CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-2443 |
Rockwell Automation ThinManager product allows the use of medium strength ciphers. If the client requests an insecure cipher, a malicious actor could potentially decrypt traffic sent between the client and server API.
| https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139442 | 2023-05-01T13:52:27.487Z | 2023-05-11T18:08:08.060Z | 2023-05-11T18:08:08.060Z | {'Vendor': 'Rockwell Automation', 'Product': 'ThinManager ', 'Versions': '<=13.0'} |
CVE-2023-2013 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 1.2 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An issue was found that allows someone to abuse a discrepancy between the Web application display and the git command line interface to social engineer victims into cloning non-trusted code. | https://gitlab.com/gitlab-org/gitlab/-/issues/406844 | 2023-04-12T00:00:00 | 2023-06-07T00:00:00 | 2023-06-07T00:00:00 | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=1.2, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'} |
CVE-2023-2910 | Improper neutralization of special elements used in a command ('Command Injection') vulnerability in Printer service functionality in ASUSTOR Data Master (ADM) allows remote unauthorized users to execute arbitrary commands via unspecified vectors. Affected products and versions include: ADM 4.0.6.RIS1, 4.1.0 and below as well as ADM 4.2.2.RI61 and below.
| https://www.asustor.com/security/security_advisory_detail?id=27 | 2023-05-26T09:43:54.979Z | 2023-08-17T09:25:43.344Z | 2023-08-17T09:25:43.344Z | {'Vendor': 'ASUSTOR', 'Product': 'ADM', 'Versions': '4.0, 4.1, 4.2'} |
CVE-2023-2286 | The WP Activity Log for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.0. This is due to missing or incorrect nonce validation on the ajax_run_cleanup function. This makes it possible for unauthenticated attackers to invoke this function via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e2008e0b-32c6-46fb-93b9-2b0004f478e8?source=cve | 2023-04-25T19:27:37.861Z | 2023-06-09T12:32:00.696Z | 2023-06-09T12:32:00.696Z | {'Vendor': 'wpwhitesecurity', 'Product': 'WP Activity Log', 'Versions': '*'} |
CVE-2023-2639 | The underlying feedback mechanism of
Rockwell Automation's FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device. This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy.
| https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683 | 2023-05-10T20:31:40.821Z | 2023-06-13T20:28:28.153Z | 2023-06-13T20:28:28.153Z | {'Vendor': 'Rockwell Automation', 'Product': 'FactoryTalk System Services', 'Versions': '<= 6.20'} |
CVE-2023-2269 | A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component. | https://lore.kernel.org/lkml/ZD1xyZxb3rHot8PV%40redhat.com/t/ | 2023-04-25T00:00:00 | 2023-04-25T00:00:00 | 2023-10-19T23:06:11.769588 | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel version 6.2.0'} |
CVE-2023-2793 | Mattermost fails to validate links on external websites when constructing a preview for a linked website, allowing an attacker to cause a denial-of-service by a linking to a specially crafted webpage in a message.
| https://mattermost.com/security-updates/ | 2023-05-18T12:17:17.551Z | 2023-06-16T09:02:34.751Z | 2023-06-16T09:02:34.751Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 7.10.1, 7.8.3, 7.9.2, 7.10.0'} |
CVE-2023-2140 | A Server-Side Request Forgery vulnerability in DELMIA Apriso Release 2017 through Release 2022
could allow an unauthenticated attacker to issue requests to arbitrary hosts on behalf of the server running the DELMIA Apriso application.
| https://www.3ds.com/vulnerability/advisories | 2023-04-18T07:52:26.003Z | 2023-04-21T15:48:25.654Z | 2023-04-21T15:48:25.654Z | {'Vendor': 'Dassault Systèmes', 'Product': 'DELMIA Apriso', 'Versions': 'Apriso 2017 Golden, Apriso 2018 Golden, Apriso 2019 Golden, Apriso 2020 Golden, Apriso 2021 Golden, Apriso 2022 Golden'} |
CVE-2023-2510 | null | null | 2023-05-04T00:00:00 | null | 2023-05-12T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2843 | The MultiParcels Shipping For WooCommerce WordPress plugin before 1.14.15 does not properly sanitize and escape a parameter before using it in an SQL statement, which could allow any authenticated users, such as subscribers, to perform SQL Injection attacks. | https://wpscan.com/vulnerability/8e713eaf-f332-47e2-a131-c14222201fdc | 2023-05-22T21:22:19.282Z | 2023-08-07T14:31:25.663Z | 2023-08-07T14:31:25.663Z | {'Vendor': 'Unknown', 'Product': 'MultiParcels Shipping For WooCommerce', 'Versions': '0'} |
CVE-2023-2906 | Due to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack.
| https://takeonme.org/cves/CVE-2023-2906.html | 2023-05-26T00:46:14.391Z | 2023-08-25T20:41:19.403Z | 2023-08-25T20:41:19.403Z | {'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '2.0.0'} |
CVE-2023-2005 | Vulnerability in Tenable Tenable.Io, Tenable Nessus, Tenable Security Center.This issue affects Tenable.Io: before Plugin Feed ID #202306261202 ; Nessus: before Plugin Feed ID #202306261202 ; Security Center: before Plugin Feed ID #202306261202 .
