CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-1048
A vulnerability, which was classified as critical, has been found in TechPowerUp Ryzen DRAM Calculator 1.2.0.5. This issue affects some unknown processing in the library WinRing0x64.sys. The manipulation leads to improper initialization. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221807.
https://vuldb.com/?id.221807
2023-02-26T12:25:28.818Z
2023-02-26T12:25:53.686Z
2023-10-21T07:00:17.000Z
{'Vendor': 'TechPowerUp', 'Product': 'Ryzen DRAM Calculator', 'Versions': '1.2.0.5'}
CVE-2023-1418
A vulnerability classified as problematic was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file cashconfirm.php of the component POST Parameter Handler. The manipulation of the argument transactioncode leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223129 was assigned to this vulnerability.
https://vuldb.com/?id.223129
2023-03-15T15:17:59.862Z
2023-03-15T15:18:33.549Z
2023-10-21T08:42:46.871Z
{'Vendor': 'SourceCodester', 'Product': 'Friendly Island Pizza Website and Ordering System', 'Versions': '1.0'}
CVE-2023-1033
Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 2.0.11.
https://huntr.dev/bounties/ba3cd929-8b60-4d8d-b77d-f28409ecf387
2023-02-25T00:00:00
2023-02-25T00:00:00
2023-02-25T00:00:00
{'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'}
CVE-2023-1463
Authorization Bypass Through User-Controlled Key in GitHub repository nilsteampassnet/teampass prior to 3.0.0.23.
https://huntr.dev/bounties/f6683c3b-a0f2-4615-b639-1920c8ae12e6
2023-03-17T00:00:00
2023-03-17T00:00:00
2023-04-26T00:00:00
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-1930
The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized data deletion due to a missing capability check on the wpfc_clear_cache_of_allsites_callback function in versions up to, and including, 1.1.2. This makes it possible for authenticated attackers with subscriber-level access to delete caches.
https://www.wordfence.com/threat-intel/vulnerabilities/id/bae67a68-4bd1-4b52-b3dd-af0eef014028?source=cve
2023-04-06T20:05:04.507Z
2023-04-06T20:05:30.159Z
2023-04-07T14:06:40.629Z
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
CVE-2023-1875
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
https://huntr.dev/bounties/39715aaf-e798-4c60-97c4-45f4f2cd5c61
2023-04-05T00:00:00
2023-04-22T00:00:00
2023-12-18T10:12:33.630Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-1176
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.2.2.
https://huntr.dev/bounties/ae92f814-6a08-435c-8445-eec0ef4f1085
2023-03-04T00:00:00
2023-03-24T00:00:00
2023-03-24T00:00:00
{'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'}
CVE-2023-1526
Certain DesignJet and PageWide XL TAA compliant models may have risk of potential information disclosure if the hard disk drive is physically removed from the printer.
https://support.hp.com/us-en/document/ish_7869666-7869691-16/hpsbpi03837
2023-03-20T20:39:28.035Z
2023-04-28T16:04:13.185Z
2023-04-28T16:04:13.185Z
{'Vendor': 'HP Inc.', 'Product': 'HP DesignJet and PageWide XL', 'Versions': 'See HP Security Bulletin reference for affected versions.'}
CVE-2023-1208
This HTTP Headers WordPress plugin before 1.18.11 allows arbitrary data to be written to arbitrary files, leading to a Remote Code Execution vulnerability.
https://wpscan.com/vulnerability/e0cc6740-866a-4a81-a93d-ff486b79b7f7
2023-03-06T19:23:12.728Z
2023-07-10T12:41:23.248Z
2023-07-10T13:05:53.449Z
{'Vendor': 'Unknown', 'Product': 'HTTP Headers', 'Versions': '0'}
CVE-2023-1967
Keysight N8844A Data Analytics Web Service deserializes untrusted data without sufficiently verifying the resulting data will be valid.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-115-01
2023-04-10T14:51:04.971Z
2023-04-27T21:37:05.110Z
2023-04-27T21:37:05.110Z
{'Vendor': 'Keysight', 'Product': 'N8844A Data Analytics Web Service', 'Versions': '0'}
CVE-2023-1064
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Uzay Baskul Weighbridge Automation Software allows SQL Injection.This issue affects Weighbridge Automation Software: before 1.1.
https://www.usom.gov.tr/bildirim/tr-23-0115
2023-02-27T11:22:27.077Z
2023-03-01T12:51:08.179Z
2023-03-01T12:51:27.504Z
{'Vendor': 'Uzay Baskul', 'Product': 'Weighbridge Automation Software', 'Versions': '0'}
CVE-2023-1571
A vulnerability, which was classified as critical, was found in DataGear up to 4.5.0. This affects an unknown part of the file /analysisProject/pagingQueryData. The manipulation of the argument queryOrder leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.5.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-223563.
https://vuldb.com/?id.223563
2023-03-22T11:10:45.104Z
2023-03-22T15:00:05.220Z
2023-10-21T10:51:35.633Z
{'Vendor': 'n/a', 'Product': 'DataGear', 'Versions': '4.0, 4.1, 4.2, 4.3, 4.4, 4.5'}
CVE-2023-1121
The Simple Giveaways WordPress plugin before 2.45.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/7ead9fb9-d81f-47c6-a1b4-21f29183cc15
2023-03-01T14:03:26.616Z
2023-04-10T13:18:04.716Z
2023-04-10T13:18:04.716Z
{'Vendor': 'Unknown', 'Product': 'Simple Giveaways', 'Versions': '0'}
CVE-2023-1988
A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/?page=maintenance/brand. The manipulation of the argument Brand Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225536.
