CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-1048
|
A vulnerability, which was classified as critical, has been found in TechPowerUp Ryzen DRAM Calculator 1.2.0.5. This issue affects some unknown processing in the library WinRing0x64.sys. The manipulation leads to improper initialization. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221807.
|
https://vuldb.com/?id.221807
|
2023-02-26T12:25:28.818Z
|
2023-02-26T12:25:53.686Z
|
2023-10-21T07:00:17.000Z
|
{'Vendor': 'TechPowerUp', 'Product': 'Ryzen DRAM Calculator', 'Versions': '1.2.0.5'}
|
CVE-2023-1418
|
A vulnerability classified as problematic was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file cashconfirm.php of the component POST Parameter Handler. The manipulation of the argument transactioncode leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223129 was assigned to this vulnerability.
|
https://vuldb.com/?id.223129
|
2023-03-15T15:17:59.862Z
|
2023-03-15T15:18:33.549Z
|
2023-10-21T08:42:46.871Z
|
{'Vendor': 'SourceCodester', 'Product': 'Friendly Island Pizza Website and Ordering System', 'Versions': '1.0'}
|
CVE-2023-1033
|
Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 2.0.11.
|
https://huntr.dev/bounties/ba3cd929-8b60-4d8d-b77d-f28409ecf387
|
2023-02-25T00:00:00
|
2023-02-25T00:00:00
|
2023-02-25T00:00:00
|
{'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'}
|
CVE-2023-1463
|
Authorization Bypass Through User-Controlled Key in GitHub repository nilsteampassnet/teampass prior to 3.0.0.23.
|
https://huntr.dev/bounties/f6683c3b-a0f2-4615-b639-1920c8ae12e6
|
2023-03-17T00:00:00
|
2023-03-17T00:00:00
|
2023-04-26T00:00:00
|
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
|
CVE-2023-1930
|
The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the wpfc_clear_cache_of_allsites_callback function in versions up to, and including, 1.1.2. This makes it possible for authenticated attackers with subscriber-level access to delete caches.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/bae67a68-4bd1-4b52-b3dd-af0eef014028?source=cve
|
2023-04-06T20:05:04.507Z
|
2023-04-06T20:05:30.159Z
|
2023-04-07T14:06:40.629Z
|
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
|
CVE-2023-1875
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
https://huntr.dev/bounties/39715aaf-e798-4c60-97c4-45f4f2cd5c61
|
2023-04-05T00:00:00
|
2023-04-22T00:00:00
|
2023-12-18T10:12:33.630Z
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-1176
|
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.2.2.
|
https://huntr.dev/bounties/ae92f814-6a08-435c-8445-eec0ef4f1085
|
2023-03-04T00:00:00
|
2023-03-24T00:00:00
|
2023-03-24T00:00:00
|
{'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'}
|
CVE-2023-1526
|
Certain DesignJet and PageWide XL TAA compliant models may have risk of potential information disclosure if the hard disk drive is physically removed from the printer.
|
https://support.hp.com/us-en/document/ish_7869666-7869691-16/hpsbpi03837
|
2023-03-20T20:39:28.035Z
|
2023-04-28T16:04:13.185Z
|
2023-04-28T16:04:13.185Z
|
{'Vendor': 'HP Inc.', 'Product': 'HP DesignJet and PageWide XL', 'Versions': 'See HP Security Bulletin reference for affected versions.'}
|
CVE-2023-1208
|
This HTTP Headers WordPress plugin before 1.18.11 allows arbitrary data to be written to arbitrary files, leading to a Remote Code Execution vulnerability.
|
https://wpscan.com/vulnerability/e0cc6740-866a-4a81-a93d-ff486b79b7f7
|
2023-03-06T19:23:12.728Z
|
2023-07-10T12:41:23.248Z
|
2023-07-10T13:05:53.449Z
|
{'Vendor': 'Unknown', 'Product': 'HTTP Headers', 'Versions': '0'}
|
CVE-2023-1967
|
Keysight N8844A Data Analytics Web Service deserializes untrusted data without sufficiently verifying the resulting data will be valid.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-115-01
|
2023-04-10T14:51:04.971Z
|
2023-04-27T21:37:05.110Z
|
2023-04-27T21:37:05.110Z
|
{'Vendor': 'Keysight', 'Product': 'N8844A Data Analytics Web Service', 'Versions': '0'}
|
CVE-2023-1064
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Uzay Baskul Weighbridge Automation Software allows SQL Injection.This issue affects Weighbridge Automation Software: before 1.1.
|
https://www.usom.gov.tr/bildirim/tr-23-0115
|
2023-02-27T11:22:27.077Z
|
2023-03-01T12:51:08.179Z
|
2023-03-01T12:51:27.504Z
|
{'Vendor': 'Uzay Baskul', 'Product': 'Weighbridge Automation Software', 'Versions': '0'}
|
CVE-2023-1571
|
A vulnerability, which was classified as critical, was found in DataGear up to 4.5.0. This affects an unknown part of the file /analysisProject/pagingQueryData. The manipulation of the argument queryOrder leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.5.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-223563.
|
https://vuldb.com/?id.223563
|
2023-03-22T11:10:45.104Z
|
2023-03-22T15:00:05.220Z
|
2023-10-21T10:51:35.633Z
|
{'Vendor': 'n/a', 'Product': 'DataGear', 'Versions': '4.0, 4.1, 4.2, 4.3, 4.4, 4.5'}
|
CVE-2023-1121
|
The Simple Giveaways WordPress plugin before 2.45.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
https://wpscan.com/vulnerability/7ead9fb9-d81f-47c6-a1b4-21f29183cc15
|
2023-03-01T14:03:26.616Z
|
2023-04-10T13:18:04.716Z
|
2023-04-10T13:18:04.716Z
|
{'Vendor': 'Unknown', 'Product': 'Simple Giveaways', 'Versions': '0'}
|
CVE-2023-1988
|
A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/?page=maintenance/brand. The manipulation of the argument Brand Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225536.
