CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-2392 | A vulnerability was found in Netgear SRX5308 up to 4.3.5-3. It has been classified as problematic. Affected is an unknown function of the file scgi-bin/platform.cgi?page=time_zone.htm of the component Web Management Interface. The manipulation of the argument ManualDate.minutes leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-227670 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227670 | 2023-04-28T11:48:56.818Z | 2023-04-28T20:31:05.126Z | 2023-10-22T18:53:48.375Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2541 | The Web Frontend of KNIME Business Hub before 1.4.0 allows an unauthenticated remote attacker to access internals about the application such as versions, host names, or IP addresses. No personal information or application data was exposed.
| https://www.knime.com/security/advisories#CVE-2023-2541 | 2023-05-05T08:31:06.603Z | 2023-06-07T08:08:50.258Z | 2023-06-07T08:08:50.258Z | {'Vendor': 'KNIME', 'Product': 'KNIME Business Hub', 'Versions': '1.0.0'} |
CVE-2023-2111 | The Fast & Effective Popups & Lead-Generation for WordPress plugin before 2.1.4 concatenates user input into an SQL query without escaping it first in the plugin's report API endpoint, which could allow administrators in multi-site configuration to leak sensitive information from the site's database. | https://wpscan.com/vulnerability/7a0bdd47-c339-489d-9443-f173a83447f2 | 2023-04-17T08:05:05.951Z | 2023-05-30T07:49:22.658Z | 2023-05-30T07:49:22.658Z | {'Vendor': 'Unknown', 'Product': 'Fast & Effective Popups & Lead-Generation for WordPress', 'Versions': '0'} |
CVE-2023-2812 | The Ultimate Dashboard WordPress plugin before 3.7.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/7de4c313-359e-4450-85f5-d29f3c2f046a | 2023-05-19T13:39:31.334Z | 2023-06-19T10:52:55.173Z | 2023-06-19T10:52:55.173Z | {'Vendor': 'Unknown', 'Product': 'Ultimate Dashboard', 'Versions': '0'} |
CVE-2023-2957 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Lisa Software Florist Site allows SQL Injection.This issue affects Florist Site: before 3.0.
| https://www.usom.gov.tr/bildirim/tr-23-0403 | 2023-05-29T11:31:32.438Z | 2023-07-13T07:47:41.216Z | 2023-07-13T07:47:41.216Z | {'Vendor': 'Lisa Software', 'Product': 'Florist Site', 'Versions': '0'} |
CVE-2023-2404 | The CRM and Lead Management by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 2.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e26ccd06-22e0-4d91-a53a-df6ead8a8e3b?source=cve | 2023-04-28T16:01:15.770Z | 2023-06-03T04:35:16.352Z | 2023-06-03T04:35:16.352Z | {'Vendor': 'vcita', 'Product': 'CRM and Lead Management by vcita', 'Versions': '*'} |
CVE-2023-2054 | A vulnerability, which was classified as critical, was found in Campcodes Advanced Online Voting System 1.0. This affects an unknown part of the file /admin/positions_delete.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225939. | https://vuldb.com/?id.225939 | 2023-04-14T07:42:09.090Z | 2023-04-14T12:31:04.716Z | 2023-10-22T10:01:05.238Z | {'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'} |
CVE-2023-2243 | A vulnerability was found in SourceCodester Complaint Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file users/registration.php of the component POST Parameter Handler. The manipulation of the argument fullname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227228. | https://vuldb.com/?id.227228 | 2023-04-22T15:49:17.121Z | 2023-04-22T16:31:03.733Z | 2023-10-22T14:58:39.992Z | {'Vendor': 'SourceCodester', 'Product': 'Complaint Management System', 'Versions': '1.0'} |
CVE-2023-2306 |
Qognify NiceVision versions 3.1 and prior are vulnerable to exposing sensitive information using hard-coded credentials. With these credentials an attacker can retrieve information about the cameras, user information, and modify database records.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-278-02 | 2023-04-26T15:22:33.977Z | 2023-10-05T16:46:42.171Z | 2023-10-05T16:46:42.171Z | {'Vendor': 'Qognify', 'Product': 'NiceVision', 'Versions': '0'} |
CVE-2023-2756 | SQL Injection in GitHub repository pimcore/customer-data-framework prior to 3.3.10. | https://huntr.dev/bounties/cf398528-819f-456e-88e7-c06d268d3f44 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/customer-data-framework', 'Versions': 'unspecified'} |
CVE-2023-2886 | Missing Origin Validation in WebSockets vulnerability in CBOT Chatbot allows Content Spoofing Via Application API Manipulation.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.