This vulnerability could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific filesystem location, and abuse the impacted plugin in order to escalate privileges.
| https://www.tenable.com/security/tns-2023-21 | 2023-04-12T15:39:04.752Z | 2023-06-26T17:39:56.554Z | 2023-06-26T17:39:56.554Z | {'Vendor': 'Tenable', 'Product': 'Tenable.io', 'Versions': '0'} |
CVE-2023-2455 | Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy. | https://access.redhat.com/security/cve/CVE-2023-2455 | 2023-05-01T00:00:00 | 2023-06-09T00:00:00 | 2023-07-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'postgresql', 'Versions': 'PostgreSQL 15.3, PostgreSQL 14.8, PostgreSQL 13.11, PostgreSQL 12.15, PostgreSQL 11.20'} |
CVE-2023-2681 | An SQL Injection vulnerability has been found on Jorani version 1.0.0. This vulnerability allows an authenticated remote user, with low privileges, to send queries with malicious SQL code on the "/leaves/validate" path and the “id” parameter, managing to extract arbritary information from the database. | https://www.incibe.es/en/incibe-cert/notices/aviso/jorani-sql-injection | 2023-05-12T10:44:03.340Z | 2023-10-03T12:19:55.164Z | 2023-10-03T12:19:55.164Z | {'Vendor': 'Jorani', 'Product': 'Jorani', 'Versions': '1.0.0'} |
CVE-2023-2394 | A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation of the argument wanName leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227672. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227672 | 2023-04-28T11:49:03.570Z | 2023-04-28T21:00:06.759Z | 2023-10-22T18:56:14.792Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2814 | A vulnerability classified as problematic has been found in SourceCodester Class Scheduling System 1.0. Affected is an unknown function of the file /admin/save_teacher.php of the component POST Parameter Handler. The manipulation of the argument Academic_Rank leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229428. | https://vuldb.com/?id.229428 | 2023-05-19T15:30:07.676Z | 2023-05-19T16:00:03.907Z | 2023-10-23T06:45:20.139Z | {'Vendor': 'SourceCodester', 'Product': 'Class Scheduling System', 'Versions': '1.0'} |
CVE-2023-2547 | The Feather Login Page plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteUser' function in versions starting from 1.0.7 up to, and including, 1.1.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete the temp user generated by the plugin. | https://www.wordfence.com/threat-intel/vulnerabilities/id/5d58a6a4-de2c-485f-a8b0-7a7d144fbf3c?source=cve | 2023-05-05T17:12:50.220Z | 2023-05-31T02:40:20.445Z | 2023-05-31T02:40:20.445Z | {'Vendor': 'featherplugins', 'Product': 'Custom Login Page | Temporary Users | Rebrand Login | Login Captcha', 'Versions': '1.0.7'} |
CVE-2023-2117 | The Image Optimizer by 10web WordPress plugin before 1.0.27 does not sanitize the dir parameter when handling the get_subdirs ajax action, allowing a high privileged users such as admins to inspect names of files and directories outside of the sites root. | https://wpscan.com/vulnerability/44024299-ba40-4da7-81e1-bd44d10846f3 | 2023-04-17T12:36:12.389Z | 2023-05-30T07:49:17.892Z | 2023-05-30T07:49:17.892Z | {'Vendor': 'Unknown', 'Product': 'Image Optimizer by 10web', 'Versions': '0'} |
CVE-2023-2402 | The Photo Gallery Slideshow & Masonry Tiled Gallery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.0.13 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/51a1c2de-56be-4487-874a-a916e8a6992a?source=cve | 2023-04-28T14:00:39.558Z | 2023-06-09T05:33:17.761Z | 2023-06-09T05:33:17.761Z | {'Vendor': 'nik00726', 'Product': 'Photo Gallery Slideshow & Masonry Tiled Gallery', 'Versions': '*'} |
CVE-2023-2052 | A vulnerability classified as critical was found in Campcodes Advanced Online Voting System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/ballot_down.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225937 was assigned to this vulnerability. | https://vuldb.com/?id.225937 | 2023-04-14T07:41:59.601Z | 2023-04-14T12:00:06.512Z | 2023-10-22T09:58:38.856Z | {'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'} |
CVE-2023-2951 | A vulnerability classified as critical has been found in code-projects Bus Dispatch and Information System 1.0. Affected is an unknown function of the file delete_bus.php. The manipulation of the argument busid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230112. | https://vuldb.com/?id.230112 | 2023-05-28T05:26:46.774Z | 2023-05-28T06:00:05.101Z | 2023-10-23T07:19:28.841Z | {'Vendor': 'code-projects', 'Product': 'Bus Dispatch and Information System', 'Versions': '1.0'} |
CVE-2023-2245 | A vulnerability was found in hansunCMS 1.4.3. It has been declared as critical. This vulnerability affects unknown code of the file /ueditor/net/controller.ashx?action=catchimage. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227230 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.227230 | 2023-04-22T15:54:55.793Z | 2023-04-22T17:00:04.635Z | 2023-10-22T15:01:06.380Z | {'Vendor': 'n/a', 'Product': 'hansunCMS', 'Versions': '1.4.3'} |
CVE-2023-2615 | Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/af9c360a-87f8-4e97-a24b-6db675ee942a | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2300 | The Contact Form Builder by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 4.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/12ce97ba-8053-481f-bcd7-05d5e8292adb?source=cve | 2023-04-26T12:23:51.740Z | 2023-06-03T04:35:12.522Z | 2023-06-03T04:35:12.522Z | {'Vendor': 'eyale-vc', 'Product': 'Contact Form Builder by vcita', 'Versions': '*'} |
CVE-2023-2750 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cityboss E-municipality allows SQL Injection.This issue affects E-municipality: before 6.05.
| https://www.usom.gov.tr/bildirim/tr-23-0286 | 2023-05-17T06:16:21.386Z | 2023-05-24T11:44:39.395Z | 2023-05-24T11:44:39.395Z | {'Vendor': 'Cityboss', 'Product': 'E-municipality', 'Versions': '0'} |
CVE-2023-2479 | OS Command Injection in GitHub repository appium/appium-desktop prior to v1.22.3-4. | https://huntr.dev/bounties/fbdeec3c-d197-4a68-a547-7f93fb9594b4 | 2023-05-02T00:00:00 | 2023-05-02T00:00:00 | 2023-05-02T00:00:00 | {'Vendor': 'appium', 'Product': 'appium/appium-desktop', 'Versions': 'unspecified'} |
CVE-2023-2183 | Grafana is an open-source platform for monitoring and observability.
