CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-2864
A vulnerability was found in SourceCodester Online Jewelry Store 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file customer.php of the component POST Parameter Handler. The manipulation of the argument Custid leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229820.
https://vuldb.com/?id.229820
2023-05-24T09:37:04.501Z
2023-05-24T10:31:03.723Z
2023-10-23T06:55:05.541Z
{'Vendor': 'SourceCodester', 'Product': 'Online Jewelry Store', 'Versions': '1.0'}
CVE-2023-2537
null
null
2023-05-05T06:52:30.958Z
2023-05-05T08:19:47.490Z
2023-05-05T08:30:58.647Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2370
A vulnerability classified as critical has been found in SourceCodester Online DJ Management System 1.0. Affected is an unknown function of the file admin/events/manage_event.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-227646 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.227646
2023-04-28T11:19:16.647Z
2023-04-28T13:31:03.936Z
2023-10-22T18:26:58.850Z
{'Vendor': 'SourceCodester', 'Product': 'Online DJ Management System', 'Versions': '1.0'}
CVE-2023-2665
Storage of Sensitive Data in a Mechanism without Access Control in GitHub repository francoisjacquet/rosariosis prior to 11.0.
https://huntr.dev/bounties/42f38a84-8954-484d-b5ff-706ca0918194
2023-05-12T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'francoisjacquet', 'Product': 'francoisjacquet/rosariosis', 'Versions': 'unspecified'}
CVE-2023-2235
A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation. The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability. We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2
2023-04-21T17:43:15.944Z
2023-05-01T12:51:25.433Z
2023-06-28T20:02:44.896Z
{'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '5.13'}
CVE-2023-2059
A vulnerability was found in DedeCMS 5.7.87. It has been rated as problematic. Affected by this issue is some unknown functionality of the file uploads/include/dialog/select_templets.php. The manipulation leads to path traversal: '..\filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225944.
https://vuldb.com/?id.225944
2023-04-14T08:39:24.082Z
2023-04-14T14:00:07.347Z
2023-10-22T13:52:44.438Z
{'Vendor': 'n/a', 'Product': 'DedeCMS', 'Versions': '5.7.87'}
CVE-2023-2409
A vulnerability, which was classified as critical, was found in SourceCodester AC Repair and Services System 1.0. This affects an unknown part of the file /admin/services/view_service.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227703.
https://vuldb.com/?id.227703
2023-04-28T16:30:40.677Z
2023-04-28T22:31:05.443Z
2023-10-22T19:02:20.666Z
{'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'}
CVE-2023-2327
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/7336b71f-a36f-4ce7-a26d-c8335ac713d6
2023-04-27T00:00:00
2023-04-27T00:00:00
2023-04-27T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2262
A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140786
2023-04-24T21:35:54.200Z
2023-09-20T15:20:23.700Z
2023-09-20T15:47:00.968Z
{'Vendor': 'Rockwell Automation', 'Product': '1756-EN2T Series A, B, C', 'Versions': '<=5.008 & 5.028'}
CVE-2023-2798
Those using HtmlUnit to browse untrusted webpages may be vulnerable to Denial of service attacks (DoS). If HtmlUnit is running on user supplied web pages, an attacker may supply content that causes HtmlUnit to crash by a stack overflow. This effect may support a denial of service attack.This issue affects htmlunit before 2.70.0.
https://github.com/HtmlUnit/htmlunit/commit/940dc7fd
2023-05-18T14:33:09.974Z
2023-05-25T13:54:52.191Z
2023-05-25T13:54:52.191Z
{'Vendor': '', 'Product': '', 'Versions': '0'}
CVE-2023-2632
Jenkins Code Dx Plugin 3.1.0 and earlier stores Code Dx server API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system.
https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3146
2023-05-10T15:00:45.214Z
2023-05-16T17:54:11.737Z
2023-05-16T17:54:11.737Z
{'Vendor': 'Jenkins', 'Product': 'Jenkins Code Dx Plugin', 'Versions': '0'}
CVE-2023-2848
Movim prior to version 0.22 is affected by a Cross-Site WebSocket Hijacking vulnerability. This was the result of a missing header validation.
https://github.com/movim/movim/commit/96372082acd3e5d778a2522a60a1805bf2af31f6
2023-05-23T10:05:08.661Z
2023-09-14T11:36:50.521Z
2023-09-14T11:36:50.521Z
{'Vendor': 'Movim', 'Product': 'Movim', 'Versions': '< 0.22'}
CVE-2023-2761
The User Activity Log WordPress plugin before 1.6.3 does not properly sanitise and escape the `txtsearch` parameter before using it in a SQL statement in some admin pages, leading to a SQL injection exploitable by high privilege users such as admin.
https://wpscan.com/vulnerability/8c82d317-f9f9-4e25-a7f1-43edb77e8aba
2023-05-17T15:09:09.490Z
2023-07-24T10:20:26.121Z
2023-07-24T10:20:26.121Z
{'Vendor': 'Unknown', 'Product': 'User Activity Log', 'Versions': '0'}
CVE-2023-2331
Unquoted service Path or Element vulnerability in 42Gears Surelock Windows SureLock Service (NixService.Exe) on Windows application will allows to insert arbitrary code into the service. This issue affects Surelock Windows : from 2.3.12 through 2.40.0.
