CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-2864 | A vulnerability was found in SourceCodester Online Jewelry Store 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file customer.php of the component POST Parameter Handler. The manipulation of the argument Custid leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229820. | https://vuldb.com/?id.229820 | 2023-05-24T09:37:04.501Z | 2023-05-24T10:31:03.723Z | 2023-10-23T06:55:05.541Z | {'Vendor': 'SourceCodester', 'Product': 'Online Jewelry Store', 'Versions': '1.0'} |
CVE-2023-2537 | null | null | 2023-05-05T06:52:30.958Z | 2023-05-05T08:19:47.490Z | 2023-05-05T08:30:58.647Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2370 | A vulnerability classified as critical has been found in SourceCodester Online DJ Management System 1.0. Affected is an unknown function of the file admin/events/manage_event.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-227646 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.227646 | 2023-04-28T11:19:16.647Z | 2023-04-28T13:31:03.936Z | 2023-10-22T18:26:58.850Z | {'Vendor': 'SourceCodester', 'Product': 'Online DJ Management System', 'Versions': '1.0'} |
CVE-2023-2665 | Storage of Sensitive Data in a Mechanism without Access Control in GitHub repository francoisjacquet/rosariosis prior to 11.0. | https://huntr.dev/bounties/42f38a84-8954-484d-b5ff-706ca0918194 | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | {'Vendor': 'francoisjacquet', 'Product': 'francoisjacquet/rosariosis', 'Versions': 'unspecified'} |
CVE-2023-2235 | A use-after-free vulnerability in the Linux Kernel Performance Events system can be exploited to achieve local privilege escalation.
The perf_group_detach function did not check the event's siblings' attach_state before calling add_event_to_groups(), but remove_on_exec made it possible to call list_del_event() on before detaching from their group, making it possible to use a dangling pointer causing a use-after-free vulnerability.
We recommend upgrading past commit fd0815f632c24878e325821943edccc7fde947a2.
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fd0815f632c24878e325821943edccc7fde947a2 | 2023-04-21T17:43:15.944Z | 2023-05-01T12:51:25.433Z | 2023-06-28T20:02:44.896Z | {'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '5.13'} |
CVE-2023-2059 | A vulnerability was found in DedeCMS 5.7.87. It has been rated as problematic. Affected by this issue is some unknown functionality of the file uploads/include/dialog/select_templets.php. The manipulation leads to path traversal: '..\filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225944. | https://vuldb.com/?id.225944 | 2023-04-14T08:39:24.082Z | 2023-04-14T14:00:07.347Z | 2023-10-22T13:52:44.438Z | {'Vendor': 'n/a', 'Product': 'DedeCMS', 'Versions': '5.7.87'} |
CVE-2023-2409 | A vulnerability, which was classified as critical, was found in SourceCodester AC Repair and Services System 1.0. This affects an unknown part of the file /admin/services/view_service.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227703. | https://vuldb.com/?id.227703 | 2023-04-28T16:30:40.677Z | 2023-04-28T22:31:05.443Z | 2023-10-22T19:02:20.666Z | {'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'} |
CVE-2023-2327 | Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/7336b71f-a36f-4ce7-a26d-c8335ac713d6 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2262 |
A buffer overflow vulnerability exists in the Rockwell Automation select 1756-EN* communication devices. If exploited, a threat actor could potentially leverage this vulnerability to perform a remote code execution. To exploit this vulnerability, a threat actor would have to send a maliciously crafted CIP request to device.
| https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140786 | 2023-04-24T21:35:54.200Z | 2023-09-20T15:20:23.700Z | 2023-09-20T15:47:00.968Z | {'Vendor': 'Rockwell Automation', 'Product': '1756-EN2T Series A, B, C', 'Versions': '<=5.008 & 5.028'} |
CVE-2023-2798 | Those using HtmlUnit to browse untrusted webpages may be vulnerable to Denial of service attacks (DoS). If HtmlUnit is running on user supplied web pages, an attacker may supply content that causes HtmlUnit to crash by a stack overflow. This effect may support a denial of service attack.This issue affects htmlunit before 2.70.0.
| https://github.com/HtmlUnit/htmlunit/commit/940dc7fd | 2023-05-18T14:33:09.974Z | 2023-05-25T13:54:52.191Z | 2023-05-25T13:54:52.191Z | {'Vendor': '', 'Product': '', 'Versions': '0'} |
CVE-2023-2632 | Jenkins Code Dx Plugin 3.1.0 and earlier stores Code Dx server API keys unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Item/Extended Read permission or access to the Jenkins controller file system. | https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3146 | 2023-05-10T15:00:45.214Z | 2023-05-16T17:54:11.737Z | 2023-05-16T17:54:11.737Z | {'Vendor': 'Jenkins', 'Product': 'Jenkins Code Dx Plugin', 'Versions': '0'} |
CVE-2023-2848 | Movim prior to version 0.22 is affected by a Cross-Site WebSocket Hijacking vulnerability. This was the result of a missing header validation. | https://github.com/movim/movim/commit/96372082acd3e5d778a2522a60a1805bf2af31f6 | 2023-05-23T10:05:08.661Z | 2023-09-14T11:36:50.521Z | 2023-09-14T11:36:50.521Z | {'Vendor': 'Movim', 'Product': 'Movim', 'Versions': '< 0.22'} |
CVE-2023-2761 | The User Activity Log WordPress plugin before 1.6.3 does not properly sanitise and escape the `txtsearch` parameter before using it in a SQL statement in some admin pages, leading to a SQL injection exploitable by high privilege users such as admin. | https://wpscan.com/vulnerability/8c82d317-f9f9-4e25-a7f1-43edb77e8aba | 2023-05-17T15:09:09.490Z | 2023-07-24T10:20:26.121Z | 2023-07-24T10:20:26.121Z | {'Vendor': 'Unknown', 'Product': 'User Activity Log', 'Versions': '0'} |
CVE-2023-2331 | Unquoted service Path or Element vulnerability in 42Gears Surelock Windows SureLock Service (NixService.Exe) on Windows application will allows to insert arbitrary code into the service.