The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function.
This might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server.
Users may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.
| https://grafana.com/security/security-advisories/cve-2023-2183/ | 2023-04-19T12:11:08.488Z | 2023-06-06T18:04:26.485Z | 2023-06-06T18:04:26.485Z | {'Vendor': 'Grafana', 'Product': 'Grafana', 'Versions': '8.0.0, 9.0.0, 9.3.0, 9.4.0, 9.5.0'} |
CVE-2023-2029 | The PrePost SEO WordPress plugin through 3.0 does not properly sanitize some of its settings, which could allow high-privilege users to perform Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/4889ad5a-c8c4-4958-b176-64560490497b | 2023-04-13T16:57:41.858Z | 2023-07-10T12:41:01.067Z | 2023-07-10T12:41:01.067Z | {'Vendor': 'Unknown', 'Product': 'PrePost SEO', 'Versions': '0'} |
CVE-2023-2880 | Frauscher Sensortechnik GmbH FDS001 for FAdC/FAdCi v1.3.3 and all previous versions are vulnerable to a path traversal vulnerability of the web interface by a crafted URL without authentication. This enables an remote attacker to read all files on the filesystem of the FDS001 device. | https://cert.vde.com/en/advisories/VDE-2023-011/ | 2023-05-25T07:17:13.633Z | 2023-07-05T09:04:28.091Z | 2023-07-05T09:04:28.091Z | {'Vendor': 'Frauscher Sensortechnik', 'Product': 'Diagnostic System FDS101 for FAdC/FAdCi', 'Versions': '0'} |
CVE-2023-2496 | The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to unauthorized arbitrary file uploads due to an improper capability check on the 'validate_upload' function in versions up to, and including, 3.3.19. This makes it possible for authenticated attackers with a role that the administrator previously granted access to the plugin to upload arbitrary files on the affected site's server which may make remote code execution possible. | https://www.wordfence.com/threat-intel/vulnerabilities/id/477c6fa2-16a8-4461-b4d4-d087e13e3ca7?source=cve | 2023-05-03T14:28:36.553Z | 2023-05-23T23:36:47.080Z | 2023-05-23T23:36:47.080Z | {'Vendor': 'Granth', 'Product': 'Go Pricing - WordPress Responsive Pricing Tables', 'Versions': '*'} |
CVE-2023-2642 | A vulnerability classified as critical has been found in SourceCodester Online Exam System 1.0. This affects an unknown part of the file adminpanel/admin/facebox_modal/updateCourse.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228771. | https://vuldb.com/?id.228771 | 2023-05-11T05:16:57.121Z | 2023-05-11T06:00:05.816Z | 2023-10-23T05:38:12.129Z | {'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'} |
CVE-2023-2212 | A vulnerability was found in Campcodes Coffee Shop POS System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/products/view_product.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226977 was assigned to this vulnerability. | https://vuldb.com/?id.226977 | 2023-04-21T06:29:01.376Z | 2023-04-21T09:31:03.626Z | 2023-10-22T14:44:01.830Z | {'Vendor': 'Campcodes', 'Product': 'Coffee Shop POS System', 'Versions': '1.0'} |
CVE-2023-2707 | The gAppointments WordPress plugin through 1.9.5.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/e5664da4-5b78-4e42-be6b-e0d7b73a85b0 | 2023-05-15T12:23:58.997Z | 2023-11-27T16:22:05.473Z | 2023-11-27T16:22:05.473Z | {'Vendor': 'Unknown', 'Product': 'gAppointments', 'Versions': '0'} |
CVE-2023-2584 | The PixelYourSite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 9.3.6 (9.6.1 in the Pro version) due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | https://www.wordfence.com/threat-intel/vulnerabilities/id/5ebf1e83-50b8-4f56-ba76-10100375edda?source=cve | 2023-05-08T17:27:38.235Z | 2023-06-09T05:33:19.003Z | 2023-06-09T05:33:19.003Z | {'Vendor': 'pixelyoursite', 'Product': 'PixelYourSite Pro – Your smart PIXEL (TAG) Manager', 'Versions': '*'} |
CVE-2023-2091 | A vulnerability classified as critical was found in KylinSoft youker-assistant on KylinOS. Affected by this vulnerability is the function adjust_cpufreq_scaling_governer. The manipulation leads to os command injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.4.13 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-226099. | https://vuldb.com/?id.226099 | 2023-04-15T08:39:31.062Z | 2023-04-15T08:40:43.814Z | 2023-10-22T14:02:31.503Z | {'Vendor': 'KylinSoft', 'Product': 'youker-assistant', 'Versions': 'n/a'} |
CVE-2023-2838 | Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2. | https://huntr.dev/bounties/711e0988-5345-4c01-a2fe-1179604dd07f | 2023-05-22T00:00:00 | 2023-05-22T00:00:00 | 2023-05-27T00:00:00 | {'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'} |
CVE-2023-2992 | An unauthenticated denial of service vulnerability exists in the SMM v1, SMM v2, and FPC management web server which can be triggered under crafted conditions. Rebooting SMM or FPC will restore access to the management web server. | https://support.lenovo.com/us/en/product_security/LEN-127357 | 2023-05-30T16:27:48.220Z | 2023-06-26T19:44:40.121Z | 2023-06-26T19:44:40.121Z | {'Vendor': 'Lenovo', 'Product': 'System Management Module (SMM) ', 'Versions': 'various'} |
