CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-2392
A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been classified as problematic. Affected is an unknown function of the file scgi-bin/platform.cgi?page=time_zone.htm of the component Web Management Interface. The manipulation of the argument ManualDate.minutes leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-227670 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227670
2023-04-28T11:48:56.818Z
2023-04-28T20:31:05.126Z
2023-10-22T18:53:48.375Z
{'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'}
CVE-2023-2541
The Web Frontend of KNIME Business Hub before 1.4.0 allows an unauthenticated remote attacker to access internals about the application such as versions, host names, or IP addresses. No personal information or application data was exposed.
https://www.knime.com/security/advisories#CVE-2023-2541
2023-05-05T08:31:06.603Z
2023-06-07T08:08:50.258Z
2023-06-07T08:08:50.258Z
{'Vendor': 'KNIME', 'Product': 'KNIME Business Hub', 'Versions': '1.0.0'}
CVE-2023-2111
The Fast & Effective Popups & Lead-Generation for WordPress plugin before 2.1.4 concatenates user input into an SQL query without escaping it first in the plugin's report API endpoint, which could allow administrators in multi-site configuration to leak sensitive information from the site's database.
https://wpscan.com/vulnerability/7a0bdd47-c339-489d-9443-f173a83447f2
2023-04-17T08:05:05.951Z
2023-05-30T07:49:22.658Z
2023-05-30T07:49:22.658Z
{'Vendor': 'Unknown', 'Product': 'Fast & Effective Popups & Lead-Generation for WordPress', 'Versions': '0'}
CVE-2023-2812
The Ultimate Dashboard WordPress plugin before 3.7.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/7de4c313-359e-4450-85f5-d29f3c2f046a
2023-05-19T13:39:31.334Z
2023-06-19T10:52:55.173Z
2023-06-19T10:52:55.173Z
{'Vendor': 'Unknown', 'Product': 'Ultimate Dashboard', 'Versions': '0'}
CVE-2023-2957
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Lisa Software Florist Site allows SQL Injection.This issue affects Florist Site: before 3.0.
https://www.usom.gov.tr/bildirim/tr-23-0403
2023-05-29T11:31:32.438Z
2023-07-13T07:47:41.216Z
2023-07-13T07:47:41.216Z
{'Vendor': 'Lisa Software', 'Product': 'Florist Site', 'Versions': '0'}
CVE-2023-2404
The CRM and Lead Management by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 2.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e26ccd06-22e0-4d91-a53a-df6ead8a8e3b?source=cve
2023-04-28T16:01:15.770Z
2023-06-03T04:35:16.352Z
2023-06-03T04:35:16.352Z
{'Vendor': 'vcita', 'Product': 'CRM and Lead Management by vcita', 'Versions': '*'}
CVE-2023-2054
A vulnerability, which was classified as critical, was found in Campcodes Advanced Online Voting System 1.0. This affects an unknown part of the file /admin/positions_delete.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225939.
https://vuldb.com/?id.225939
2023-04-14T07:42:09.090Z
2023-04-14T12:31:04.716Z
2023-10-22T10:01:05.238Z
{'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'}
CVE-2023-2243
A vulnerability was found in SourceCodester Complaint Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file users/registration.php of the component POST Parameter Handler. The manipulation of the argument fullname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227228.
https://vuldb.com/?id.227228
2023-04-22T15:49:17.121Z
2023-04-22T16:31:03.733Z
2023-10-22T14:58:39.992Z
{'Vendor': 'SourceCodester', 'Product': 'Complaint Management System', 'Versions': '1.0'}
CVE-2023-2306
Qognify NiceVision versions 3.1 and prior are vulnerable to exposing sensitive information using hard-coded credentials. With these credentials an attacker can retrieve information about the cameras, user information, and modify database records.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-278-02
2023-04-26T15:22:33.977Z
2023-10-05T16:46:42.171Z
2023-10-05T16:46:42.171Z
{'Vendor': 'Qognify', 'Product': 'NiceVision', 'Versions': '0'}
CVE-2023-2756
SQL Injection in GitHub repository pimcore/customer-data-framework prior to 3.3.10.
https://huntr.dev/bounties/cf398528-819f-456e-88e7-c06d268d3f44
2023-05-17T00:00:00
2023-05-17T00:00:00
2023-05-17T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/customer-data-framework', 'Versions': 'unspecified'}
CVE-2023-2886
Missing Origin Validation in WebSockets vulnerability in CBOT Chatbot allows Content Spoofing Via Application API Manipulation.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.
https://www.usom.gov.tr/bildirim/tr-23-0293
2023-05-25T08:03:31.837Z
2023-05-25T08:31:24.499Z
2023-10-18T07:37:07.056Z
{'Vendor': 'CBOT', 'Product': 'Chatbot', 'Versions': '0'}
CVE-2023-2185
null
null
2023-04-19T00:00:00
null
2023-05-12T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2490
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Fernando Briano UserAgent-Spy plugin <= 1.3.1 versions.
https://patchstack.com/database/vulnerability/useragent-spy/wordpress-useragent-spy-plugin-1-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve
2023-05-03T09:59:11.200Z
2023-05-11T09:46:03.191Z
2023-05-11T09:46:03.191Z
{'Vendor': 'Fernando Briano', 'Product': 'UserAgent-Spy', 'Versions': 'n/a'}
CVE-2023-2869
The WP-Members Membership plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the do_field_reorder function in versions up to, and including, 3.4.7.3. This makes it possible for authenticated attackers with subscriber-level access to reorder form elements on login forms.