| https://www.usom.gov.tr/bildirim/tr-23-0293 | 2023-05-25T08:03:31.837Z | 2023-05-25T08:31:24.499Z | 2023-10-18T07:37:07.056Z | {'Vendor': 'CBOT', 'Product': 'Chatbot', 'Versions': '0'} |
CVE-2023-2185 | null | null | 2023-04-19T00:00:00 | null | 2023-05-12T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2490 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Fernando Briano UserAgent-Spy plugin <= 1.3.1 versions. | https://patchstack.com/database/vulnerability/useragent-spy/wordpress-useragent-spy-plugin-1-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve | 2023-05-03T09:59:11.200Z | 2023-05-11T09:46:03.191Z | 2023-05-11T09:46:03.191Z | {'Vendor': 'Fernando Briano', 'Product': 'UserAgent-Spy', 'Versions': 'n/a'} |
CVE-2023-2869 | The WP-Members Membership plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the do_field_reorder function in versions up to, and including, 3.4.7.3. This makes it possible for authenticated attackers with subscriber-level access to reorder form elements on login forms. | https://www.wordfence.com/threat-intel/vulnerabilities/id/bf05a79a-0375-4c9d-bbf0-a87484327b87?source=cve | 2023-05-24T16:34:43.226Z | 2023-07-12T04:38:48.717Z | 2023-07-12T04:38:48.717Z | {'Vendor': 'cbutlerjr', 'Product': 'WP-Members Membership Plugin', 'Versions': '*'} |
CVE-2023-2644 | A vulnerability, which was classified as problematic, has been found in DigitalPersona FPSensor 1.0.0.1. This issue affects some unknown processing of the file C:\Program Files (x86)\FPSensor\bin\DpHost.exe. The manipulation leads to unquoted search path. Attacking locally is a requirement. The identifier VDB-228773 was assigned to this vulnerability. | https://vuldb.com/?id.228773 | 2023-05-11T05:21:50.890Z | 2023-05-11T07:00:06.766Z | 2023-10-23T05:40:38.445Z | {'Vendor': 'DigitalPersona', 'Product': 'FPSensor', 'Versions': '1.0.0.1'} |
CVE-2023-2214 | A vulnerability was found in Campcodes Coffee Shop POS System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/sales/manage_sale.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226979. | https://vuldb.com/?id.226979 | 2023-04-21T06:29:08.859Z | 2023-04-21T10:00:05.640Z | 2023-10-22T14:46:28.348Z | {'Vendor': 'Campcodes', 'Product': 'Coffee Shop POS System', 'Versions': '1.0'} |
CVE-2023-2701 | The Gravity Forms WordPress plugin before 2.7.5 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high-privileged users such as admin. | https://wpscan.com/vulnerability/298fbe34-62c2-4e56-9bdb-90da570c5bbe | 2023-05-15T09:55:25.578Z | 2023-07-17T13:30:00.715Z | 2023-07-17T13:30:00.715Z | {'Vendor': 'Unknown', 'Product': 'gravityforms', 'Versions': '0'} |
CVE-2023-2351 | The WP Directory Kit plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the 'ajax_admin' function in versions up to, and including, 1.2.3. This makes it possible for authenticated attackers with subscriber-level permissions or above to delete or change plugin settings, import demo data, delete Directory Kit related posts and terms, and install arbitrary plugins. A partial patch was introduced in version 1.2.0. | https://www.wordfence.com/threat-intel/vulnerabilities/id/50c5154c-1573-4c2b-85a1-a89bdb22dc7d?source=cve | 2023-04-27T14:19:51.549Z | 2023-06-13T01:48:06.282Z | 2023-06-13T01:48:06.282Z | {'Vendor': 'listingthemes', 'Product': 'WP Directory Kit', 'Versions': '*'} |
CVE-2023-2078 | The "Buy Me a Coffee – Button and Widget Plugin" plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on the recieve_post, bmc_disconnect, name_post, and widget_post functions in versions up to, and including, 3.7. This makes it possible for authenticated attackers, with minimal permissions such as subscribers, to update the plugins settings. CVE-2023-25030 may be a duplicate of this issue. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c1c218c6-1599-4dc9-846f-e0ef74821488?source=cve | 2023-04-14T19:05:13.001Z | 2023-07-11T02:03:55.890Z | 2023-07-11T02:03:55.890Z | {'Vendor': 'buymeacoffee', 'Product': 'Buy Me a Coffee – Button and Widget Plugin', 'Versions': '*'} |
CVE-2023-2582 | A prototype pollution vulnerability exists in Strikingly CMS which can result in reflected cross-site scripting (XSS) in affected applications and sites built with Strikingly. The vulnerability exists because of Strikingly JavaScript library parsing the URL fragment allows access to the __proto__ or constructor properties and the Object prototype. By leveraging an embedded gadget like jQuery, an attacker who convinces a victim to visit a specially crafted link could achieve arbitrary javascript execution in the context of the user's browser. | https://www.tenable.com/security/research/tra-2023-18 | 2023-05-08T00:00:00 | 2023-05-08T00:00:00 | 2023-05-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'Strikingly', 'Versions': 'All versions'} |
CVE-2023-2428 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13. | https://huntr.dev/bounties/cee65b6d-b003-4e6a-9d14-89aa94bee43e | 2023-04-30T00:00:00 | 2023-04-30T00:00:00 | 2023-04-30T00:00:00 | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-2994 | null | null | 2023-05-30T16:44:34.802Z | null | 2023-05-30T17:26:56.324Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2097 | A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226105 was assigned to this vulnerability. | https://vuldb.com/?id.226105 | 2023-04-15T09:11:51.421Z | 2023-04-15T11:00:08.918Z | 2023-10-22T14:09:50.749Z | {'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'} |