https://www.42gears.com/security-and-compliance
2023-04-27T09:20:29.336Z
2023-04-27T11:51:45.946Z
2023-04-28T07:16:21.298Z
{'Vendor': '42Gears', 'Product': 'Surelock Windows ', 'Versions': '2.3.12'}
CVE-2023-2624
The KiviCare WordPress plugin before 3.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrator
https://wpscan.com/vulnerability/dc3a841d-a95b-462e-be4b-acaa44e77264
2023-05-10T09:40:12.422Z
2023-06-27T13:17:23.450Z
2023-06-27T13:17:23.450Z
{'Vendor': 'Unknown', 'Product': 'KiviCare', 'Versions': '0'}
CVE-2023-2448
The UserPro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'userpro_shortcode_template' function in versions up to, and including, 5.1.4. This makes it possible for unauthenticated attackers to arbitrary shortcode execution. An attacker can leverage CVE-2023-2446 to get sensitive information via shortcode.
https://www.wordfence.com/threat-intel/vulnerabilities/id/7cbe9175-4a6f-4eb6-8d31-9a9fda9b4f40?source=cve
2023-05-01T14:19:36.551Z
2023-11-22T15:33:29.321Z
2023-11-22T15:33:29.321Z
{'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'}
CVE-2023-2366
A vulnerability was found in SourceCodester Faculty Evaluation System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file ajax.php?action=delete_class. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227642 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.227642
2023-04-28T11:08:09.598Z
2023-04-28T12:00:05.334Z
2023-10-22T16:14:47.124Z
{'Vendor': 'SourceCodester', 'Product': 'Faculty Evaluation System', 'Versions': '1.0'}
CVE-2023-2736
The Groundhogg plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.7.9.8. This is due to missing nonce validation in the 'ajax_edit_contact' function. This makes it possible for authenticated attackers to receive the auto login link via shortcode and then modify the assigned user to the auto login link to elevate verified user privileges via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/9bf472f1-5980-48ee-aa10-aad19b6f2456?source=cve
2023-05-16T13:17:27.854Z
2023-05-20T02:03:23.875Z
2023-05-20T02:03:23.875Z
{'Vendor': 'trainingbusinesspros', 'Product': 'WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg', 'Versions': '*'}
CVE-2023-2223
The Login rebuilder WordPress plugin before 2.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/7b356b82-5d03-4f70-b4ce-f1405304bb52
2023-04-21T10:24:12.529Z
2023-05-30T07:49:20.226Z
2023-05-30T07:49:20.226Z
{'Vendor': 'Unknown', 'Product': 'Login rebuilder', 'Versions': '0'}
CVE-2023-2673
Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks.
https://cert.vde.com/en/advisories/VDE-2023-010/
2023-05-12T06:13:26.259Z
2023-06-13T06:16:18.557Z
2023-08-25T05:48:41.651Z
{'Vendor': 'PHOENIX CONTACT', 'Product': 'FL MGUARD 2102', 'Versions': '0'}
CVE-2023-2389
A vulnerability, which was classified as problematic, was found in Netgear SRX5308 up to 4.3.5-3. This affects an unknown part of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.emailServer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227667. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227667
2023-04-28T11:48:45.164Z
2023-04-28T20:00:05.733Z
2023-10-22T18:50:08.939Z
{'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'}
CVE-2023-2809
Plaintext credential usage vulnerability in Sage 200 Spain 2023.38.001 version, the exploitation of which could allow a remote attacker to extract SQL database credentials from the DLL application. This vulnerability could be linked to known techniques to obtain remote execution of MS SQL commands and escalate privileges on Windows systems because the credentials are stored in plaintext.
https://www.incibe.es/en/incibe-cert/notices/aviso/use-cleartext-credentials-sage-200
2023-05-19T10:54:17.589Z
2023-10-04T10:49:56.429Z
2023-12-19T14:34:45.575Z
{'Vendor': 'Sage', 'Product': 'Sage 200 Spain', 'Versions': '2023.38.001'}
CVE-2023-2808
Mattermost fails to normalize UTF confusable characters when determining if a preview should be generated for a hyperlink, allowing an attacker to trigger link preview on a disallowed domain using a specially crafted link.
https://mattermost.com/security-updates/
2023-05-19T09:34:03.996Z
2023-05-29T09:07:34.768Z
2023-05-29T09:07:34.768Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.1.9, 7.8.4, 7.9.3, 7.10'}
CVE-2023-2367
A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/manage_academic.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227643.
https://vuldb.com/?id.227643
2023-04-28T11:08:13.008Z
2023-04-28T12:31:03.172Z
2023-10-22T18:23:19.368Z
{'Vendor': 'SourceCodester', 'Product': 'Faculty Evaluation System', 'Versions': '1.0'}
CVE-2023-2737
Improper log permissions in SafeNet Authentication Service Version 3.4.0 on Windows allows an authenticated attacker to cause a denial of service via local privilege escalation.
https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=08f460ba47bba550c0e42e61e36d432f&sysparm_article=KB0027485
2023-05-16T13:48:23.279Z
2023-08-16T15:45:29.540Z
2023-08-16T15:45:29.540Z
{'Vendor': 'Thales', 'Product': 'SafeNet Authtentication Service Agent', 'Versions': 'SafeNet Authentication Service Agent '}
CVE-2023-2222
null
null
2023-04-21T08:11:32.142Z
null
2023-10-03T15:46:24.436Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2672
A vulnerability classified as critical has been found in SourceCodester Lost and Found Information System 1.0. Affected is an unknown function of the file items/view.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228888.
https://vuldb.com/?id.228888
2023-05-12T06:01:32.348Z
2023-05-12T09:00:05.619Z
2023-10-23T06:03:49.823Z
{'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'}
CVE-2023-2388
A vulnerability, which was classified as problematic, has been found in Netgear SRX5308 up to 4.3.5-3. Affected by this issue is some unknown functionality of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.fromAddr leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227666 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227666
2023-04-28T11:48:40.540Z
2023-04-28T19:31:03.818Z
2023-10-22T18:48:55.770Z
{'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'}
CVE-2023-2019
A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. This issue results from the improper management of a reference count. This may allow an attacker to create a denial of service condition on the system.