https://www.wordfence.com/threat-intel/vulnerabilities/id/bf05a79a-0375-4c9d-bbf0-a87484327b87?source=cve
2023-05-24T16:34:43.226Z
2023-07-12T04:38:48.717Z
2023-07-12T04:38:48.717Z
{'Vendor': 'cbutlerjr', 'Product': 'WP-Members Membership Plugin', 'Versions': '*'}
CVE-2023-2644
A vulnerability, which was classified as problematic, has been found in DigitalPersona FPSensor 1.0.0.1. This issue affects some unknown processing of the file C:\Program Files (x86)\FPSensor\bin\DpHost.exe. The manipulation leads to unquoted search path. Attacking locally is a requirement. The identifier VDB-228773 was assigned to this vulnerability.
https://vuldb.com/?id.228773
2023-05-11T05:21:50.890Z
2023-05-11T07:00:06.766Z
2023-10-23T05:40:38.445Z
{'Vendor': 'DigitalPersona', 'Product': 'FPSensor', 'Versions': '1.0.0.1'}
CVE-2023-2214
A vulnerability was found in Campcodes Coffee Shop POS System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/sales/manage_sale.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226979.
https://vuldb.com/?id.226979
2023-04-21T06:29:08.859Z
2023-04-21T10:00:05.640Z
2023-10-22T14:46:28.348Z
{'Vendor': 'Campcodes', 'Product': 'Coffee Shop POS System', 'Versions': '1.0'}
CVE-2023-2701
The Gravity Forms WordPress plugin before 2.7.5 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high-privileged users such as admin.
https://wpscan.com/vulnerability/298fbe34-62c2-4e56-9bdb-90da570c5bbe
2023-05-15T09:55:25.578Z
2023-07-17T13:30:00.715Z
2023-07-17T13:30:00.715Z
{'Vendor': 'Unknown', 'Product': 'gravityforms', 'Versions': '0'}
CVE-2023-2351
The WP Directory Kit plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the 'ajax_admin' function in versions up to, and including, 1.2.3. This makes it possible for authenticated attackers with subscriber-level permissions or above to delete or change plugin settings, import demo data, delete Directory Kit related posts and terms, and install arbitrary plugins. A partial patch was introduced in version 1.2.0.
https://www.wordfence.com/threat-intel/vulnerabilities/id/50c5154c-1573-4c2b-85a1-a89bdb22dc7d?source=cve
2023-04-27T14:19:51.549Z
2023-06-13T01:48:06.282Z
2023-06-13T01:48:06.282Z
{'Vendor': 'listingthemes', 'Product': 'WP Directory Kit', 'Versions': '*'}
CVE-2023-2078
The "Buy Me a Coffee – Button and Widget Plugin" plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on the recieve_post, bmc_disconnect, name_post, and widget_post functions in versions up to, and including, 3.7. This makes it possible for authenticated attackers, with minimal permissions such as subscribers, to update the plugins settings. CVE-2023-25030 may be a duplicate of this issue.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c1c218c6-1599-4dc9-846f-e0ef74821488?source=cve
2023-04-14T19:05:13.001Z
2023-07-11T02:03:55.890Z
2023-07-11T02:03:55.890Z
{'Vendor': 'buymeacoffee', 'Product': 'Buy Me a Coffee – Button and Widget Plugin', 'Versions': '*'}
CVE-2023-2582
A prototype pollution vulnerability exists in Strikingly CMS which can result in reflected cross-site scripting (XSS) in affected applications and sites built with Strikingly. The vulnerability exists because of Strikingly JavaScript library parsing the URL fragment allows access to the __proto__ or constructor properties and the Object prototype. By leveraging an embedded gadget like jQuery, an attacker who convinces a victim to visit a specially crafted link could achieve arbitrary javascript execution in the context of the user's browser.
https://www.tenable.com/security/research/tra-2023-18
2023-05-08T00:00:00
2023-05-08T00:00:00
2023-05-08T00:00:00
{'Vendor': 'n/a', 'Product': 'Strikingly', 'Versions': 'All versions'}
CVE-2023-2428
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13.
https://huntr.dev/bounties/cee65b6d-b003-4e6a-9d14-89aa94bee43e
2023-04-30T00:00:00
2023-04-30T00:00:00
2023-04-30T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-2994
null
null
2023-05-30T16:44:34.802Z
null
2023-05-30T17:26:56.324Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2097
A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226105 was assigned to this vulnerability.
https://vuldb.com/?id.226105
2023-04-15T09:11:51.421Z
2023-04-15T11:00:08.918Z
2023-10-22T14:09:50.749Z
{'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'}
CVE-2023-2202
Improper Access Control in GitHub repository francoisjacquet/rosariosis prior to 10.9.3.
https://huntr.dev/bounties/efe6ef47-d17c-4773-933a-4836c32db85c
2023-04-21T00:00:00
2023-04-21T00:00:00
2023-04-21T00:00:00
{'Vendor': 'francoisjacquet', 'Product': 'francoisjacquet/rosariosis', 'Versions': 'unspecified'}
CVE-2023-2652
A vulnerability classified as critical has been found in SourceCodester Lost and Found Information System 1.0. Affected is an unknown function of the file /classes/Master.php?f=delete_item. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228780.