|
https://vuldb.com/?id.225536
|
2023-04-11T16:40:38.775Z
|
2023-04-11T18:31:03.319Z
|
2023-10-22T09:39:07.651Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
|
CVE-2023-1822
|
Incorrect security UI in Navigation in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)
|
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
|
2023-04-03T20:48:53.447Z
|
2023-04-04T21:39:35.557Z
|
2023-04-04T21:39:35.557Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
|
CVE-2023-1588
| null | null |
2023-03-23T07:02:54.910Z
| null |
2023-05-25T07:29:33.047Z
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-1072
|
An issue has been discovered in GitLab affecting all versions starting from 9.0 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. It was possible to trigger a resource depletion attack due to improper filtering for number of requests to read commits details.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/219619
|
2023-02-27T00:00:00
|
2023-03-09T00:00:00
|
2023-03-09T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=9.0, <15.7.8, >=15.8, <15.8.4, >=15.9, <15.9.2'}
|
CVE-2023-1971
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in yuan1994 tpAdmin 1.3.12. Affected is the function remote of the file application\admin\controller\Upload.php. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225408. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
|
https://vuldb.com/?id.225408
|
2023-04-10T15:49:27.271Z
|
2023-04-10T16:31:03.094Z
|
2023-10-22T09:31:48.483Z
|
{'Vendor': 'yuan1994', 'Product': 'tpAdmin', 'Versions': '1.3.12'}
|
CVE-2023-1834
|
Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and January 2023, and are running v7.13 may have the telnet and FTP ports open by default. This could potentially allow attackers unauthorized access to the device through the open ports.
|
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139441
|
2023-04-04T13:44:37.415Z
|
2023-05-11T18:01:06.560Z
|
2023-05-11T18:01:06.560Z
|
{'Vendor': 'Rockwell Automation', 'Product': 'Kinetix 5500 EtherNet/IP Servo Drive', 'Versions': '7.13'}
|
CVE-2023-1137
|
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a vulnerability in which a low-level user could extract files and plaintext credentials of administrator users, resulting in privilege escalation.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
|
2023-03-01T23:23:12.414Z
|
2023-03-27T14:44:40.332Z
|
2023-03-27T14:44:40.332Z
|
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
|
CVE-2023-1567
|
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/assign/assign.php. The manipulation of the argument sid leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223559.
|
https://vuldb.com/?id.223559
|
2023-03-22T10:49:52.765Z
|
2023-03-22T13:31:05.743Z
|
2023-10-21T10:46:42.817Z
|
{'Vendor': 'SourceCodester', 'Product': 'Student Study Center Desk Management System', 'Versions': '1.0'}
|
CVE-2023-1249
|
A use-after-free flaw was found in the Linux kernel’s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 ("coredump: Use the vma snapshot in fill_files_note") not applied yet, then kernel could be affected.
|
https://patchwork.kernel.org/project/linux-fsdevel/patch/87iltzn3nd.fsf_-_%40email.froward.int.ebiederm.org/
|
2023-03-07T00:00:00
|
2023-03-23T00:00:00
|
2023-04-18T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel 5.18-rc1'}
|
CVE-2023-1619
|
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.
|
https://cert.vde.com/en/advisories/VDE-2023-006/
|
2023-03-24T10:12:25.218Z
|
2023-06-26T06:18:33.981Z
|
2023-06-26T06:18:33.981Z
|
{'Vendor': 'Wago', 'Product': '750-8202/xxx-xxx', 'Versions': 'FW1'}
|
CVE-2023-1926
|
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the deleteCacheToolbar function. This makes it possible for unauthenticated attackers to perform cache deletion via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/b793a4cb-3130-428e-9b61-8ce29fcdaf70?source=cve
|
2023-04-06T19:59:48.848Z
|
2023-04-06T19:59:53.783Z
|
2023-04-07T14:05:18.634Z
|
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
|
CVE-2023-1475
|
A vulnerability, which was classified as critical, has been found in SourceCodester Canteen Management System 1.0. This issue affects the function query of the file createuser.php. The manipulation of the argument uemail leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223337 was assigned to this vulnerability.
|
https://vuldb.com/?id.223337
|
2023-03-17T14:41:48.144Z
|
2023-03-17T14:42:05.637Z
|
2023-10-21T09:16:57.116Z
|
{'Vendor': 'SourceCodester', 'Product': 'Canteen Management System', 'Versions': '1.0'}
|
CVE-2023-1025
|
The Simple File List WordPress plugin before 6.0.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
https://wpscan.com/vulnerability/13621b13-8d31-4214-a665-cb15981f3ec1
|
2023-02-24T19:04:10.457Z
|
2023-03-27T15:37:42.298Z
|
2023-03-27T15:37:42.298Z
|
{'Vendor': 'Unknown', 'Product': 'Simple File List', 'Versions': '0'}
|
CVE-2023-1530
|
Use after free in PDF in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html
|
2023-03-21T00:43:36.474Z
|
2023-03-21T20:50:56.042Z
|
2023-03-21T20:50:56.042Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.110'}
|
CVE-2023-1160
|
Use of Platform-Dependent Third Party Components in GitHub repository cockpit-hq/cockpit prior to 2.4.0.