https://bugzilla.redhat.com/show_bug.cgi?id=2189137
2023-04-13T00:00:00
2023-04-24T00:00:00
2023-04-24T00:00:00
{'Vendor': 'n/a', 'Product': "Linux kernel's netdevsim device driver", 'Versions': 'Fixed in kernel v6.0-rc1'}
CVE-2023-2449
The UserPro plugin for WordPress is vulnerable to unauthorized password resets in versions up to, and including 5.1.1. This is due to the plugin using native password reset functionality, with insufficient validation on the password reset function (userpro_process_form). The function uses the plaintext value of a password reset key instead of a hashed value which means it can easily be retrieved and subsequently used. An attacker can leverage CVE-2023-2448 and CVE-2023-2446, or another vulnerability like SQL Injection in another plugin or theme installed on the site to successfully exploit this vulnerability.
https://www.wordfence.com/threat-intel/vulnerabilities/id/de9be7bc-4f8a-4393-8ebb-1b1f141b7585?source=cve
2023-05-01T14:20:24.641Z
2023-11-22T15:33:36.801Z
2023-11-22T15:33:36.801Z
{'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'}
CVE-2023-2760
An SQL injection vulnerability exists in TapHome core HandleMessageUpdateDevicePropertiesRequest function before version 2023.2, allowing low privileged users to inject arbitrary SQL directives into an SQL query and execute arbitrary SQL commands and get full reading access. This may also lead to limited write access and temporary Denial-of-Service.
https://claroty.com/team82/disclosure-dashboard/cve-2023-2759
2023-05-17T14:21:50.584Z
2023-07-17T06:14:32.851Z
2023-08-09T10:48:53.246Z
{'Vendor': 'TAPHOME', 'Product': 'Core Platform', 'Versions': '0.0'}
CVE-2023-2330
The Caldera Forms Google Sheets Connector WordPress plugin before 1.3 does not have CSRF check when updating its Access Code, which could allow attackers to make logged in admin change the access code to an arbitrary one via a CSRF attack
https://wpscan.com/vulnerability/fa8ccdd0-7b23-4b12-9aa9-4b29d47256b8
2023-04-27T09:19:05.911Z
2023-07-17T13:29:57.798Z
2023-08-16T07:46:39.924Z
{'Vendor': 'Unknown', 'Product': 'Caldera Forms Google Sheets Connector', 'Versions': '0'}
CVE-2023-2625
A vulnerability exists that can be exploited by an authenticated client that is connected to the same network segment as the CoreTec 4, having any level of access VIEWER to ADMIN. To exploit the vulnerability the attacker can inject shell commands through a particular field of the web user interface that will be executed by the system.
https://search.abb.com/library/Download.aspx?DocumentID=8DBD000163&LanguageCode=en&DocumentPartId=&Action=Launch
2023-05-10T10:31:57.900Z
2023-06-28T16:15:46.529Z
2023-06-28T16:15:46.529Z
{'Vendor': 'Hitachi Energy', 'Product': 'TXpert Hub CoreTec 4', 'Versions': 'TXpert Hub CoreTec 4 version 2.0.*, TXpert Hub CoreTec 4 version 2.1.*, TXpert Hub CoreTec 4 version 2.2.*, TXpert Hub CoreTec 4 version 2.3.*, TXpert Hub CoreTec 4 version 2.4.*, TXpert Hub CoreTec 4 version 3.0.1'}
CVE-2023-2275
The WooCommerce Multivendor Marketplace – REST API plugin for WordPress is vulnerable to unauthorized access of data and addition of data due to a missing capability check on the 'get_item', 'get_order_notes' and 'add_order_note' functions in versions up to, and including, 1.5.3. This makes it possible for authenticated attackers with subscriber privileges or above, to view the order details and order notes, and add order notes.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b0520601-7e5c-412d-a8da-df1bf8ce28df?source=cve
2023-04-25T11:42:13.932Z
2023-06-09T05:33:28.997Z
2023-06-09T05:33:28.997Z
{'Vendor': 'wclovers', 'Product': 'WooCommerce Multivendor Marketplace – REST API', 'Versions': '*'}
CVE-2023-2326
The Gravity Forms Google Sheet Connector WordPress plugin before 1.3.5, gsheetconnector-gravityforms-pro WordPress plugin through 1.3.5 does not have CSRF check when updating its Access Code, which could allow attackers to make logged in admin change the access code to an arbitrary one via a CSRF attack
https://wpscan.com/vulnerability/f922695a-b803-4edf-aadc-80c79d99bebb
2023-04-27T08:38:06.515Z
2023-06-27T13:17:25.086Z
2023-06-27T13:17:25.086Z
{'Vendor': 'Unknown', 'Product': 'Gravity Forms Google Sheet Connector', 'Versions': '0'}
CVE-2023-2776
A vulnerability was found in code-projects Simple Photo Gallery 1.0. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to unrestricted upload. The attack can be initiated remotely. VDB-229282 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.229282
2023-05-17T17:00:09.409Z
2023-05-17T20:00:05.422Z
2023-10-23T06:39:14.182Z
{'Vendor': 'code-projects', 'Product': 'Simple Photo Gallery', 'Versions': '1.0'}
CVE-2023-2263
The Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A is vulnerable to CIP fuzzing.  The new ENIP connections cannot be established if impacted by this vulnerability,  which prohibits operational capabilities of the device resulting in a denial-of-service attack.