CVE-2023-2202 | Improper Access Control in GitHub repository francoisjacquet/rosariosis prior to 10.9.3. | https://huntr.dev/bounties/efe6ef47-d17c-4773-933a-4836c32db85c | 2023-04-21T00:00:00 | 2023-04-21T00:00:00 | 2023-04-21T00:00:00 | {'Vendor': 'francoisjacquet', 'Product': 'francoisjacquet/rosariosis', 'Versions': 'unspecified'} |
CVE-2023-2652 | A vulnerability classified as critical has been found in SourceCodester Lost and Found Information System 1.0. Affected is an unknown function of the file /classes/Master.php?f=delete_item. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-228780. | https://vuldb.com/?id.228780 | 2023-05-11T07:47:14.136Z | 2023-05-11T08:31:03.874Z | 2023-10-23T05:47:57.500Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
CVE-2023-2347 | A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/services/manage_service.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227590 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.227590 | 2023-04-27T13:38:03.162Z | 2023-04-27T14:31:04.439Z | 2023-10-22T16:06:15.000Z | {'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'} |
CVE-2023-2717 | The Groundhogg plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.7.9.8. This is due to missing nonce validation on the 'enable_safe_mode' function. This makes it possible for unauthenticated attackers to enable safe mode, which disables all other plugins, via a forged request if they can successfully trick an administrator into performing an action such as clicking on a link. A warning message about safe mode is displayed to the admin, which can be easily disabled. | https://www.wordfence.com/threat-intel/vulnerabilities/id/af73240c-b711-4e91-9998-5f7e6a9a4fb9?source=cve | 2023-05-15T16:57:58.649Z | 2023-05-20T02:03:24.840Z | 2023-05-20T02:03:24.840Z | {'Vendor': 'trainingbusinesspros', 'Product': 'WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg', 'Versions': '*'} |
CVE-2023-2594 | A vulnerability, which was classified as critical, was found in SourceCodester Food Ordering Management System 1.0. Affected is an unknown function of the component Registration. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-228396. | https://vuldb.com/?id.228396 | 2023-05-09T12:12:49.383Z | 2023-05-09T12:31:03.673Z | 2023-10-23T05:29:39.864Z | {'Vendor': 'SourceCodester', 'Product': 'Food Ordering Management System', 'Versions': '1.0'} |
CVE-2023-2982 | The WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 7.6.4. This is due to insufficient encryption on the user being supplied during a login validated through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they know the email address associated with that user. This was partially patched in version 7.6.4 and fully patched in version 7.6.5. | https://www.wordfence.com/threat-intel/vulnerabilities/id/08ca186a-2486-4a58-9c53-03e9eba13e66?source=cve | 2023-05-30T13:38:43.774Z | 2023-06-29T01:56:56.207Z | 2023-06-29T01:56:56.207Z | {'Vendor': 'cyberlord92', 'Product': 'WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn)', 'Versions': '*'} |
CVE-2023-2828 | Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit.
It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded.
This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1. | https://kb.isc.org/docs/cve-2023-2828 | 2023-05-22T07:57:41.362Z | 2023-06-21T16:26:07.096Z | 2023-06-21T16:26:07.096Z | {'Vendor': 'ISC', 'Product': 'BIND 9', 'Versions': '9.11.0, 9.18.0, 9.19.0, 9.11.3-S1, 9.18.11-S1'} |
CVE-2023-2605 | The wpbrutalai WordPress plugin before 2.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against a logged in high privilege users such as admin. | https://wpscan.com/vulnerability/372cb940-71ba-4d19-b35a-ab15f8c2fdeb | 2023-05-09T15:38:11.242Z | 2023-06-27T13:17:26.709Z | 2023-06-27T13:17:26.709Z | {'Vendor': 'Unknown', 'Product': 'wpbrutalai', 'Versions': '0'} |
CVE-2023-2255 | Improper access control in editor components of The Document Foundation LibreOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of LibreOffice documents that used "floating frames" linked to external files, would load the contents of those frames without prompting the user for permission to do so. This was inconsistent with the treatment of other linked content in LibreOffice. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.7; 7.5 versions prior to 7.5.3. | https://www.libreoffice.org/about-us/security/advisories/CVE-2023-2255 | 2023-04-24T00:00:00 | 2023-05-25T00:00:00 | 2023-11-26T09:06:16.295449 | {'Vendor': 'The Document Foundation', 'Product': 'LibreOffice', 'Versions': '7.4, 7.5'} |
CVE-2023-2740 | A vulnerability, which was classified as problematic, has been found in SourceCodester Guest Management System 1.0. Affected by this issue is some unknown functionality of the file dateTest.php of the component GET Parameter Handler. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229160. | https://vuldb.com/?id.229160 | 2023-05-16T16:13:51.292Z | 2023-05-16T16:31:03.385Z | 2023-10-23T06:25:48.689Z | {'Vendor': 'SourceCodester', 'Product': 'Guest Management System', 'Versions': '1.0'} |
CVE-2023-2310 | A Channel Accessible by Non-Endpoint vulnerability in the Schweitzer Engineering Laboratories SEL Real-Time Automation Controller (RTAC) could allow a remote attacker to perform a man-in-the-middle (MiTM) that could result in denial of service.
