CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-2443
Rockwell Automation ThinManager product allows the use of medium strength ciphers.  If the client requests an insecure cipher, a malicious actor could potentially decrypt traffic sent between the client and server API.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139442
2023-05-01T13:52:27.487Z
2023-05-11T18:08:08.060Z
2023-05-11T18:08:08.060Z
{'Vendor': 'Rockwell Automation', 'Product': 'ThinManager ', 'Versions': '<=13.0'}
CVE-2023-2013
An issue has been discovered in GitLab CE/EE affecting all versions starting from 1.2 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An issue was found that allows someone to abuse a discrepancy between the Web application display and the git command line interface to social engineer victims into cloning non-trusted code.
https://gitlab.com/gitlab-org/gitlab/-/issues/406844
2023-04-12T00:00:00
2023-06-07T00:00:00
2023-06-07T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=1.2, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'}
CVE-2023-2910
Improper neutralization of special elements used in a command ('Command Injection') vulnerability in Printer service functionality in ASUSTOR Data Master (ADM) allows remote unauthorized users to execute arbitrary commands via unspecified vectors. Affected products and versions include: ADM 4.0.6.RIS1, 4.1.0 and below as well as ADM 4.2.2.RI61 and below.
https://www.asustor.com/security/security_advisory_detail?id=27
2023-05-26T09:43:54.979Z
2023-08-17T09:25:43.344Z
2023-08-17T09:25:43.344Z
{'Vendor': 'ASUSTOR', 'Product': 'ADM', 'Versions': '4.0, 4.1, 4.2'}
CVE-2023-2286
The WP Activity Log for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.0. This is due to missing or incorrect nonce validation on the ajax_run_cleanup function. This makes it possible for unauthenticated attackers to invoke this function via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e2008e0b-32c6-46fb-93b9-2b0004f478e8?source=cve
2023-04-25T19:27:37.861Z
2023-06-09T12:32:00.696Z
2023-06-09T12:32:00.696Z
{'Vendor': 'wpwhitesecurity', 'Product': 'WP Activity Log', 'Versions': '*'}
CVE-2023-2639
The underlying feedback mechanism of Rockwell Automation's FactoryTalk System Services that transfers the FactoryTalk Policy Manager rules to relevant devices on the network does not verify that the origin of the communication is from a legitimate local client device.  This may allow a threat actor to craft a malicious website that, when visited, will send a malicious script that can connect to the local WebSocket endpoint and wait for events as if it was a valid client device. If successfully exploited, this would allow a threat actor to receive information including whether FactoryTalk Policy Manager is installed and potentially the entire security policy. 
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139683
2023-05-10T20:31:40.821Z
2023-06-13T20:28:28.153Z
2023-06-13T20:28:28.153Z
{'Vendor': 'Rockwell Automation', 'Product': 'FactoryTalk System Services', 'Versions': '<= 6.20'}
CVE-2023-2269
A denial of service problem was found, due to a possible recursive locking scenario, resulting in a deadlock in table_clear in drivers/md/dm-ioctl.c in the Linux Kernel Device Mapper-Multipathing sub-component.
https://lore.kernel.org/lkml/ZD1xyZxb3rHot8PV%40redhat.com/t/
2023-04-25T00:00:00
2023-04-25T00:00:00
2023-10-19T23:06:11.769588
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel version 6.2.0'}
CVE-2023-2793
Mattermost fails to validate links on external websites when constructing a preview for a linked website, allowing an attacker to cause a denial-of-service by a linking to a specially crafted webpage in a message.
https://mattermost.com/security-updates/
2023-05-18T12:17:17.551Z
2023-06-16T09:02:34.751Z
2023-06-16T09:02:34.751Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 7.10.1, 7.8.3, 7.9.2, 7.10.0'}
CVE-2023-2140
A Server-Side Request Forgery vulnerability in DELMIA Apriso Release 2017 through Release 2022 could allow an unauthenticated attacker to issue requests to arbitrary hosts on behalf of the server running the DELMIA Apriso application.
https://www.3ds.com/vulnerability/advisories
2023-04-18T07:52:26.003Z
2023-04-21T15:48:25.654Z
2023-04-21T15:48:25.654Z
{'Vendor': 'Dassault Systèmes', 'Product': 'DELMIA Apriso', 'Versions': 'Apriso 2017 Golden, Apriso 2018 Golden, Apriso 2019 Golden, Apriso 2020 Golden, Apriso 2021 Golden, Apriso 2022 Golden'}
CVE-2023-2510
null
null
2023-05-04T00:00:00
null
2023-05-12T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2843
The MultiParcels Shipping For WooCommerce WordPress plugin before 1.14.15 does not properly sanitize and escape a parameter before using it in an SQL statement, which could allow any authenticated users, such as subscribers, to perform SQL Injection attacks.
https://wpscan.com/vulnerability/8e713eaf-f332-47e2-a131-c14222201fdc
2023-05-22T21:22:19.282Z
2023-08-07T14:31:25.663Z
2023-08-07T14:31:25.663Z
{'Vendor': 'Unknown', 'Product': 'MultiParcels Shipping For WooCommerce', 'Versions': '0'}
CVE-2023-2906
Due to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack.
https://takeonme.org/cves/CVE-2023-2906.html
2023-05-26T00:46:14.391Z
2023-08-25T20:41:19.403Z
2023-08-25T20:41:19.403Z
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '2.0.0'}
CVE-2023-2005
Vulnerability in Tenable Tenable.Io, Tenable Nessus, Tenable Security Center.This issue affects Tenable.Io: before Plugin Feed ID #202306261202 ; Nessus: before Plugin Feed ID #202306261202 ; Security Center: before Plugin Feed ID #202306261202 . This vulnerability could allow a malicious actor with sufficient permissions on a scan target to place a binary in a specific filesystem location, and abuse the impacted plugin in order to escalate privileges.