https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140029
2023-04-24T21:50:22.174Z
2023-07-18T15:01:24.115Z
2023-07-18T15:01:24.115Z
{'Vendor': 'Rockwell Automation', 'Product': 'Kinetix 5700 DC Bus Power Supply Series A ', 'Versions': '13.001'}
CVE-2023-2799
A vulnerability, which was classified as problematic, has been found in cnoa OA up to 5.1.1.5. Affected by this issue is some unknown functionality of the file /index.php?app=main&func=passport&action=login. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229376. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.229376
2023-05-18T15:02:51.328Z
2023-05-18T15:31:03.350Z
2023-10-23T06:42:53.758Z
{'Vendor': 'cnoa', 'Product': 'OA', 'Versions': '5.1.1.0, 5.1.1.1, 5.1.1.2, 5.1.1.3, 5.1.1.4, 5.1.1.5'}
CVE-2023-2633
Jenkins Code Dx Plugin 3.1.0 and earlier does not mask Code Dx server API keys displayed on the configuration form, increasing the potential for attackers to observe and capture them.
https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3146
2023-05-10T15:00:46.137Z
2023-05-16T17:56:40.703Z
2023-05-16T17:56:40.703Z
{'Vendor': 'Jenkins', 'Product': 'Jenkins Code Dx Plugin', 'Versions': '0'}
CVE-2023-2058
A vulnerability was found in EyouCms up to 1.6.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /yxcms/index.php?r=admin/extendfield/mesedit&tabid=12&id=4 of the component HTTP POST Request Handler. The manipulation of the argument web_ico leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225943.
https://vuldb.com/?id.225943
2023-04-14T08:35:23.366Z
2023-04-14T14:00:05.983Z
2023-10-22T13:51:31.107Z
{'Vendor': 'n/a', 'Product': 'EyouCms', 'Versions': '1.6.0, 1.6.1, 1.6.2'}
CVE-2023-2408
A vulnerability, which was classified as critical, has been found in SourceCodester AC Repair and Services System 1.0. Affected by this issue is some unknown functionality of the file services/view.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227702 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.227702
2023-04-28T16:30:38.454Z
2023-04-28T22:31:04.313Z
2023-10-22T19:01:07.494Z
{'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'}
CVE-2023-2721
Use after free in Navigation in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html
2023-05-15T21:16:57.843Z
2023-05-16T18:45:33.757Z
2023-05-16T18:45:33.757Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.126'}
CVE-2023-2371
A vulnerability classified as critical was found in SourceCodester Online DJ Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/inquiries/view_details.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227647.
https://vuldb.com/?id.227647
2023-04-28T11:19:19.930Z
2023-04-28T13:31:05.071Z
2023-10-22T18:28:11.981Z
{'Vendor': 'SourceCodester', 'Product': 'Online DJ Management System', 'Versions': '1.0'}
CVE-2023-2664
 In Xpdf 4.04 (and earlier), a PDF object loop in the embedded file tree leads to infinite recursion and a stack overflow.
https://forum.xpdfreader.com/viewtopic.php?t=42422
2023-05-11T20:19:40.531Z
2023-05-11T20:21:25.821Z
2023-05-11T20:21:25.821Z
{'Vendor': 'Xpdf', 'Product': 'Xpdf', 'Versions': '4.04'}
CVE-2023-2234
Union variant confusion allows any malicious BT controller to execute arbitrary code on the Zephyr host.
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx9g-8fr2-q899
2023-04-21T17:15:56.122Z
2023-07-10T04:33:35.254Z
2023-07-10T04:33:35.254Z
{'Vendor': 'zephyrproject-rtos', 'Product': 'Zephyr', 'Versions': '*'}
CVE-2023-2023
The Custom 404 Pro WordPress plugin before 3.7.3 does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting.
https://wpscan.com/vulnerability/8859843a-a8c2-4f7a-8372-67049d6ea317
2023-04-13T14:56:16.541Z
2023-05-30T07:49:21.025Z
2023-05-30T07:49:21.025Z
{'Vendor': 'Unknown', 'Product': 'Custom 404 Pro', 'Versions': '0'}
CVE-2023-2473
A vulnerability was found in Dreamer CMS up to 4.1.3. It has been declared as problematic. This vulnerability affects the function updatePwd of the file UserController.java of the component Password Hash Calculation. The manipulation leads to inefficient algorithmic complexity. The attack can be initiated remotely. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227860.
https://vuldb.com/?id.227860
2023-05-02T11:43:40.581Z
2023-05-02T12:00:09.669Z
2023-10-23T05:13:48.158Z
{'Vendor': 'n/a', 'Product': 'Dreamer CMS', 'Versions': '4.1.0, 4.1.1, 4.1.2, 4.1.3'}
CVE-2023-2189
The Elementor Addons, Widgets and Enhancements – Stax plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the toggle_widget function in versions up to, and including, 1.4.3. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to enable or disable Elementor widgets.
https://www.wordfence.com/threat-intel/vulnerabilities/id/926550bb-265d-4811-a375-10c47e9fb4d6?source=cve
2023-04-19T19:39:11.493Z
2023-06-09T05:33:24.777Z
2023-06-09T05:33:24.777Z
{'Vendor': 'staxwp', 'Product': 'Elementor Addons, Widgets and Enhancements – Stax', 'Versions': '*'}
CVE-2023-2865
A vulnerability was found in SourceCodester Theme Park Ticketing System 1.0. It has been classified as critical. This affects an unknown part of the file print_ticket.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229821 was assigned to this vulnerability.
https://vuldb.com/?id.229821
2023-05-24T09:38:59.420Z
2023-05-24T10:31:04.666Z
2023-10-23T06:56:18.667Z
{'Vendor': 'SourceCodester', 'Product': 'Theme Park Ticketing System', 'Versions': '1.0'}
CVE-2023-2166
A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service.