See the ACSELERATOR RTAC SEL-5033 Software instruction manual date code 20210915 for more details. | https://selinc.com/support/security-notifications/external-reports/ | 2023-04-26T18:25:33.932Z | 2023-05-10T19:18:43.806Z | 2023-05-10T19:18:43.806Z | {'Vendor': 'Schweitzer Engineering Laboratories', 'Product': 'SEL-3505', 'Versions': 'R119-V0, R119-V0, R119-V0, R119-V0'} |
CVE-2023-2039 | A vulnerability was found in novel-plus 3.6.2. It has been rated as critical. This issue affects some unknown processing of the file /author/list?limit=10&offset=0&order=desc. The manipulation of the argument sort leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225917 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.225917 | 2023-04-14T06:30:50.683Z | 2023-04-14T08:00:05.391Z | 2023-10-22T09:45:13.622Z | {'Vendor': 'n/a', 'Product': 'novel-plus', 'Versions': '3.6.2'} |
CVE-2023-2469 | null | null | 2023-05-02T08:32:53.378Z | null | 2023-05-17T07:35:35.479Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2193 | Mattermost fails to invalidate existing authorization codes when deauthorizing an OAuth2 app, allowing an attacker possessing an authorization code to generate an access token.
| https://mattermost.com/security-updates/ | 2023-04-20T08:16:27.253Z | 2023-04-20T08:17:04.731Z | 2023-04-20T08:17:04.731Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 7.10, 7.9.3, 7.8.4, 7.7.5, 7.1.9'} |
CVE-2023-6794 | An arbitrary file upload vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-write administrator with access to the web interface to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall. | https://security.paloaltonetworks.com/CVE-2023-6794 | 2023-12-13T17:27:26.884Z | 2023-12-13T18:16:39.175Z | 2023-12-13T18:16:39.175Z | {'Vendor': 'Palo Alto Networks', 'Product': 'PAN-OS', 'Versions': '8.1, 9.0, 9.1, 10.1, 10.2, 11.0, 11.1'} |
CVE-2023-6002 | YugabyteDB is vulnerable to cross site scripting (XSS) via log injection. Writing invalidated user input to log files can allow an unprivileged attacker to forge log entries or inject malicious content into the logs.
| https://www.yugabyte.com/ | 2023-11-07T22:20:00.534Z | 2023-11-07T23:56:50.729Z | 2023-11-09T19:18:33.398Z | {'Vendor': 'YugabyteDB', 'Product': 'YugabyteDB', 'Versions': '2.0.0.0, 2.14.14.0, 2.16.8.0, 2.18.4.0'} |
CVE-2023-6901 | A vulnerability, which was classified as critical, was found in codelyfe Stupid Simple CMS up to 1.2.3. This affects an unknown part of the file /terminal/handle-command.php of the component HTTP POST Request Handler. The manipulation of the argument command with the input whoami leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248259. | https://vuldb.com/?id.248259 | 2023-12-16T19:43:19.876Z | 2023-12-17T14:00:04.686Z | 2023-12-17T14:00:04.686Z | {'Vendor': 'codelyfe', 'Product': 'Stupid Simple CMS', 'Versions': '1.2.0, 1.2.1, 1.2.2, 1.2.3'} |
CVE-2023-6147 |
Qualys Jenkins Plugin for Policy Compliance prior to version and including 1.0.5 was identified to be affected by a security flaw, which was missing a permission check while performing a connectivity check to Qualys Cloud Services. This allowed any user with login access to configure or edit jobs to utilize the plugin and configure potential a rouge endpoint via which it was possible to control response for certain request which could be injected with XXE payloads leading to XXE while processing the response data | https://www.qualys.com/security-advisories/ | 2023-11-15T10:10:24.476Z | 2024-01-09T08:08:43.883Z | 2024-01-09T08:08:43.883Z | {'Vendor': 'Qualys,Inc. ', 'Product': 'Policy Compliance Connector Jenkins Plugin', 'Versions': '1.0.5'} |
CVE-2023-6393 | A flaw was found in the Quarkus Cache Runtime. When request processing utilizes a Uni cached using @CacheResult and the cached Uni reuses the initial "completion" context, the processing switches to the cached Uni instead of the request context. This is a problem if the cached Uni context contains sensitive information, and could allow a malicious user to benefit from a POST request returning the response that is meant for another user, gaining access to sensitive data. | https://access.redhat.com/security/cve/CVE-2023-6393 | 2023-11-30T03:30:16.241Z | 2023-12-06T16:58:54.230Z | 2024-01-23T02:03:53.595Z | {'Vendor': 'n/a', 'Product': 'quarkus', 'Versions': '3.2.9.GA, 2.13.9.CR2'} |
CVE-2023-6239 | Under rare conditions, the effective permissions of an object might be incorrectly calculated if the object has a specific configuration of metadata-driven permissions in M-Files Server versions 23.9, 23.10, and 23.11 before 23.11.13168.7, potentially enabling unauthorized access to the object.