https://vuldb.com/?id.225536
2023-04-11T16:40:38.775Z
2023-04-11T18:31:03.319Z
2023-10-22T09:39:07.651Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
CVE-2023-1822
Incorrect security UI in Navigation in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
2023-04-03T20:48:53.447Z
2023-04-04T21:39:35.557Z
2023-04-04T21:39:35.557Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
CVE-2023-1588
null
null
2023-03-23T07:02:54.910Z
null
2023-05-25T07:29:33.047Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-1072
An issue has been discovered in GitLab affecting all versions starting from 9.0 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. It was possible to trigger a resource depletion attack due to improper filtering for number of requests to read commits details.
https://gitlab.com/gitlab-org/gitlab/-/issues/219619
2023-02-27T00:00:00
2023-03-09T00:00:00
2023-03-09T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=9.0, <15.7.8, >=15.8, <15.8.4, >=15.9, <15.9.2'}
CVE-2023-1971
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in yuan1994 tpAdmin 1.3.12. Affected is the function remote of the file application\admin\controller\Upload.php. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225408. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://vuldb.com/?id.225408
2023-04-10T15:49:27.271Z
2023-04-10T16:31:03.094Z
2023-10-22T09:31:48.483Z
{'Vendor': 'yuan1994', 'Product': 'tpAdmin', 'Versions': '1.3.12'}
CVE-2023-1834
Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and January 2023, and are running v7.13 may have the telnet and FTP ports open by default.  This could potentially allow attackers unauthorized access to the device through the open ports.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139441
2023-04-04T13:44:37.415Z
2023-05-11T18:01:06.560Z
2023-05-11T18:01:06.560Z
{'Vendor': 'Rockwell Automation', 'Product': 'Kinetix 5500 EtherNet/IP Servo Drive', 'Versions': '7.13'}
CVE-2023-1137
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a vulnerability in which a low-level user could extract files and plaintext credentials of administrator users, resulting in privilege escalation.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
2023-03-01T23:23:12.414Z
2023-03-27T14:44:40.332Z
2023-03-27T14:44:40.332Z
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
CVE-2023-1567
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/assign/assign.php. The manipulation of the argument sid leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223559.
https://vuldb.com/?id.223559
2023-03-22T10:49:52.765Z
2023-03-22T13:31:05.743Z
2023-10-21T10:46:42.817Z
{'Vendor': 'SourceCodester', 'Product': 'Student Study Center Desk Management System', 'Versions': '1.0'}
CVE-2023-1249
A use-after-free flaw was found in the Linux kernel’s core dump subsystem. This flaw allows a local user to crash the system. Only if patch 390031c94211 ("coredump: Use the vma snapshot in fill_files_note") not applied yet, then kernel could be affected.
https://patchwork.kernel.org/project/linux-fsdevel/patch/87iltzn3nd.fsf_-_%40email.froward.int.ebiederm.org/
2023-03-07T00:00:00
2023-03-23T00:00:00
2023-04-18T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel 5.18-rc1'}
CVE-2023-1619
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.
https://cert.vde.com/en/advisories/VDE-2023-006/
2023-03-24T10:12:25.218Z
2023-06-26T06:18:33.981Z
2023-06-26T06:18:33.981Z
{'Vendor': 'Wago', 'Product': '750-8202/xxx-xxx', 'Versions': 'FW1'}
CVE-2023-1926
The WP Fastest Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing or incorrect nonce validation on the deleteCacheToolbar function. This makes it possible for unauthenticated attackers to perform cache deletion via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b793a4cb-3130-428e-9b61-8ce29fcdaf70?source=cve
2023-04-06T19:59:48.848Z
2023-04-06T19:59:53.783Z
2023-04-07T14:05:18.634Z
{'Vendor': 'emrevona', 'Product': 'WP Fastest Cache', 'Versions': '*'}
CVE-2023-1475
A vulnerability, which was classified as critical, has been found in SourceCodester Canteen Management System 1.0. This issue affects the function query of the file createuser.php. The manipulation of the argument uemail leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223337 was assigned to this vulnerability.
https://vuldb.com/?id.223337
2023-03-17T14:41:48.144Z
2023-03-17T14:42:05.637Z
2023-10-21T09:16:57.116Z
{'Vendor': 'SourceCodester', 'Product': 'Canteen Management System', 'Versions': '1.0'}
CVE-2023-1025
The Simple File List WordPress plugin before 6.0.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/13621b13-8d31-4214-a665-cb15981f3ec1
2023-02-24T19:04:10.457Z
2023-03-27T15:37:42.298Z
2023-03-27T15:37:42.298Z
{'Vendor': 'Unknown', 'Product': 'Simple File List', 'Versions': '0'}
CVE-2023-1530
Use after free in PDF in Google Chrome prior to 111.0.5563.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop_21.html
2023-03-21T00:43:36.474Z
2023-03-21T20:50:56.042Z
2023-03-21T20:50:56.042Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.110'}
CVE-2023-1160
Use of Platform-Dependent Third Party Components in GitHub repository cockpit-hq/cockpit prior to 2.4.0.
https://huntr.dev/bounties/3ce480dc-1b1c-4230-9287-0dc3b31c2f87
2023-03-03T00:00:00
2023-03-03T00:00:00
2023-03-03T00:00:00
{'Vendor': 'cockpit-hq', 'Product': 'cockpit-hq/cockpit', 'Versions': 'unspecified'}
CVE-2023-1863
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eskom Water Metering Software allows Command Line Execution through SQL Injection.This issue affects Water Metering Software: before 23.04.06.