This issue affects Surelock Windows : from 2.3.12 through 2.40.0.
| https://www.42gears.com/security-and-compliance | 2023-04-27T09:20:29.336Z | 2023-04-27T11:51:45.946Z | 2023-04-28T07:16:21.298Z | {'Vendor': '42Gears', 'Product': 'Surelock Windows ', 'Versions': '2.3.12'} |
CVE-2023-2624 | The KiviCare WordPress plugin before 3.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrator | https://wpscan.com/vulnerability/dc3a841d-a95b-462e-be4b-acaa44e77264 | 2023-05-10T09:40:12.422Z | 2023-06-27T13:17:23.450Z | 2023-06-27T13:17:23.450Z | {'Vendor': 'Unknown', 'Product': 'KiviCare', 'Versions': '0'} |
CVE-2023-2448 | The UserPro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'userpro_shortcode_template' function in versions up to, and including, 5.1.4. This makes it possible for unauthenticated attackers to arbitrary shortcode execution. An attacker can leverage CVE-2023-2446 to get sensitive information via shortcode. | https://www.wordfence.com/threat-intel/vulnerabilities/id/7cbe9175-4a6f-4eb6-8d31-9a9fda9b4f40?source=cve | 2023-05-01T14:19:36.551Z | 2023-11-22T15:33:29.321Z | 2023-11-22T15:33:29.321Z | {'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'} |
CVE-2023-2366 | A vulnerability was found in SourceCodester Faculty Evaluation System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file ajax.php?action=delete_class. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227642 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.227642 | 2023-04-28T11:08:09.598Z | 2023-04-28T12:00:05.334Z | 2023-10-22T16:14:47.124Z | {'Vendor': 'SourceCodester', 'Product': 'Faculty Evaluation System', 'Versions': '1.0'} |
CVE-2023-2736 | The Groundhogg plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.7.9.8. This is due to missing nonce validation in the 'ajax_edit_contact' function. This makes it possible for authenticated attackers to receive the auto login link via shortcode and then modify the assigned user to the auto login link to elevate verified user privileges via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/9bf472f1-5980-48ee-aa10-aad19b6f2456?source=cve | 2023-05-16T13:17:27.854Z | 2023-05-20T02:03:23.875Z | 2023-05-20T02:03:23.875Z | {'Vendor': 'trainingbusinesspros', 'Product': 'WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg', 'Versions': '*'} |
CVE-2023-2223 | The Login rebuilder WordPress plugin before 2.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/7b356b82-5d03-4f70-b4ce-f1405304bb52 | 2023-04-21T10:24:12.529Z | 2023-05-30T07:49:20.226Z | 2023-05-30T07:49:20.226Z | {'Vendor': 'Unknown', 'Product': 'Login rebuilder', 'Versions': '0'} |
CVE-2023-2673 | Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks. | https://cert.vde.com/en/advisories/VDE-2023-010/ | 2023-05-12T06:13:26.259Z | 2023-06-13T06:16:18.557Z | 2023-08-25T05:48:41.651Z | {'Vendor': 'PHOENIX CONTACT', 'Product': 'FL MGUARD 2102', 'Versions': '0'} |
CVE-2023-2389 | A vulnerability, which was classified as problematic, was found in Netgear SRX5308 up to 4.3.5-3. This affects an unknown part of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.emailServer leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227667. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227667 | 2023-04-28T11:48:45.164Z | 2023-04-28T20:00:05.733Z | 2023-10-22T18:50:08.939Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2809 | Plaintext credential usage vulnerability in Sage 200 Spain 2023.38.001 version, the exploitation of which could allow a remote attacker to extract SQL database credentials from the DLL application. This vulnerability could be linked to known techniques to obtain remote execution of MS SQL commands and escalate privileges on Windows systems because the credentials are stored in plaintext. | https://www.incibe.es/en/incibe-cert/notices/aviso/use-cleartext-credentials-sage-200 | 2023-05-19T10:54:17.589Z | 2023-10-04T10:49:56.429Z | 2023-12-19T14:34:45.575Z | {'Vendor': 'Sage', 'Product': 'Sage 200 Spain', 'Versions': '2023.38.001'} |
CVE-2023-2808 | Mattermost fails to normalize UTF confusable characters when determining if a preview should be generated for a hyperlink, allowing an attacker to trigger link preview on a disallowed domain using a specially crafted link.
| https://mattermost.com/security-updates/ | 2023-05-19T09:34:03.996Z | 2023-05-29T09:07:34.768Z | 2023-05-29T09:07:34.768Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.1.9, 7.8.4, 7.9.3, 7.10'} |
CVE-2023-2367 | A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/manage_academic.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227643. | https://vuldb.com/?id.227643 | 2023-04-28T11:08:13.008Z | 2023-04-28T12:31:03.172Z | 2023-10-22T18:23:19.368Z | {'Vendor': 'SourceCodester', 'Product': 'Faculty Evaluation System', 'Versions': '1.0'} |
CVE-2023-2737 | Improper log permissions in SafeNet Authentication Service Version 3.4.0 on Windows allows an authenticated attacker to cause a denial of service via local privilege escalation.