https://lore.kernel.org/lkml/CAO4mrfcV_07hbj8NUuZrA8FH-kaRsrFy-2metecpTuE5kKHn5w%40mail.gmail.com/
2023-04-18T00:00:00
2023-04-19T00:00:00
2023-04-19T00:00:00
{'Vendor': 'n/a', 'Product': 'Linux', 'Versions': 'Linux Kernel version prior to Kernel 6.1 RC9'}
CVE-2023-2536
null
null
2023-05-05T06:52:12.918Z
2023-05-05T08:12:36.131Z
2023-05-05T08:30:43.827Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2977
A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible.
https://access.redhat.com/security/cve/CVE-2023-2977
2023-05-30T00:00:00
2023-06-01T00:00:00
2023-08-17T18:06:58.134977
{'Vendor': 'n/a', 'Product': 'OpenSC', 'Versions': 'opensc-0.23.0'}
CVE-2023-2424
A vulnerability was found in DedeCMS 5.7.106 and classified as critical. Affected by this issue is the function UpDateMemberModCache of the file uploads/dede/config.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227750 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.227750
2023-04-29T07:00:58.578Z
2023-04-29T07:31:03.339Z
2023-10-23T05:10:08.205Z
{'Vendor': 'n/a', 'Product': 'DedeCMS', 'Versions': '5.7.106'}
CVE-2023-2074
A vulnerability was found in Campcodes Online Traffic Offense Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /classes/Master.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226052.
https://vuldb.com/?id.226052
2023-04-14T18:33:12.101Z
2023-04-14T19:00:07.607Z
2023-10-22T13:55:10.773Z
{'Vendor': 'Campcodes', 'Product': 'Online Traffic Offense Management System', 'Versions': '1.0'}
CVE-2023-2561
The Gallery Metabox for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the gallery_remove function in versions up to, and including, 1.5. This makes it possible for subscriber-level attackers to modify galleries attached to posts and pages with this plugin.
https://www.wordfence.com/threat-intel/vulnerabilities/id/faad339f-96d6-4937-a1f3-9d2d19bc6395?source=cve
2023-05-06T14:31:14.616Z
2023-07-12T04:38:52.528Z
2023-07-12T04:38:52.528Z
{'Vendor': 'billerickson', 'Product': 'Gallery Metabox', 'Versions': '*'}
CVE-2023-2131
Versions of INEA ME RTU firmware prior to 3.36 are vulnerable to OS command injection, which could allow an attacker to remotely execute arbitrary code.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-110-01
2023-04-17T20:21:31.950Z
2023-04-20T20:40:57.215Z
2023-04-20T20:40:57.215Z
{'Vendor': 'INEA', 'Product': 'ME RTU', 'Versions': '0'}
CVE-2023-2998
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14.
https://huntr.dev/bounties/8282d78e-f399-4bf4-8403-f39103a31e78
2023-05-31T00:00:00
2023-05-31T00:00:00
2023-05-31T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-2832
SQL Injection in GitHub repository unilogies/bumsys prior to 2.2.0.
https://huntr.dev/bounties/37b80402-0edf-4f26-a668-b6f8b48dcdfb
2023-05-22T10:30:38.565Z
2023-05-22T10:43:44.187Z
2023-05-22T10:43:44.187Z
{'Vendor': 'unilogies', 'Product': 'unilogies/bumsys', 'Versions': 'unspecified'}
CVE-2023-2218
A vulnerability has been found in SourceCodester Task Reminder System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226984.
https://vuldb.com/?id.226984
2023-04-21T06:42:31.869Z
2023-04-21T11:00:06.238Z
2023-10-22T14:51:20.993Z
{'Vendor': 'SourceCodester', 'Product': 'Task Reminder System', 'Versions': '1.0'}
CVE-2023-2648
A vulnerability was found in Weaver E-Office 9.5. It has been classified as critical. This affects an unknown part of the file /inc/jquery/uploadify/uploadify.php. The manipulation of the argument Filedata leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228777 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.228777
2023-05-11T05:32:57.638Z
2023-05-11T08:00:04.941Z
2023-10-23T05:45:31.196Z
{'Vendor': 'Weaver', 'Product': 'E-Office', 'Versions': '9.5'}
CVE-2023-2062
Missing Password Field Masking vulnerability in Mitsubishi Electric Corporation EtherNet/IP configuration tools SW1DNN-EIPCT-BD and SW1DNN-EIPCTFX5-BD allows a remote unauthenticated attacker to know the password for MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP. This vulnerability results in authentication bypass vulnerability, which allows the attacker to access MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP via FTP.
https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2023-004.pdf
2023-04-14T08:44:07.523Z
2023-06-02T04:04:28.648Z
2023-06-02T04:04:28.648Z
{'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'EtherNet/IP Configuration tool for RJ71EIP91 SW1DNN-EIPCT-BD', 'Versions': 'all versions'}
CVE-2023-2598
A flaw was found in the fixed buffer registration code for io_uring (io_sqe_buffer_register in io_uring/rsrc.c) in the Linux kernel that allows out-of-bounds access to physical memory beyond the end of the buffer. This flaw enables full local privilege escalation.
https://www.openwall.com/lists/oss-security/2023/05/08/3
2023-05-09T00:00:00
2023-06-01T00:00:00
2023-07-03T00:00:00
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Kernel prior to 6.4-rc1'}
CVE-2023-2961
A segmentation fault flaw was found in the Advancecomp package. This may lead to decreased availability.