https://www.tenable.com/security/tns-2023-21
2023-04-12T15:39:04.752Z
2023-06-26T17:39:56.554Z
2023-06-26T17:39:56.554Z
{'Vendor': 'Tenable', 'Product': 'Tenable.io', 'Versions': '0'}
CVE-2023-2455
Row security policies disregard user ID changes after inlining; PostgreSQL could permit incorrect policies to be applied in certain cases where role-specific policies are used and a given query is planned under one role and then executed under other roles. This scenario can happen under security definer functions or when a common user and query is planned initially and then re-used across multiple SET ROLEs. Applying an incorrect policy may permit a user to complete otherwise-forbidden reads and modifications. This affects only databases that have used CREATE POLICY to define a row security policy.
https://access.redhat.com/security/cve/CVE-2023-2455
2023-05-01T00:00:00
2023-06-09T00:00:00
2023-07-06T00:00:00
{'Vendor': 'n/a', 'Product': 'postgresql', 'Versions': 'PostgreSQL 15.3, PostgreSQL 14.8, PostgreSQL 13.11, PostgreSQL 12.15, PostgreSQL 11.20'}
CVE-2023-2681
An SQL Injection vulnerability has been found on Jorani version 1.0.0. This vulnerability allows an authenticated remote user, with low privileges, to send queries with malicious SQL code on the "/leaves/validate" path and the “id” parameter, managing to extract arbritary information from the database.
https://www.incibe.es/en/incibe-cert/notices/aviso/jorani-sql-injection
2023-05-12T10:44:03.340Z
2023-10-03T12:19:55.164Z
2023-10-03T12:19:55.164Z
{'Vendor': 'Jorani', 'Product': 'Jorani', 'Versions': '1.0.0'}
CVE-2023-2394
A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation of the argument wanName leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227672. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227672
2023-04-28T11:49:03.570Z
2023-04-28T21:00:06.759Z
2023-10-22T18:56:14.792Z
{'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'}
CVE-2023-2814
A vulnerability classified as problematic has been found in SourceCodester Class Scheduling System 1.0. Affected is an unknown function of the file /admin/save_teacher.php of the component POST Parameter Handler. The manipulation of the argument Academic_Rank leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229428.
https://vuldb.com/?id.229428
2023-05-19T15:30:07.676Z
2023-05-19T16:00:03.907Z
2023-10-23T06:45:20.139Z
{'Vendor': 'SourceCodester', 'Product': 'Class Scheduling System', 'Versions': '1.0'}
CVE-2023-2547
The Feather Login Page plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteUser' function in versions starting from 1.0.7 up to, and including, 1.1.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete the temp user generated by the plugin.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5d58a6a4-de2c-485f-a8b0-7a7d144fbf3c?source=cve
2023-05-05T17:12:50.220Z
2023-05-31T02:40:20.445Z
2023-05-31T02:40:20.445Z
{'Vendor': 'featherplugins', 'Product': 'Custom Login Page | Temporary Users | Rebrand Login | Login Captcha', 'Versions': '1.0.7'}
CVE-2023-2117
The Image Optimizer by 10web WordPress plugin before 1.0.27 does not sanitize the dir parameter when handling the get_subdirs ajax action, allowing a high privileged users such as admins to inspect names of files and directories outside of the sites root.
https://wpscan.com/vulnerability/44024299-ba40-4da7-81e1-bd44d10846f3
2023-04-17T12:36:12.389Z
2023-05-30T07:49:17.892Z
2023-05-30T07:49:17.892Z
{'Vendor': 'Unknown', 'Product': 'Image Optimizer by 10web', 'Versions': '0'}
CVE-2023-2402
The Photo Gallery Slideshow & Masonry Tiled Gallery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the search_term parameter in versions up to, and including, 1.0.13 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/51a1c2de-56be-4487-874a-a916e8a6992a?source=cve
2023-04-28T14:00:39.558Z
2023-06-09T05:33:17.761Z
2023-06-09T05:33:17.761Z
{'Vendor': 'nik00726', 'Product': 'Photo Gallery Slideshow & Masonry Tiled Gallery', 'Versions': '*'}
CVE-2023-2052
A vulnerability classified as critical was found in Campcodes Advanced Online Voting System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/ballot_down.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225937 was assigned to this vulnerability.
https://vuldb.com/?id.225937
2023-04-14T07:41:59.601Z
2023-04-14T12:00:06.512Z
2023-10-22T09:58:38.856Z
{'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'}
CVE-2023-2951
A vulnerability classified as critical has been found in code-projects Bus Dispatch and Information System 1.0. Affected is an unknown function of the file delete_bus.php. The manipulation of the argument busid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230112.
https://vuldb.com/?id.230112
2023-05-28T05:26:46.774Z
2023-05-28T06:00:05.101Z
2023-10-23T07:19:28.841Z
{'Vendor': 'code-projects', 'Product': 'Bus Dispatch and Information System', 'Versions': '1.0'}
CVE-2023-2245
A vulnerability was found in hansunCMS 1.4.3. It has been declared as critical. This vulnerability affects unknown code of the file /ueditor/net/controller.ashx?action=catchimage. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227230 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.227230
2023-04-22T15:54:55.793Z
2023-04-22T17:00:04.635Z
2023-10-22T15:01:06.380Z
{'Vendor': 'n/a', 'Product': 'hansunCMS', 'Versions': '1.4.3'}
CVE-2023-2615
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/af9c360a-87f8-4e97-a24b-6db675ee942a
2023-05-10T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2300
The Contact Form Builder by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 4.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/12ce97ba-8053-481f-bcd7-05d5e8292adb?source=cve
2023-04-26T12:23:51.740Z
2023-06-03T04:35:12.522Z
2023-06-03T04:35:12.522Z
{'Vendor': 'eyale-vc', 'Product': 'Contact Form Builder by vcita', 'Versions': '*'}
CVE-2023-2750
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cityboss E-municipality allows SQL Injection.This issue affects E-municipality: before 6.05.