|
https://huntr.dev/bounties/3ce480dc-1b1c-4230-9287-0dc3b31c2f87
|
2023-03-03T00:00:00
|
2023-03-03T00:00:00
|
2023-03-03T00:00:00
|
{'Vendor': 'cockpit-hq', 'Product': 'cockpit-hq/cockpit', 'Versions': 'unspecified'}
|
CVE-2023-1863
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eskom Water Metering Software allows Command Line Execution through SQL Injection.This issue affects Water Metering Software: before 23.04.06.
|
https://www.usom.gov.tr/bildirim/tr-23-0225
|
2023-04-05T08:34:09.113Z
|
2023-04-14T08:14:06.058Z
|
2023-09-06T14:54:29.230Z
|
{'Vendor': 'Eskom', 'Product': 'Water Metering Software', 'Versions': '0'}
|
CVE-2023-1814
|
Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass download checking via a crafted HTML page. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
|
2023-04-03T20:48:52.530Z
|
2023-04-04T21:39:34.568Z
|
2023-04-04T21:39:34.568Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
|
CVE-2023-1117
|
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.18.
|
https://huntr.dev/bounties/e8c0044d-a31b-4347-b2d5-59fbf492da39
|
2023-03-01T00:00:00
|
2023-03-01T00:00:00
|
2023-03-01T00:00:00
|
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
|
CVE-2023-1547
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Elra Parkmatik allows SQL Injection through SOAP Parameter Tampering, Command Line Execution through SQL Injection.This issue affects Parkmatik: before 02.01-a51.
|
https://www.usom.gov.tr/bildirim/tr-23-0404
|
2023-03-21T10:09:35.583Z
|
2023-07-13T07:42:44.365Z
|
2023-07-26T09:02:48.423Z
|
{'Vendor': 'Elra', 'Product': 'Parkmatik', 'Versions': '0'}
|
CVE-2023-1402
|
The course participation report required additional checks to prevent roles being displayed which the user did not have access to view.
|
https://moodle.org/mod/forum/discuss.php?d=445069
|
2023-03-14T00:00:00
|
2023-03-23T00:00:00
|
2023-03-30T00:00:00
|
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.1 to 4.1.1, 4.0 to 4.0.6, 3.11 to 3.11.12, 3.9 to 3.9.19 and earlier unsupported versions'}
|
CVE-2023-1951
|
A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0 and classified as critical. Affected by this issue is the function delete_brand of the file /admin/maintenance/brand.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-225338 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.225338
|
2023-04-08T06:29:31.943Z
|
2023-04-08T08:00:05.752Z
|
2023-10-22T06:36:45.378Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
|
CVE-2023-1681
|
A vulnerability, which was classified as problematic, was found in Xunrui CMS 4.61. Affected is an unknown function of the file /config/myfield/test.php. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-224238 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.224238
|
2023-03-28T20:20:51.031Z
|
2023-03-28T23:00:05.838Z
|
2023-10-21T13:48:00.871Z
|
{'Vendor': 'Xunrui', 'Product': 'CMS', 'Versions': '4.61'}
|
CVE-2023-1394
|
A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0. It has been classified as critical. This affects the function mysqli_query of the file bsitemp.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222981 was assigned to this vulnerability.
|
https://vuldb.com/?id.222981
|
2023-03-14T14:30:15.552Z
|
2023-03-14T14:31:19.825Z
|
2023-10-21T08:33:01.367Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Graduate Tracer System', 'Versions': '1.0'}
|
CVE-2023-1140
|
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a vulnerability that could allow an attacker to achieve unauthenticated remote code execution in the context of an administrator.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
|
2023-03-01T23:24:37.667Z
|
2023-03-27T14:54:53.192Z
|
2023-03-27T14:54:53.192Z
|
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
|
CVE-2023-1843
|
The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to unauthorized permalink structure update due to a missing capability check on the permalink_setup function in versions up to, and including, 3.3.0. This makes it possible for unauthenticated attackers to change the permalink structure.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/5db00eb6-3e05-42fa-bb84-2df4bcae3955?source=cve
|
2023-04-04T19:51:47.391Z
|
2023-06-09T05:33:18.588Z
|
2023-06-09T05:33:18.588Z
|
{'Vendor': 'xpeedstudio', 'Product': 'Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress', 'Versions': '*'}
|
CVE-2023-1906
|
A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.
|
https://bugzilla.redhat.com/show_bug.cgi?id=2185714
|
2023-04-06T00:00:00
|
2023-04-12T00:00:00
|
2023-05-16T00:00:00
|
{'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': 'Fixed in ImageMagick v6.9.12-84, v 7.1.1-6.'}
|
CVE-2023-1455
|
A vulnerability classified as critical was found in SourceCodester Online Pizza Ordering System 1.0. This vulnerability affects unknown code of the file admin/ajax.php?action=login2 of the component Login Page. The manipulation of the argument email with the input abc%40qq.com' AND (SELECT 9110 FROM (SELECT(SLEEP(5)))XSlc) AND 'jFNl'='jFNl leads to sql injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223300.
|
https://vuldb.com/?id.223300
|
2023-03-17T06:58:21.845Z
|
2023-03-17T06:58:47.326Z
|
2023-10-21T09:05:58.260Z
|
{'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'}
|
CVE-2023-1005
|
A vulnerability was found in JP1016 Markdown-Electron and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to code injection. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. VDB-221738 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.221738
|
2023-02-24T07:59:59.175Z
|
2023-02-24T08:00:18.381Z
|
2023-10-20T22:01:37.519Z
|
{'Vendor': 'JP1016', 'Product': 'Markdown-Electron', 'Versions': 'n/a'}
|
CVE-2023-1286
|
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.19.