https://www.usom.gov.tr/bildirim/tr-23-0225
2023-04-05T08:34:09.113Z
2023-04-14T08:14:06.058Z
2023-09-06T14:54:29.230Z
{'Vendor': 'Eskom', 'Product': 'Water Metering Software', 'Versions': '0'}
CVE-2023-1814
Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass download checking via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
2023-04-03T20:48:52.530Z
2023-04-04T21:39:34.568Z
2023-04-04T21:39:34.568Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'}
CVE-2023-1117
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.18.
https://huntr.dev/bounties/e8c0044d-a31b-4347-b2d5-59fbf492da39
2023-03-01T00:00:00
2023-03-01T00:00:00
2023-03-01T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-1547
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Elra Parkmatik allows SQL Injection through SOAP Parameter Tampering, Command Line Execution through SQL Injection.This issue affects Parkmatik: before 02.01-a51.
https://www.usom.gov.tr/bildirim/tr-23-0404
2023-03-21T10:09:35.583Z
2023-07-13T07:42:44.365Z
2023-07-26T09:02:48.423Z
{'Vendor': 'Elra', 'Product': 'Parkmatik', 'Versions': '0'}
CVE-2023-1402
The course participation report required additional checks to prevent roles being displayed which the user did not have access to view.
https://moodle.org/mod/forum/discuss.php?d=445069
2023-03-14T00:00:00
2023-03-23T00:00:00
2023-03-30T00:00:00
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.1 to 4.1.1, 4.0 to 4.0.6, 3.11 to 3.11.12, 3.9 to 3.9.19 and earlier unsupported versions'}
CVE-2023-1951
A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0 and classified as critical. Affected by this issue is the function delete_brand of the file /admin/maintenance/brand.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-225338 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.225338
2023-04-08T06:29:31.943Z
2023-04-08T08:00:05.752Z
2023-10-22T06:36:45.378Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
CVE-2023-1681
A vulnerability, which was classified as problematic, was found in Xunrui CMS 4.61. Affected is an unknown function of the file /config/myfield/test.php. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-224238 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224238
2023-03-28T20:20:51.031Z
2023-03-28T23:00:05.838Z
2023-10-21T13:48:00.871Z
{'Vendor': 'Xunrui', 'Product': 'CMS', 'Versions': '4.61'}
CVE-2023-1394
A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0. It has been classified as critical. This affects the function mysqli_query of the file bsitemp.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222981 was assigned to this vulnerability.
https://vuldb.com/?id.222981
2023-03-14T14:30:15.552Z
2023-03-14T14:31:19.825Z
2023-10-21T08:33:01.367Z
{'Vendor': 'SourceCodester', 'Product': 'Online Graduate Tracer System', 'Versions': '1.0'}
CVE-2023-1140
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contain a vulnerability that could allow an attacker to achieve unauthenticated remote code execution in the context of an administrator.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-02
2023-03-01T23:24:37.667Z
2023-03-27T14:54:53.192Z
2023-03-27T14:54:53.192Z
{'Vendor': 'Delta Electronics', 'Product': 'InfraSuite Device Master', 'Versions': '0'}
CVE-2023-1843
The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to unauthorized permalink structure update due to a missing capability check on the permalink_setup function in versions up to, and including, 3.3.0. This makes it possible for unauthenticated attackers to change the permalink structure.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5db00eb6-3e05-42fa-bb84-2df4bcae3955?source=cve
2023-04-04T19:51:47.391Z
2023-06-09T05:33:18.588Z
2023-06-09T05:33:18.588Z
{'Vendor': 'xpeedstudio', 'Product': 'Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress', 'Versions': '*'}
CVE-2023-1906
A heap-based buffer overflow issue was discovered in ImageMagick's ImportMultiSpectralQuantum() function in MagickCore/quantum-import.c. An attacker could pass specially crafted file to convert, triggering an out-of-bounds read error, allowing an application to crash, resulting in a denial of service.
https://bugzilla.redhat.com/show_bug.cgi?id=2185714
2023-04-06T00:00:00
2023-04-12T00:00:00
2023-05-16T00:00:00
{'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': 'Fixed in ImageMagick v6.9.12-84, v 7.1.1-6.'}
CVE-2023-1455
A vulnerability classified as critical was found in SourceCodester Online Pizza Ordering System 1.0. This vulnerability affects unknown code of the file admin/ajax.php?action=login2 of the component Login Page. The manipulation of the argument email with the input abc%40qq.com' AND (SELECT 9110 FROM (SELECT(SLEEP(5)))XSlc) AND 'jFNl'='jFNl leads to sql injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223300.
https://vuldb.com/?id.223300
2023-03-17T06:58:21.845Z
2023-03-17T06:58:47.326Z
2023-10-21T09:05:58.260Z
{'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'}
CVE-2023-1005
A vulnerability was found in JP1016 Markdown-Electron and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to code injection. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. VDB-221738 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.221738
2023-02-24T07:59:59.175Z
2023-02-24T08:00:18.381Z
2023-10-20T22:01:37.519Z
{'Vendor': 'JP1016', 'Product': 'Markdown-Electron', 'Versions': 'n/a'}
CVE-2023-1286
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.19.