| https://www.m-files.com/about/trust-center/security-advisories/cve-2023-6239/ | 2023-11-21T12:03:50.773Z | 2023-11-28T14:07:20.877Z | 2023-11-30T15:44:48.463Z | {'Vendor': 'M-Files', 'Product': 'M-Files Server', 'Versions': '23.9, 23.10, 23.11'} |
CVE-2023-6540 | A vulnerability was reported in the Lenovo Browser Mobile and Lenovo Browser HD Apps for Android that could allow an attacker to craft a payload that could result in the disclosure of sensitive information. | https://iknow.lenovo.com.cn/detail/419251 | 2023-12-05T23:58:51.346Z | 2024-01-03T21:01:59.690Z | 2024-01-03T21:01:59.690Z | {'Vendor': 'Lenovo', 'Product': 'Lenovo Browser Mobile', 'Versions': ' '} |
CVE-2023-6690 | A race condition in GitHub Enterprise Server allowed an existing admin to maintain permissions on transferred repositories by making a GraphQL mutation to alter repository permissions during the transfer. This vulnerability affected GitHub Enterprise Server version 3.8.0 and above and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
| https://docs.github.com/en/[email protected]/admin/release-notes#3.8.12 | 2023-12-11T17:06:22.719Z | 2023-12-21T20:45:19.285Z | 2023-12-21T20:45:19.285Z | {'Vendor': 'GitHub', 'Product': 'Enterprise Server', 'Versions': '3.8, 3.9, 3.10, 3.11'} |
CVE-2023-6413 | A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via photos.php in the id and user parameters. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script | 2023-11-30T10:02:07.236Z | 2023-11-30T13:11:58.127Z | 2023-11-30T13:11:58.127Z | {'Vendor': 'Voovi Social Networking Script', 'Product': 'Voovi Social Networking Script', 'Versions': '1.0'} |
CVE-2023-6043 | A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker to bypass integrity checks and execute arbitrary code with elevated privileges. | https://support.lenovo.com/us/en/product_security/LEN-144736 | 2023-11-08T21:12:22.029Z | 2024-01-19T20:08:26.945Z | 2024-01-19T20:08:26.945Z | {'Vendor': 'Lenovo', 'Product': 'Vantage', 'Versions': ' '} |
CVE-2023-6940 | with only one user interaction(download a malicious config), attackers can gain full command execution on the victim system. | https://huntr.com/bounties/c6f59480-ce47-4f78-a3dc-4bd8ca15029c | 2023-12-19T01:40:50.546Z | 2023-12-19T01:41:12.560Z | 2023-12-19T01:41:12.560Z | {'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'} |
CVE-2023-6556 | The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via currency options in all versions up to, and including, 1.4.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/8cb37019-33f6-4f72-adfc-befbfbf69e47?source=cve | 2023-12-06T14:39:21.279Z | 2024-01-11T08:32:45.695Z | 2024-01-11T08:32:45.695Z | {'Vendor': 'realmag777', 'Product': 'FOX – Currency Switcher Professional for WooCommerce', 'Versions': '*'} |
CVE-2023-6106 | null | null | 2023-11-13T15:24:04.193Z | null | 2023-11-13T23:36:29.663Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-6782 | The AMP for WP – Accelerated Mobile Pages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.0.92 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c1cae64e-caed-43c0-9a75-9aa4234946a0?source=cve | 2023-12-13T15:02:41.145Z | 2024-01-11T08:32:55.986Z | 2024-01-11T08:32:55.986Z | {'Vendor': 'mohammed_kaludi', 'Product': 'AMP for WP – Accelerated Mobile Pages', 'Versions': '*'} |
CVE-2023-6297 | A vulnerability classified as problematic has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file patient-search-report.php of the component Search Report Page. The manipulation of the argument Search By Patient Name with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246123. | https://vuldb.com/?id.246123 | 2023-11-26T07:21:11.672Z | 2023-11-26T22:31:04.240Z | 2023-11-26T22:31:04.240Z | {'Vendor': 'PHPGurukul', 'Product': 'Nipah Virus Testing Management System', 'Versions': '1.0'} |
CVE-2023-6014 | An attacker is able to arbitrarily create an account in MLflow bypassing any authentication requirment. | https://huntr.com/bounties/3e64df69-ddc2-463e-9809-d07c24dc1de4 | 2023-11-08T09:11:22.613Z | 2023-11-16T21:07:36.577Z | 2023-11-16T21:07:36.577Z | {'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'} |
CVE-2023-6151 | Improper Privilege Management vulnerability in ESKOM Computer e-municipality module allows Collect Data as Provided by Users.This issue affects e-municipality module: before v.105.
| https://www.usom.gov.tr/bildirim/tr-23-0664 | 2023-11-15T12:19:47.534Z | 2023-11-28T09:29:12.504Z | 2023-12-05T06:18:46.314Z | {'Vendor': 'ESKOM Computer', 'Product': 'e-municipality module', 'Versions': '0'} |
CVE-2023-6852 | A vulnerability classified as critical has been found in kalcaddle KodExplorer up to 4.51.03. Affected is an unknown function of the file plugins/webodf/app.php. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.52.01 is able to address this issue. The name of the patch is 5cf233f7556b442100cf67b5e92d57ceabb126c6. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-248220. | https://vuldb.com/?id.248220 | 2023-12-15T16:38:19.441Z | 2023-12-16T11:31:03.827Z | 2023-12-16T11:31:03.827Z | {'Vendor': 'kalcaddle', 'Product': 'KodExplorer', 'Versions': '4.51.03'} |
CVE-2023-6346 | Use after free in WebAudio in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html | 2023-11-28T01:12:09.277Z | 2023-11-29T12:02:04.978Z | 2023-11-29T12:02:04.978Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.199'} |
CVE-2023-6653 | A vulnerability was found in PHPGurukul Teacher Subject Allocation Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/subject.php of the component Create a new Subject. The manipulation of the argument cid leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-247346 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.247346 | 2023-12-09T17:29:48.357Z | 2023-12-10T12:31:03.928Z | 2023-12-10T12:31:03.928Z | {'Vendor': 'PHPGurukul', 'Product': 'Teacher Subject Allocation Management System', 'Versions': '1.0'} |
CVE-2023-6203 | The Events Calendar WordPress plugin before 6.2.8.1 discloses the content of password protected posts to unauthenticated users via a crafted request | https://wpscan.com/vulnerability/229273e6-e849-447f-a95a-0730969ecdae | 2023-11-20T13:33:17.684Z | 2023-12-18T20:07:53.415Z | 2023-12-18T20:07:53.415Z | {'Vendor': 'Unknown', 'Product': 'The Events Calendar', 'Versions': '0'} |
CVE-2023-6595 |
In WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate ancillary credential information stored within WhatsUp Gold.