|
https://huntr.dev/bounties/31d97442-3f87-439f-83f0-1c7862ef0c7c
|
2023-03-09T00:00:00
|
2023-03-09T00:00:00
|
2023-03-09T00:00:00
|
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
|
CVE-2023-1793
|
A vulnerability was found in SourceCodester Police Crime Record Management System 1.0. It has been classified as critical. This affects an unknown part of the file /officer/assigncase.php of the component GET Parameter Handler. The manipulation of the argument caseid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224745 was assigned to this vulnerability.
|
https://vuldb.com/?id.224745
|
2023-04-02T06:49:10.126Z
|
2023-04-02T07:31:03.379Z
|
2023-10-21T14:29:28.701Z
|
{'Vendor': 'SourceCodester', 'Product': 'Police Crime Record Management System', 'Versions': '1.0'}
|
CVE-2023-1269
|
Use of Hard-coded Credentials in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
|
https://huntr.dev/bounties/91c31eb6-024d-4ad3-88fe-f15b03fd20f5
|
2023-03-08T00:00:00
|
2023-03-08T00:00:00
|
2023-03-08T00:00:00
|
{'Vendor': 'alextselegidis', 'Product': 'alextselegidis/easyappointments', 'Versions': 'unspecified'}
|
CVE-2023-1639
|
A vulnerability classified as problematic has been found in IObit Malware Fighter 9.4.0.776. This affects the function 0x8001E04C in the library ImfRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224019.
|
https://vuldb.com/?id.224019
|
2023-03-26T20:12:01.613Z
|
2023-03-26T20:31:04.595Z
|
2023-10-21T13:28:30.036Z
|
{'Vendor': 'IObit', 'Product': 'Malware Fighter', 'Versions': '9.4.0.776'}
|
CVE-2023-1855
|
A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.
|
https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
2023-07-23T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel prior to Kernel 6.3 RC3'}
|
CVE-2023-1156
|
A vulnerability classified as problematic was found in SourceCodester Health Center Patient Record Management System 1.0. This vulnerability affects unknown code of the file admin/fecalysis_form.php. The manipulation of the argument itr_no leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222220.
|
https://vuldb.com/?id.222220
|
2023-03-02T18:07:05.967Z
|
2023-03-02T18:07:23.125Z
|
2023-10-21T07:21:01.575Z
|
{'Vendor': 'SourceCodester', 'Product': 'Health Center Patient Record Management System', 'Versions': '1.0'}
|
CVE-2023-1506
|
A vulnerability, which was classified as critical, was found in SourceCodester E-Commerce System 1.0. Affected is an unknown function of the file login.php. The manipulation of the argument U_USERNAME leads to sql injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-223410 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.223410
|
2023-03-20T07:32:52.947Z
|
2023-03-20T09:31:04.091Z
|
2023-10-21T09:49:53.569Z
|
{'Vendor': 'SourceCodester', 'Product': 'E-Commerce System', 'Versions': '1.0'}
|
CVE-2023-1013
|
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Virames Vira-Investing allows Cross-Site Scripting (XSS).This issue affects Vira-Investing: before 1.0.84.86.
|
https://www.usom.gov.tr/bildirim/tr-23-0183
|
2023-02-24T13:53:12.593Z
|
2023-03-30T08:14:06.747Z
|
2023-03-31T09:03:01.453Z
|
{'Vendor': 'Virames', 'Product': 'Vira-Investing', 'Versions': '0'}
|
CVE-2023-1443
|
A vulnerability was found in Filseclab Twister Antivirus 8. It has been declared as problematic. This vulnerability affects the function 0x80112053 in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223288.
|
https://vuldb.com/?id.223288
|
2023-03-17T06:30:52.865Z
|
2023-03-17T06:31:13.627Z
|
2023-10-21T08:51:19.570Z
|
{'Vendor': 'Filseclab', 'Product': 'Twister Antivirus', 'Versions': '8'}
|
CVE-2023-1910
|
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to unauthorized modification of data due to an insufficient capability check on the get_remote_templates function in versions up to, and including, 1.8.3. This makes it possible for authenticated attackers with subscriber-level permissions or above to flush the remote template cache. Cached template information can also be accessed via this endpoint but these are not considered sensitive as they are publicly accessible from the developer's site.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/6cd64ab0-007b-4778-9d92-06e530638fad?source=cve
|
2023-04-06T13:29:59.935Z
|
2023-06-09T05:33:20.298Z
|
2023-06-09T05:33:20.298Z
|
{'Vendor': 'jetmonsters', 'Product': 'Getwid – Gutenberg Blocks', 'Versions': '*'}
|
CVE-2023-1290
|
A vulnerability, which was classified as critical, has been found in SourceCodester Sales Tracker Management System 1.0. Affected by this issue is some unknown functionality of the file admin/clients/view_client.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222644.
|
https://vuldb.com/?id.222644
|
2023-03-09T14:25:35.716Z
|
2023-03-09T14:26:00.790Z
|
2023-10-21T07:49:04.764Z
|
{'Vendor': 'SourceCodester', 'Product': 'Sales Tracker Management System', 'Versions': '1.0'}
|
CVE-2023-1785
|
A vulnerability was found in SourceCodester Earnings and Expense Tracker App 1.0. It has been classified as critical. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-224700.
|
https://vuldb.com/?id.224700
|
2023-03-31T19:39:25.099Z
|
2023-03-31T20:00:06.742Z
|
2023-10-21T14:24:35.962Z
|
{'Vendor': 'SourceCodester', 'Product': 'Earnings and Expense Tracker App', 'Versions': '1.0'}
|
CVE-2023-1101
|
SonicOS SSLVPN improper restriction of excessive MFA attempts vulnerability allows an authenticated attacker to use excessive MFA codes.