| https://supportportal.thalesgroup.com/csm?id=kb_article_view&sys_kb_id=08f460ba47bba550c0e42e61e36d432f&sysparm_article=KB0027485 | 2023-05-16T13:48:23.279Z | 2023-08-16T15:45:29.540Z | 2023-08-16T15:45:29.540Z | {'Vendor': 'Thales', 'Product': 'SafeNet Authtentication Service Agent', 'Versions': 'SafeNet Authentication Service Agent '} |
CVE-2023-2222 | null | null | 2023-04-21T08:11:32.142Z | null | 2023-10-03T15:46:24.436Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2672 | A vulnerability classified as critical has been found in SourceCodester Lost and Found Information System 1.0. Affected is an unknown function of the file items/view.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228888. | https://vuldb.com/?id.228888 | 2023-05-12T06:01:32.348Z | 2023-05-12T09:00:05.619Z | 2023-10-23T06:03:49.823Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
CVE-2023-2388 | A vulnerability, which was classified as problematic, has been found in Netgear SRX5308 up to 4.3.5-3. Affected by this issue is some unknown functionality of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.fromAddr leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227666 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227666 | 2023-04-28T11:48:40.540Z | 2023-04-28T19:31:03.818Z | 2023-10-22T18:48:55.770Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2019 | A flaw was found in the Linux kernel's netdevsim device driver, within the scheduling of events. This issue results from the improper management of a reference count. This may allow an attacker to create a denial of service condition on the system. | https://bugzilla.redhat.com/show_bug.cgi?id=2189137 | 2023-04-13T00:00:00 | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | {'Vendor': 'n/a', 'Product': "Linux kernel's netdevsim device driver", 'Versions': 'Fixed in kernel v6.0-rc1'} |
CVE-2023-2449 | The UserPro plugin for WordPress is vulnerable to unauthorized password resets in versions up to, and including 5.1.1. This is due to the plugin using native password reset functionality, with insufficient validation on the password reset function (userpro_process_form). The function uses the plaintext value of a password reset key instead of a hashed value which means it can easily be retrieved and subsequently used. An attacker can leverage CVE-2023-2448 and CVE-2023-2446, or another vulnerability like SQL Injection in another plugin or theme installed on the site to successfully exploit this vulnerability. | https://www.wordfence.com/threat-intel/vulnerabilities/id/de9be7bc-4f8a-4393-8ebb-1b1f141b7585?source=cve | 2023-05-01T14:20:24.641Z | 2023-11-22T15:33:36.801Z | 2023-11-22T15:33:36.801Z | {'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'} |
CVE-2023-2760 | An SQL injection vulnerability exists in TapHome core HandleMessageUpdateDevicePropertiesRequest function before version 2023.2, allowing low privileged users to inject arbitrary SQL directives into an SQL query and execute arbitrary SQL commands and get full reading access. This may also lead to limited write access and temporary Denial-of-Service. | https://claroty.com/team82/disclosure-dashboard/cve-2023-2759 | 2023-05-17T14:21:50.584Z | 2023-07-17T06:14:32.851Z | 2023-08-09T10:48:53.246Z | {'Vendor': 'TAPHOME', 'Product': 'Core Platform', 'Versions': '0.0'} |
CVE-2023-2330 | The Caldera Forms Google Sheets Connector WordPress plugin before 1.3 does not have CSRF check when updating its Access Code, which could allow attackers to make logged in admin change the access code to an arbitrary one via a CSRF attack | https://wpscan.com/vulnerability/fa8ccdd0-7b23-4b12-9aa9-4b29d47256b8 | 2023-04-27T09:19:05.911Z | 2023-07-17T13:29:57.798Z | 2023-08-16T07:46:39.924Z | {'Vendor': 'Unknown', 'Product': 'Caldera Forms Google Sheets Connector', 'Versions': '0'} |
CVE-2023-2625 | A vulnerability exists that can be exploited by an authenticated client that is connected to the same network segment as the CoreTec 4, having any level of access VIEWER to ADMIN. To exploit the vulnerability the attacker can inject shell commands through a particular field of the web user interface that will be executed by the system. | https://search.abb.com/library/Download.aspx?DocumentID=8DBD000163&LanguageCode=en&DocumentPartId=&Action=Launch | 2023-05-10T10:31:57.900Z | 2023-06-28T16:15:46.529Z | 2023-06-28T16:15:46.529Z | {'Vendor': 'Hitachi Energy', 'Product': 'TXpert Hub CoreTec 4', 'Versions': 'TXpert Hub CoreTec 4 version 2.0.*, TXpert Hub CoreTec 4 version 2.1.*, TXpert Hub CoreTec 4 version 2.2.*, TXpert Hub CoreTec 4 version 2.3.*, TXpert Hub CoreTec 4 version 2.4.*, TXpert Hub CoreTec 4 version 3.0.1'} |
CVE-2023-2275 | The WooCommerce Multivendor Marketplace – REST API plugin for WordPress is vulnerable to unauthorized access of data and addition of data due to a missing capability check on the 'get_item', 'get_order_notes' and 'add_order_note' functions in versions up to, and including, 1.5.3. This makes it possible for authenticated attackers with subscriber privileges or above, to view the order details and order notes, and add order notes. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b0520601-7e5c-412d-a8da-df1bf8ce28df?source=cve | 2023-04-25T11:42:13.932Z | 2023-06-09T05:33:28.997Z | 2023-06-09T05:33:28.997Z | {'Vendor': 'wclovers', 'Product': 'WooCommerce Multivendor Marketplace – REST API', 'Versions': '*'} |
CVE-2023-2326 | The Gravity Forms Google Sheet Connector WordPress plugin before 1.3.5, gsheetconnector-gravityforms-pro WordPress plugin through 1.3.5 does not have CSRF check when updating its Access Code, which could allow attackers to make logged in admin change the access code to an arbitrary one via a CSRF attack | https://wpscan.com/vulnerability/f922695a-b803-4edf-aadc-80c79d99bebb | 2023-04-27T08:38:06.515Z | 2023-06-27T13:17:25.086Z | 2023-06-27T13:17:25.086Z | {'Vendor': 'Unknown', 'Product': 'Gravity Forms Google Sheet Connector', 'Versions': '0'} |
CVE-2023-2776 | A vulnerability was found in code-projects Simple Photo Gallery 1.0. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to unrestricted upload. The attack can be initiated remotely. VDB-229282 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.229282 | 2023-05-17T17:00:09.409Z | 2023-05-17T20:00:05.422Z | 2023-10-23T06:39:14.182Z | {'Vendor': 'code-projects', 'Product': 'Simple Photo Gallery', 'Versions': '1.0'} |
CVE-2023-2263 |
The Rockwell Automation Kinetix 5700 DC Bus Power Supply Series A is vulnerable to CIP fuzzing. The new ENIP connections cannot be established if impacted by this vulnerability, which prohibits operational capabilities of the device resulting in a denial-of-service attack.