CVE-2023-2204 | A vulnerability was found in Campcodes Retro Basketball Shoes Online Store 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file faqs.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226969 was assigned to this vulnerability. | https://vuldb.com/?id.226969 | 2023-04-21T06:21:16.753Z | 2023-04-21T06:31:03.348Z | 2023-10-22T14:34:14.814Z | {'Vendor': 'Campcodes', 'Product': 'Retro Basketball Shoes Online Store', 'Versions': '1.0'} |
CVE-2023-2654 | The Conditional Menus WordPress plugin before 1.2.1 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/506ecee9-8e42-46de-9c5c-fc252ab2646e | 2023-05-11T11:39:46.840Z | 2023-06-19T10:52:53.455Z | 2023-06-19T10:52:53.455Z | {'Vendor': 'Unknown', 'Product': 'Conditional Menus', 'Versions': '0'} |
CVE-2023-2341 | Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/cf3901ac-a649-478f-ab08-094ef759c11d | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2711 | The Ultimate Product Catalog WordPress plugin before 5.2.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/71c5b5b5-8694-4738-8e4b-8670a8d21c86 | 2023-05-15T13:41:52.936Z | 2023-06-27T13:17:18.296Z | 2023-06-27T13:17:18.296Z | {'Vendor': 'Unknown', 'Product': 'Ultimate Product Catalog', 'Versions': '0'} |
CVE-2023-2438 | The UserPro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.1.0. This is due to missing or incorrect nonce validation on the 'userpro_save_userdata' function. This makes it possible for unauthenticated attackers to update the user meta and inject malicious JavaScript via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/7d30adc5-27a5-4549-84fc-b930f27f03e5?source=cve | 2023-05-01T09:50:31.544Z | 2023-11-22T15:33:29.765Z | 2023-11-22T15:33:29.765Z | {'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'} |
CVE-2023-2068 | The File Manager Advanced Shortcode WordPress plugin through 2.3.2 does not adequately prevent uploading files with disallowed MIME types when using the shortcode. This leads to RCE in cases where the allowed MIME type list does not include PHP files. In the worst case, this is available to unauthenticated users. | https://wpscan.com/vulnerability/58f72953-56d2-4d86-a49b-311b5fc58056 | 2023-04-14T14:53:15.771Z | 2023-06-27T13:17:19.200Z | 2023-06-27T13:17:19.200Z | {'Vendor': 'Unknown', 'Product': 'file-manager-advanced-shortcode', 'Versions': '0'} |
CVE-2023-2592 | The FormCraft WordPress plugin before 3.9.7 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin. | https://wpscan.com/vulnerability/d4298960-eaba-4185-a730-3e621d9680e1 | 2023-05-09T09:28:30.578Z | 2023-06-27T13:17:20.071Z | 2023-06-27T13:17:20.071Z | {'Vendor': 'Unknown', 'Product': 'FormCraft', 'Versions': '3.8.2'} |
CVE-2023-2984 | Path Traversal: '\..\filename' in GitHub repository pimcore/pimcore prior to 10.5.22. | https://huntr.dev/bounties/5df8b951-e2f1-4548-a7e3-601186e1b191 | 2023-05-30T00:00:00 | 2023-05-30T00:00:00 | 2023-05-30T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2087 | The Essential Blocks plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.0.6. This is due to missing or incorrect nonce validation on the save function. This makes it possible for unauthenticated attackers to change plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d38d41c7-8786-4145-9591-3e24eff3b79c?source=cve | 2023-04-14T20:31:46.951Z | 2023-06-09T05:33:34.844Z | 2023-06-09T05:33:34.844Z | {'Vendor': 'wpdevteam', 'Product': 'Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates', 'Versions': '*'} |
CVE-2023-2603 | A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB. | https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf | 2023-05-09T00:00:00 | 2023-06-06T00:00:00 | 2023-11-30T05:06:21.152575 | {'Vendor': 'n/a', 'Product': 'libcap', 'Versions': 'NA'} |
CVE-2023-2253 | A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory. | https://bugzilla.redhat.com/show_bug.cgi?id=2189886 | 2023-04-24T00:00:00 | 2023-06-06T00:00:00 | 2023-06-29T00:00:00 | {'Vendor': 'n/a', 'Product': 'distribution/distribution', 'Versions': 'NA'} |
CVE-2023-2746 | The Rockwell Automation Enhanced HIM software contains
an API that the application uses that is not protected sufficiently and uses incorrect Cross-Origin Resource Sharing (CORS) settings and, as a result, is vulnerable to a Cross Site Request Forgery (CSRF) attack. To exploit this vulnerability, a malicious user would have to convince a user to click on an untrusted link through a social engineering attack or successfully perform a Cross Site Scripting Attack (XSS). Exploitation of a CSRF could potentially lead to sensitive information disclosure and full remote access to the affected products.
| https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139760 | 2023-05-16T20:09:25.338Z | 2023-07-11T13:15:04.152Z | 2023-07-11T13:15:04.152Z | {'Vendor': 'Rockwell Automation', 'Product': 'Enhanced HIM', 'Versions': 'v1.001'} |
CVE-2023-2316 | Improper path handling in Typora before 1.6.7 on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via "typora://app/<absolute-path>".