https://bugzilla.redhat.com/show_bug.cgi?id=2210768
2023-05-29T00:00:00
2023-06-06T00:00:00
2023-06-06T00:00:00
{'Vendor': 'n/a', 'Product': 'advancecomp', 'Versions': 'advancecomp 2.5'}
CVE-2023-2824
A vulnerability was found in SourceCodester Dental Clinic Appointment Reservation System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/service.php of the component POST Parameter Handler. The manipulation of the argument service leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-229598 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.229598
2023-05-20T06:49:18.481Z
2023-05-20T08:00:05.761Z
2023-10-23T06:50:12.922Z
{'Vendor': 'SourceCodester', 'Product': 'Dental Clinic Appointment Reservation System', 'Versions': '1.0'}
CVE-2023-2936
Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
2023-05-27T19:39:14.649Z
2023-05-30T21:31:40.505Z
2023-05-30T21:31:40.505Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'}
CVE-2023-2465
Inappropriate implementation in CORS in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html
2023-05-01T23:09:50.448Z
2023-05-02T23:47:59.069Z
2023-05-02T23:47:59.069Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.63'}
CVE-2023-2035
A vulnerability has been found in Campcodes Video Sharing Website 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file signup.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225913 was assigned to this vulnerability.
https://vuldb.com/?id.225913
2023-04-14T06:20:51.160Z
2023-04-14T06:31:03.450Z
2023-10-22T09:40:20.831Z
{'Vendor': 'Campcodes', 'Product': 'Video Sharing Website', 'Versions': '1.0'}
CVE-2023-2520
A vulnerability was found in Caton Prime 2.1.2.51.e8d7225049(202303031001) and classified as critical. This issue affects some unknown processing of the file cgi-bin/tools_ping.cgi?action=Command of the component Ping Handler. The manipulation of the argument Destination leads to command injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-228011. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.228011
2023-05-04T15:56:26.560Z
2023-05-04T16:31:04.913Z
2023-10-23T05:21:07.546Z
{'Vendor': 'Caton', 'Product': 'Prime', 'Versions': '2.1.2.51.e8d7225049(202303031001)'}
CVE-2023-2170
The TaxoPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Related Posts functionality in versions up to, and including, 3.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Editor+ permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e98ed932-4e4c-4127-ae72-500e2a34f371?source=cve
2023-04-18T20:39:26.474Z
2023-04-19T09:38:19.750Z
2023-04-19T09:38:19.750Z
{'Vendor': 'stevejburge', 'Product': 'TaxoPress is the WordPress Tag, Category, and Taxonomy Manager', 'Versions': '*'}
CVE-2023-2873
A vulnerability classified as critical was found in Twister Antivirus 8. This vulnerability affects the function 0x804f2143/0x804f217f/0x804f214b/0x80800043 in the library filppd.sys of the component IoControlCode Handler. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229852. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.229852
2023-05-24T17:17:52.596Z
2023-05-24T18:00:05.170Z
2023-10-23T07:01:11.289Z
{'Vendor': 'Twister', 'Product': 'Antivirus', 'Versions': '8'}
CVE-2023-2259
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository alfio-event/alf.io prior to 2.0-M4-2304.
https://huntr.dev/bounties/e753bce0-ce82-463b-b344-2f67b39b60ff
2023-04-24T00:00:00
2023-04-24T00:00:00
2023-04-24T00:00:00
{'Vendor': 'alfio-event', 'Product': 'alfio-event/alf.io', 'Versions': 'unspecified'}
CVE-2023-2609
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1531.
https://huntr.dev/bounties/1679be5a-565f-4a44-a430-836412a0b622
2023-05-09T00:00:00
2023-05-09T00:00:00
2023-12-23T07:06:22.968939
{'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'}
CVE-2023-2691
A vulnerability, which was classified as problematic, was found in SourceCodester Personnel Property Equipment System 1.0. Affected is an unknown function of the file admin/add_item.php of the component POST Parameter Handler. The manipulation of the argument item_name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228972.
https://vuldb.com/?id.228972
2023-05-14T07:44:04.858Z
2023-05-14T08:31:03.372Z
2023-10-23T06:12:22.888Z
{'Vendor': 'SourceCodester', 'Product': 'Personnel Property Equipment System', 'Versions': '1.0'}
CVE-2023-2384
A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been declared as problematic. This vulnerability affects unknown code of the file scgi-bin/platform.cgi?page=dmz_setup.htm of the component Web Management Interface. The manipulation of the argument dhcp.SecDnsIPByte2 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227662 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227662
2023-04-28T11:48:25.137Z
2023-04-28T17:31:04.548Z
2023-10-22T18:44:03.043Z
{'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'}
CVE-2023-2804
A heap-based buffer overflow issue was discovered in libjpeg-turbo in h2v2_merged_upsample_internal() function of jdmrgext.c file. The vulnerability can only be exploited with 12-bit data precision for which the range of the sample data type exceeds the valid sample range, hence, an attacker could craft a 12-bit lossless JPEG image that contains out-of-range 12-bit samples. An application attempting to decompress such image using merged upsampling would lead to segmentation fault or buffer overflows, causing an application to crash.