| https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140029 | 2023-04-24T21:50:22.174Z | 2023-07-18T15:01:24.115Z | 2023-07-18T15:01:24.115Z | {'Vendor': 'Rockwell Automation', 'Product': 'Kinetix 5700 DC Bus Power Supply Series A ', 'Versions': '13.001'} |
CVE-2023-2799 | A vulnerability, which was classified as problematic, has been found in cnoa OA up to 5.1.1.5. Affected by this issue is some unknown functionality of the file /index.php?app=main&func=passport&action=login. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229376. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.229376 | 2023-05-18T15:02:51.328Z | 2023-05-18T15:31:03.350Z | 2023-10-23T06:42:53.758Z | {'Vendor': 'cnoa', 'Product': 'OA', 'Versions': '5.1.1.0, 5.1.1.1, 5.1.1.2, 5.1.1.3, 5.1.1.4, 5.1.1.5'} |
CVE-2023-2633 | Jenkins Code Dx Plugin 3.1.0 and earlier does not mask Code Dx server API keys displayed on the configuration form, increasing the potential for attackers to observe and capture them. | https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3146 | 2023-05-10T15:00:46.137Z | 2023-05-16T17:56:40.703Z | 2023-05-16T17:56:40.703Z | {'Vendor': 'Jenkins', 'Product': 'Jenkins Code Dx Plugin', 'Versions': '0'} |
CVE-2023-2058 | A vulnerability was found in EyouCms up to 1.6.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /yxcms/index.php?r=admin/extendfield/mesedit&tabid=12&id=4 of the component HTTP POST Request Handler. The manipulation of the argument web_ico leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225943. | https://vuldb.com/?id.225943 | 2023-04-14T08:35:23.366Z | 2023-04-14T14:00:05.983Z | 2023-10-22T13:51:31.107Z | {'Vendor': 'n/a', 'Product': 'EyouCms', 'Versions': '1.6.0, 1.6.1, 1.6.2'} |
CVE-2023-2408 | A vulnerability, which was classified as critical, has been found in SourceCodester AC Repair and Services System 1.0. Affected by this issue is some unknown functionality of the file services/view.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227702 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.227702 | 2023-04-28T16:30:38.454Z | 2023-04-28T22:31:04.313Z | 2023-10-22T19:01:07.494Z | {'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'} |
CVE-2023-2721 | Use after free in Navigation in Google Chrome prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html | 2023-05-15T21:16:57.843Z | 2023-05-16T18:45:33.757Z | 2023-05-16T18:45:33.757Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.126'} |
CVE-2023-2371 | A vulnerability classified as critical was found in SourceCodester Online DJ Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/inquiries/view_details.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227647. | https://vuldb.com/?id.227647 | 2023-04-28T11:19:19.930Z | 2023-04-28T13:31:05.071Z | 2023-10-22T18:28:11.981Z | {'Vendor': 'SourceCodester', 'Product': 'Online DJ Management System', 'Versions': '1.0'} |
CVE-2023-2664 | In Xpdf 4.04 (and earlier), a PDF object loop in the embedded file tree leads to infinite recursion and a stack overflow.
| https://forum.xpdfreader.com/viewtopic.php?t=42422 | 2023-05-11T20:19:40.531Z | 2023-05-11T20:21:25.821Z | 2023-05-11T20:21:25.821Z | {'Vendor': 'Xpdf', 'Product': 'Xpdf', 'Versions': '4.04'} |
CVE-2023-2234 | Union variant confusion allows any malicious BT controller to execute arbitrary code on the Zephyr host. | https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-fx9g-8fr2-q899 | 2023-04-21T17:15:56.122Z | 2023-07-10T04:33:35.254Z | 2023-07-10T04:33:35.254Z | {'Vendor': 'zephyrproject-rtos', 'Product': 'Zephyr', 'Versions': '*'} |
CVE-2023-2023 | The Custom 404 Pro WordPress plugin before 3.7.3 does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting. | https://wpscan.com/vulnerability/8859843a-a8c2-4f7a-8372-67049d6ea317 | 2023-04-13T14:56:16.541Z | 2023-05-30T07:49:21.025Z | 2023-05-30T07:49:21.025Z | {'Vendor': 'Unknown', 'Product': 'Custom 404 Pro', 'Versions': '0'} |
CVE-2023-2473 | A vulnerability was found in Dreamer CMS up to 4.1.3. It has been declared as problematic. This vulnerability affects the function updatePwd of the file UserController.java of the component Password Hash Calculation. The manipulation leads to inefficient algorithmic complexity. The attack can be initiated remotely. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227860. | https://vuldb.com/?id.227860 | 2023-05-02T11:43:40.581Z | 2023-05-02T12:00:09.669Z | 2023-10-23T05:13:48.158Z | {'Vendor': 'n/a', 'Product': 'Dreamer CMS', 'Versions': '4.1.0, 4.1.1, 4.1.2, 4.1.3'} |
CVE-2023-2189 | The Elementor Addons, Widgets and Enhancements – Stax plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the toggle_widget function in versions up to, and including, 1.4.3. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to enable or disable Elementor widgets. | https://www.wordfence.com/threat-intel/vulnerabilities/id/926550bb-265d-4811-a375-10c47e9fb4d6?source=cve | 2023-04-19T19:39:11.493Z | 2023-06-09T05:33:24.777Z | 2023-06-09T05:33:24.777Z | {'Vendor': 'staxwp', 'Product': 'Elementor Addons, Widgets and Enhancements – Stax', 'Versions': '*'} |
CVE-2023-2865 | A vulnerability was found in SourceCodester Theme Park Ticketing System 1.0. It has been classified as critical. This affects an unknown part of the file print_ticket.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-229821 was assigned to this vulnerability. | https://vuldb.com/?id.229821 | 2023-05-24T09:38:59.420Z | 2023-05-24T10:31:04.666Z | 2023-10-23T06:56:18.667Z | {'Vendor': 'SourceCodester', 'Product': 'Theme Park Ticketing System', 'Versions': '1.0'} |