This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.
| https://support.typora.io/What's-New-1.6/ | 2023-04-27T04:51:09.913Z | 2023-08-19T05:34:20.390Z | 2023-08-19T05:34:20.390Z | {'Vendor': 'Typora', 'Product': 'Typora', 'Versions': '0'} |
CVE-2023-2896 | The WP EasyCart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.4.8. This is due to missing or incorrect nonce validation on the process_duplicate_product function. This makes it possible for unauthenticated attackers to duplicate products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/041830b8-f059-46f5-961b-3ba908d161f9?source=cve | 2023-05-25T16:34:37.889Z | 2023-06-09T06:48:38.994Z | 2023-06-09T06:48:38.994Z | {'Vendor': 'levelfourstorefront', 'Product': 'Shopping Cart & eCommerce Store', 'Versions': '*'} |
CVE-2023-2195 | A cross-site request forgery (CSRF) vulnerability in Jenkins Code Dx Plugin 3.1.0 and earlier allows attackers to connect to an attacker-specified URL. | https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3118 | 2023-04-20T18:13:35.219Z | 2023-05-16T18:02:33.898Z | 2023-05-16T18:02:33.898Z | {'Vendor': 'Jenkins', 'Product': 'Jenkins Code Dx Plugin', 'Versions': '0'} |
CVE-2023-2480 | Missing access permissions checks in M-Files Client before 23.5.12598.0 (excluding 23.2 SR2 and newer) allows elevation of privilege via UI extension applications | https://https://www.m-files.com/about/trust-center/security-advisories/cve-2023-2480/ | 2023-05-02T13:56:42.382Z | 2023-05-25T13:28:29.204Z | 2023-06-27T12:30:39.116Z | {'Vendor': 'M-Files', 'Product': 'M-Files Client', 'Versions': '0, 23.2.12340.11'} |
CVE-2023-2879 | GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file | https://www.wireshark.org/security/wnpa-sec-2023-14.html | 2023-05-25T00:00:00 | 2023-05-26T00:00:00 | 2023-09-17T06:06:33.344581 | {'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.6, >=3.6.0, <3.6.14'} |
CVE-2023-2418 | A vulnerability was found in Konga 2.8.3 on Kong. It has been classified as problematic. This affects an unknown part of the component Login API. The manipulation leads to insufficiently random values. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The associated identifier of this vulnerability is VDB-227715. | https://vuldb.com/?id.227715 | 2023-04-28T16:52:40.949Z | 2023-04-29T00:31:04.842Z | 2023-10-22T19:09:39.779Z | {'Vendor': 'n/a', 'Product': 'Konga', 'Versions': '2.8.3'} |
CVE-2023-2048 | A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/voters_row.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225933 was assigned to this vulnerability. | https://vuldb.com/?id.225933 | 2023-04-14T07:41:44.035Z | 2023-04-14T10:31:05.007Z | 2023-10-22T09:53:46.242Z | {'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'} |
CVE-2023-2361 | Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/24d91b83-c3df-48f5-a713-9def733f2de7 | 2023-04-28T00:00:00 | 2023-04-28T00:00:00 | 2023-04-28T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2731 | A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service. | https://gitlab.com/libtiff/libtiff/-/issues/548 | 2023-05-16T00:00:00 | 2023-05-17T00:00:00 | 2023-07-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'libtiff', 'Versions': 'Fixed in libtiff v4.5.0'} |
CVE-2023-2224 | The SEO by 10Web WordPress plugin before 1.2.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/a76b6d22-1e00-428a-8a04-12162bd0d992 | 2023-04-21T10:24:24.143Z | 2023-06-05T13:39:02.151Z | 2023-06-05T13:39:02.151Z | {'Vendor': 'Unknown', 'Product': 'SEO by 10Web', 'Versions': '0'} |
CVE-2023-2674 | Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1. | https://huntr.dev/bounties/af73e913-730c-4245-88ce-26fc908d3644 | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | {'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'} |
CVE-2023-2859 | Code Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.9. | https://huntr.dev/bounties/d7b8ea75-c74a-4721-89bb-12e5c80fb0ba | 2023-05-24T00:00:00 | 2023-05-24T00:00:00 | 2023-05-24T00:00:00 | {'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'} |
CVE-2023-2766 | A vulnerability was found in Weaver OA 9.5 and classified as problematic. This issue affects some unknown processing of the file /building/backmgr/urlpage/mobileurl/configfile/jx2_config.ini. The manipulation leads to files or directories accessible. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229271. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.229271 | 2023-05-17T16:05:03.207Z | 2023-05-17T16:31:04.349Z | 2023-10-23T06:28:15.429Z | {'Vendor': 'Weaver', 'Product': 'OA', 'Versions': '9.5'} |
CVE-2023-2336 | Path Traversal in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/af764624-7746-4f53-8480-85348dbb4f14 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2623 | The KiviCare WordPress plugin before 3.2.1 does not restrict the information returned in a response and returns all user data, allowing low privilege users such as subscriber to retrieve sensitive information such as the user email and hashed password of other users | https://wpscan.com/vulnerability/85cc39b1-416f-4d23-84c1-fdcbffb0dda0 | 2023-05-10T09:40:03.919Z | 2023-06-27T13:17:20.907Z | 2023-06-27T13:17:20.907Z | {'Vendor': 'Unknown', 'Product': 'KiviCare', 'Versions': '0'} |