https://www.usom.gov.tr/bildirim/tr-23-0286
2023-05-17T06:16:21.386Z
2023-05-24T11:44:39.395Z
2023-05-24T11:44:39.395Z
{'Vendor': 'Cityboss', 'Product': 'E-municipality', 'Versions': '0'}
CVE-2023-2479
OS Command Injection in GitHub repository appium/appium-desktop prior to v1.22.3-4.
https://huntr.dev/bounties/fbdeec3c-d197-4a68-a547-7f93fb9594b4
2023-05-02T00:00:00
2023-05-02T00:00:00
2023-05-02T00:00:00
{'Vendor': 'appium', 'Product': 'appium/appium-desktop', 'Versions': 'unspecified'}
CVE-2023-2183
Grafana is an open-source platform for monitoring and observability. The option to send a test alert is not available from the user panel UI for users having the Viewer role. It is still possible for a user with the Viewer role to send a test alert using the API as the API does not check access to this function. This might enable malicious users to abuse the functionality by sending multiple alert messages to e-mail and Slack, spamming users, prepare Phishing attack or block SMTP server. Users may upgrade to version 9.5.3, 9.4.12, 9.3.15, 9.2.19 and 8.5.26 to receive a fix.
https://grafana.com/security/security-advisories/cve-2023-2183/
2023-04-19T12:11:08.488Z
2023-06-06T18:04:26.485Z
2023-06-06T18:04:26.485Z
{'Vendor': 'Grafana', 'Product': 'Grafana', 'Versions': '8.0.0, 9.0.0, 9.3.0, 9.4.0, 9.5.0'}
CVE-2023-2029
The PrePost SEO WordPress plugin through 3.0 does not properly sanitize some of its settings, which could allow high-privilege users to perform Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/4889ad5a-c8c4-4958-b176-64560490497b
2023-04-13T16:57:41.858Z
2023-07-10T12:41:01.067Z
2023-07-10T12:41:01.067Z
{'Vendor': 'Unknown', 'Product': 'PrePost SEO', 'Versions': '0'}
CVE-2023-2880
Frauscher Sensortechnik GmbH FDS001 for FAdC/FAdCi v1.3.3 and all previous versions are vulnerable to a path traversal vulnerability of the web interface by a crafted URL without authentication. This enables an remote attacker to read all files on the filesystem of the FDS001 device.
https://cert.vde.com/en/advisories/VDE-2023-011/
2023-05-25T07:17:13.633Z
2023-07-05T09:04:28.091Z
2023-07-05T09:04:28.091Z
{'Vendor': 'Frauscher Sensortechnik', 'Product': 'Diagnostic System FDS101 for FAdC/FAdCi', 'Versions': '0'}
CVE-2023-2496
The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to unauthorized arbitrary file uploads due to an improper capability check on the 'validate_upload' function in versions up to, and including, 3.3.19. This makes it possible for authenticated attackers with a role that the administrator previously granted access to the plugin to upload arbitrary files on the affected site's server which may make remote code execution possible.
https://www.wordfence.com/threat-intel/vulnerabilities/id/477c6fa2-16a8-4461-b4d4-d087e13e3ca7?source=cve
2023-05-03T14:28:36.553Z
2023-05-23T23:36:47.080Z
2023-05-23T23:36:47.080Z
{'Vendor': 'Granth', 'Product': 'Go Pricing - WordPress Responsive Pricing Tables', 'Versions': '*'}
CVE-2023-2642
A vulnerability classified as critical has been found in SourceCodester Online Exam System 1.0. This affects an unknown part of the file adminpanel/admin/facebox_modal/updateCourse.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228771.
https://vuldb.com/?id.228771
2023-05-11T05:16:57.121Z
2023-05-11T06:00:05.816Z
2023-10-23T05:38:12.129Z
{'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'}
CVE-2023-2212
A vulnerability was found in Campcodes Coffee Shop POS System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/products/view_product.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226977 was assigned to this vulnerability.
https://vuldb.com/?id.226977
2023-04-21T06:29:01.376Z
2023-04-21T09:31:03.626Z
2023-10-22T14:44:01.830Z
{'Vendor': 'Campcodes', 'Product': 'Coffee Shop POS System', 'Versions': '1.0'}
CVE-2023-2707
The gAppointments WordPress plugin through 1.9.5.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/e5664da4-5b78-4e42-be6b-e0d7b73a85b0
2023-05-15T12:23:58.997Z
2023-11-27T16:22:05.473Z
2023-11-27T16:22:05.473Z
{'Vendor': 'Unknown', 'Product': 'gAppointments', 'Versions': '0'}
CVE-2023-2584
The PixelYourSite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 9.3.6 (9.6.1 in the Pro version) due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5ebf1e83-50b8-4f56-ba76-10100375edda?source=cve
2023-05-08T17:27:38.235Z
2023-06-09T05:33:19.003Z
2023-06-09T05:33:19.003Z
{'Vendor': 'pixelyoursite', 'Product': 'PixelYourSite Pro – Your smart PIXEL (TAG) Manager', 'Versions': '*'}
CVE-2023-2091
A vulnerability classified as critical was found in KylinSoft youker-assistant on KylinOS. Affected by this vulnerability is the function adjust_cpufreq_scaling_governer. The manipulation leads to os command injection. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.4.13 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-226099.
https://vuldb.com/?id.226099
2023-04-15T08:39:31.062Z
2023-04-15T08:40:43.814Z
2023-10-22T14:02:31.503Z
{'Vendor': 'KylinSoft', 'Product': 'youker-assistant', 'Versions': 'n/a'}
CVE-2023-2838
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2.