https://vuldb.com/?id.228780
2023-05-11T07:47:14.136Z
2023-05-11T08:31:03.874Z
2023-10-23T05:47:57.500Z
{'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'}
CVE-2023-2347
A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/services/manage_service.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227590 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.227590
2023-04-27T13:38:03.162Z
2023-04-27T14:31:04.439Z
2023-10-22T16:06:15.000Z
{'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'}
CVE-2023-2717
The Groundhogg plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.7.9.8. This is due to missing nonce validation on the 'enable_safe_mode' function. This makes it possible for unauthenticated attackers to enable safe mode, which disables all other plugins, via a forged request if they can successfully trick an administrator into performing an action such as clicking on a link. A warning message about safe mode is displayed to the admin, which can be easily disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/af73240c-b711-4e91-9998-5f7e6a9a4fb9?source=cve
2023-05-15T16:57:58.649Z
2023-05-20T02:03:24.840Z
2023-05-20T02:03:24.840Z
{'Vendor': 'trainingbusinesspros', 'Product': 'WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg', 'Versions': '*'}
CVE-2023-2594
A vulnerability, which was classified as critical, was found in SourceCodester Food Ordering Management System 1.0. Affected is an unknown function of the component Registration. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-228396.
https://vuldb.com/?id.228396
2023-05-09T12:12:49.383Z
2023-05-09T12:31:03.673Z
2023-10-23T05:29:39.864Z
{'Vendor': 'SourceCodester', 'Product': 'Food Ordering Management System', 'Versions': '1.0'}
CVE-2023-2982
The WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 7.6.4. This is due to insufficient encryption on the user being supplied during a login validated through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they know the email address associated with that user. This was partially patched in version 7.6.4 and fully patched in version 7.6.5.
https://www.wordfence.com/threat-intel/vulnerabilities/id/08ca186a-2486-4a58-9c53-03e9eba13e66?source=cve
2023-05-30T13:38:43.774Z
2023-06-29T01:56:56.207Z
2023-06-29T01:56:56.207Z
{'Vendor': 'cyberlord92', 'Product': 'WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn)', 'Versions': '*'}
CVE-2023-2828
Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit. It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded. This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.
https://kb.isc.org/docs/cve-2023-2828
2023-05-22T07:57:41.362Z
2023-06-21T16:26:07.096Z
2023-06-21T16:26:07.096Z
{'Vendor': 'ISC', 'Product': 'BIND 9', 'Versions': '9.11.0, 9.18.0, 9.19.0, 9.11.3-S1, 9.18.11-S1'}
CVE-2023-2605
The wpbrutalai WordPress plugin before 2.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against a logged in high privilege users such as admin.
https://wpscan.com/vulnerability/372cb940-71ba-4d19-b35a-ab15f8c2fdeb
2023-05-09T15:38:11.242Z
2023-06-27T13:17:26.709Z
2023-06-27T13:17:26.709Z
{'Vendor': 'Unknown', 'Product': 'wpbrutalai', 'Versions': '0'}
CVE-2023-2255
Improper access control in editor components of The Document Foundation LibreOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of LibreOffice documents that used "floating frames" linked to external files, would load the contents of those frames without prompting the user for permission to do so. This was inconsistent with the treatment of other linked content in LibreOffice. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.7; 7.5 versions prior to 7.5.3.
https://www.libreoffice.org/about-us/security/advisories/CVE-2023-2255
2023-04-24T00:00:00
2023-05-25T00:00:00
2023-11-26T09:06:16.295449
{'Vendor': 'The Document Foundation', 'Product': 'LibreOffice', 'Versions': '7.4, 7.5'}
CVE-2023-2740
A vulnerability, which was classified as problematic, has been found in SourceCodester Guest Management System 1.0. Affected by this issue is some unknown functionality of the file dateTest.php of the component GET Parameter Handler. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229160.
https://vuldb.com/?id.229160
2023-05-16T16:13:51.292Z
2023-05-16T16:31:03.385Z
2023-10-23T06:25:48.689Z
{'Vendor': 'SourceCodester', 'Product': 'Guest Management System', 'Versions': '1.0'}
CVE-2023-2310
A Channel Accessible by Non-Endpoint vulnerability in the Schweitzer Engineering Laboratories SEL Real-Time Automation Controller (RTAC) could allow a remote attacker to perform a man-in-the-middle (MiTM) that could result in denial of service. See the ACSELERATOR RTAC SEL-5033 Software instruction manual date code 20210915 for more details.
https://selinc.com/support/security-notifications/external-reports/
2023-04-26T18:25:33.932Z
2023-05-10T19:18:43.806Z
2023-05-10T19:18:43.806Z
{'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R119-V0, R119-V0, R119-V0, R119-V0'}
CVE-2023-2039
A vulnerability was found in novel-plus 3.6.2. It has been rated as critical. This issue affects some unknown processing of the file /author/list?limit=10&offset=0&order=desc. The manipulation of the argument sort leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225917 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.225917
2023-04-14T06:30:50.683Z
2023-04-14T08:00:05.391Z
2023-10-22T09:45:13.622Z
{'Vendor': 'n/a', 'Product': 'novel-plus', 'Versions': '3.6.2'}
CVE-2023-2469
null
null
2023-05-02T08:32:53.378Z
null
2023-05-17T07:35:35.479Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2193
Mattermost fails to invalidate existing authorization codes when deauthorizing an OAuth2 app, allowing an attacker possessing an authorization code to generate an access token.
https://mattermost.com/security-updates/
2023-04-20T08:16:27.253Z
2023-04-20T08:17:04.731Z
2023-04-20T08:17:04.731Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 7.10, 7.9.3, 7.8.4, 7.7.5, 7.1.9'}
CVE-2023-6794
An arbitrary file upload vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
https://security.paloaltonetworks.com/CVE-2023-6794
2023-12-13T17:27:26.884Z
2023-12-13T18:16:39.175Z
2023-12-13T18:16:39.175Z
{'Vendor': 'Palo Alto Networks', 'Product': 'PAN-OS', 'Versions': '8.1, 9.0, 9.1, 10.1, 10.2, 11.0, 11.1'}
CVE-2023-6002
YugabyteDB is vulnerable to cross site scripting (XSS) via log injection. Writing invalidated user input to log files can allow an unprivileged attacker to forge log entries or inject malicious content into the logs.