CVE-2023-2273 | Rapid7 Insight Agent token handler versions 3.2.6 and below, suffer from a Directory Traversal vulnerability whereby unsanitized input from a CLI argument flows into io.ioutil.WriteFile, where it is used as a path. This can result in a Path Traversal vulnerability and allow an attacker to write arbitrary files. This issue is remediated in version 3.3.0 via safe guards that reject inputs that attempt to do path traversal. | https://docs.rapid7.com/release-notes/insightagent/20230425/ | 2023-04-25T08:45:42.126Z | 2023-04-26T08:55:36.868Z | 2023-04-26T08:59:51.382Z | {'Vendor': 'Rapid7', 'Product': 'Insight Agent', 'Versions': '0'} |
CVE-2023-2789 | A vulnerability was found in GNU cflow 1.7. It has been rated as problematic. This issue affects the function func_body/parse_variable_declaration of the file parser.c. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. The identifier VDB-229373 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.229373 | 2023-05-18T12:02:42.211Z | 2023-05-18T12:31:03.470Z | 2023-10-23T06:40:27.356Z | {'Vendor': 'GNU', 'Product': 'cflow', 'Versions': '1.7'} |
CVE-2023-2459 | Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to bypass permission restrictions via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html | 2023-05-01T23:09:49.131Z | 2023-05-02T23:47:57.424Z | 2023-05-02T23:47:57.424Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.63'} |
CVE-2023-2009 | Plugin does not sanitize and escape the URL field in the Pretty Url WordPress plugin through 1.5.4 settings, which could allow high-privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/f7988a18-ba9d-4ead-82c8-30ea8223846f | 2023-04-12T16:15:31.335Z | 2023-05-15T12:15:42.265Z | 2023-05-15T12:15:42.265Z | {'Vendor': 'Unknown', 'Product': 'Pretty Url', 'Versions': '0'} |
CVE-2023-2320 | The CF7 Google Sheets Connector WordPress plugin before 5.0.2, cf7-google-sheets-connector-pro WordPress plugin through 5.0.2 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/f17ccbaa-2fcd-4f17-a4da-73f2bc8a4fe9 | 2023-04-27T07:29:19.462Z | 2023-07-04T07:23:30.440Z | 2023-07-05T10:47:54.273Z | {'Vendor': 'Unknown', 'Product': 'CF7 Google Sheets Connector', 'Versions': '0'} |
CVE-2023-2770 | A vulnerability classified as critical was found in SourceCodester Online Exam System 1.0. This vulnerability affects unknown code of the file /kelasdosen/data. The manipulation of the argument columns[1][data] leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229276. | https://vuldb.com/?id.229276 | 2023-05-17T16:50:35.323Z | 2023-05-17T18:00:04.299Z | 2023-10-23T06:31:54.988Z | {'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'} |
CVE-2023-2265 | An Improper Restriction of Rendered UI Layers or Frames in the Schweitzer Engineering Laboratories SEL-411L could allow an unauthenticated attacker to perform clickjacking based attacks against an authenticated and authorized user.
See product Instruction Manual Appendix A dated 20230830 for more details.
| https://selinc.com/support/security-notifications/external-reports/ | 2023-04-24T23:20:54.900Z | 2023-11-30T16:55:55.901Z | 2023-11-30T16:55:55.901Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-411L', 'Versions': 'R118-V0, R119-V0, R120-V0, R121-V0, R122-V0, R123-V0, R124-V0, R125-V0, R126-V0, R127-V0, R128-V0, R129-V0'} |
CVE-2023-2635 | The Call Now Accessibility Button WordPress plugin before 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/81b89613-18d0-4c13-84e3-9e2e1802fd7c | 2023-05-10T18:55:53.007Z | 2023-07-10T12:41:07.725Z | 2023-07-10T13:05:50.645Z | {'Vendor': 'Unknown', 'Product': 'Call Now Accessibility Button', 'Versions': '0'} |
CVE-2023-2818 | An insecure filesystem permission in the Insider Threat Management Agent for Windows enables local unprivileged users to disrupt agent monitoring. All versions prior to 7.14.3 are affected. Agents for MacOS and Linux and Cloud are unaffected. | https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-005 | 2023-05-19T20:44:55.575Z | 2023-06-27T14:29:49.258Z | 2023-06-27T14:31:22.344Z | {'Vendor': 'Proofpoint', 'Product': 'Insider Threat Management', 'Versions': '0'} |
CVE-2023-2727 | Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.
| https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8 | 2023-05-16T00:31:53.873Z | 2023-07-03T20:05:04.329Z | 2023-07-03T20:05:04.329Z | {'Vendor': 'Kubernetes', 'Product': 'Kubernetes', 'Versions': 'v1.24.14, v1.25.0 - v1.25.10, v1.26.0 - v1.26.5, v1.27.0 - v1.27.2'} |
CVE-2023-2377 | A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Web Management Interface. The manipulation of the argument name leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227653 was assigned to this vulnerability. | https://vuldb.com/?id.227653 | 2023-04-28T11:30:03.838Z | 2023-04-28T15:31:03.377Z | 2023-10-22T18:35:31.006Z | {'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.0, 2.0.9-hotfix.1, 2.0.9-hotfix.2, 2.0.9-hotfix.3, 2.0.9-hotfix.4, 2.0.9-hotfix.5, 2.0.9-hotfix.6'} |
CVE-2023-2662 | In Xpdf 4.04 (and earlier), a bad color space object in the input PDF file can cause a divide-by-zero.