https://huntr.dev/bounties/711e0988-5345-4c01-a2fe-1179604dd07f
2023-05-22T00:00:00
2023-05-22T00:00:00
2023-05-27T00:00:00
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
CVE-2023-2992
An unauthenticated  denial of service vulnerability exists in the SMM v1, SMM v2, and FPC management web server which can be triggered under crafted conditions. Rebooting SMM or FPC will restore access to the management web server.
https://support.lenovo.com/us/en/product_security/LEN-127357
2023-05-30T16:27:48.220Z
2023-06-26T19:44:40.121Z
2023-06-26T19:44:40.121Z
{'Vendor': 'Lenovo', 'Product': 'System Management Module (SMM) ', 'Versions': 'various'}
CVE-2023-2204
A vulnerability was found in Campcodes Retro Basketball Shoes Online Store 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file faqs.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226969 was assigned to this vulnerability.
https://vuldb.com/?id.226969
2023-04-21T06:21:16.753Z
2023-04-21T06:31:03.348Z
2023-10-22T14:34:14.814Z
{'Vendor': 'Campcodes', 'Product': 'Retro Basketball Shoes Online Store', 'Versions': '1.0'}
CVE-2023-2654
The Conditional Menus WordPress plugin before 1.2.1 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/506ecee9-8e42-46de-9c5c-fc252ab2646e
2023-05-11T11:39:46.840Z
2023-06-19T10:52:53.455Z
2023-06-19T10:52:53.455Z
{'Vendor': 'Unknown', 'Product': 'Conditional Menus', 'Versions': '0'}
CVE-2023-2341
Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/cf3901ac-a649-478f-ab08-094ef759c11d
2023-04-27T00:00:00
2023-04-27T00:00:00
2023-04-27T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2711
The Ultimate Product Catalog WordPress plugin before 5.2.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/71c5b5b5-8694-4738-8e4b-8670a8d21c86
2023-05-15T13:41:52.936Z
2023-06-27T13:17:18.296Z
2023-06-27T13:17:18.296Z
{'Vendor': 'Unknown', 'Product': 'Ultimate Product Catalog', 'Versions': '0'}
CVE-2023-2438
The UserPro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.1.0. This is due to missing or incorrect nonce validation on the 'userpro_save_userdata' function. This makes it possible for unauthenticated attackers to update the user meta and inject malicious JavaScript via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/7d30adc5-27a5-4549-84fc-b930f27f03e5?source=cve
2023-05-01T09:50:31.544Z
2023-11-22T15:33:29.765Z
2023-11-22T15:33:29.765Z
{'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'}
CVE-2023-2068
The File Manager Advanced Shortcode WordPress plugin through 2.3.2 does not adequately prevent uploading files with disallowed MIME types when using the shortcode. This leads to RCE in cases where the allowed MIME type list does not include PHP files. In the worst case, this is available to unauthenticated users.
https://wpscan.com/vulnerability/58f72953-56d2-4d86-a49b-311b5fc58056
2023-04-14T14:53:15.771Z
2023-06-27T13:17:19.200Z
2023-06-27T13:17:19.200Z
{'Vendor': 'Unknown', 'Product': 'file-manager-advanced-shortcode', 'Versions': '0'}
CVE-2023-2592
The FormCraft WordPress plugin before 3.9.7 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
https://wpscan.com/vulnerability/d4298960-eaba-4185-a730-3e621d9680e1
2023-05-09T09:28:30.578Z
2023-06-27T13:17:20.071Z
2023-06-27T13:17:20.071Z
{'Vendor': 'Unknown', 'Product': 'FormCraft', 'Versions': '3.8.2'}
CVE-2023-2984
Path Traversal: '\..\filename' in GitHub repository pimcore/pimcore prior to 10.5.22.
https://huntr.dev/bounties/5df8b951-e2f1-4548-a7e3-601186e1b191
2023-05-30T00:00:00
2023-05-30T00:00:00
2023-05-30T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2087
The Essential Blocks plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.0.6. This is due to missing or incorrect nonce validation on the save function. This makes it possible for unauthenticated attackers to change plugin settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d38d41c7-8786-4145-9591-3e24eff3b79c?source=cve
2023-04-14T20:31:46.951Z
2023-06-09T05:33:34.844Z
2023-06-09T05:33:34.844Z
{'Vendor': 'wpdevteam', 'Product': 'Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates', 'Versions': '*'}
CVE-2023-2603
A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.
https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf
2023-05-09T00:00:00
2023-06-06T00:00:00
2023-11-30T05:06:21.152575
{'Vendor': 'n/a', 'Product': 'libcap', 'Versions': 'NA'}
CVE-2023-2253
A flaw was found in the `/v2/_catalog` endpoint in distribution/distribution, which accepts a parameter to control the maximum number of records returned (query string: `n`). This vulnerability allows a malicious user to submit an unreasonably large value for `n,` causing the allocation of a massive string array, possibly causing a denial of service through excessive use of memory.
https://bugzilla.redhat.com/show_bug.cgi?id=2189886
2023-04-24T00:00:00
2023-06-06T00:00:00
2023-06-29T00:00:00
{'Vendor': 'n/a', 'Product': 'distribution/distribution', 'Versions': 'NA'}
CVE-2023-2746
The Rockwell Automation Enhanced HIM software contains an API that the application uses that is not protected sufficiently and uses incorrect Cross-Origin Resource Sharing (CORS) settings and, as a result, is vulnerable to a Cross Site Request Forgery (CSRF) attack. To exploit this vulnerability, a malicious user would have to convince a user to click on an untrusted link through a social engineering attack or successfully perform a Cross Site Scripting Attack (XSS). Exploitation of a CSRF could potentially lead to sensitive information disclosure and full remote access to the affected products.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139760
2023-05-16T20:09:25.338Z
2023-07-11T13:15:04.152Z
2023-07-11T13:15:04.152Z
{'Vendor': 'Rockwell Automation', 'Product': 'Enhanced HIM', 'Versions': 'v1.001'}
CVE-2023-2316
Improper path handling in Typora before 1.6.7 on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via "typora://app/<absolute-path>". This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.