https://www.yugabyte.com/
2023-11-07T22:20:00.534Z
2023-11-07T23:56:50.729Z
2023-11-09T19:18:33.398Z
{'Vendor': 'YugabyteDB', 'Product': 'YugabyteDB', 'Versions': '2.0.0.0, 2.14.14.0, 2.16.8.0, 2.18.4.0'}
CVE-2023-6901
A vulnerability, which was classified as critical, was found in codelyfe Stupid Simple CMS up to 1.2.3. This affects an unknown part of the file /terminal/handle-command.php of the component HTTP POST Request Handler. The manipulation of the argument command with the input whoami leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248259.
https://vuldb.com/?id.248259
2023-12-16T19:43:19.876Z
2023-12-17T14:00:04.686Z
2023-12-17T14:00:04.686Z
{'Vendor': 'codelyfe', 'Product': 'Stupid Simple CMS', 'Versions': '1.2.0, 1.2.1, 1.2.2, 1.2.3'}
CVE-2023-6147
Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data
https://www.qualys.com/security-advisories/
2023-11-15T10:10:24.476Z
2024-01-09T08:08:43.883Z
2024-01-09T08:08:43.883Z
{'Vendor': 'Qualys,Inc. ', 'Product': 'Policy Compliance Connector Jenkins Plugin', 'Versions': '1.0.5'}
CVE-2023-6393
A flaw was found in the Quarkus Cache Runtime. When request processing utilizes a Uni cached using @CacheResult and the cached Uni reuses the initial "completion" context, the processing switches to the cached Uni instead of the request context. This is a problem if the cached Uni context contains sensitive information, and could allow a malicious user to benefit from a POST request returning the response that is meant for another user, gaining access to sensitive data.
https://access.redhat.com/security/cve/CVE-2023-6393
2023-11-30T03:30:16.241Z
2023-12-06T16:58:54.230Z
2024-01-23T02:03:53.595Z
{'Vendor': 'n/a', 'Product': 'quarkus', 'Versions': '3.2.9.GA, 2.13.9.CR2'}
CVE-2023-6239
Under rare conditions, the effective permissions of an object might be incorrectly calculated if the object has a specific configuration of metadata-driven permissions in M-Files Server versions 23.9, 23.10, and 23.11 before 23.11.13168.7, potentially enabling unauthorized access to the object.
https://www.m-files.com/about/trust-center/security-advisories/cve-2023-6239/
2023-11-21T12:03:50.773Z
2023-11-28T14:07:20.877Z
2023-11-30T15:44:48.463Z
{'Vendor': 'M-Files', 'Product': 'M-Files Server', 'Versions': '23.9, 23.10, 23.11'}
CVE-2023-6540
A vulnerability was reported in the Lenovo Browser Mobile and Lenovo Browser HD Apps for Android that could allow an attacker to craft a payload that could result in the disclosure of sensitive information.
https://iknow.lenovo.com.cn/detail/419251
2023-12-05T23:58:51.346Z
2024-01-03T21:01:59.690Z
2024-01-03T21:01:59.690Z
{'Vendor': 'Lenovo', 'Product': 'Lenovo Browser Mobile', 'Versions': ' '}
CVE-2023-6690
A race condition in GitHub Enterprise Server allowed an existing admin to maintain permissions on transferred repositories by making a GraphQL mutation to alter repository permissions during the transfer. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
https://docs.github.com/en/[email protected]/admin/release-notes#3.8.12
2023-12-11T17:06:22.719Z
2023-12-21T20:45:19.285Z
2023-12-21T20:45:19.285Z
{'Vendor': 'GitHub', 'Product': 'Enterprise Server', 'Versions': '3.8, 3.9, 3.10, 3.11'}
CVE-2023-6413
A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via photos.php in the id and user parameters. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script
2023-11-30T10:02:07.236Z
2023-11-30T13:11:58.127Z
2023-11-30T13:11:58.127Z
{'Vendor': 'Voovi Social Networking Script', 'Product': 'Voovi Social Networking Script', 'Versions': '1.0'}
CVE-2023-6043
A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker to bypass integrity checks and execute arbitrary code with elevated privileges.
https://support.lenovo.com/us/en/product_security/LEN-144736
2023-11-08T21:12:22.029Z
2024-01-19T20:08:26.945Z
2024-01-19T20:08:26.945Z
{'Vendor': 'Lenovo', 'Product': 'Vantage', 'Versions': ' '}
CVE-2023-6940
with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system.
https://huntr.com/bounties/c6f59480-ce47-4f78-a3dc-4bd8ca15029c
2023-12-19T01:40:50.546Z
2023-12-19T01:41:12.560Z
2023-12-19T01:41:12.560Z
{'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'}
CVE-2023-6556
The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via currency options in all versions up to, and including, 1.4.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/8cb37019-33f6-4f72-adfc-befbfbf69e47?source=cve
2023-12-06T14:39:21.279Z
2024-01-11T08:32:45.695Z
2024-01-11T08:32:45.695Z
{'Vendor': 'realmag777', 'Product': 'FOX – Currency Switcher Professional for WooCommerce', 'Versions': '*'}
CVE-2023-6106
null
null
2023-11-13T15:24:04.193Z
null
2023-11-13T23:36:29.663Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-6782
The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.0.92 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c1cae64e-caed-43c0-9a75-9aa4234946a0?source=cve
2023-12-13T15:02:41.145Z
2024-01-11T08:32:55.986Z
2024-01-11T08:32:55.986Z
{'Vendor': 'mohammed_kaludi', 'Product': 'AMP for WP – Accelerated Mobile Pages', 'Versions': '*'}
CVE-2023-6297
A vulnerability classified as problematic has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file patient-search-report.php of the component Search Report Page. The manipulation of the argument Search By Patient Name with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246123.