https://huntr.dev/bounties/31d97442-3f87-439f-83f0-1c7862ef0c7c
2023-03-09T00:00:00
2023-03-09T00:00:00
2023-03-09T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-1793
A vulnerability was found in SourceCodester Police Crime Record Management System 1.0. It has been classified as critical. This affects an unknown part of the file /officer/assigncase.php of the component GET Parameter Handler. The manipulation of the argument caseid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224745 was assigned to this vulnerability.
https://vuldb.com/?id.224745
2023-04-02T06:49:10.126Z
2023-04-02T07:31:03.379Z
2023-10-21T14:29:28.701Z
{'Vendor': 'SourceCodester', 'Product': 'Police Crime Record Management System', 'Versions': '1.0'}
CVE-2023-1269
Use of Hard-coded Credentials in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
https://huntr.dev/bounties/91c31eb6-024d-4ad3-88fe-f15b03fd20f5
2023-03-08T00:00:00
2023-03-08T00:00:00
2023-03-08T00:00:00
{'Vendor': 'alextselegidis', 'Product': 'alextselegidis/easyappointments', 'Versions': 'unspecified'}
CVE-2023-1639
A vulnerability classified as problematic has been found in IObit Malware Fighter 9.4.0.776. This affects the function 0x8001E04C in the library ImfRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224019.
https://vuldb.com/?id.224019
2023-03-26T20:12:01.613Z
2023-03-26T20:31:04.595Z
2023-10-21T13:28:30.036Z
{'Vendor': 'IObit', 'Product': 'Malware Fighter', 'Versions': '9.4.0.776'}
CVE-2023-1855
A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.
https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/
2023-04-05T00:00:00
2023-04-05T00:00:00
2023-07-23T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel prior to Kernel 6.3 RC3'}
CVE-2023-1156
A vulnerability classified as problematic was found in SourceCodester Health Center Patient Record Management System 1.0. This vulnerability affects unknown code of the file admin/fecalysis_form.php. The manipulation of the argument itr_no leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222220.
https://vuldb.com/?id.222220
2023-03-02T18:07:05.967Z
2023-03-02T18:07:23.125Z
2023-10-21T07:21:01.575Z
{'Vendor': 'SourceCodester', 'Product': 'Health Center Patient Record Management System', 'Versions': '1.0'}
CVE-2023-1506
A vulnerability, which was classified as critical, was found in SourceCodester E-Commerce System 1.0. Affected is an unknown function of the file login.php. The manipulation of the argument U_USERNAME leads to sql injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-223410 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.223410
2023-03-20T07:32:52.947Z
2023-03-20T09:31:04.091Z
2023-10-21T09:49:53.569Z
{'Vendor': 'SourceCodester', 'Product': 'E-Commerce System', 'Versions': '1.0'}
CVE-2023-1013
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Virames Vira-Investing allows Cross-Site Scripting (XSS).This issue affects Vira-Investing: before 1.0.84.86.
https://www.usom.gov.tr/bildirim/tr-23-0183
2023-02-24T13:53:12.593Z
2023-03-30T08:14:06.747Z
2023-03-31T09:03:01.453Z
{'Vendor': 'Virames', 'Product': 'Vira-Investing', 'Versions': '0'}
CVE-2023-1443
A vulnerability was found in Filseclab Twister Antivirus 8. It has been declared as problematic. This vulnerability affects the function 0x80112053 in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223288.
https://vuldb.com/?id.223288
2023-03-17T06:30:52.865Z
2023-03-17T06:31:13.627Z
2023-10-21T08:51:19.570Z
{'Vendor': 'Filseclab', 'Product': 'Twister Antivirus', 'Versions': '8'}
CVE-2023-1910
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to unauthorized modification of data due to an insufficient capability check on the get_remote_templates function in versions up to, and including, 1.8.3. This makes it possible for authenticated attackers with subscriber-level permissions or above to flush the remote template cache. Cached template information can also be accessed via this endpoint but these are not considered sensitive as they are publicly accessible from the developer's site.
https://www.wordfence.com/threat-intel/vulnerabilities/id/6cd64ab0-007b-4778-9d92-06e530638fad?source=cve
2023-04-06T13:29:59.935Z
2023-06-09T05:33:20.298Z
2023-06-09T05:33:20.298Z
{'Vendor': 'jetmonsters', 'Product': 'Getwid – Gutenberg Blocks', 'Versions': '*'}
CVE-2023-1290
A vulnerability, which was classified as critical, has been found in SourceCodester Sales Tracker Management System 1.0. Affected by this issue is some unknown functionality of the file admin/clients/view_client.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222644.
https://vuldb.com/?id.222644
2023-03-09T14:25:35.716Z
2023-03-09T14:26:00.790Z
2023-10-21T07:49:04.764Z
{'Vendor': 'SourceCodester', 'Product': 'Sales Tracker Management System', 'Versions': '1.0'}
CVE-2023-1785
A vulnerability was found in SourceCodester Earnings and Expense Tracker App 1.0. It has been classified as critical. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-224700.
https://vuldb.com/?id.224700
2023-03-31T19:39:25.099Z
2023-03-31T20:00:06.742Z
2023-10-21T14:24:35.962Z
{'Vendor': 'SourceCodester', 'Product': 'Earnings and Expense Tracker App', 'Versions': '1.0'}
CVE-2023-1101
SonicOS SSLVPN improper restriction of excessive MFA attempts vulnerability allows an authenticated attacker to use excessive MFA codes.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0005
2023-02-28T00:00:00
2023-03-02T00:00:00
2023-03-02T00:00:00
{'Vendor': 'SonicWall', 'Product': 'SonicOS', 'Versions': 'SonicOS 6.5.4.11-97n and earlier, SonicOS NSv 6.5.4.4-44v-21-1551 and earlier, SonicOS NSsp 7.0.1-5083 and earlier, SonicOS 7.0.1-5095 and earlier'}
CVE-2023-1802
In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a disclosure of sensitive information. Only users who have Access Experimental Features enabled and have logged in to a private registry are affected.