https://support.typora.io/What's-New-1.6/
2023-04-27T04:51:09.913Z
2023-08-19T05:34:20.390Z
2023-08-19T05:34:20.390Z
{'Vendor': 'Typora', 'Product': 'Typora', 'Versions': '0'}
CVE-2023-2896
The WP EasyCart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.4.8. This is due to missing or incorrect nonce validation on the process_duplicate_product function. This makes it possible for unauthenticated attackers to duplicate products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/041830b8-f059-46f5-961b-3ba908d161f9?source=cve
2023-05-25T16:34:37.889Z
2023-06-09T06:48:38.994Z
2023-06-09T06:48:38.994Z
{'Vendor': 'levelfourstorefront', 'Product': 'Shopping Cart & eCommerce Store', 'Versions': '*'}
CVE-2023-2195
A cross-site request forgery (CSRF) vulnerability in Jenkins Code Dx Plugin 3.1.0 and earlier allows attackers to connect to an attacker-specified URL.
https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3118
2023-04-20T18:13:35.219Z
2023-05-16T18:02:33.898Z
2023-05-16T18:02:33.898Z
{'Vendor': 'Jenkins', 'Product': 'Jenkins Code Dx Plugin', 'Versions': '0'}
CVE-2023-2480
Missing access permissions checks in M-Files Client before 23.5.12598.0 (excluding 23.2 SR2 and newer) allows elevation of privilege via UI extension applications
https://https://www.m-files.com/about/trust-center/security-advisories/cve-2023-2480/
2023-05-02T13:56:42.382Z
2023-05-25T13:28:29.204Z
2023-06-27T12:30:39.116Z
{'Vendor': 'M-Files', 'Product': 'M-Files Client', 'Versions': '0, 23.2.12340.11'}
CVE-2023-2879
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
https://www.wireshark.org/security/wnpa-sec-2023-14.html
2023-05-25T00:00:00
2023-05-26T00:00:00
2023-09-17T06:06:33.344581
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.6, >=3.6.0, <3.6.14'}
CVE-2023-2418
A vulnerability was found in Konga 2.8.3 on Kong. It has been classified as problematic. This affects an unknown part of the component Login API. The manipulation leads to insufficiently random values. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The associated identifier of this vulnerability is VDB-227715.
https://vuldb.com/?id.227715
2023-04-28T16:52:40.949Z
2023-04-29T00:31:04.842Z
2023-10-22T19:09:39.779Z
{'Vendor': 'n/a', 'Product': 'Konga', 'Versions': '2.8.3'}
CVE-2023-2048
A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/voters_row.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225933 was assigned to this vulnerability.
https://vuldb.com/?id.225933
2023-04-14T07:41:44.035Z
2023-04-14T10:31:05.007Z
2023-10-22T09:53:46.242Z
{'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'}
CVE-2023-2361
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/24d91b83-c3df-48f5-a713-9def733f2de7
2023-04-28T00:00:00
2023-04-28T00:00:00
2023-04-28T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2731
A NULL pointer dereference flaw was found in Libtiff's LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.
https://gitlab.com/libtiff/libtiff/-/issues/548
2023-05-16T00:00:00
2023-05-17T00:00:00
2023-07-03T00:00:00
{'Vendor': 'n/a', 'Product': 'libtiff', 'Versions': 'Fixed in libtiff v4.5.0'}
CVE-2023-2224
The SEO by 10Web WordPress plugin before 1.2.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/a76b6d22-1e00-428a-8a04-12162bd0d992
2023-04-21T10:24:24.143Z
2023-06-05T13:39:02.151Z
2023-06-05T13:39:02.151Z
{'Vendor': 'Unknown', 'Product': 'SEO by 10Web', 'Versions': '0'}
CVE-2023-2674
Improper Access Control in GitHub repository openemr/openemr prior to 7.0.1.
https://huntr.dev/bounties/af73e913-730c-4245-88ce-26fc908d3644
2023-05-12T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'}
CVE-2023-2859
Code Injection in GitHub repository nilsteampassnet/teampass prior to 3.0.9.
https://huntr.dev/bounties/d7b8ea75-c74a-4721-89bb-12e5c80fb0ba
2023-05-24T00:00:00
2023-05-24T00:00:00
2023-05-24T00:00:00
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-2766
A vulnerability was found in Weaver OA 9.5 and classified as problematic. This issue affects some unknown processing of the file /building/backmgr/urlpage/mobileurl/configfile/jx2_config.ini. The manipulation leads to files or directories accessible. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229271. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.229271
2023-05-17T16:05:03.207Z
2023-05-17T16:31:04.349Z
2023-10-23T06:28:15.429Z
{'Vendor': 'Weaver', 'Product': 'OA', 'Versions': '9.5'}
CVE-2023-2336
Path Traversal in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/af764624-7746-4f53-8480-85348dbb4f14
2023-04-27T00:00:00
2023-04-27T00:00:00
2023-04-27T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2623
The KiviCare WordPress plugin before 3.2.1 does not restrict the information returned in a response and returns all user data, allowing low privilege users such as subscriber to retrieve sensitive information such as the user email and hashed password of other users
https://wpscan.com/vulnerability/85cc39b1-416f-4d23-84c1-fdcbffb0dda0
2023-05-10T09:40:03.919Z
2023-06-27T13:17:20.907Z
2023-06-27T13:17:20.907Z
{'Vendor': 'Unknown', 'Product': 'KiviCare', 'Versions': '0'}
CVE-2023-2273
Rapid7 Insight Agent token handler versions 3.2.6 and below, suffer from a Directory Traversal vulnerability whereby unsanitized input from a CLI argument flows into io.ioutil.WriteFile, where it is used as a path. This can result in a Path Traversal vulnerability and allow an attacker to write arbitrary files. This issue is remediated in version 3.3.0 via safe guards that reject inputs that attempt to do path traversal.