| https://www.progress.com/network-monitoring | 2023-12-07T20:21:13.167Z | 2023-12-14T16:06:11.767Z | 2023-12-14T16:06:11.767Z | {'Vendor': 'Progress Software Corporation', 'Product': 'WhatsUp Gold', 'Versions': '2023.0, 2022.0'} |
CVE-2023-6311 | A vulnerability was found in SourceCodester Loan Management System 1.0 and classified as critical. This issue affects the function delete_ltype of the file delete_ltype.php of the component Loan Type Page. The manipulation of the argument ltype_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246137 was assigned to this vulnerability. | https://vuldb.com/?id.246137 | 2023-11-26T15:20:54.536Z | 2023-11-27T02:00:06.792Z | 2023-11-27T02:00:06.792Z | {'Vendor': 'SourceCodester', 'Product': 'Loan Management System', 'Versions': '1.0'} |
CVE-2023-6741 | The WP Customer Area WordPress plugin before 8.2.1 does not properly validate users capabilities in some of its AJAX actions, allowing malicious users to edit other users' account address. | https://wpscan.com/vulnerability/9debe1ea-18ad-44c4-8078-68eb66d36c4a/ | 2023-12-12T15:58:59.273Z | 2024-01-16T15:56:59.595Z | 2024-01-16T15:56:59.595Z | {'Vendor': 'Unknown', 'Product': 'WP Customer Area', 'Versions': '0'} |
CVE-2023-6254 | A Vulnerability in OTRS AgentInterface and ExternalInterface allows the reading of plain text passwords which are send back to the client in the server response-
This issue affects OTRS: from 8.0.X through 8.0.37.
| https://otrs.com/release-notes/otrs-security-advisory-2023-11/ | 2023-11-22T12:14:39.322Z | 2023-11-27T09:44:00.273Z | 2023-11-27T09:44:00.273Z | {'Vendor': 'OTRS AG', 'Product': 'OTRS', 'Versions': '8.0.x'} |
CVE-2023-6038 | An attacker is able to read any file on the server hosting the H2O dashboard without any authentication. | https://huntr.com/bounties/380fce33-fec5-49d9-a101-12c972125d8c | 2023-11-08T18:15:34.018Z | 2023-11-16T16:06:43.684Z | 2023-11-16T16:06:43.684Z | {'Vendor': 'h2oai', 'Product': 'h2oai/h2o-3', 'Versions': 'unspecified'} |
CVE-2023-6891 | A vulnerability has been found in PeaZip 9.4.0 and classified as problematic. Affected by this vulnerability is an unknown functionality in the library dragdropfilesdll.dll of the component Library Handler. The manipulation leads to uncontrolled search path. An attack has to be approached locally. Upgrading to version 9.6.0 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-248251. NOTE: Vendor was contacted early, confirmed the existence of the flaw and immediately worked on a patched release. | https://vuldb.com/?id.248251 | 2023-12-16T12:51:39.702Z | 2023-12-17T03:31:03.908Z | 2023-12-17T03:31:03.908Z | {'Vendor': 'n/a', 'Product': 'PeaZip', 'Versions': '9.4.0'} |
CVE-2023-6757 | A vulnerability was found in Thecosy IceCMS 2.0.1. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /adplanet/PlanetUser of the component API. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247885 was assigned to this vulnerability. | https://vuldb.com/?id.247885 | 2023-12-13T07:39:46.821Z | 2023-12-13T14:00:05.225Z | 2023-12-13T14:00:05.225Z | {'Vendor': 'Thecosy', 'Product': 'IceCMS', 'Versions': '2.0.1'} |
CVE-2023-6307 | A vulnerability classified as critical was found in jeecgboot JimuReport up to 1.6.1. Affected by this vulnerability is an unknown functionality of the file /download/image. The manipulation of the argument imageUrl leads to relative path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246133 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.246133 | 2023-11-26T15:08:14.077Z | 2023-11-27T01:00:06.877Z | 2023-11-27T01:00:06.877Z | {'Vendor': 'jeecgboot', 'Product': 'JimuReport', 'Versions': '1.6.0, 1.6.1'} |
CVE-2023-6612 | A vulnerability was found in Totolink X5000R 9.1.0cu.2300_B20230112. It has been rated as critical. This issue affects the function setDdnsCfg/setDynamicRoute/setFirewallType/setIPSecCfg/setIpPortFilterRules/setLancfg/setLoginPasswordCfg/setMacFilterRules/setMtknatCfg/setNetworkConfig/setPortForwardRules/setRemoteCfg/setSSServer/setScheduleCfg/setSmartQosCfg/setStaticDhcpRules/setStaticRoute/setVpnAccountCfg/setVpnPassCfg/setVpnUser/setWiFiAclAddConfig/setWiFiEasyGuestCfg/setWiFiGuestCfg/setWiFiRepeaterConfig/setWiFiScheduleCfg/setWizardCfg of the file /cgi-bin/cstecgi.cgi. The manipulation leads to os command injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247247. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.247247 | 2023-12-08T09:07:13.778Z | 2023-12-08T15:31:04.669Z | 2023-12-09T06:54:32.625Z | {'Vendor': 'Totolink', 'Product': 'X5000R', 'Versions': '9.1.0cu.2300_B20230112'} |
CVE-2023-6242 | The EventON - WordPress Virtual Event Calendar Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.5.4 (for Pro) & 2.2.7 (for Free). This is due to missing or incorrect nonce validation on the evo_eventpost_update_meta function. This makes it possible for unauthenticated attackers to update arbitrary post metadata via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c8e9a333-a6b7-4b5e-93c1-b95566e5d6fb?source=cve | 2023-11-21T14:06:49.646Z | 2024-01-11T14:32:23.144Z | 2024-01-11T14:32:23.144Z | {'Vendor': 'ashanjay', 'Product': 'EventON', 'Versions': '*'} |
CVE-2023-6868 | In some instances, the user-agent would allow push requests which lacked a valid VAPID even though the push manager subscription defined one. This could allow empty messages to be sent from unauthorized parties.