|
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0005
|
2023-02-28T00:00:00
|
2023-03-02T00:00:00
|
2023-03-02T00:00:00
|
{'Vendor': 'SonicWall', 'Product': 'SonicOS', 'Versions': 'SonicOS 6.5.4.11-97n and earlier, SonicOS NSv 6.5.4.4-44v-21-1551 and earlier, SonicOS NSsp 7.0.1-5083 and earlier, SonicOS 7.0.1-5095 and earlier'}
|
CVE-2023-1802
|
In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a disclosure of sensitive information. Only users who have Access Experimental Features enabled and have logged in to a private registry are affected.
|
https://docs.docker.com/desktop/release-notes/#4180
|
2023-04-03T10:20:15.739Z
|
2023-04-06T08:52:19.506Z
|
2023-04-06T08:52:19.506Z
|
{'Vendor': 'Docker', 'Product': 'Docker Desktop', 'Versions': '4.17.0'}
|
CVE-2023-1947
|
A vulnerability was found in taoCMS 3.0.2. It has been classified as critical. Affected is an unknown function of the file /admin/admin.php. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225330 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.225330
|
2023-04-07T21:52:25.537Z
|
2023-04-07T22:00:08.628Z
|
2023-10-22T06:31:52.779Z
|
{'Vendor': 'n/a', 'Product': 'taoCMS', 'Versions': '3.0.2'}
|
CVE-2023-1414
|
The WP VR WordPress plugin before 8.3.0 does not have authorisation and CSRF checks in various AJAX actions, one in particular could allow any authenticated users, such as subscriber to update arbitrary tours
|
https://wpscan.com/vulnerability/d61d4be7-9251-4c62-8fb7-8a456aa6969e
|
2023-03-15T14:48:28.665Z
|
2023-04-24T18:31:02.339Z
|
2023-04-24T18:31:02.339Z
|
{'Vendor': 'Unknown', 'Product': 'WP VR', 'Versions': '0'}
|
CVE-2023-1044
|
A vulnerability was found in MuYuCMS 2.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /editor/index.php. The manipulation of the argument file_path leads to relative path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221803.
|
https://vuldb.com/?id.221803
|
2023-02-26T12:20:19.503Z
|
2023-02-26T12:20:49.107Z
|
2023-10-20T22:21:09.108Z
|
{'Vendor': 'n/a', 'Product': 'MuYuCMS', 'Versions': '2.2'}
|
CVE-2023-1697
|
An Improper Handling of Missing Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause a dcpfe process core and thereby a Denial of Service (DoS). Continued receipt of these specific frames will cause a sustained Denial of Service condition. This issue occurs when a specific malformed ethernet frame is received. This issue affects Juniper Networks Junos OS on QFX10000 Series, PTX1000 Series Series: All versions prior to 19.4R3-S10; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S1; 22.1 versions prior to 22.1R2-S1, 22.1R3; 22.2 versions prior to 22.2R1-S2, 22.2R2.
|
https://supportportal.juniper.net/JSA70612
|
2023-03-29T00:00:00
|
2023-04-17T00:00:00
|
2023-04-17T00:00:00
|
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': 'unspecified, 20.1R1, 20.2, 20.3, 20.4, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2'}
|
CVE-2023-1228
|
Insufficient policy enforcement in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html
|
2023-03-07T00:41:19.202Z
|
2023-03-07T21:42:18.300Z
|
2023-03-07T21:42:18.300Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'}
|
CVE-2023-1382
|
A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.
|
https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u
|
2023-03-14T00:00:00
|
2023-04-19T00:00:00
|
2023-04-19T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux Kernel prior to Kernel 6.1 RC7'}
|
CVE-2023-1678
|
A vulnerability classified as critical has been found in DriverGenius 9.70.0.346. This affects the function 0x9C40A0D8/0x9C40A0DC/0x9C40A0E0 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224235.
|
https://vuldb.com/?id.224235
|
2023-03-28T20:16:32.440Z
|
2023-03-28T22:00:05.144Z
|
2023-10-21T13:44:21.341Z
|
{'Vendor': 'n/a', 'Product': 'DriverGenius', 'Versions': '9.70.0.346'}
|
CVE-2023-1195
|
A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server->hostname to NULL, leading to an invalid pointer request.
|
https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621
|
2023-03-06T00:00:00
|
2023-05-18T00:00:00
|
2023-05-18T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'prior to kernel 6.1 rc3'}
|
CVE-2023-1480
|
A vulnerability classified as critical was found in SourceCodester Monitoring of Students Cyber Accounts System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php of the component POST Parameter Handler. The manipulation of the argument un leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223363.
|
https://vuldb.com/?id.223363
|
2023-03-18T08:27:08.104Z
|
2023-03-18T09:00:05.604Z
|
2023-10-21T09:19:23.779Z
|
{'Vendor': 'SourceCodester', 'Product': 'Monitoring of Students Cyber Accounts System', 'Versions': '1.0'}
|
CVE-2023-1879
|
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
https://huntr.dev/bounties/1dc7f818-c8ea-4f80-b000-31b48a426334
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-1253
|
A vulnerability, which was classified as critical, was found in SourceCodester Health Center Patient Record Management System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222483.
|
https://vuldb.com/?id.222483
|
2023-03-07T14:53:48.378Z
|
2023-03-07T14:54:28.997Z
|
2023-10-21T07:41:45.692Z
|
{'Vendor': 'SourceCodester', 'Product': 'Health Center Patient Record Management System', 'Versions': '1.0'}
|
CVE-2023-1603
|
Permission bypass when importing or synchronizing entries in User vault
in Devolutions Server 2022.3.13 and prior versions allows users with restricted rights to bypass entry permission via id collision.