https://vuldb.com/?id.246123
2023-11-26T07:21:11.672Z
2023-11-26T22:31:04.240Z
2023-11-26T22:31:04.240Z
{'Vendor': 'PHPGurukul', 'Product': 'Nipah Virus Testing Management System', 'Versions': '1.0'}
CVE-2023-6014
An attacker is able to arbitrarily create an account in MLflow bypassing any authentication requirment.
https://huntr.com/bounties/3e64df69-ddc2-463e-9809-d07c24dc1de4
2023-11-08T09:11:22.613Z
2023-11-16T21:07:36.577Z
2023-11-16T21:07:36.577Z
{'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'}
CVE-2023-6151
Improper Privilege Management vulnerability in ESKOM Computer e-municipality module allows Collect Data as Provided by Users.This issue affects e-municipality module: before v.105.
https://www.usom.gov.tr/bildirim/tr-23-0664
2023-11-15T12:19:47.534Z
2023-11-28T09:29:12.504Z
2023-12-05T06:18:46.314Z
{'Vendor': 'ESKOM Computer', 'Product': 'e-municipality module', 'Versions': '0'}
CVE-2023-6852
A vulnerability classified as critical has been found in kalcaddle KodExplorer up to 4.51.03. Affected is an unknown function of the file plugins/webodf/app.php. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.52.01 is able to address this issue. The name of the patch is 5cf233f7556b442100cf67b5e92d57ceabb126c6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-248220.
https://vuldb.com/?id.248220
2023-12-15T16:38:19.441Z
2023-12-16T11:31:03.827Z
2023-12-16T11:31:03.827Z
{'Vendor': 'kalcaddle', 'Product': 'KodExplorer', 'Versions': '4.51.03'}
CVE-2023-6346
Use after free in WebAudio in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html
2023-11-28T01:12:09.277Z
2023-11-29T12:02:04.978Z
2023-11-29T12:02:04.978Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.199'}
CVE-2023-6653
A vulnerability was found in PHPGurukul Teacher Subject Allocation Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/subject.php of the component Create a new Subject. The manipulation of the argument cid leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-247346 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.247346
2023-12-09T17:29:48.357Z
2023-12-10T12:31:03.928Z
2023-12-10T12:31:03.928Z
{'Vendor': 'PHPGurukul', 'Product': 'Teacher Subject Allocation Management System', 'Versions': '1.0'}
CVE-2023-6203
The Events Calendar WordPress plugin before 6.2.8.1 discloses the content of password protected posts to unauthenticated users via a crafted request
https://wpscan.com/vulnerability/229273e6-e849-447f-a95a-0730969ecdae
2023-11-20T13:33:17.684Z
2023-12-18T20:07:53.415Z
2023-12-18T20:07:53.415Z
{'Vendor': 'Unknown', 'Product': 'The Events Calendar', 'Versions': '0'}
CVE-2023-6595
In WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate ancillary credential information stored within WhatsUp Gold.
https://www.progress.com/network-monitoring
2023-12-07T20:21:13.167Z
2023-12-14T16:06:11.767Z
2023-12-14T16:06:11.767Z
{'Vendor': 'Progress Software Corporation', 'Product': 'WhatsUp Gold', 'Versions': '2023.0, 2022.0'}
CVE-2023-6311
A vulnerability was found in SourceCodester Loan Management System 1.0 and classified as critical. This issue affects the function delete_ltype of the file delete_ltype.php of the component Loan Type Page. The manipulation of the argument ltype_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246137 was assigned to this vulnerability.
https://vuldb.com/?id.246137
2023-11-26T15:20:54.536Z
2023-11-27T02:00:06.792Z
2023-11-27T02:00:06.792Z
{'Vendor': 'SourceCodester', 'Product': 'Loan Management System', 'Versions': '1.0'}
CVE-2023-6741
The WP Customer Area WordPress plugin before 8.2.1 does not properly validate users capabilities in some of its AJAX actions, allowing malicious users to edit other users' account address.
https://wpscan.com/vulnerability/9debe1ea-18ad-44c4-8078-68eb66d36c4a/
2023-12-12T15:58:59.273Z
2024-01-16T15:56:59.595Z
2024-01-16T15:56:59.595Z
{'Vendor': 'Unknown', 'Product': 'WP Customer Area', 'Versions': '0'}
CVE-2023-6254
A Vulnerability in OTRS AgentInterface and ExternalInterface allows the reading of plain text passwords which are send back to the client in the server response- This issue affects OTRS: from 8.0.X through 8.0.37.
https://otrs.com/release-notes/otrs-security-advisory-2023-11/
2023-11-22T12:14:39.322Z
2023-11-27T09:44:00.273Z
2023-11-27T09:44:00.273Z
{'Vendor': 'OTRS AG', 'Product': 'OTRS', 'Versions': '8.0.x'}
CVE-2023-6038
An attacker is able to read any file on the server hosting the H2O dashboard without any authentication.
https://huntr.com/bounties/380fce33-fec5-49d9-a101-12c972125d8c
2023-11-08T18:15:34.018Z
2023-11-16T16:06:43.684Z
2023-11-16T16:06:43.684Z
{'Vendor': 'h2oai', 'Product': 'h2oai/h2o-3', 'Versions': 'unspecified'}
CVE-2023-6891
A vulnerability has been found in PeaZip 9.4.0 and classified as problematic. Affected by this vulnerability is an unknown functionality in the library dragdropfilesdll.dll of the component Library Handler. The manipulation leads to uncontrolled search path. An attack has to be approached locally. Upgrading to version 9.6.0 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-248251. NOTE: Vendor was contacted early, confirmed the existence of the flaw and immediately worked on a patched release.