CVE-2023-2166 | A null pointer dereference issue was found in can protocol in net/can/af_can.c in the Linux before Linux. ml_priv may not be initialized in the receive path of CAN frames. A local user could use this flaw to crash the system or potentially cause a denial of service. | https://lore.kernel.org/lkml/CAO4mrfcV_07hbj8NUuZrA8FH-kaRsrFy-2metecpTuE5kKHn5w%40mail.gmail.com/ | 2023-04-18T00:00:00 | 2023-04-19T00:00:00 | 2023-04-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'Linux', 'Versions': 'Linux Kernel version prior to Kernel 6.1 RC9'} |
CVE-2023-2536 | null | null | 2023-05-05T06:52:12.918Z | 2023-05-05T08:12:36.131Z | 2023-05-05T08:30:43.827Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2977 | A vulnerbility was found in OpenSC. This security flaw cause a buffer overrun vulnerability in pkcs15 cardos_have_verifyrc_package. The attacker can supply a smart card package with malformed ASN1 context. The cardos_have_verifyrc_package function scans the ASN1 buffer for 2 tags, where remaining length is wrongly caculated due to moved starting pointer. This leads to possible heap-based buffer oob read. In cases where ASAN is enabled while compiling this causes a crash. Further info leak or more damage is possible. | https://access.redhat.com/security/cve/CVE-2023-2977 | 2023-05-30T00:00:00 | 2023-06-01T00:00:00 | 2023-08-17T18:06:58.134977 | {'Vendor': 'n/a', 'Product': 'OpenSC', 'Versions': 'opensc-0.23.0'} |
CVE-2023-2424 | A vulnerability was found in DedeCMS 5.7.106 and classified as critical. Affected by this issue is the function UpDateMemberModCache of the file uploads/dede/config.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227750 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.227750 | 2023-04-29T07:00:58.578Z | 2023-04-29T07:31:03.339Z | 2023-10-23T05:10:08.205Z | {'Vendor': 'n/a', 'Product': 'DedeCMS', 'Versions': '5.7.106'} |
CVE-2023-2074 | A vulnerability was found in Campcodes Online Traffic Offense Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /classes/Master.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226052. | https://vuldb.com/?id.226052 | 2023-04-14T18:33:12.101Z | 2023-04-14T19:00:07.607Z | 2023-10-22T13:55:10.773Z | {'Vendor': 'Campcodes', 'Product': 'Online Traffic Offense Management System', 'Versions': '1.0'} |
CVE-2023-2561 | The Gallery Metabox for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the gallery_remove function in versions up to, and including, 1.5. This makes it possible for subscriber-level attackers to modify galleries attached to posts and pages with this plugin. | https://www.wordfence.com/threat-intel/vulnerabilities/id/faad339f-96d6-4937-a1f3-9d2d19bc6395?source=cve | 2023-05-06T14:31:14.616Z | 2023-07-12T04:38:52.528Z | 2023-07-12T04:38:52.528Z | {'Vendor': 'billerickson', 'Product': 'Gallery Metabox', 'Versions': '*'} |
CVE-2023-2131 | Versions of INEA ME RTU firmware prior to 3.36 are vulnerable to OS command injection, which could allow an attacker to remotely execute arbitrary code. | https://www.cisa.gov/news-events/ics-advisories/icsa-23-110-01 | 2023-04-17T20:21:31.950Z | 2023-04-20T20:40:57.215Z | 2023-04-20T20:40:57.215Z | {'Vendor': 'INEA', 'Product': 'ME RTU', 'Versions': '0'} |
CVE-2023-2998 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.14. | https://huntr.dev/bounties/8282d78e-f399-4bf4-8403-f39103a31e78 | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | 2023-05-31T00:00:00 | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-2832 | SQL Injection in GitHub repository unilogies/bumsys prior to 2.2.0. | https://huntr.dev/bounties/37b80402-0edf-4f26-a668-b6f8b48dcdfb | 2023-05-22T10:30:38.565Z | 2023-05-22T10:43:44.187Z | 2023-05-22T10:43:44.187Z | {'Vendor': 'unilogies', 'Product': 'unilogies/bumsys', 'Versions': 'unspecified'} |
CVE-2023-2218 | A vulnerability has been found in SourceCodester Task Reminder System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226984. | https://vuldb.com/?id.226984 | 2023-04-21T06:42:31.869Z | 2023-04-21T11:00:06.238Z | 2023-10-22T14:51:20.993Z | {'Vendor': 'SourceCodester', 'Product': 'Task Reminder System', 'Versions': '1.0'} |
CVE-2023-2648 | A vulnerability was found in Weaver E-Office 9.5. It has been classified as critical. This affects an unknown part of the file /inc/jquery/uploadify/uploadify.php. The manipulation of the argument Filedata leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228777 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.228777 | 2023-05-11T05:32:57.638Z | 2023-05-11T08:00:04.941Z | 2023-10-23T05:45:31.196Z | {'Vendor': 'Weaver', 'Product': 'E-Office', 'Versions': '9.5'} |
CVE-2023-2062 | Missing Password Field Masking vulnerability in Mitsubishi Electric Corporation EtherNet/IP configuration tools SW1DNN-EIPCT-BD and SW1DNN-EIPCTFX5-BD allows a remote unauthenticated attacker to know the password for MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP. This vulnerability results in authentication bypass vulnerability, which allows the attacker to access MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP via FTP. | https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2023-004.pdf | 2023-04-14T08:44:07.523Z | 2023-06-02T04:04:28.648Z | 2023-06-02T04:04:28.648Z | {'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'EtherNet/IP Configuration tool for RJ71EIP91 SW1DNN-EIPCT-BD', 'Versions': 'all versions'} |