*This bug only affects Firefox on Android.* This vulnerability affects Firefox < 121. | https://bugzilla.mozilla.org/show_bug.cgi?id=1865488 | 2023-12-15T17:42:57.290Z | 2023-12-19T13:38:50.669Z | 2023-12-19T13:38:50.669Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-6887 | A vulnerability classified as critical has been found in saysky ForestBlog up to 20220630. This affects an unknown part of the file /admin/upload/img of the component Image Upload Handler. The manipulation of the argument filename leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-248247. | https://vuldb.com/?id.248247 | 2023-12-16T08:37:10.091Z | 2023-12-17T00:31:04.405Z | 2023-12-17T00:31:04.405Z | {'Vendor': 'saysky', 'Product': 'ForestBlog', 'Versions': '20220630'} |
CVE-2023-6184 | Cross SiteScripting vulnerability in Citrix Session Recording allows attacker to perform Cross Site Scripting | https://support.citrix.com/article/CTX583930/citrix-session-recording-security-bulletin-for-cve20236184 | 2023-11-16T21:18:24.367Z | 2024-01-18T01:04:15.120Z | 2024-01-18T01:04:15.120Z | {'Vendor': 'Cloud Software Group', 'Product': 'Citrix Session Recording', 'Versions': '2311 Current Release, 1912 LTSR , 2203 LTSR'} |
CVE-2023-6350 | Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html | 2023-11-28T02:43:37.508Z | 2023-11-29T12:02:05.123Z | 2023-11-29T12:02:05.123Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.199'} |
CVE-2023-6645 | The Post Grid Combo – 36+ Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the custom JS parameter in all versions up to, and including, 2.2.64 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor access or higher to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ab777672-6eef-4078-932d-24bb784107fa?source=cve | 2023-12-08T20:55:13.445Z | 2024-01-11T08:32:49.663Z | 2024-01-11T08:32:49.663Z | {'Vendor': 'pickplugins', 'Product': 'Post Grid, Form Maker, Popup Maker, WooCommerce Blocks, Post Blocks, Post Carousel – Combo Blocks', 'Versions': '*'} |
CVE-2023-6429 | A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /invoicing/app/clients_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products | 2023-11-30T10:46:00.745Z | 2023-11-30T13:54:03.417Z | 2023-11-30T13:54:03.417Z | {'Vendor': 'BigProf ', 'Product': 'Online Invoicing System', 'Versions': '2.6'} |
CVE-2023-6583 | The Import and export users and customers plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.24.2 via the Recurring Import functionality. This makes it possible for authenticated attackers, with administrator access and above, to read and delete the contents of arbitrary files on the server including wp-config.php, which can contain sensitive information. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ac709779-36f1-4f66-8db3-95a514a5ea59?source=cve | 2023-12-07T14:47:52.315Z | 2024-01-11T08:32:50.136Z | 2024-01-11T08:32:50.136Z | {'Vendor': 'carazo', 'Product': 'Import and export users and customers', 'Versions': '*'} |
CVE-2023-6079 | null | null | 2023-11-10T17:31:00.255Z | null | 2023-11-15T17:01:33.722Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-6848 | A vulnerability was found in kalcaddle kodbox up to 1.48. It has been declared as critical. Affected by this vulnerability is the function check of the file plugins/officeViewer/controller/libreOffice/index.class.php. The manipulation of the argument soffice leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.48.04 is able to address this issue. The identifier of the patch is 63a4d5708d210f119c24afd941d01a943e25334c. It is recommended to upgrade the affected component. The identifier VDB-248209 was assigned to this vulnerability. | https://vuldb.com/?id.248209 | 2023-12-15T16:15:54.998Z | 2023-12-16T06:31:04.404Z | 2023-12-16T06:31:04.404Z | {'Vendor': 'kalcaddle', 'Product': 'kodbox', 'Versions': '1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12, 1.13, 1.14, 1.15, 1.16, 1.17, 1.18, 1.19, 1.20, 1.21, 1.22, 1.23, 1.24, 1.25, 1.26, 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, 1.33, 1.34, 1.35, 1.36, 1.37, 1.38, 1.39, 1.40, 1.41, 1.42, 1.43, 1.44, 1.45, 1.46, 1.47, 1.48'} |
CVE-2023-6632 | The Happy Addons for Elementor plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via DOM in all versions up to and including 3.9.1.1 (versions up to 2.9.1.1 in Happy Addons for Elementor Pro) due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/06ef69f0-34d3-4389-8a81-a4d9922f1468?source=cve | 2023-12-08T18:04:37.324Z | 2024-01-11T08:32:27.224Z | 2024-01-11T08:32:27.224Z | {'Vendor': 'weDevs', 'Product': 'Happy Addons for Elementor Pro', 'Versions': '*'} |