https://docs.docker.com/desktop/release-notes/#4180
2023-04-03T10:20:15.739Z
2023-04-06T08:52:19.506Z
2023-04-06T08:52:19.506Z
{'Vendor': 'Docker', 'Product': 'Docker Desktop', 'Versions': '4.17.0'}
CVE-2023-1947
A vulnerability was found in taoCMS 3.0.2. It has been classified as critical. Affected is an unknown function of the file /admin/admin.php. The manipulation leads to code injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-225330 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.225330
2023-04-07T21:52:25.537Z
2023-04-07T22:00:08.628Z
2023-10-22T06:31:52.779Z
{'Vendor': 'n/a', 'Product': 'taoCMS', 'Versions': '3.0.2'}
CVE-2023-1414
The WP VR WordPress plugin before 8.3.0 does not have authorisation and CSRF checks in various AJAX actions, one in particular could allow any authenticated users, such as subscriber to update arbitrary tours
https://wpscan.com/vulnerability/d61d4be7-9251-4c62-8fb7-8a456aa6969e
2023-03-15T14:48:28.665Z
2023-04-24T18:31:02.339Z
2023-04-24T18:31:02.339Z
{'Vendor': 'Unknown', 'Product': 'WP VR', 'Versions': '0'}
CVE-2023-1044
A vulnerability was found in MuYuCMS 2.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /editor/index.php. The manipulation of the argument file_path leads to relative path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221803.
https://vuldb.com/?id.221803
2023-02-26T12:20:19.503Z
2023-02-26T12:20:49.107Z
2023-10-20T22:21:09.108Z
{'Vendor': 'n/a', 'Product': 'MuYuCMS', 'Versions': '2.2'}
CVE-2023-1697
An Improper Handling of Missing Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause a dcpfe process core and thereby a Denial of Service (DoS). Continued receipt of these specific frames will cause a sustained Denial of Service condition. This issue occurs when a specific malformed ethernet frame is received. This issue affects Juniper Networks Junos OS on QFX10000 Series, PTX1000 Series Series: All versions prior to 19.4R3-S10; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S1; 22.1 versions prior to 22.1R2-S1, 22.1R3; 22.2 versions prior to 22.2R1-S2, 22.2R2.
https://supportportal.juniper.net/JSA70612
2023-03-29T00:00:00
2023-04-17T00:00:00
2023-04-17T00:00:00
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': 'unspecified, 20.1R1, 20.2, 20.3, 20.4, 21.1, 21.2, 21.3, 21.4, 22.1, 22.2'}
CVE-2023-1228
Insufficient policy enforcement in Intents in Google Chrome on Android prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html
2023-03-07T00:41:19.202Z
2023-03-07T21:42:18.300Z
2023-03-07T21:42:18.300Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'}
CVE-2023-1382
A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.
https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u
2023-03-14T00:00:00
2023-04-19T00:00:00
2023-04-19T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux Kernel prior to Kernel 6.1 RC7'}
CVE-2023-1678
A vulnerability classified as critical has been found in DriverGenius 9.70.0.346. This affects the function 0x9C40A0D8/0x9C40A0DC/0x9C40A0E0 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224235.
https://vuldb.com/?id.224235
2023-03-28T20:16:32.440Z
2023-03-28T22:00:05.144Z
2023-10-21T13:44:21.341Z
{'Vendor': 'n/a', 'Product': 'DriverGenius', 'Versions': '9.70.0.346'}
CVE-2023-1195
A use-after-free flaw was found in reconn_set_ipaddr_from_hostname in fs/cifs/connect.c in the Linux kernel. The issue occurs when it forgets to set the free pointer server->hostname to NULL, leading to an invalid pointer request.
https://github.com/torvalds/linux/commit/153695d36ead0ccc4d0256953c751cabf673e621
2023-03-06T00:00:00
2023-05-18T00:00:00
2023-05-18T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'prior to kernel 6.1 rc3'}
CVE-2023-1480
A vulnerability classified as critical was found in SourceCodester Monitoring of Students Cyber Accounts System 1.0. Affected by this vulnerability is an unknown functionality of the file login.php of the component POST Parameter Handler. The manipulation of the argument un leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223363.
https://vuldb.com/?id.223363
2023-03-18T08:27:08.104Z
2023-03-18T09:00:05.604Z
2023-10-21T09:19:23.779Z
{'Vendor': 'SourceCodester', 'Product': 'Monitoring of Students Cyber Accounts System', 'Versions': '1.0'}
CVE-2023-1879
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
https://huntr.dev/bounties/1dc7f818-c8ea-4f80-b000-31b48a426334
2023-04-05T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-1253
A vulnerability, which was classified as critical, was found in SourceCodester Health Center Patient Record Management System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222483.
https://vuldb.com/?id.222483
2023-03-07T14:53:48.378Z
2023-03-07T14:54:28.997Z
2023-10-21T07:41:45.692Z
{'Vendor': 'SourceCodester', 'Product': 'Health Center Patient Record Management System', 'Versions': '1.0'}
CVE-2023-1603
Permission bypass when importing or synchronizing entries in User vault in Devolutions Server 2022.3.13 and prior versions allows users with restricted rights to bypass entry permission via id collision.