CVE-2023-2598 | A flaw was found in the fixed buffer registration code for io_uring (io_sqe_buffer_register in io_uring/rsrc.c) in the Linux kernel that allows out-of-bounds access to physical memory beyond the end of the buffer. This flaw enables full local privilege escalation. | https://www.openwall.com/lists/oss-security/2023/05/08/3 | 2023-05-09T00:00:00 | 2023-06-01T00:00:00 | 2023-07-03T00:00:00 | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Kernel prior to 6.4-rc1'} |
CVE-2023-2961 | A segmentation fault flaw was found in the Advancecomp package. This may lead to decreased availability. | https://bugzilla.redhat.com/show_bug.cgi?id=2210768 | 2023-05-29T00:00:00 | 2023-06-06T00:00:00 | 2023-06-06T00:00:00 | {'Vendor': 'n/a', 'Product': 'advancecomp', 'Versions': 'advancecomp 2.5'} |
CVE-2023-2824 | A vulnerability was found in SourceCodester Dental Clinic Appointment Reservation System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/service.php of the component POST Parameter Handler. The manipulation of the argument service leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-229598 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.229598 | 2023-05-20T06:49:18.481Z | 2023-05-20T08:00:05.761Z | 2023-10-23T06:50:12.922Z | {'Vendor': 'SourceCodester', 'Product': 'Dental Clinic Appointment Reservation System', 'Versions': '1.0'} |
CVE-2023-2936 | Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html | 2023-05-27T19:39:14.649Z | 2023-05-30T21:31:40.505Z | 2023-05-30T21:31:40.505Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'} |
CVE-2023-2465 | Inappropriate implementation in CORS in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html | 2023-05-01T23:09:50.448Z | 2023-05-02T23:47:59.069Z | 2023-05-02T23:47:59.069Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.63'} |
CVE-2023-2035 | A vulnerability has been found in Campcodes Video Sharing Website 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file signup.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225913 was assigned to this vulnerability. | https://vuldb.com/?id.225913 | 2023-04-14T06:20:51.160Z | 2023-04-14T06:31:03.450Z | 2023-10-22T09:40:20.831Z | {'Vendor': 'Campcodes', 'Product': 'Video Sharing Website', 'Versions': '1.0'} |
CVE-2023-2520 | A vulnerability was found in Caton Prime 2.1.2.51.e8d7225049(202303031001) and classified as critical. This issue affects some unknown processing of the file cgi-bin/tools_ping.cgi?action=Command of the component Ping Handler. The manipulation of the argument Destination leads to command injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-228011. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.228011 | 2023-05-04T15:56:26.560Z | 2023-05-04T16:31:04.913Z | 2023-10-23T05:21:07.546Z | {'Vendor': 'Caton', 'Product': 'Prime', 'Versions': '2.1.2.51.e8d7225049(202303031001)'} |
CVE-2023-2170 | The TaxoPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Related Posts functionality in versions up to, and including, 3.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Editor+ permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e98ed932-4e4c-4127-ae72-500e2a34f371?source=cve | 2023-04-18T20:39:26.474Z | 2023-04-19T09:38:19.750Z | 2023-04-19T09:38:19.750Z | {'Vendor': 'stevejburge', 'Product': 'TaxoPress is the WordPress Tag, Category, and Taxonomy Manager', 'Versions': '*'} |
CVE-2023-2873 | A vulnerability classified as critical was found in Twister Antivirus 8. This vulnerability affects the function 0x804f2143/0x804f217f/0x804f214b/0x80800043 in the library filppd.sys of the component IoControlCode Handler. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229852. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.229852 | 2023-05-24T17:17:52.596Z | 2023-05-24T18:00:05.170Z | 2023-10-23T07:01:11.289Z | {'Vendor': 'Twister', 'Product': 'Antivirus', 'Versions': '8'} |
CVE-2023-2259 | Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository alfio-event/alf.io prior to 2.0-M4-2304. | https://huntr.dev/bounties/e753bce0-ce82-463b-b344-2f67b39b60ff | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | {'Vendor': 'alfio-event', 'Product': 'alfio-event/alf.io', 'Versions': 'unspecified'} |
CVE-2023-2609 | NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1531. | https://huntr.dev/bounties/1679be5a-565f-4a44-a430-836412a0b622 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | 2023-12-23T07:06:22.968939 | {'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'} |
CVE-2023-2691 | A vulnerability, which was classified as problematic, was found in SourceCodester Personnel Property Equipment System 1.0. Affected is an unknown function of the file admin/add_item.php of the component POST Parameter Handler. The manipulation of the argument item_name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228972. | https://vuldb.com/?id.228972 | 2023-05-14T07:44:04.858Z | 2023-05-14T08:31:03.372Z | 2023-10-23T06:12:22.888Z | {'Vendor': 'SourceCodester', 'Product': 'Personnel Property Equipment System', 'Versions': '1.0'} |
CVE-2023-2384 | A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been declared as problematic. This vulnerability affects unknown code of the file scgi-bin/platform.cgi?page=dmz_setup.htm of the component Web Management Interface. The manipulation of the argument dhcp.SecDnsIPByte2 leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227662 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227662 | 2023-04-28T11:48:25.137Z | 2023-04-28T17:31:04.548Z | 2023-10-22T18:44:03.043Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2804 | A heap-based buffer overflow issue was discovered in libjpeg-turbo in h2v2_merged_upsample_internal() function of jdmrgext.c file. The vulnerability can only be exploited with 12-bit data precision for which the range of the sample data type exceeds the valid sample range, hence, an attacker could craft a 12-bit lossless JPEG image that contains out-of-range 12-bit samples. An application attempting to decompress such image using merged upsampling would lead to segmentation fault or buffer overflows, causing an application to crash. | https://github.com/libjpeg-turbo/libjpeg-turbo/issues/675 | 2023-05-19T00:00:00 | 2023-05-25T00:00:00 | 2023-05-25T00:00:00 | {'Vendor': 'n/a', 'Product': 'libjpeg-turbo', 'Versions': 'Fixed in libjpeg-turbo v3.0 (beta2)'} |