https://vuldb.com/?id.248251
2023-12-16T12:51:39.702Z
2023-12-17T03:31:03.908Z
2023-12-17T03:31:03.908Z
{'Vendor': 'n/a', 'Product': 'PeaZip', 'Versions': '9.4.0'}
CVE-2023-6757
A vulnerability was found in Thecosy IceCMS 2.0.1. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /adplanet/PlanetUser of the component API. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247885 was assigned to this vulnerability.
https://vuldb.com/?id.247885
2023-12-13T07:39:46.821Z
2023-12-13T14:00:05.225Z
2023-12-13T14:00:05.225Z
{'Vendor': 'Thecosy', 'Product': 'IceCMS', 'Versions': '2.0.1'}
CVE-2023-6307
A vulnerability classified as critical was found in jeecgboot JimuReport up to 1.6.1. Affected by this vulnerability is an unknown functionality of the file /download/image. The manipulation of the argument imageUrl leads to relative path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246133 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.246133
2023-11-26T15:08:14.077Z
2023-11-27T01:00:06.877Z
2023-11-27T01:00:06.877Z
{'Vendor': 'jeecgboot', 'Product': 'JimuReport', 'Versions': '1.6.0, 1.6.1'}
CVE-2023-6612
A vulnerability was found in Totolink X5000R 9.1.0cu.2300_B20230112. It has been rated as critical. This issue affects the function setDdnsCfg/setDynamicRoute/setFirewallType/setIPSecCfg/setIpPortFilterRules/setLancfg/setLoginPasswordCfg/setMacFilterRules/setMtknatCfg/setNetworkConfig/setPortForwardRules/setRemoteCfg/setSSServer/setScheduleCfg/setSmartQosCfg/setStaticDhcpRules/setStaticRoute/setVpnAccountCfg/setVpnPassCfg/setVpnUser/setWiFiAclAddConfig/setWiFiEasyGuestCfg/setWiFiGuestCfg/setWiFiRepeaterConfig/setWiFiScheduleCfg/setWizardCfg of the file /cgi-bin/cstecgi.cgi. The manipulation leads to os command injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247247. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.247247
2023-12-08T09:07:13.778Z
2023-12-08T15:31:04.669Z
2023-12-09T06:54:32.625Z
{'Vendor': 'Totolink', 'Product': 'X5000R', 'Versions': '9.1.0cu.2300_B20230112'}
CVE-2023-6242
The EventON - WordPress Virtual Event Calendar Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.5.4 (for Pro) & 2.2.7 (for Free). This is due to missing or incorrect nonce validation on the evo_eventpost_update_meta function. This makes it possible for unauthenticated attackers to update arbitrary post metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c8e9a333-a6b7-4b5e-93c1-b95566e5d6fb?source=cve
2023-11-21T14:06:49.646Z
2024-01-11T14:32:23.144Z
2024-01-11T14:32:23.144Z
{'Vendor': 'ashanjay', 'Product': 'EventON', 'Versions': '*'}
CVE-2023-6868
In some instances, the user-agent would allow push requests which lacked a valid VAPID even though the push manager subscription defined one. This could allow empty messages to be sent from unauthorized parties. *This bug only affects Firefox on Android.* This vulnerability affects Firefox < 121.
https://bugzilla.mozilla.org/show_bug.cgi?id=1865488
2023-12-15T17:42:57.290Z
2023-12-19T13:38:50.669Z
2023-12-19T13:38:50.669Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-6887
A vulnerability classified as critical has been found in saysky ForestBlog up to 20220630. This affects an unknown part of the file /admin/upload/img of the component Image Upload Handler. The manipulation of the argument filename leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248247.
https://vuldb.com/?id.248247
2023-12-16T08:37:10.091Z
2023-12-17T00:31:04.405Z
2023-12-17T00:31:04.405Z
{'Vendor': 'saysky', 'Product': 'ForestBlog', 'Versions': '20220630'}
CVE-2023-6184
Cross SiteScripting vulnerability in Citrix Session Recording allows attacker to perform Cross Site Scripting
https://support.citrix.com/article/CTX583930/citrix-session-recording-security-bulletin-for-cve20236184
2023-11-16T21:18:24.367Z
2024-01-18T01:04:15.120Z
2024-01-18T01:04:15.120Z
{'Vendor': 'Cloud Software Group', 'Product': 'Citrix Session Recording', 'Versions': '2311 Current Release, 1912 LTSR , 2203 LTSR'}
CVE-2023-6350
Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html
2023-11-28T02:43:37.508Z
2023-11-29T12:02:05.123Z
2023-11-29T12:02:05.123Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.199'}
CVE-2023-6645
The Post Grid Combo – 36+ Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom JS parameter in all versions up to, and including, 2.2.64 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ab777672-6eef-4078-932d-24bb784107fa?source=cve
2023-12-08T20:55:13.445Z
2024-01-11T08:32:49.663Z
2024-01-11T08:32:49.663Z
{'Vendor': 'pickplugins', 'Product': 'Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel – Combo Blocks', 'Versions': '*'}
CVE-2023-6429
A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /invoicing/app/clients_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products
2023-11-30T10:46:00.745Z
2023-11-30T13:54:03.417Z
2023-11-30T13:54:03.417Z
{'Vendor': 'BigProf ', 'Product': 'Online Invoicing System', 'Versions': '2.6'}
CVE-2023-6583
The Import and export users and customers plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.24.2 via the Recurring Import functionality. This makes it possible for authenticated attackers, with administrator access and above, to read and delete the contents of arbitrary files on the server including wp-config.php, which can contain sensitive information.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ac709779-36f1-4f66-8db3-95a514a5ea59?source=cve
2023-12-07T14:47:52.315Z
2024-01-11T08:32:50.136Z
2024-01-11T08:32:50.136Z
{'Vendor': 'carazo', 'Product': 'Import and export users and customers', 'Versions': '*'}
CVE-2023-6079
null
null
2023-11-10T17:31:00.255Z
null
2023-11-15T17:01:33.722Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-6848
A vulnerability was found in kalcaddle kodbox up to 1.48. It has been declared as critical. Affected by this vulnerability is the function check of the file plugins/officeViewer/controller/libreOffice/index.class.php. The manipulation of the argument soffice leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.48.04 is able to address this issue. The identifier of the patch is 63a4d5708d210f119c24afd941d01a943e25334c. It is recommended to upgrade the affected component. The identifier VDB-248209 was assigned to this vulnerability.
