:54.244Z
{'Vendor': 'Google', 'Product': 'gRPC', 'Versions': '1.51'}
CVE-2023-1582
A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.
https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0%40kroah.com/
2023-03-22T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'n/a', 'Product': 'Linux', 'Versions': 'Linux Kernel prior to Kernel 5.7 RC14'}
CVE-2023-1078
A flaw was found in the Linux Kernel in RDS (Reliable Datagram Sockets) protocol. The rds_rm_zerocopy_callback() uses list_entry() on the head of a list causing a type confusion. Local user can trigger this with rds_message_put(). Type confusion leads to `struct rds_msg_zcopy_info *info` actually points to something else that is potentially controlled by local user. It is known how to trigger this, which causes an out of bounds access, and a lock corruption.
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/commit/?id=f753a68980cf4b59a80fe677619da2b1804f526d
2023-02-27T00:00:00
2023-03-27T00:00:00
2023-11-05T18:06:14.308401
{'Vendor': 'n/a', 'Product': 'Linux kernel', 'Versions': 'unknown'}
CVE-2023-1994
GQUIC dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
https://www.wireshark.org/security/wnpa-sec-2023-11.html
2023-04-11T00:00:00
2023-04-12T00:00:00
2023-09-17T06:06:30.017563
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.5, >=3.6.0, <3.6.13'}