https://devolutions.net/security/advisories/DEVO-2023-0008
2023-03-23T15:48:10.734Z
2023-03-23T17:13:31.049Z
2023-04-02T18:49:20.069507Z
{'Vendor': 'Devolutions', 'Product': 'Server', 'Versions': '0'}
CVE-2023-1316
Cross-site Scripting (XSS) - Stored in GitHub repository osticket/osticket prior to v1.16.6.
https://huntr.dev/bounties/c6353bab-c382-47f6-937b-56d253f2e8d3
2023-03-10T00:00:00
2023-03-10T00:00:00
2023-03-10T00:00:00
{'Vendor': 'osticket', 'Product': 'osticket/osticket', 'Versions': 'unspecified'}
CVE-2023-1746
A vulnerability, which was classified as problematic, was found in Dreamer CMS up to 3.5.0. Affected is an unknown function of the component File Upload Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. VDB-224634 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224634
2023-03-30T19:31:03.636Z
2023-03-30T23:00:06.477Z
2023-10-21T14:14:50.480Z
{'Vendor': 'n/a', 'Product': 'Dreamer CMS', 'Versions': '3.0, 3.1, 3.2, 3.3, 3.4, 3.5'}
CVE-2023-1592
A vulnerability classified as critical was found in SourceCodester Automatic Question Paper Generator System 1.0. This vulnerability affects unknown code of the file admin/courses/view_class.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-223660.
https://vuldb.com/?id.223660
2023-03-23T08:42:14.407Z
2023-03-23T09:31:03.883Z
2023-10-21T10:58:55.172Z
{'Vendor': 'SourceCodester', 'Product': 'Automatic Question Paper Generator System', 'Versions': '1.0'}
CVE-2023-1068
The Download Read More Excerpt Link plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.0. This is due to missing or incorrect nonce validation on the read_more_excerpt_link_menu_options() function. This makes it possible for unauthenticated attackers to update he plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/0359434b-9d88-4a40-8e9f-ec354c8de816
2023-02-27T13:28:49.110Z
2023-02-27T13:29:53.318Z
2023-02-27T13:29:53.318Z
{'Vendor': 'teckel', 'Product': 'Read More Excerpt Link', 'Versions': '<= 1.6.0'}
CVE-2023-1984
A vulnerability classified as critical was found in SourceCodester Complaint Management System 1.0. This vulnerability affects unknown code of the file /users/check_availability.php of the component POST Parameter Handler. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225532.
https://vuldb.com/?id.225532
2023-04-11T16:32:20.941Z
2023-04-11T17:31:03.568Z
2023-10-22T09:34:14.981Z
{'Vendor': 'SourceCodester', 'Product': 'Complaint Management System', 'Versions': '1.0'}
CVE-2023-1087
The WC Sales Notification WordPress plugin before 1.2.3 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
https://wpscan.com/vulnerability/356c89a1-81b6-4600-9291-1a74788af7f9
2023-02-28T13:17:54.720Z
2023-03-27T15:37:45.104Z
2023-03-27T15:37:45.104Z
{'Vendor': 'Unknown', 'Product': 'WC Sales Notification', 'Versions': '0'}
CVE-2023-1654
Denial of Service in GitHub repository gpac/gpac prior to 2.4.0.
https://huntr.dev/bounties/33652b56-128f-41a7-afcc-10641f69ff14
2023-03-27T00:00:00
2023-03-27T00:00:00
2023-05-27T00:00:00
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
CVE-2023-1204
An issue has been discovered in GitLab CE/EE affecting all versions starting from 10.1 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A user could use an unverified email as a public email and commit email by sending a specifically crafted request on user update settings.
https://gitlab.com/gitlab-org/gitlab/-/issues/394745
2023-03-06T00:00:00
2023-05-03T00:00:00
2023-06-06T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=10.0, <12.9.8, >=12.10, <12.10.7, >=13.0, <13.0.1'}
CVE-2023-1711
A vulnerability exists in a FOXMAN-UN and UNEM logging component, it only affects systems that use remote authentication to the network elements. If exploited an attacker could obtain confidential information. List of CPEs: * cpe:2.3:a:hitachienergy:foxman_un:R9C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R10C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R11A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R11B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R14A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R14B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R15A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R15B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R16A:*:*:*:*:*:*:* * * cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R10C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R11A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R11B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R14A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R14B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R15A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R15B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R16A:*:*:*:*:*:*:*
https://search.abb.com/library/Download.aspx?DocumentID=8DBD000155&LanguageCode=en&DocumentPartId=&Action=Launch
2023-03-30T07:56:02.223Z
2023-05-30T18:46:24.317Z
2023-05-30T18:46:29.787Z
{'Vendor': 'Hitachi Energy', 'Product': 'FOXMAN-UN', 'Versions': 'FOXMAN-UN R16A, FOXMAN-UN R15B, FOXMAN-UN R15A, FOXMAN-UN R14B, FOXMAN-UN R14A, FOXMAN-UN R11B, FOXMAN-UN R11A, FOXMAN-UN R10C, FOXMAN-UN R9C'}
CVE-2023-1341
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the ajax_deactivate function. This makes it possible for unauthenticated attackers to turn off caching via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d95b01c3-5db4-40ac-8787-0db58a9cc3a6
2023-03-10T18:49:40.150Z
2023-03-10T19:05:49.813Z
2023-03-10T19:05:49.813Z
{'Vendor': 'shakee93', 'Product': 'RapidLoad Power-Up for Autoptimize', 'Versions': '*'}
CVE-2023-1584
A flaw was found in Quarkus. Quarkus OIDC can leak both ID and access tokens in the authorization code flow when an insecure HTTP protocol is used, which can allow attackers to access sensitive user data directly from the ID token or by using the access token to access user data from OIDC provider services. Please note that passwords are not stored in access tokens.