https://docs.rapid7.com/release-notes/insightagent/20230425/
2023-04-25T08:45:42.126Z
2023-04-26T08:55:36.868Z
2023-04-26T08:59:51.382Z
{'Vendor': 'Rapid7', 'Product': 'Insight Agent', 'Versions': '0'}
CVE-2023-2789
A vulnerability was found in GNU cflow 1.7. It has been rated as problematic. This issue affects the function func_body/parse_variable_declaration of the file parser.c. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. The identifier VDB-229373 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.229373
2023-05-18T12:02:42.211Z
2023-05-18T12:31:03.470Z
2023-10-23T06:40:27.356Z
{'Vendor': 'GNU', 'Product': 'cflow', 'Versions': '1.7'}
CVE-2023-2459
Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to bypass permission restrictions via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html
2023-05-01T23:09:49.131Z
2023-05-02T23:47:57.424Z
2023-05-02T23:47:57.424Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.63'}
CVE-2023-2009
Plugin does not sanitize and escape the URL field in the Pretty Url WordPress plugin through 1.5.4 settings, which could allow high-privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/f7988a18-ba9d-4ead-82c8-30ea8223846f
2023-04-12T16:15:31.335Z
2023-05-15T12:15:42.265Z
2023-05-15T12:15:42.265Z
{'Vendor': 'Unknown', 'Product': 'Pretty Url', 'Versions': '0'}
CVE-2023-2320
The CF7 Google Sheets Connector WordPress plugin before 5.0.2, cf7-google-sheets-connector-pro WordPress plugin through 5.0.2 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/f17ccbaa-2fcd-4f17-a4da-73f2bc8a4fe9
2023-04-27T07:29:19.462Z
2023-07-04T07:23:30.440Z
2023-07-05T10:47:54.273Z
{'Vendor': 'Unknown', 'Product': 'CF7 Google Sheets Connector', 'Versions': '0'}
CVE-2023-2770
A vulnerability classified as critical was found in SourceCodester Online Exam System 1.0. This vulnerability affects unknown code of the file /kelasdosen/data. The manipulation of the argument columns[1][data] leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229276.
https://vuldb.com/?id.229276
2023-05-17T16:50:35.323Z
2023-05-17T18:00:04.299Z
2023-10-23T06:31:54.988Z
{'Vendor': 'SourceCodester', 'Product': 'Online Exam System', 'Versions': '1.0'}
CVE-2023-2265
An Improper Restriction of Rendered UI Layers or Frames in the Schweitzer Engineering Laboratories SEL-411L could allow an unauthenticated attacker to perform clickjacking based attacks against an authenticated and authorized user. See product Instruction Manual Appendix A dated 20230830 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-04-24T23:20:54.900Z
2023-11-30T16:55:55.901Z
2023-11-30T16:55:55.901Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-411L', 'Versions': 'R118-V0, R119-V0, R120-V0, R121-V0, R122-V0, R123-V0, R124-V0, R125-V0, R126-V0, R127-V0, R128-V0, R129-V0'}
CVE-2023-2635
The Call Now Accessibility Button WordPress plugin before 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/81b89613-18d0-4c13-84e3-9e2e1802fd7c
2023-05-10T18:55:53.007Z
2023-07-10T12:41:07.725Z
2023-07-10T13:05:50.645Z
{'Vendor': 'Unknown', 'Product': 'Call Now Accessibility Button', 'Versions': '0'}
CVE-2023-2818
An insecure filesystem permission in the Insider Threat Management Agent for Windows enables local unprivileged users to disrupt agent monitoring. All versions prior to 7.14.3 are affected. Agents for MacOS and Linux and Cloud are unaffected.
https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-005
2023-05-19T20:44:55.575Z
2023-06-27T14:29:49.258Z
2023-06-27T14:31:22.344Z
{'Vendor': 'Proofpoint', 'Product': 'Insider Threat Management', 'Versions': '0'}
CVE-2023-2727
Users may be able to launch containers using images that are restricted by ImagePolicyWebhook when using ephemeral containers. Kubernetes clusters are only affected if the ImagePolicyWebhook admission plugin is used together with ephemeral containers.
https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
2023-05-16T00:31:53.873Z
2023-07-03T20:05:04.329Z
2023-07-03T20:05:04.329Z
{'Vendor': 'Kubernetes', 'Product': 'Kubernetes', 'Versions': 'v1.24.14, v1.25.0 - v1.25.10, v1.26.0 - v1.26.5, v1.27.0 - v1.27.2'}
CVE-2023-2377
A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Web Management Interface. The manipulation of the argument name leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227653 was assigned to this vulnerability.
https://vuldb.com/?id.227653
2023-04-28T11:30:03.838Z
2023-04-28T15:31:03.377Z
2023-10-22T18:35:31.006Z
{'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.0, 2.0.9-hotfix.1, 2.0.9-hotfix.2, 2.0.9-hotfix.3, 2.0.9-hotfix.4, 2.0.9-hotfix.5, 2.0.9-hotfix.6'}
CVE-2023-2662
In Xpdf 4.04 (and earlier), a bad color space object in the input PDF file can cause a divide-by-zero.