| https://forum.xpdfreader.com/viewtopic.php?t=42505 | 2023-05-11T20:03:56.213Z | 2023-05-11T20:08:25.610Z | 2023-05-11T20:08:27.720Z | {'Vendor': 'Xpdf', 'Product': 'Xpdf', 'Versions': '4.04'} |
CVE-2023-2398 | The Icegram Engage WordPress plugin before 3.1.12 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/16d47d20-58aa-4d04-9275-fd91ce926ff3 | 2023-04-28T13:07:18.163Z | 2023-06-12T17:28:22.252Z | 2023-06-12T17:28:22.252Z | {'Vendor': 'Unknown', 'Product': 'Icegram Engage', 'Versions': '0'} |
CVE-2023-2232 | An issue has been discovered in GitLab affecting all versions starting from 15.10 before 16.1, leading to a ReDoS vulnerability in the Jira prefix | https://gitlab.com/gitlab-org/gitlab/-/issues/408352 | 2023-04-21T00:00:00 | 2023-06-28T00:00:00 | 2023-06-28T00:00:00 | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.10, <16.1'} |
CVE-2023-2926 | A vulnerability was found in SeaCMS 11.6 and classified as problematic. This issue affects some unknown processing of the file member.php of the component Picture Upload Handler. The manipulation of the argument oldpic leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230081 was assigned to this vulnerability. | https://vuldb.com/?id.230081 | 2023-05-27T07:30:08.167Z | 2023-05-27T09:00:03.321Z | 2023-10-23T07:15:49.167Z | {'Vendor': 'n/a', 'Product': 'SeaCMS', 'Versions': '11.6'} |
CVE-2023-2025 | OpenBlue Enterprise Manager Data Collector versions prior to 3.2.5.75 may expose sensitive information to an unauthorized user under certain circumstances. | https://www.johnsoncontrols.com/cyber-solutions/security-advisories | 2023-04-13T15:11:24.430Z | 2023-05-18T20:50:36.726Z | 2023-05-18T20:50:36.726Z | {'Vendor': 'Johnson Controls', 'Product': 'OpenBlue Enterprise Manager Data Collector', 'Versions': '0'} |
CVE-2023-2475 | A vulnerability was found in Dromara J2eeFAST up to 2.6.0 and classified as problematic. This issue affects some unknown processing of the component System Message Handler. The manipulation of the argument 主题 leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-227867. | https://vuldb.com/?id.227867 | 2023-05-02T11:57:59.930Z | 2023-05-02T13:00:04.852Z | 2023-10-23T05:16:14.573Z | {'Vendor': 'Dromara', 'Product': 'J2eeFAST', 'Versions': '2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6'} |
CVE-2023-2160 | Weak Password Requirements in GitHub repository modoboa/modoboa prior to 2.1.0.
| https://huntr.dev/bounties/54fb6d6a-6b39-45b6-b62a-930260ba484b | 2023-04-18T00:00:00 | 2023-04-18T00:00:00 | 2023-12-18T10:12:55.186Z | {'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'} |
CVE-2023-2530 | A privilege escalation allowing remote code execution was discovered in the orchestration service. | https://www.puppet.com/security/cve/cve-2023-2530-remote-code-execution-orchestrator | 2023-05-04T00:00:00 | 2023-06-07T00:00:00 | 2023-06-07T19:52:12 | {'Vendor': 'Puppet', 'Product': 'Puppet Enterprise', 'Versions': '2021.7.0, 2023.0.0'} |
CVE-2023-2863 | A vulnerability has been found in Simple Design Daily Journal 1.012.GP.B on Android and classified as problematic. Affected by this vulnerability is an unknown functionality of the component SQLite Database. The manipulation leads to cleartext storage in a file or on disk. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229819. | https://vuldb.com/?id.229819 | 2023-05-24T09:33:33.773Z | 2023-05-24T10:00:04.517Z | 2023-10-23T06:53:52.317Z | {'Vendor': 'Simple Design', 'Product': 'Daily Journal', 'Versions': '1.012.GP.B'} |
CVE-2023-2619 | A vulnerability, which was classified as critical, was found in SourceCodester Online Tours & Travels Management System 1.0. This affects the function exec of the file disapprove_delete.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228549 was assigned to this vulnerability. | https://vuldb.com/?id.228549 | 2023-05-10T05:15:54.605Z | 2023-05-10T06:00:05.934Z | 2023-10-23T05:35:45.883Z | {'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'} |
CVE-2023-2249 | The wpForo Forum plugin for WordPress is vulnerable to Local File Include, Server-Side Request Forgery, and PHAR Deserialization in versions up to, and including, 2.1.7. This is due to the insecure use of file_get_contents without appropriate verification of the data being supplied to the function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to retrieve the contents of files like wp-config.php hosted on the system, perform a deserialization attack and possibly achieve remote code execution, and make requests to internal services. | https://www.wordfence.com/threat-intel/vulnerabilities/id/800fa098-b29f-4979-b7bd-b1186a4dafcb?source=cve | 2023-04-24T11:24:12.750Z | 2023-06-09T05:33:21.777Z | 2023-06-09T05:33:21.777Z | {'Vendor': 'tomdever', 'Product': 'wpForo Forum', 'Versions': '*'} |
CVE-2023-2422 | A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients. | https://access.redhat.com/errata/RHSA-2023:3883 | 2023-04-28T17:33:42.062Z | 2023-10-04T10:59:30.818Z | 2023-10-04T10:59:30.818Z | {'Vendor': 'n/a', 'Product': 'keycloak', 'Versions': '18.0'} |
CVE-2023-2072 | The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product. The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product.