https://access.redhat.com/errata/RHSA-2023:3809
2023-03-22T20:15:15.323Z
2023-10-04T10:47:37.831Z
2023-10-04T10:47:37.831Z
{'Vendor': 'n/a', 'Product': 'quarkus-oidc', 'Versions': '3.1.0.CR1'}
CVE-2023-1091
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Alpata Licensed Warehousing Automation System allows Command Line Execution through SQL Injection.This issue affects Licensed Warehousing Automation System: through 2023.1.01.
https://www.usom.gov.tr/bildirim/tr-23-0139
2023-02-28T14:07:00.592Z
2023-03-10T07:02:09.307Z
2023-03-26T19:51:00.697Z
{'Vendor': 'Alpata', 'Product': 'Licensed Warehousing Automation System', 'Versions': '0'}
CVE-2023-1992
RPCoRDMA dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
https://www.wireshark.org/security/wnpa-sec-2023-09.html
2023-04-11T00:00:00
2023-04-12T00:00:00
2023-09-17T06:06:13.063626
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.5, >=3.6.0, <3.6.13'}
CVE-2023-1838
A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.
https://lore.kernel.org/netdev/20220516084213.26854-1-jasowang%40redhat.com/T/
2023-04-04T00:00:00
2023-04-05T00:00:00
2023-05-17T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux Kernel prior to kernel 5.18 25'}
CVE-2023-1212
Cross-site Scripting (XSS) - Stored in GitHub repository phpipam/phpipam prior to v1.5.2.
https://huntr.dev/bounties/3d5199d6-9bb2-4f7b-bd81-bded704da499
2023-03-06T00:00:00
2023-03-06T00:00:00
2023-03-06T00:00:00
{'Vendor': 'phpipam', 'Product': 'phpipam/phpipam', 'Versions': 'unspecified'}
CVE-2023-1642
A vulnerability, which was classified as problematic, was found in IObit Malware Fighter 9.4.0.776. Affected is the function 0x222034/0x222038/0x22203C/0x222040 in the library ObCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-224022 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.224022
2023-03-26T20:12:12.473Z
2023-03-26T21:31:03.521Z
2023-10-21T13:32:09.483Z
{'Vendor': 'IObit', 'Product': 'Malware Fighter', 'Versions': '9.4.0.776'}
CVE-2023-1357
A vulnerability, which was classified as critical, has been found in SourceCodester Simple Bakery Shop Management System 1.0. Affected by this issue is some unknown functionality of the component Admin Login. The manipulation of the argument username/password with the input admin' or 1=1 -- leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222860.
https://vuldb.com/?id.222860
2023-03-12T07:10:10.437Z
2023-03-12T07:31:03.736Z
2023-10-21T08:15:56.370Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Bakery Shop Management System', 'Versions': '1.0'}
CVE-2023-1707
Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to information disclosure when IPsec is enabled with FutureSmart version 5.6.
https://support.hp.com/us-en/document/ish_7905330-7905358-16/hpsbpi03838
2023-03-29T16:34:11.993Z
2023-06-13T17:06:04.682Z
2023-06-13T17:06:04.682Z
{'Vendor': 'HP Inc.', 'Product': 'HP Enterprise LaserJet and HP LaserJet Managed Printers', 'Versions': 'See HP Security Bulletin reference for affected versions.'}
CVE-2023-1029
The WP Meta SEO plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.3. This is due to missing or incorrect nonce validation on the regenerateSitemaps function. This makes it possible for unauthenticated attackers to regenerate Sitemaps via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/764aec73-f291-4372-9dde-812ffaf025ed
2023-02-24T19:23:24.418Z
2023-02-24T19:25:31.865Z
2023-02-24T19:25:31.865Z
{'Vendor': 'joomunited', 'Product': 'WP Meta SEO', 'Versions': '*'}
CVE-2023-1183
A flaw was found in the Libreoffice package. An attacker can craft an odb containing a "database/script" file with a SCRIPT command where the contents of the file could be written to a new file whose location was determined by the attacker.
https://access.redhat.com/security/cve/CVE-2023-1183
2023-03-06T04:37:10.705Z
2023-07-10T15:04:30.740Z
2023-07-10T15:04:30.740Z
{'Vendor': 'n/a', 'Product': 'libreoffice', 'Versions': '7.4.6, 7.5.1'}
CVE-2023-1479
A vulnerability classified as critical has been found in SourceCodester Simple Music Player 1.0. Affected is an unknown function of the file save_music.php. The manipulation of the argument filename leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-223362 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.223362
2023-03-18T08:25:06.796Z
2023-03-18T08:25:39.933Z
2023-10-21T09:18:10.284Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Music Player', 'Versions': '1.0'}
CVE-2023-1880
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
https://huntr.dev/bounties/ece5f051-674e-4919-b998-594714910f9e
2023-04-05T00:00:00
2023-04-05T00:00:00
2023-04-05T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-1496
Cross-site Scripting (XSS) - Reflected in GitHub repository imgproxy/imgproxy prior to 3.14.0.