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/675
2023-05-19T00:00:00
2023-05-25T00:00:00
2023-05-25T00:00:00
{'Vendor': 'n/a', 'Product': 'libjpeg-turbo', 'Versions': 'Fixed in libjpeg-turbo v3.0 (beta2)'}
CVE-2023-2107
A vulnerability, which was classified as critical, was found in IBOS 4.5.5. Affected is an unknown function of the file file/personal/del&op=recycle. The manipulation of the argument fids leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226110 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.226110
2023-04-15T13:46:17.678Z
2023-04-15T14:00:06.289Z
2023-10-22T14:15:56.593Z
{'Vendor': 'n/a', 'Product': 'IBOS', 'Versions': '4.5.5'}
CVE-2023-2557
The WPCS – WordPress Currency Switcher Professional plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save function in versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to edit an arbitrary custom drop-down currency switcher.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d4c79242-5c89-40c0-abcc-c112f7a64a74?source=cve
2023-05-05T19:41:17.892Z
2023-06-09T05:33:35.241Z
2023-06-09T05:33:35.241Z
{'Vendor': 'realmag777', 'Product': 'WPCS – WordPress Currency Switcher Professional', 'Versions': '*'}
CVE-2023-2042
A vulnerability, which was classified as problematic, has been found in DataGear up to 4.5.1. Affected by this issue is some unknown functionality of the component JDBC Server Handler. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225920. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.225920
2023-04-14T06:39:02.719Z
2023-04-14T09:00:08.369Z
2023-10-22T09:48:53.169Z
{'Vendor': 'n/a', 'Product': 'DataGear', 'Versions': '4.5.0, 4.5.1'}
CVE-2023-2412
A vulnerability was found in SourceCodester AC Repair and Services System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-227706 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.227706
2023-04-28T16:30:50.808Z
2023-04-28T23:31:03.979Z
2023-10-22T19:06:00.142Z
{'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'}
CVE-2023-2941
Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
2023-05-27T19:39:15.280Z
2023-05-30T21:31:41.432Z
2023-05-30T21:31:41.432Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'}
CVE-2023-2296
The Loginizer WordPress plugin before 1.7.9 does not escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/8126ff73-c0e5-4c1b-ba10-2e51f690521e
2023-04-26T09:47:45.470Z
2023-05-30T07:49:21.849Z
2023-05-30T07:49:21.849Z
{'Vendor': 'Unknown', 'Product': 'Loginizer', 'Versions': '1.7.8'}
CVE-2023-2279
The WP Directory Kit plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.1. This is due to missing or incorrect nonce validation on the 'admin_page_display' function. This makes it possible for unauthenticated attackers to delete or change plugin settings, import demo data, modify or delete Directory Kit related posts and terms via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Partial patches were made avilable in versions 1.2.0 and 1.2.1 but the issue was not fully patched until 1.2.2
https://www.wordfence.com/threat-intel/vulnerabilities/id/8a7a6da3-d67c-42b3-8826-7e7fc9b938b4?source=cve
2023-04-25T11:47:11.005Z
2023-08-31T05:33:12.671Z
2023-08-31T05:33:12.671Z
{'Vendor': 'listingthemes', 'Product': 'WP Directory Kit', 'Versions': '*'}
CVE-2023-2783
Mattermost Apps Framework fails to verify that a secret provided in the incoming webhook request allowing an attacker to modify the contents of the post sent by the Apps.
https://mattermost.com/security-updates
2023-05-18T10:17:10.305Z
2023-06-16T08:39:26.096Z
2023-06-16T08:39:26.096Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost App Framework', 'Versions': '0, 0, 7.10.0, 7.10.1, 7.8.5, 7.9.4'}
CVE-2023-2629
Improper Neutralization of Formula Elements in a CSV File in GitHub repository pimcore/customer-data-framework prior to 3.3.9.
https://huntr.dev/bounties/821ff465-4754-42d1-9376-813c17f16a01
2023-05-10T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/customer-data-framework', 'Versions': 'unspecified'}
CVE-2023-2500
The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 3.3.19 via deserialization of untrusted input from the 'go_pricing' shortcode 'data' parameter. This allows authenticated attackers, with subscriber-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
https://www.wordfence.com/threat-intel/vulnerabilities/id/f7686b11-97a8-4f09-bbfa-d77120cc35b7?source=cve
2023-05-03T14:57:19.467Z
2023-05-24T23:38:16.209Z
2023-05-24T23:38:16.209Z
{'Vendor': 'Granth', 'Product': 'Go Pricing - WordPress Responsive Pricing Tables', 'Versions': '*'}
CVE-2023-2150
A vulnerability, which was classified as critical, has been found in SourceCodester Task Reminder System 1.0. This issue affects some unknown processing of the file Master.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226271.
https://vuldb.com/?id.226271
2023-04-18T10:50:08.359Z
2023-04-18T13:00:05.441Z
2023-10-22T14:26:55.494Z
{'Vendor': 'SourceCodester', 'Product': 'Task Reminder System', 'Versions': '1.0'}
CVE-2023-2853
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Softmed SelfPatron allows Reflected XSS.This issue affects SelfPatron : before 2.0.
https://www.usom.gov.tr/bildirim/tr-23-0388
2023-05-23T18:31:47.722Z
2023-07-09T16:39:36.595Z
2023-07-09T16:56:12.905Z
{'Vendor': 'Softmed', 'Product': 'SelfPatron ', 'Versions': '0'}
CVE-2023-2916
The InfiniteWP Client plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 1.11.1 via the 'admin_notice' function. This can allow authenticated attackers with subscriber-level permissions or above to extract sensitive data including configuration. It can only be exploited if the plugin has not been configured yet. If combined with another arbitrary plugin installation and activation vulnerability, it may be possible to connect a site to InfiniteWP which would make remote management possible and allow for elevation of privileges.
https://www.wordfence.com/threat-intel/vulnerabilities/id/aa157c80-447f-4406-9e49-9cc6208b7b19?source=cve
2023-05-26T13:47:33.528Z
2023-08-15T08:32:58.963Z
2023-08-15T08:32:58.963Z
{'Vendor': 'infinitewp', 'Product': 'InfiniteWP Client', 'Versions': '*'}
CVE-2023-2445
Improper access control in Subscriptions Folder path filter in Devolutions Server 2023.1.1 and earlier allows attackers with administrator privileges to retrieve usage information on folders in user vaults via a specific folder name.