|
https://devolutions.net/security/advisories/DEVO-2023-0008
|
2023-03-23T15:48:10.734Z
|
2023-03-23T17:13:31.049Z
|
2023-04-02T18:49:20.069507Z
|
{'Vendor': 'Devolutions', 'Product': 'Server', 'Versions': '0'}
|
CVE-2023-1316
|
Cross-site Scripting (XSS) - Stored in GitHub repository osticket/osticket prior to v1.16.6.
|
https://huntr.dev/bounties/c6353bab-c382-47f6-937b-56d253f2e8d3
|
2023-03-10T00:00:00
|
2023-03-10T00:00:00
|
2023-03-10T00:00:00
|
{'Vendor': 'osticket', 'Product': 'osticket/osticket', 'Versions': 'unspecified'}
|
CVE-2023-1746
|
A vulnerability, which was classified as problematic, was found in Dreamer CMS up to 3.5.0. Affected is an unknown function of the component File Upload Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. VDB-224634 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.224634
|
2023-03-30T19:31:03.636Z
|
2023-03-30T23:00:06.477Z
|
2023-10-21T14:14:50.480Z
|
{'Vendor': 'n/a', 'Product': 'Dreamer CMS', 'Versions': '3.0, 3.1, 3.2, 3.3, 3.4, 3.5'}
|
CVE-2023-1592
|
A vulnerability classified as critical was found in SourceCodester Automatic Question Paper Generator System 1.0. This vulnerability affects unknown code of the file admin/courses/view_class.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-223660.
|
https://vuldb.com/?id.223660
|
2023-03-23T08:42:14.407Z
|
2023-03-23T09:31:03.883Z
|
2023-10-21T10:58:55.172Z
|
{'Vendor': 'SourceCodester', 'Product': 'Automatic Question Paper Generator System', 'Versions': '1.0'}
|
CVE-2023-1068
|
The Download Read More Excerpt Link plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.0. This is due to missing or incorrect nonce validation on the read_more_excerpt_link_menu_options() function. This makes it possible for unauthenticated attackers to update he plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/0359434b-9d88-4a40-8e9f-ec354c8de816
|
2023-02-27T13:28:49.110Z
|
2023-02-27T13:29:53.318Z
|
2023-02-27T13:29:53.318Z
|
{'Vendor': 'teckel', 'Product': 'Read More Excerpt Link', 'Versions': '<= 1.6.0'}
|
CVE-2023-1984
|
A vulnerability classified as critical was found in SourceCodester Complaint Management System 1.0. This vulnerability affects unknown code of the file /users/check_availability.php of the component POST Parameter Handler. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225532.
|
https://vuldb.com/?id.225532
|
2023-04-11T16:32:20.941Z
|
2023-04-11T17:31:03.568Z
|
2023-10-22T09:34:14.981Z
|
{'Vendor': 'SourceCodester', 'Product': 'Complaint Management System', 'Versions': '1.0'}
|
CVE-2023-1087
|
The WC Sales Notification WordPress plugin before 1.2.3 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
|
https://wpscan.com/vulnerability/356c89a1-81b6-4600-9291-1a74788af7f9
|
2023-02-28T13:17:54.720Z
|
2023-03-27T15:37:45.104Z
|
2023-03-27T15:37:45.104Z
|
{'Vendor': 'Unknown', 'Product': 'WC Sales Notification', 'Versions': '0'}
|
CVE-2023-1654
|
Denial of Service in GitHub repository gpac/gpac prior to 2.4.0.
|
https://huntr.dev/bounties/33652b56-128f-41a7-afcc-10641f69ff14
|
2023-03-27T00:00:00
|
2023-03-27T00:00:00
|
2023-05-27T00:00:00
|
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
|
CVE-2023-1204
|
An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.1 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A user could use an unverified email as a public email and commit email by sending a specifically crafted request on user update settings.
|
https://gitlab.com/gitlab-org/gitlab/-/issues/394745
|
2023-03-06T00:00:00
|
2023-05-03T00:00:00
|
2023-06-06T00:00:00
|
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=10.0, <12.9.8, >=12.10, <12.10.7, >=13.0, <13.0.1'}
|
CVE-2023-1711
|
A vulnerability exists in a FOXMAN-UN and UNEM logging component, it only affects systems that use remote authentication to the network elements.
If exploited an attacker could obtain confidential information.
List of CPEs:
* cpe:2.3:a:hitachienergy:foxman_un:R9C:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R10C:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R11A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R11B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R14A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R14B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R15A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R15B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R16A:*:*:*:*:*:*:*
*
* cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R10C:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R11A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R11B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R14A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R14B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R15A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R15B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R16A:*:*:*:*:*:*:*
|
https://search.abb.com/library/Download.aspx?DocumentID=8DBD000155&LanguageCode=en&DocumentPartId=&Action=Launch
|
2023-03-30T07:56:02.223Z
|
2023-05-30T18:46:24.317Z
|
2023-05-30T18:46:29.787Z
|
{'Vendor': 'Hitachi Energy', 'Product': 'FOXMAN-UN', 'Versions': 'FOXMAN-UN R16A, FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C'}
|
CVE-2023-1341
|
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the ajax_deactivate function. This makes it possible for unauthenticated attackers to turn off caching via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/d95b01c3-5db4-40ac-8787-0db58a9cc3a6
|
2023-03-10T18:49:40.150Z
|
2023-03-10T19:05:49.813Z
|
2023-03-10T19:05:49.813Z
|
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
|
CVE-2023-1584
|
A flaw was found in Quarkus. Quarkus OIDC can leak both ID and access tokens in the authorization code flow when an insecure HTTP protocol is used, which can allow attackers to access sensitive user data directly from the ID token or by using the access token to access user data from OIDC provider services. Please note that passwords are not stored in access tokens.