CVE-2023-2107 | A vulnerability, which was classified as critical, was found in IBOS 4.5.5. Affected is an unknown function of the file file/personal/del&op=recycle. The manipulation of the argument fids leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-226110 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.226110 | 2023-04-15T13:46:17.678Z | 2023-04-15T14:00:06.289Z | 2023-10-22T14:15:56.593Z | {'Vendor': 'n/a', 'Product': 'IBOS', 'Versions': '4.5.5'} |
CVE-2023-2557 | The WPCS – WordPress Currency Switcher Professional plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the save function in versions up to, and including, 1.1.9. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to edit an arbitrary custom drop-down currency switcher. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d4c79242-5c89-40c0-abcc-c112f7a64a74?source=cve | 2023-05-05T19:41:17.892Z | 2023-06-09T05:33:35.241Z | 2023-06-09T05:33:35.241Z | {'Vendor': 'realmag777', 'Product': 'WPCS – WordPress Currency Switcher Professional', 'Versions': '*'} |
CVE-2023-2042 | A vulnerability, which was classified as problematic, has been found in DataGear up to 4.5.1. Affected by this issue is some unknown functionality of the component JDBC Server Handler. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225920. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.225920 | 2023-04-14T06:39:02.719Z | 2023-04-14T09:00:08.369Z | 2023-10-22T09:48:53.169Z | {'Vendor': 'n/a', 'Product': 'DataGear', 'Versions': '4.5.0, 4.5.1'} |
CVE-2023-2412 | A vulnerability was found in SourceCodester AC Repair and Services System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-227706 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.227706 | 2023-04-28T16:30:50.808Z | 2023-04-28T23:31:03.979Z | 2023-10-22T19:06:00.142Z | {'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'} |
CVE-2023-2941 | Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html | 2023-05-27T19:39:15.280Z | 2023-05-30T21:31:41.432Z | 2023-05-30T21:31:41.432Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'} |
CVE-2023-2296 | The Loginizer WordPress plugin before 1.7.9 does not escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/8126ff73-c0e5-4c1b-ba10-2e51f690521e | 2023-04-26T09:47:45.470Z | 2023-05-30T07:49:21.849Z | 2023-05-30T07:49:21.849Z | {'Vendor': 'Unknown', 'Product': 'Loginizer', 'Versions': '1.7.8'} |
CVE-2023-2279 | The WP Directory Kit plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.1. This is due to missing or incorrect nonce validation on the 'admin_page_display' function. This makes it possible for unauthenticated attackers to delete or change plugin settings, import demo data, modify or delete Directory Kit related posts and terms via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Partial patches were made avilable in versions 1.2.0 and 1.2.1 but the issue was not fully patched until 1.2.2 | https://www.wordfence.com/threat-intel/vulnerabilities/id/8a7a6da3-d67c-42b3-8826-7e7fc9b938b4?source=cve | 2023-04-25T11:47:11.005Z | 2023-08-31T05:33:12.671Z | 2023-08-31T05:33:12.671Z | {'Vendor': 'listingthemes', 'Product': 'WP Directory Kit', 'Versions': '*'} |
CVE-2023-2783 | Mattermost Apps Framework fails to verify that a secret provided in the incoming webhook request allowing an attacker to modify the contents of the post sent by the Apps.
| https://mattermost.com/security-updates | 2023-05-18T10:17:10.305Z | 2023-06-16T08:39:26.096Z | 2023-06-16T08:39:26.096Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost App Framework', 'Versions': '0, 0, 7.10.0, 7.10.1, 7.8.5, 7.9.4'} |
CVE-2023-2629 | Improper Neutralization of Formula Elements in a CSV File in GitHub repository pimcore/customer-data-framework prior to 3.3.9. | https://huntr.dev/bounties/821ff465-4754-42d1-9376-813c17f16a01 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/customer-data-framework', 'Versions': 'unspecified'} |
CVE-2023-2500 | The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 3.3.19 via deserialization of untrusted input from the 'go_pricing' shortcode 'data' parameter. This allows authenticated attackers, with subscriber-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | https://www.wordfence.com/threat-intel/vulnerabilities/id/f7686b11-97a8-4f09-bbfa-d77120cc35b7?source=cve | 2023-05-03T14:57:19.467Z | 2023-05-24T23:38:16.209Z | 2023-05-24T23:38:16.209Z | {'Vendor': 'Granth', 'Product': 'Go Pricing - WordPress Responsive Pricing Tables', 'Versions': '*'} |
CVE-2023-2150 | A vulnerability, which was classified as critical, has been found in SourceCodester Task Reminder System 1.0. This issue affects some unknown processing of the file Master.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226271. | https://vuldb.com/?id.226271 | 2023-04-18T10:50:08.359Z | 2023-04-18T13:00:05.441Z | 2023-10-22T14:26:55.494Z | {'Vendor': 'SourceCodester', 'Product': 'Task Reminder System', 'Versions': '1.0'} |
CVE-2023-2853 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Softmed SelfPatron allows Reflected XSS.This issue affects SelfPatron : before 2.0.