| https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139761 | 2023-04-14T18:04:06.540Z | 2023-07-11T13:05:56.994Z | 2023-07-11T13:05:56.994Z | {'Vendor': 'Rockwell Automation', 'Product': 'PowerMonitor 1000', 'Versions': 'V4.011'} |
CVE-2023-2588 |
Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08 | 2023-05-08T22:09:43.872Z | 2023-05-22T15:09:31.169Z | 2023-05-22T15:09:31.169Z | {'Vendor': 'Teltonika', 'Product': 'Remote Management System', 'Versions': '0'} |
CVE-2023-2971 | Improper path handling in Typora before 1.7.0-dev on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via "typora://app/typemark/". This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora. | https://starlabs.sg/advisories/23/23-2971/ | 2023-05-30T07:46:11.004Z | 2023-08-19T05:45:35.025Z | 2023-08-19T05:45:35.025Z | {'Vendor': 'Typora', 'Product': 'Typora', 'Versions': '0'} |
CVE-2023-2834 | The BookIt plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.3.7. This is due to insufficient verification on the user being supplied during booking an appointment through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. | https://www.wordfence.com/threat-intel/vulnerabilities/id/cfd32e46-a4fc-4c10-b546-9f9da75db791?source=cve | 2023-05-22T10:35:10.936Z | 2023-06-30T01:56:17.606Z | 2023-06-30T01:56:17.606Z | {'Vendor': 'stylemix', 'Product': 'Booking Calendar | Appointment Booking | BookIt', 'Versions': '*'} |
CVE-2023-2567 | A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain parameters used in the Query functionality, allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application.
Authenticated users can extract arbitrary information from the DBMS in an uncontrolled way.
| https://security.nozominetworks.com/NN-2023:9-01 | 2023-05-08T08:20:28.150Z | 2023-09-19T10:03:04.013Z | 2023-09-19T10:03:04.013Z | {'Vendor': 'Nozomi Networks', 'Product': 'Guardian', 'Versions': '0, 23.0.0'} |
CVE-2023-2137 | Heap buffer overflow in sqlite in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html | 2023-04-17T22:27:00.599Z | 2023-04-19T03:40:26.810Z | 2023-04-19T03:40:26.810Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.137'} |
CVE-2023-2967 | The TinyMCE Custom Styles WordPress plugin before 1.1.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/9afec4aa-1210-4c40-b566-64e37acf2b64 | 2023-05-29T19:32:35.912Z | 2023-07-10T12:41:10.826Z | 2023-07-10T13:05:51.211Z | {'Vendor': 'Unknown', 'Product': 'TinyMCE Custom Styles', 'Versions': '0'} |
CVE-2023-2064 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Minova Technology eTrace allows SQL Injection.This issue affects eTrace: before 23.05.20.
| https://www.usom.gov.tr/bildirim/tr-23-0288 | 2023-04-14T10:27:05.143Z | 2023-05-24T13:15:28.680Z | 2023-05-24T13:15:28.680Z | {'Vendor': 'Minova Technology', 'Product': 'eTrace', 'Versions': '0'} |
CVE-2023-2434 | The Nested Pages plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'reset' function in versions up to, and including, 3.2.3. This makes it possible for authenticated attackers, with editor-level permissions and above, to reset plugin settings. | https://www.wordfence.com/threat-intel/vulnerabilities/id/8c3e61e9-3610-41b5-9820-28012dc657fd?source=cve | 2023-05-01T09:19:58.742Z | 2023-05-31T03:36:10.899Z | 2023-05-31T03:36:10.899Z | {'Vendor': 'kylephillips', 'Product': 'Nested Pages', 'Versions': '*'} |
CVE-2023-2121 | Vault and Vault Enterprise's (Vault) key-value v2 (kv-v2) diff viewer allowed HTML injection into the Vault web UI through key values. This vulnerability, CVE-2023-2121, is fixed in Vault 1.14.0, 1.13.3, 1.12.7, and 1.11.11. | https://discuss.hashicorp.com/t/hcsec-2023-17-vault-s-kv-diff-viewer-allowed-html-injection/54814 | 2023-04-17T14:51:51.916Z | 2023-06-09T16:59:49.065Z | 2023-06-09T16:59:49.065Z | {'Vendor': 'HashiCorp', 'Product': 'Vault', 'Versions': '1.13.0, 1.12.0, 1.11.0, 1.10.0'} |
CVE-2023-2571 | The Quiz Maker WordPress plugin before 6.4.2.7 does not escape some parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/2dc02e5c-1c89-4053-a6a7-29ee7b996183 | 2023-05-08T10:24:05.793Z | 2023-06-05T13:39:02.507Z | 2023-06-05T13:39:02.507Z | {'Vendor': 'Unknown', 'Product': 'Quiz Maker', 'Versions': '0'} |
CVE-2023-2822 | A vulnerability was found in Ellucian Ethos Identity up to 5.10.5. It has been classified as problematic. Affected is an unknown function of the file /cas/logout. The manipulation of the argument url leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 5.10.6 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-229596. | https://vuldb.com/?id.229596 | 2023-05-20T06:49:02.849Z | 2023-05-20T07:00:04.836Z | 2023-10-23T06:47:46.425Z | {'Vendor': 'Ellucian', 'Product': 'Ethos Identity', 'Versions': '5.10.0, 5.10.1, 5.10.2, 5.10.3, 5.10.4, 5.10.5'} |
CVE-2023-2658 | A vulnerability, which was classified as critical, has been found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this issue is some unknown functionality of the file products.php. The manipulation of the argument c leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228800. | https://vuldb.com/?id.228800 | 2023-05-11T13:01:31.377Z | 2023-05-11T14:00:06.021Z | 2023-10-23T05:52:50.217Z | {'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'} |
Subsets and Splits