https://forum.xpdfreader.com/viewtopic.php?t=42505
2023-05-11T20:03:56.213Z
2023-05-11T20:08:25.610Z
2023-05-11T20:08:27.720Z
{'Vendor': 'Xpdf', 'Product': 'Xpdf', 'Versions': '4.04'}
CVE-2023-2398
The Icegram Engage WordPress plugin before 3.1.12 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/16d47d20-58aa-4d04-9275-fd91ce926ff3
2023-04-28T13:07:18.163Z
2023-06-12T17:28:22.252Z
2023-06-12T17:28:22.252Z
{'Vendor': 'Unknown', 'Product': 'Icegram Engage', 'Versions': '0'}
CVE-2023-2232
An issue has been discovered in GitLab affecting all versions starting from 15.10 before 16.1, leading to a ReDoS vulnerability in the Jira prefix
https://gitlab.com/gitlab-org/gitlab/-/issues/408352
2023-04-21T00:00:00
2023-06-28T00:00:00
2023-06-28T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.10, <16.1'}
CVE-2023-2926
A vulnerability was found in SeaCMS 11.6 and classified as problematic. This issue affects some unknown processing of the file member.php of the component Picture Upload Handler. The manipulation of the argument oldpic leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230081 was assigned to this vulnerability.
https://vuldb.com/?id.230081
2023-05-27T07:30:08.167Z
2023-05-27T09:00:03.321Z
2023-10-23T07:15:49.167Z
{'Vendor': 'n/a', 'Product': 'SeaCMS', 'Versions': '11.6'}
CVE-2023-2025
OpenBlue Enterprise Manager Data Collector versions prior to 3.2.5.75 may expose sensitive information to an unauthorized user under certain circumstances.
https://www.johnsoncontrols.com/cyber-solutions/security-advisories
2023-04-13T15:11:24.430Z
2023-05-18T20:50:36.726Z
2023-05-18T20:50:36.726Z
{'Vendor': 'Johnson Controls', 'Product': 'OpenBlue Enterprise Manager Data Collector', 'Versions': '0'}
CVE-2023-2475
A vulnerability was found in Dromara J2eeFAST up to 2.6.0 and classified as problematic. This issue affects some unknown processing of the component System Message Handler. The manipulation of the argument 主题 leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-227867.
https://vuldb.com/?id.227867
2023-05-02T11:57:59.930Z
2023-05-02T13:00:04.852Z
2023-10-23T05:16:14.573Z
{'Vendor': 'Dromara', 'Product': 'J2eeFAST', 'Versions': '2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6'}
CVE-2023-2160
Weak Password Requirements in GitHub repository modoboa/modoboa prior to 2.1.0.
https://huntr.dev/bounties/54fb6d6a-6b39-45b6-b62a-930260ba484b
2023-04-18T00:00:00
2023-04-18T00:00:00
2023-12-18T10:12:55.186Z
{'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'}
CVE-2023-2530
A privilege escalation allowing remote code execution was discovered in the orchestration service.
https://www.puppet.com/security/cve/cve-2023-2530-remote-code-execution-orchestrator
2023-05-04T00:00:00
2023-06-07T00:00:00
2023-06-07T19:52:12
{'Vendor': 'Puppet', 'Product': 'Puppet Enterprise', 'Versions': '2021.7.0, 2023.0.0'}
CVE-2023-2863
A vulnerability has been found in Simple Design Daily Journal 1.012.GP.B on Android and classified as problematic. Affected by this vulnerability is an unknown functionality of the component SQLite Database. The manipulation leads to cleartext storage in a file or on disk. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-229819.
https://vuldb.com/?id.229819
2023-05-24T09:33:33.773Z
2023-05-24T10:00:04.517Z
2023-10-23T06:53:52.317Z
{'Vendor': 'Simple Design', 'Product': 'Daily Journal', 'Versions': '1.012.GP.B'}
CVE-2023-2619
A vulnerability, which was classified as critical, was found in SourceCodester Online Tours & Travels Management System 1.0. This affects the function exec of the file disapprove_delete.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228549 was assigned to this vulnerability.
https://vuldb.com/?id.228549
2023-05-10T05:15:54.605Z
2023-05-10T06:00:05.934Z
2023-10-23T05:35:45.883Z
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
CVE-2023-2249
The wpForo Forum plugin for WordPress is vulnerable to Local File Include, Server-Side Request Forgery, and PHAR Deserialization in versions up to, and including, 2.1.7. This is due to the insecure use of file_get_contents without appropriate verification of the data being supplied to the function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to retrieve the contents of files like wp-config.php hosted on the system, perform a deserialization attack and possibly achieve remote code execution, and make requests to internal services.
https://www.wordfence.com/threat-intel/vulnerabilities/id/800fa098-b29f-4979-b7bd-b1186a4dafcb?source=cve
2023-04-24T11:24:12.750Z
2023-06-09T05:33:21.777Z
2023-06-09T05:33:21.777Z
{'Vendor': 'tomdever', 'Product': 'wpForo Forum', 'Versions': '*'}
CVE-2023-2422
A flaw was found in Keycloak. A Keycloak server configured to support mTLS authentication for OAuth/OpenID clients does not properly verify the client certificate chain. A client that possesses a proper certificate can authorize itself as any other client, therefore, access data that belongs to other clients.
https://access.redhat.com/errata/RHSA-2023:3883
2023-04-28T17:33:42.062Z
2023-10-04T10:59:30.818Z
2023-10-04T10:59:30.818Z
{'Vendor': 'n/a', 'Product': 'keycloak', 'Versions': '18.0'}
CVE-2023-2072
The Rockwell Automation PowerMonitor 1000 contains stored cross-site scripting vulnerabilities within the web page of the product.  The vulnerable pages do not require privileges to access and can be injected with code by an attacker which could be used to leverage an attack on an authenticated user resulting in remote code execution and potentially the complete loss of confidentiality, integrity, and availability of the product.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139761
2023-04-14T18:04:06.540Z
2023-07-11T13:05:56.994Z
2023-07-11T13:05:56.994Z
{'Vendor': 'Rockwell Automation', 'Product': 'PowerMonitor 1000', 'Versions': 'V4.011'}
CVE-2023-2588
Teltonika’s Remote Management System versions prior to 4.10.0 have a feature allowing users to access managed devices’ local secure shell (SSH)/web management services over the cloud proxy. A user can request a web proxy and obtain a URL in the Remote Management System cloud subdomain. This URL could be shared with others without Remote Management System authentication . An attacker could exploit this vulnerability to create a malicious webpage that uses a trusted and certified domain. An attacker could initiate a reverse shell when a victim connects to the malicious webpage, achieving remote code execution on the victim device.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08
2023-05-08T22:09:43.872Z
2023-05-22T15:09:31.169Z
2023-05-22T15:09:31.169Z
{'Vendor': 'Teltonika', 'Product': 'Remote Management System', 'Versions': '0'}
CVE-2023-2971
Improper path handling in Typora before 1.7.0-dev on Windows and Linux allows a crafted webpage to access local files and exfiltrate them to remote web servers via "typora://app/typemark/". This vulnerability can be exploited if a user opens a malicious markdown file in Typora, or copies text from a malicious webpage and paste it into Typora.