https://vuldb.com/?id.248209
2023-12-15T16:15:54.998Z
2023-12-16T06:31:04.404Z
2023-12-16T06:31:04.404Z
{'Vendor': 'kalcaddle', 'Product': 'kodbox', 'Versions': '1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12, 1.13, 1.14, 1.15, 1.16, 1.17, 1.18, 1.19, 1.20, 1.21, 1.22, 1.23, 1.24, 1.25, 1.26, 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, 1.33, 1.34, 1.35, 1.36, 1.37, 1.38, 1.39, 1.40, 1.41, 1.42, 1.43, 1.44, 1.45, 1.46, 1.47, 1.48'}
CVE-2023-6632
The Happy Addons for Elementor plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via DOM in all versions up to and including 3.9.1.1 (versions up to 2.9.1.1 in Happy Addons for Elementor Pro) due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/06ef69f0-34d3-4389-8a81-a4d9922f1468?source=cve
2023-12-08T18:04:37.324Z
2024-01-11T08:32:27.224Z
2024-01-11T08:32:27.224Z
{'Vendor': 'weDevs', 'Product': 'Happy Addons for Elementor Pro', 'Versions': '*'}
CVE-2023-6798
The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to unauthorized settings update due to a missing capability check when updating settings in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with author-level access or above to change the plugin's settings including proxy settings, which are also exposed to authors.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c2cdf4e5-0a40-42ca-b5ac-78511fdd2b77?source=cve
2023-12-13T18:27:16.213Z
2024-01-06T09:38:36.799Z
2024-01-06T09:38:36.799Z
{'Vendor': 'themeisle', 'Product': 'RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator', 'Versions': '*'}
CVE-2023-6235
An uncontrolled search path element vulnerability has been found in the Duet Display product, affecting version 2.5.9.1. An attacker could place an arbitrary libusk.dll file in the C:\Users\user\AppData\Local\Microsoft\WindowsApps\ directory, which could lead to the execution and persistence of arbitrary code.
https://www.incibe.es/en/incibe-cert/notices/aviso/arbitrary-code-execution-duet-display
2023-11-21T08:42:59.605Z
2023-11-21T12:24:55.918Z
2023-11-21T12:24:55.918Z
{'Vendor': 'Duet Display', 'Product': 'Duet Display for Windows 10+', 'Versions': '2.5.9.1'}
CVE-2023-6720
An XSS vulnerability stored in Repox has been identified, which allows a local attacker to store a specially crafted JavaScript payload on the server, due to the lack of proper sanitisation of field elements, allowing the attacker to trigger the malicious payload when the application loads.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-repox
2023-12-12T08:04:45.812Z
2023-12-13T10:04:07.091Z
2023-12-13T10:04:07.091Z
{'Vendor': 'Repox', 'Product': 'Repox', 'Versions': '0'}
CVE-2023-6223
The LearnPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.2.5.7 via the /wp-json/lp/v1/profile/course-tab REST API due to missing validation on the 'userID' user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve the details of another user's course progress.
https://www.wordfence.com/threat-intel/vulnerabilities/id/215d5d9e-dabb-462d-8c51-952f8c497b78?source=cve
2023-11-20T20:57:47.843Z
2024-01-11T06:49:32.006Z
2024-01-11T06:49:32.006Z
{'Vendor': 'thimpress', 'Product': 'LearnPress – WordPress LMS Plugin', 'Versions': '*'}
CVE-2023-6366
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within Alert Center.   If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
https://www.progress.com/network-monitoring
2023-11-28T15:36:12.163Z
2023-12-14T16:05:31.492Z
2023-12-14T16:05:31.492Z
{'Vendor': 'Progress Software Corporation', 'Product': 'WhatsUp Gold', 'Versions': '2023.0, 2022.0'}
CVE-2023-6448
Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.
https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems
2023-11-30T18:40:51.463Z
2023-12-05T17:43:40.451Z
2023-12-19T16:23:39.022Z
{'Vendor': 'Unitronics', 'Product': 'VisiLogic', 'Versions': '0'}
CVE-2023-6018
An attacker can overwrite any file on the server hosting MLflow without any authentication.