|
https://access.redhat.com/errata/RHSA-2023:3809
|
2023-03-22T20:15:15.323Z
|
2023-10-04T10:47:37.831Z
|
2023-10-04T10:47:37.831Z
|
{'Vendor': 'n/a', 'Product': 'quarkus-oidc', 'Versions': '3.1.0.CR1'}
|
CVE-2023-1091
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Alpata Licensed Warehousing Automation System allows Command Line Execution through SQL Injection.This issue affects Licensed Warehousing Automation System: through 2023.1.01.
|
https://www.usom.gov.tr/bildirim/tr-23-0139
|
2023-02-28T14:07:00.592Z
|
2023-03-10T07:02:09.307Z
|
2023-03-26T19:51:00.697Z
|
{'Vendor': 'Alpata', 'Product': 'Licensed Warehousing Automation System', 'Versions': '0'}
|
CVE-2023-1992
|
RPCoRDMA dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
|
https://www.wireshark.org/security/wnpa-sec-2023-09.html
|
2023-04-11T00:00:00
|
2023-04-12T00:00:00
|
2023-09-17T06:06:13.063626
|
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.5, >=3.6.0, <3.6.13'}
|
CVE-2023-1838
|
A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.
|
https://lore.kernel.org/netdev/20220516084213.26854-1-jasowang%40redhat.com/T/
|
2023-04-04T00:00:00
|
2023-04-05T00:00:00
|
2023-05-17T00:00:00
|
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux Kernel prior to kernel 5.18 25'}
|
CVE-2023-1212
|
Cross-site Scripting (XSS) - Stored in GitHub repository phpipam/phpipam prior to v1.5.2.
|
https://huntr.dev/bounties/3d5199d6-9bb2-4f7b-bd81-bded704da499
|
2023-03-06T00:00:00
|
2023-03-06T00:00:00
|
2023-03-06T00:00:00
|
{'Vendor': 'phpipam', 'Product': 'phpipam/phpipam', 'Versions': 'unspecified'}
|
CVE-2023-1642
|
A vulnerability, which was classified as problematic, was found in IObit Malware Fighter 9.4.0.776. Affected is the function 0x222034/0x222038/0x22203C/0x222040 in the library ObCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-224022 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.224022
|
2023-03-26T20:12:12.473Z
|
2023-03-26T21:31:03.521Z
|
2023-10-21T13:32:09.483Z
|
{'Vendor': 'IObit', 'Product': 'Malware Fighter', 'Versions': '9.4.0.776'}
|
CVE-2023-1357
|
A vulnerability, which was classified as critical, has been found in SourceCodester Simple Bakery Shop Management System 1.0. Affected by this issue is some unknown functionality of the component Admin Login. The manipulation of the argument username/password with the input admin' or 1=1 -- leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222860.
|
https://vuldb.com/?id.222860
|
2023-03-12T07:10:10.437Z
|
2023-03-12T07:31:03.736Z
|
2023-10-21T08:15:56.370Z
|
{'Vendor': 'SourceCodester', 'Product': 'Simple Bakery Shop Management System', 'Versions': '1.0'}
|
CVE-2023-1707
|
Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to information disclosure when IPsec is enabled with FutureSmart version 5.6.
|
https://support.hp.com/us-en/document/ish_7905330-7905358-16/hpsbpi03838
|
2023-03-29T16:34:11.993Z
|
2023-06-13T17:06:04.682Z
|
2023-06-13T17:06:04.682Z
|
{'Vendor': 'HP Inc.', 'Product': 'HP Enterprise LaserJet and HP LaserJet Managed Printers', 'Versions': 'See HP Security Bulletin reference for affected versions.'}
|
CVE-2023-1029
|
The WP Meta SEO plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.3. This is due to missing or incorrect nonce validation on the regenerateSitemaps function. This makes it possible for unauthenticated attackers to regenerate Sitemaps via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/764aec73-f291-4372-9dde-812ffaf025ed
|
2023-02-24T19:23:24.418Z
|
2023-02-24T19:25:31.865Z
|
2023-02-24T19:25:31.865Z
|
{'Vendor': 'joomunited', 'Product': 'WP Meta SEO', 'Versions': '*'}
|
CVE-2023-1183
|
A flaw was found in the Libreoffice package. An attacker can craft an odb containing a "database/script" file with a SCRIPT command where the contents of the file could be written to a new file whose location was determined by the attacker.
|
https://access.redhat.com/security/cve/CVE-2023-1183
|
2023-03-06T04:37:10.705Z
|
2023-07-10T15:04:30.740Z
|
2023-07-10T15:04:30.740Z
|
{'Vendor': 'n/a', 'Product': 'libreoffice', 'Versions': '7.4.6, 7.5.1'}
|
CVE-2023-1479
|
A vulnerability classified as critical has been found in SourceCodester Simple Music Player 1.0. Affected is an unknown function of the file save_music.php. The manipulation of the argument filename leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-223362 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.223362
|
2023-03-18T08:25:06.796Z
|
2023-03-18T08:25:39.933Z
|
2023-10-21T09:18:10.284Z
|
{'Vendor': 'SourceCodester', 'Product': 'Simple Music Player', 'Versions': '1.0'}
|
CVE-2023-1880
|
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
|
https://huntr.dev/bounties/ece5f051-674e-4919-b998-594714910f9e
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
2023-04-05T00:00:00
|
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
|
CVE-2023-1496
|
Cross-site Scripting (XSS) - Reflected in GitHub repository imgproxy/imgproxy prior to 3.14.0.