| https://www.usom.gov.tr/bildirim/tr-23-0388 | 2023-05-23T18:31:47.722Z | 2023-07-09T16:39:36.595Z | 2023-07-09T16:56:12.905Z | {'Vendor': 'Softmed', 'Product': 'SelfPatron ', 'Versions': '0'} |
CVE-2023-2916 | The InfiniteWP Client plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 1.11.1 via the 'admin_notice' function. This can allow authenticated attackers with subscriber-level permissions or above to extract sensitive data including configuration. It can only be exploited if the plugin has not been configured yet. If combined with another arbitrary plugin installation and activation vulnerability, it may be possible to connect a site to InfiniteWP which would make remote management possible and allow for elevation of privileges. | https://www.wordfence.com/threat-intel/vulnerabilities/id/aa157c80-447f-4406-9e49-9cc6208b7b19?source=cve | 2023-05-26T13:47:33.528Z | 2023-08-15T08:32:58.963Z | 2023-08-15T08:32:58.963Z | {'Vendor': 'infinitewp', 'Product': 'InfiniteWP Client', 'Versions': '*'} |
CVE-2023-2445 | Improper access control in Subscriptions Folder path filter in Devolutions Server 2023.1.1 and earlier allows attackers with administrator privileges to retrieve usage information on folders in user vaults via a specific folder name. | https://devolutions.net/security/advisories/DEVO-2023-0013/ | 2023-05-01T14:10:14.917Z | 2023-05-02T13:11:06.405Z | 2023-05-02T13:11:06.405Z | {'Vendor': 'Devolutions', 'Product': 'Devolutions Server', 'Versions': '0'} |
CVE-2023-2015 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.8 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A reflected XSS was possible when creating new abuse reports which allows attackers to perform arbitrary actions on behalf of victims. | https://gitlab.com/gitlab-org/gitlab/-/issues/407137 | 2023-04-13T00:00:00 | 2023-06-07T00:00:00 | 2023-06-07T00:00:00 | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '> 15.8, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'} |
CVE-2023-2280 | The WP Directory Kit plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the 'ajax_public' function in versions up to, and including, 1.2.2. This makes it possible for unauthenticated attackers to delete or change plugin settings, import demo data, delete Directory Kit related posts and terms, and install arbitrary plugins. A partial patch was introduced in version 1.2.0 and an additional partial patch was introduced in version 1.2.2, but the issue was not fully patched until 1.2.3. | https://www.wordfence.com/threat-intel/vulnerabilities/id/abb1a758-5c16-4841-b1c7-0705ab16b328?source=cve | 2023-04-25T11:47:56.570Z | 2023-06-09T05:33:26.093Z | 2023-06-09T05:33:26.093Z | {'Vendor': 'listingthemes', 'Product': 'WP Directory Kit', 'Versions': '*'} |
CVE-2023-2795 | The CodeColorer WordPress plugin before 0.10.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/2d6ecd21-3dd4-423d-80e7-277c45080a9f | 2023-05-18T12:45:42.347Z | 2023-06-27T13:17:25.903Z | 2023-06-27T13:17:25.903Z | {'Vendor': 'Unknown', 'Product': 'CodeColorer', 'Versions': '0'} |
CVE-2023-2845 | Improper Access Control in GitHub repository cloudexplorer-dev/cloudexplorer-lite prior to v1.1.0. | https://github.com/cloudexplorer-dev/cloudexplorer-lite/commit/d9f55a44e579d312977b02317b2020de758b763a | 2023-05-23T00:00:00 | 2023-05-23T00:00:00 | 2023-05-23T00:00:00 | {'Vendor': 'cloudexplorer-dev', 'Product': 'cloudexplorer-dev/cloudexplorer-lite', 'Versions': 'unspecified'} |
CVE-2023-2146 | A vulnerability was found in Campcodes Online Thesis Archiving System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file classes/Master.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226267. | https://vuldb.com/?id.226267 | 2023-04-18T10:47:09.512Z | 2023-04-18T11:31:03.764Z | 2023-10-22T14:22:02.798Z | {'Vendor': 'Campcodes', 'Product': 'Online Thesis Archiving System', 'Versions': '1.0'} |
CVE-2023-2516 | Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.7. | https://huntr.dev/bounties/19470f0b-7094-4339-8d4a-4b5570b54716 | 2023-05-04T00:00:00 | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | {'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'} |
CVE-2023-2003 | Embedded malicious code vulnerability in Vision1210, in the build 5 of operating system version 4.3, which could allow a remote attacker to store base64-encoded malicious code in the device's data tables via the PCOM protocol, which can then be retrieved by a client and executed on the device.
| https://www.incibe.es/en/incibe-cert/notices/aviso-sci/embedded-malicious-code-vulnerability-unitronics-vision1210 | 2023-04-12T14:08:51.192Z | 2023-07-13T11:25:03.096Z | 2023-07-17T10:11:18.273Z | {'Vendor': 'Unitronics', 'Product': 'Vision1210', 'Versions': '4.3, build 5'} |
CVE-2023-2453 | There is insufficient sanitization of tainted file names that are directly concatenated with a path that is subsequently passed to a ‘require_once’ statement. This allows arbitrary files with the ‘.php’ extension for which the absolute path is known to be included and executed. There are no known means in PHPFusion through which an attacker can upload and target a ‘.php’ file payload. | https://www.synopsys.com/blogs/software-security/cyrc-vulnerability-advisory-cve-2023-2453/ | 2023-05-01T16:45:27.226Z | 2023-09-05T14:39:10.011Z | 2023-09-05T14:39:10.011Z | {'Vendor': 'PHPFusion', 'Product': 'PHPFusion', 'Versions': '0'} |
CVE-2023-2900 | A vulnerability was found in NFine Rapid Development Platform 20230511. It has been classified as problematic. Affected is an unknown function of the file /Login/CheckLogin. The manipulation leads to use of weak hash. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. VDB-229974 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.229974 | 2023-05-25T20:36:35.687Z | 2023-05-25T21:00:03.450Z | 2023-10-23T07:06:03.898Z | {'Vendor': 'NFine', 'Product': 'Rapid Development Platform', 'Versions': '20230511'} |
CVE-2023-2687 | Buffer overflow in Platform CLI component in Silicon Labs Gecko SDK v4.2.1 and earlier allows user to overwrite limited structures on the heap.
| https://github.com/SiliconLabs/gecko_sdk/releases | 2023-05-12T16:13:16.672Z | 2023-06-02T15:56:21.083Z | 2023-06-02T15:56:21.083Z | {'Vendor': 'silabs.com', 'Product': 'Gecko SDK', 'Versions': '0'} |
CVE-2023-2668 | A vulnerability was found in SourceCodester Lost and Found Information System 1.0 and classified as critical. Affected by this issue is the function manager_category of the file admin/?page=categories/manage_category of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228884. | https://vuldb.com/?id.228884 | 2023-05-12T06:01:17.158Z | 2023-05-12T07:00:06.598Z | 2023-10-23T05:58:56.306Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
Subsets and Splits