https://huntr.com/bounties/7cf918b5-43f4-48c0-a371-4d963ce69b30
2023-11-08T09:12:29.945Z
2023-11-16T16:05:14.579Z
2023-11-16T16:05:14.579Z
{'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'}
CVE-2023-6274
A vulnerability was found in Beijing Baichuo Smart S80 up to 20231108. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /sysmanage/updatelib.php of the component PHP File Handler. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246103. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.246103
2023-11-24T07:35:58.776Z
2023-11-24T14:00:04.902Z
2023-11-24T14:00:04.902Z
{'Vendor': 'Beijing Baichuo', 'Product': 'Smart S80', 'Versions': '20231108'}
CVE-2023-6624
The Import and export users and customers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.24.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4731eb39-8c01-4a2b-80f7-15d8c13a19b5?source=cve
2023-12-08T14:29:23.325Z
2024-01-11T08:32:33.293Z
2024-01-11T08:32:33.293Z
{'Vendor': 'carazo', 'Product': 'Import and export users and customers', 'Versions': '*'}
CVE-2023-6761
A vulnerability, which was classified as problematic, has been found in Thecosy IceCMS up to 2.0.1. This issue affects some unknown processing of the component User Data Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247889 was assigned to this vulnerability.
https://vuldb.com/?id.247889
2023-12-13T07:40:04.184Z
2023-12-13T16:00:05.256Z
2023-12-13T16:00:05.256Z
{'Vendor': 'Thecosy', 'Product': 'IceCMS', 'Versions': '2.0.0, 2.0.1'}
CVE-2023-6576
A vulnerability was found in Beijing Baichuo S210 up to 20231123. It has been declared as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php of the component HTTP POST Request Handler. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247156. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.247156
2023-12-07T12:48:54.181Z
2023-12-07T20:31:04.084Z
2023-12-07T20:31:04.084Z
{'Vendor': 'Beijing Baichuo', 'Product': 'S210', 'Versions': '20231123'}
CVE-2023-6126
Code Injection in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.
https://huntr.com/bounties/e22a9be3-3273-42cb-bfcc-c67a1025684e
2023-11-14T15:51:26.576Z
2023-11-14T15:51:44.501Z
2023-11-14T15:51:44.501Z
{'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm', 'Versions': 'unspecified'}
CVE-2023-6433
A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /inventory/suppliers_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products
2023-11-30T10:46:07.063Z
2023-11-30T13:55:24.467Z
2023-11-30T13:55:24.467Z
{'Vendor': 'BigProf ', 'Product': 'Online Inventory Manager', 'Versions': '3.2'}
CVE-2023-6599
Missing Standardized Error Handling Mechanism in GitHub repository microweber/microweber prior to 2.0.
https://huntr.com/bounties/6198785c-bf60-422e-9b80-68a6e658a10e
2023-12-08T00:00:10.842Z
2023-12-08T00:00:32.714Z
2023-12-08T00:00:32.714Z
{'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'}
CVE-2023-6063
The WP Fastest Cache WordPress plugin before 1.2.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users.
https://wpscan.com/vulnerability/30a74105-8ade-4198-abe2-1c6f2967443e
2023-11-09T19:22:57.391Z
2023-12-04T21:29:41.536Z
2023-12-04T21:29:41.536Z
{'Vendor': 'Unknown', 'Product': 'WP Fastest Cache', 'Versions': '0'}
CVE-2023-6872
Browser tab titles were being leaked by GNOME to system logs. This could potentially expose the browsing habits of users running in a private tab. This vulnerability affects Firefox < 121.
https://bugzilla.mozilla.org/show_bug.cgi?id=1849186
2023-12-15T17:42:58.045Z
2023-12-19T13:38:54.985Z
2023-12-19T13:38:54.985Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-6034
null
null
2023-11-08T15:19:44.484Z
null
2023-11-13T23:39:52.077Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-6464
A vulnerability was found in SourceCodester User Registration and Login System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /endpoint/add-user.php. The manipulation of the argument user leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-246614 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.246614
2023-12-01T16:05:28.504Z
2023-12-02T09:00:07.949Z
2023-12-02T09:00:07.949Z
{'Vendor': 'SourceCodester', 'Product': 'User Registration and Login System', 'Versions': '1.0'}
CVE-2023-6608
A vulnerability was found in Tongda OA 2017 up to 11.9 and classified as critical. Affected by this issue is some unknown functionality of the file general/notify/manage/delete.php. The manipulation of the argument DELETE_STR leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-247244. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.247244
2023-12-08T08:00:23.294Z
2023-12-08T14:31:04.296Z
2023-12-08T14:31:04.296Z
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'}
CVE-2023-6864
Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1736385%2C1810805%2C1846328%2C1856090%2C1858033%2C1858509%2C1862089%2C1862777%2C1864015
2023-12-15T17:42:56.544Z
2023-12-19T13:38:45.300Z
2023-12-19T13:38:45.300Z
{'Vendor': 'Mozilla', 'Product': 'Firefox ESR', 'Versions': 'unspecified'}
CVE-2023-6188
A vulnerability was found in GetSimpleCMS 3.3.16/3.4.0a. It has been rated as critical. This issue affects some unknown processing of the file /admin/theme-edit.php. The manipulation leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-245735.
https://vuldb.com/?id.245735
2023-11-17T12:18:08.127Z
2023-11-17T17:31:04.595Z
2023-11-17T17:31:04.595Z
{'Vendor': 'n/a', 'Product': 'GetSimpleCMS', 'Versions': '3.3.16, 3.4.0a'}
CVE-2023-6472
A vulnerability, which was classified as problematic, has been found in PHPEMS 7.0. This issue affects some unknown processing of the file app\content\cls\api.cls.php of the component Content Section Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246629 was assigned to this vulnerability.
https://vuldb.com/?id.246629
2023-12-02T03:01:51.529Z
2023-12-02T18:31:03.772Z
2023-12-02T18:31:03.772Z
{'Vendor': 'n/a', 'Product': 'PHPEMS', 'Versions': '7.0'}