|
https://huntr.dev/bounties/de603972-935a-401a-96fb-17ddadd282b2
|
2023-03-19T00:00:00
|
2023-03-19T00:00:00
|
2023-03-19T00:00:00
|
{'Vendor': 'imgproxy', 'Product': 'imgproxy/imgproxy', 'Versions': 'unspecified'}
|
CVE-2023-1615
|
The Ultimate Addons for Contact Form 7 plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in versions up to, and including, 3.1.23. This makes it possible for authenticated attackers of any authorization level to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/817ca119-ddaf-4525-beee-68c4e0aac544?source=cve
|
2023-03-23T20:40:48.245Z
|
2023-06-09T05:33:22.261Z
|
2023-06-09T05:33:22.261Z
|
{'Vendor': 'psdtowpservice', 'Product': 'Ultimate Addons for Contact Form 7', 'Versions': '3.1.23'}
|
CVE-2023-1245
|
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
|
https://huntr.dev/bounties/f8011bb3-8212-4937-aa58-79f4b73be004
|
2023-03-07T00:00:00
|
2023-03-07T00:00:00
|
2023-03-07T00:00:00
|
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
|
CVE-2023-1750
|
The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could retrieve device history, set device settings, and retrieve device information.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01
|
2023-03-30T20:02:38.794Z
|
2023-04-04T16:52:59.453Z
|
2023-04-04T16:52:59.453Z
|
{'Vendor': 'Nexx', 'Product': 'Smart Alarm NXAL-100', 'Versions': '0'}
|
CVE-2023-1300
|
A vulnerability classified as critical was found in SourceCodester COVID 19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file patient-report.php of the component POST Parameter Handler. The manipulation of the argument searchdata leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222661 was assigned to this vulnerability.
|
https://vuldb.com/?id.222661
|
2023-03-09T21:30:02.210Z
|
2023-03-09T21:30:17.774Z
|
2023-10-21T07:55:11.387Z
|
{'Vendor': 'SourceCodester', 'Product': 'COVID 19 Testing Management System', 'Versions': '1.0'}
|
CVE-2023-49964
|
An issue was discovered in Hyland Alfresco Community Edition through 7.2.0. By inserting malicious content in the folder.get.html.ftl file, an attacker may perform SSTI (Server-Side Template Injection) attacks, which can leverage FreeMarker exposed objects to bypass restrictions and achieve RCE (Remote Code Execution). NOTE: this issue exists because of an incomplete fix for CVE-2020-12873.
|
https://www.alfresco.com/products/community/download
|
2023-12-04T00:00:00
|
2023-12-11T00:00:00
|
2023-12-11T07:19:12.103820
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-49437
|
Tenda AX12 V22.03.01.46 has been discovered to contain a command injection vulnerability in the 'list' parameter at /goform/SetNetControlList.
|
https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetNetControlList-3.md
|
2023-11-27T00:00:00
|
2023-12-07T00:00:00
|
2023-12-07T14:47:22.357226
|
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
|
CVE-2023-49122
|
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
|
https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf
|
2023-11-22T14:43:13.524Z
|
2024-01-09T09:59:53.759Z
|
2024-01-09T09:59:53.759Z
|
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2023', 'Versions': 'All versions < V223.0 Update 10'}
|
CVE-2023-49088
|
Cacti is an open source operational monitoring and fault management framework. The fix applied for CVE-2023-39515 in version 1.2.25 is incomplete as it enables an adversary to have a victim browser execute malicious code when a victim user hovers their mouse over the malicious data source path in `data_debug.php`. To perform the cross-site scripting attack, the adversary needs to be an authorized cacti user with the following permissions: `General Administration>Sites/Devices/Data`. The victim of this attack could be any account with permissions to view `http://<HOST>/cacti/data_debug.php`. As of time of publication, no complete fix has been included in Cacti.
|
https://github.com/Cacti/cacti/security/advisories/GHSA-q7g7-gcf6-wh4x
|
2023-11-21T18:57:30.429Z
|
2023-12-22T16:16:53.348Z
|
2023-12-22T16:16:53.348Z
|
{'Vendor': 'Cacti', 'Product': 'cacti', 'Versions': '<= 1.2.25'}
|
CVE-2023-49821
|
Cross-Site Request Forgery (CSRF) vulnerability in LiveChat LiveChat – WP live chat plugin for WordPress.This issue affects LiveChat – WP live chat plugin for WordPress: from n/a through 4.5.15.
|
https://patchstack.com/database/vulnerability/wp-live-chat-software-for-wordpress/wordpress-livechat-plugin-4-5-15-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
|
2023-11-30T14:51:04.753Z
|
2023-12-18T22:31:09.739Z
|
2023-12-18T22:31:09.739Z
|
{'Vendor': 'LiveChat', 'Product': 'LiveChat – WP live chat plugin for WordPress', 'Versions': 'n/a'}
|
CVE-2023-49749
|
Cross-Site Request Forgery (CSRF) vulnerability in SureTriggers SureTriggers – Connect All Your Plugins, Apps, Tools & Automate Everything!.This issue affects SureTriggers – Connect All Your Plugins, Apps, Tools & Automate Everything!: from n/a through 1.0.23.
|
https://patchstack.com/database/vulnerability/suretriggers/wordpress-suretriggers-plugin-1-0-23-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
|
2023-11-30T13:22:02.831Z
|
2023-12-15T15:45:00.770Z
|
2023-12-15T15:45:00.770Z
|
{'Vendor': 'SureTriggers', 'Product': 'SureTriggers – Connect All Your Plugins, Apps, Tools & Automate Everything!', 'Versions': 'n/a'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.