https://huntr.dev/bounties/de603972-935a-401a-96fb-17ddadd282b2
2023-03-19T00:00:00
2023-03-19T00:00:00
2023-03-19T00:00:00
{'Vendor': 'imgproxy', 'Product': 'imgproxy/imgproxy', 'Versions': 'unspecified'}
CVE-2023-1615
The Ultimate Addons for Contact Form 7 plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in versions up to, and including, 3.1.23. This makes it possible for authenticated attackers of any authorization level to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/817ca119-ddaf-4525-beee-68c4e0aac544?source=cve
2023-03-23T20:40:48.245Z
2023-06-09T05:33:22.261Z
2023-06-09T05:33:22.261Z
{'Vendor': 'psdtowpservice', 'Product': 'Ultimate Addons for Contact Form 7', 'Versions': '3.1.23'}
CVE-2023-1245
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6.
https://huntr.dev/bounties/f8011bb3-8212-4937-aa58-79f4b73be004
2023-03-07T00:00:00
2023-03-07T00:00:00
2023-03-07T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-1750
The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could retrieve device history, set device settings, and retrieve device information.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01
2023-03-30T20:02:38.794Z
2023-04-04T16:52:59.453Z
2023-04-04T16:52:59.453Z
{'Vendor': 'Nexx', 'Product': 'Smart Alarm NXAL-100', 'Versions': '0'}
CVE-2023-1300
A vulnerability classified as critical was found in SourceCodester COVID 19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file patient-report.php of the component POST Parameter Handler. The manipulation of the argument searchdata leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222661 was assigned to this vulnerability.
https://vuldb.com/?id.222661
2023-03-09T21:30:02.210Z
2023-03-09T21:30:17.774Z
2023-10-21T07:55:11.387Z
{'Vendor': 'SourceCodester', 'Product': 'COVID 19 Testing Management System', 'Versions': '1.0'}
CVE-2023-49964
An issue was discovered in Hyland Alfresco Community Edition through 7.2.0. By inserting malicious content in the folder.get.html.ftl file, an attacker may perform SSTI (Server-Side Template Injection) attacks, which can leverage FreeMarker exposed objects to bypass restrictions and achieve RCE (Remote Code Execution). NOTE: this issue exists because of an incomplete fix for CVE-2020-12873.
https://www.alfresco.com/products/community/download
2023-12-04T00:00:00
2023-12-11T00:00:00
2023-12-11T07:19:12.103820
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49437
Tenda AX12 V22.03.01.46 has been discovered to contain a command injection vulnerability in the 'list' parameter at /goform/SetNetControlList.
https://github.com/ef4tless/vuln/blob/master/iot/AX12/SetNetControlList-3.md
2023-11-27T00:00:00
2023-12-07T00:00:00
2023-12-07T14:47:22.357226
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-49122
A vulnerability has been identified in Solid Edge SE2023 (All versions < V223.0 Update 10). The affected application is vulnerable to heap-based buffer overflow while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
https://cert-portal.siemens.com/productcert/pdf/ssa-589891.pdf
2023-11-22T14:43:13.524Z
2024-01-09T09:59:53.759Z
2024-01-09T09:59:53.759Z
{'Vendor': 'Siemens', 'Product': 'Solid Edge SE2023', 'Versions': 'All versions < V223.0 Update 10'}
CVE-2023-49088
Cacti is an open source operational monitoring and fault management framework. The fix applied for CVE-2023-39515 in version 1.2.25 is incomplete as it enables an adversary to have a victim browser execute malicious code when a victim user hovers their mouse over the malicious data source path in `data_debug.php`. To perform the cross-site scripting attack, the adversary needs to be an authorized cacti user with the following permissions: `General Administration>Sites/Devices/Data`. The victim of this attack could be any account with permissions to view `http://<HOST>/cacti/data_debug.php`. As of time of publication, no complete fix has been included in Cacti.
https://github.com/Cacti/cacti/security/advisories/GHSA-q7g7-gcf6-wh4x
2023-11-21T18:57:30.429Z
2023-12-22T16:16:53.348Z
2023-12-22T16:16:53.348Z
{'Vendor': 'Cacti', 'Product': 'cacti', 'Versions': '<= 1.2.25'}
CVE-2023-49821
Cross-Site Request Forgery (CSRF) vulnerability in LiveChat LiveChat – WP live chat plugin for WordPress.This issue affects LiveChat – WP live chat plugin for WordPress: from n/a through 4.5.15.
https://patchstack.com/database/vulnerability/wp-live-chat-software-for-wordpress/wordpress-livechat-plugin-4-5-15-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T14:51:04.753Z
2023-12-18T22:31:09.739Z
2023-12-18T22:31:09.739Z
{'Vendor': 'LiveChat', 'Product': 'LiveChat – WP live chat plugin for WordPress', 'Versions': 'n/a'}
CVE-2023-49749
Cross-Site Request Forgery (CSRF) vulnerability in SureTriggers SureTriggers – Connect All Your Plugins, Apps, Tools & Automate Everything!.This issue affects SureTriggers – Connect All Your Plugins, Apps, Tools & Automate Everything!: from n/a through 1.0.23.
https://patchstack.com/database/vulnerability/suretriggers/wordpress-suretriggers-plugin-1-0-23-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-30T13:22:02.831Z
2023-12-15T15:45:00.770Z
2023-12-15T15:45:00.770Z
{'Vendor': 'SureTriggers', 'Product': 'SureTriggers – Connect All Your Plugins, Apps, Tools & Automate Everything!', 'Versions': 'n/a'}