https://starlabs.sg/advisories/23/23-2971/
2023-05-30T07:46:11.004Z
2023-08-19T05:45:35.025Z
2023-08-19T05:45:35.025Z
{'Vendor': 'Typora', 'Product': 'Typora', 'Versions': '0'}
CVE-2023-2834
The BookIt plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.3.7. This is due to insufficient verification on the user being supplied during booking an appointment through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
https://www.wordfence.com/threat-intel/vulnerabilities/id/cfd32e46-a4fc-4c10-b546-9f9da75db791?source=cve
2023-05-22T10:35:10.936Z
2023-06-30T01:56:17.606Z
2023-06-30T01:56:17.606Z
{'Vendor': 'stylemix', 'Product': 'Booking Calendar | Appointment Booking | BookIt', 'Versions': '*'}
CVE-2023-2567
A SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in certain parameters used in the Query functionality, allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application. Authenticated users can extract arbitrary information from the DBMS in an uncontrolled way.
https://security.nozominetworks.com/NN-2023:9-01
2023-05-08T08:20:28.150Z
2023-09-19T10:03:04.013Z
2023-09-19T10:03:04.013Z
{'Vendor': 'Nozomi Networks', 'Product': 'Guardian', 'Versions': '0, 23.0.0'}
CVE-2023-2137
Heap buffer overflow in sqlite in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html
2023-04-17T22:27:00.599Z
2023-04-19T03:40:26.810Z
2023-04-19T03:40:26.810Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.137'}
CVE-2023-2967
The TinyMCE Custom Styles WordPress plugin before 1.1.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/9afec4aa-1210-4c40-b566-64e37acf2b64
2023-05-29T19:32:35.912Z
2023-07-10T12:41:10.826Z
2023-07-10T13:05:51.211Z
{'Vendor': 'Unknown', 'Product': 'TinyMCE Custom Styles', 'Versions': '0'}
CVE-2023-2064
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Minova Technology eTrace allows SQL Injection.This issue affects eTrace: before 23.05.20.
https://www.usom.gov.tr/bildirim/tr-23-0288
2023-04-14T10:27:05.143Z
2023-05-24T13:15:28.680Z
2023-05-24T13:15:28.680Z
{'Vendor': 'Minova Technology', 'Product': 'eTrace', 'Versions': '0'}
CVE-2023-2434
The Nested Pages plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'reset' function in versions up to, and including, 3.2.3. This makes it possible for authenticated attackers, with editor-level permissions and above, to reset plugin settings.
https://www.wordfence.com/threat-intel/vulnerabilities/id/8c3e61e9-3610-41b5-9820-28012dc657fd?source=cve
2023-05-01T09:19:58.742Z
2023-05-31T03:36:10.899Z
2023-05-31T03:36:10.899Z
{'Vendor': 'kylephillips', 'Product': 'Nested Pages', 'Versions': '*'}
CVE-2023-2121
Vault and Vault Enterprise's (Vault) key-value v2 (kv-v2) diff viewer allowed HTML injection into the Vault web UI through key values. This vulnerability, CVE-2023-2121, is fixed in Vault 1.14.0, 1.13.3, 1.12.7, and 1.11.11.
https://discuss.hashicorp.com/t/hcsec-2023-17-vault-s-kv-diff-viewer-allowed-html-injection/54814
2023-04-17T14:51:51.916Z
2023-06-09T16:59:49.065Z
2023-06-09T16:59:49.065Z
{'Vendor': 'HashiCorp', 'Product': 'Vault', 'Versions': '1.13.0, 1.12.0, 1.11.0, 1.10.0'}
CVE-2023-2571
The Quiz Maker WordPress plugin before 6.4.2.7 does not escape some parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/2dc02e5c-1c89-4053-a6a7-29ee7b996183
2023-05-08T10:24:05.793Z
2023-06-05T13:39:02.507Z
2023-06-05T13:39:02.507Z
{'Vendor': 'Unknown', 'Product': 'Quiz Maker', 'Versions': '0'}
CVE-2023-2822
A vulnerability was found in Ellucian Ethos Identity up to 5.10.5. It has been classified as problematic. Affected is an unknown function of the file /cas/logout. The manipulation of the argument url leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 5.10.6 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-229596.
https://vuldb.com/?id.229596
2023-05-20T06:49:02.849Z
2023-05-20T07:00:04.836Z
2023-10-23T06:47:46.425Z
{'Vendor': 'Ellucian', 'Product': 'Ethos Identity', 'Versions': '5.10.0, 5.10.1, 5.10.2, 5.10.3, 5.10.4, 5.10.5'}
CVE-2023-2658
A vulnerability, which was classified as critical, has been found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this issue is some unknown functionality of the file products.php. The manipulation of the argument c leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228800.
https://vuldb.com/?id.228800
2023-05-11T13:01:31.377Z
2023-05-11T14:00:06.021Z
2023-10-23T05:52:50.217Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}