https://devolutions.net/security/advisories/DEVO-2023-0013/
2023-05-01T14:10:14.917Z
2023-05-02T13:11:06.405Z
2023-05-02T13:11:06.405Z
{'Vendor': 'Devolutions', 'Product': 'Devolutions Server', 'Versions': '0'}
CVE-2023-2015
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.8 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A reflected XSS was possible when creating new abuse reports which allows attackers to perform arbitrary actions on behalf of victims.
https://gitlab.com/gitlab-org/gitlab/-/issues/407137
2023-04-13T00:00:00
2023-06-07T00:00:00
2023-06-07T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '> 15.8, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'}
CVE-2023-2280
The WP Directory Kit plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the 'ajax_public' function in versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to delete or change plugin settings, import demo data, delete Directory Kit related posts and terms, and install arbitrary plugins. A partial patch was introduced in version 1.2.0 and an additional partial patch was introduced in version 1.2.2, but the issue was not fully patched until 1.2.3.
https://www.wordfence.com/threat-intel/vulnerabilities/id/abb1a758-5c16-4841-b1c7-0705ab16b328?source=cve
2023-04-25T11:47:56.570Z
2023-06-09T05:33:26.093Z
2023-06-09T05:33:26.093Z
{'Vendor': 'listingthemes', 'Product': 'WP Directory Kit', 'Versions': '*'}
CVE-2023-2795
The CodeColorer WordPress plugin before 0.10.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/2d6ecd21-3dd4-423d-80e7-277c45080a9f
2023-05-18T12:45:42.347Z
2023-06-27T13:17:25.903Z
2023-06-27T13:17:25.903Z
{'Vendor': 'Unknown', 'Product': 'CodeColorer', 'Versions': '0'}
CVE-2023-2845
Improper Access Control in GitHub repository cloudexplorer-dev/cloudexplorer-lite prior to v1.1.0.
https://github.com/cloudexplorer-dev/cloudexplorer-lite/commit/d9f55a44e579d312977b02317b2020de758b763a
2023-05-23T00:00:00
2023-05-23T00:00:00
2023-05-23T00:00:00
{'Vendor': 'cloudexplorer-dev', 'Product': 'cloudexplorer-dev/cloudexplorer-lite', 'Versions': 'unspecified'}
CVE-2023-2146
A vulnerability was found in Campcodes Online Thesis Archiving System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file classes/Master.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226267.
https://vuldb.com/?id.226267
2023-04-18T10:47:09.512Z
2023-04-18T11:31:03.764Z
2023-10-22T14:22:02.798Z
{'Vendor': 'Campcodes', 'Product': 'Online Thesis Archiving System', 'Versions': '1.0'}
CVE-2023-2516
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.7.
https://huntr.dev/bounties/19470f0b-7094-4339-8d4a-4b5570b54716
2023-05-04T00:00:00
2023-05-05T00:00:00
2023-05-05T00:00:00
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-2003
Embedded malicious code vulnerability in Vision1210, in the build 5 of operating system version 4.3, which could allow a remote attacker to store base64-encoded malicious code in the device's data tables via the PCOM protocol, which can then be retrieved by a client and executed on the device.
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/embedded-malicious-code-vulnerability-unitronics-vision1210
2023-04-12T14:08:51.192Z
2023-07-13T11:25:03.096Z
2023-07-17T10:11:18.273Z
{'Vendor': 'Unitronics', 'Product': 'Vision1210', 'Versions': '4.3, build 5'}
CVE-2023-2453
There is insufficient sanitization of tainted file names that are directly concatenated with a path that is subsequently passed to a ‘require_once’ statement. This allows arbitrary files with the ‘.php’ extension for which the absolute path is known to be included and executed. There are no known means in PHPFusion through which an attacker can upload and target a ‘.php’ file payload.
https://www.synopsys.com/blogs/software-security/cyrc-vulnerability-advisory-cve-2023-2453/
2023-05-01T16:45:27.226Z
2023-09-05T14:39:10.011Z
2023-09-05T14:39:10.011Z
{'Vendor': 'PHPFusion', 'Product': 'PHPFusion', 'Versions': '0'}
CVE-2023-2900
A vulnerability was found in NFine Rapid Development Platform 20230511. It has been classified as problematic. Affected is an unknown function of the file /Login/CheckLogin. The manipulation leads to use of weak hash. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-229974 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.229974
2023-05-25T20:36:35.687Z
2023-05-25T21:00:03.450Z
2023-10-23T07:06:03.898Z
{'Vendor': 'NFine', 'Product': 'Rapid Development Platform', 'Versions': '20230511'}
CVE-2023-2687
Buffer overflow in Platform CLI component in Silicon Labs Gecko SDK v4.2.1 and earlier allows user to overwrite limited structures on the heap.
https://github.com/SiliconLabs/gecko_sdk/releases
2023-05-12T16:13:16.672Z
2023-06-02T15:56:21.083Z
2023-06-02T15:56:21.083Z
{'Vendor': 'silabs.com', 'Product': 'Gecko SDK', 'Versions': '0'}
CVE-2023-2668
A vulnerability was found in SourceCodester Lost and Found Information System 1.0 and classified as critical. Affected by this issue is the function manager_category of the file admin/?page=categories/manage_category of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228884.
https://vuldb.com/?id.228884
2023-05-12T06:01:17.158Z
2023-05-12T07:00:06.598Z
2023-10-23T05:58:56.306Z
{'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'}