CVE-2023-6798 | The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to unauthorized settings update due to a missing capability check when updating settings in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with author-level access or above to change the plugin's settings including proxy settings, which are also exposed to authors. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c2cdf4e5-0a40-42ca-b5ac-78511fdd2b77?source=cve | 2023-12-13T18:27:16.213Z | 2024-01-06T09:38:36.799Z | 2024-01-06T09:38:36.799Z | {'Vendor': 'themeisle', 'Product': 'RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator', 'Versions': '*'} |
CVE-2023-6235 | An uncontrolled search path element vulnerability has been found in the Duet Display product, affecting version 2.5.9.1. An attacker could place an arbitrary libusk.dll file in the C:\Users\user\AppData\Local\Microsoft\WindowsApps\ directory, which could lead to the execution and persistence of arbitrary code. | https://www.incibe.es/en/incibe-cert/notices/aviso/arbitrary-code-execution-duet-display | 2023-11-21T08:42:59.605Z | 2023-11-21T12:24:55.918Z | 2023-11-21T12:24:55.918Z | {'Vendor': 'Duet Display', 'Product': 'Duet Display for Windows 10+', 'Versions': '2.5.9.1'} |
CVE-2023-6720 | An XSS vulnerability stored in Repox has been identified, which allows a local attacker to store a specially crafted JavaScript payload on the server, due to the lack of proper sanitisation of field elements, allowing the attacker to trigger the malicious payload when the application loads. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-repox | 2023-12-12T08:04:45.812Z | 2023-12-13T10:04:07.091Z | 2023-12-13T10:04:07.091Z | {'Vendor': 'Repox', 'Product': 'Repox', 'Versions': '0'} |
CVE-2023-6223 | The LearnPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.2.5.7 via the /wp-json/lp/v1/profile/course-tab REST API due to missing validation on the 'userID' user controlled key. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve the details of another user's course progress. | https://www.wordfence.com/threat-intel/vulnerabilities/id/215d5d9e-dabb-462d-8c51-952f8c497b78?source=cve | 2023-11-20T20:57:47.843Z | 2024-01-11T06:49:32.006Z | 2024-01-11T06:49:32.006Z | {'Vendor': 'thimpress', 'Product': 'LearnPress – WordPress LMS Plugin', 'Versions': '*'} |
CVE-2023-6366 |
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within Alert Center.
If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
| https://www.progress.com/network-monitoring | 2023-11-28T15:36:12.163Z | 2023-12-14T16:05:31.492Z | 2023-12-14T16:05:31.492Z | {'Vendor': 'Progress Software Corporation', 'Product': 'WhatsUp Gold', 'Versions': '2023.0, 2022.0'} |
CVE-2023-6448 | Unitronics VisiLogic before version 9.9.00, used in Vision and Samba PLCs and HMIs, uses a default administrative password. An unauthenticated attacker with network access can take administrative control of a vulnerable system.
| https://www.cisa.gov/news-events/alerts/2023/11/28/exploitation-unitronics-plcs-used-water-and-wastewater-systems | 2023-11-30T18:40:51.463Z | 2023-12-05T17:43:40.451Z | 2023-12-19T16:23:39.022Z | {'Vendor': 'Unitronics', 'Product': 'VisiLogic', 'Versions': '0'} |
CVE-2023-6018 | An attacker can overwrite any file on the server hosting MLflow without any authentication. | https://huntr.com/bounties/7cf918b5-43f4-48c0-a371-4d963ce69b30 | 2023-11-08T09:12:29.945Z | 2023-11-16T16:05:14.579Z | 2023-11-16T16:05:14.579Z | {'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'} |
CVE-2023-6274 | A vulnerability was found in Beijing Baichuo Smart S80 up to 20231108. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /sysmanage/updatelib.php of the component PHP File Handler. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246103. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.246103 | 2023-11-24T07:35:58.776Z | 2023-11-24T14:00:04.902Z | 2023-11-24T14:00:04.902Z | {'Vendor': 'Beijing Baichuo', 'Product': 'Smart S80', 'Versions': '20231108'} |
CVE-2023-6624 | The Import and export users and customers plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.24.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/4731eb39-8c01-4a2b-80f7-15d8c13a19b5?source=cve | 2023-12-08T14:29:23.325Z | 2024-01-11T08:32:33.293Z | 2024-01-11T08:32:33.293Z | {'Vendor': 'carazo', 'Product': 'Import and export users and customers', 'Versions': '*'} |
CVE-2023-6761 | A vulnerability, which was classified as problematic, has been found in Thecosy IceCMS up to 2.0.1. This issue affects some unknown processing of the component User Data Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247889 was assigned to this vulnerability. | https://vuldb.com/?id.247889 | 2023-12-13T07:40:04.184Z | 2023-12-13T16:00:05.256Z | 2023-12-13T16:00:05.256Z | {'Vendor': 'Thecosy', 'Product': 'IceCMS', 'Versions': '2.0.0, 2.0.1'} |
CVE-2023-6576 | A vulnerability was found in Beijing Baichuo S210 up to 20231123. It has been declared as critical. This vulnerability affects unknown code of the file /Tool/uploadfile.php of the component HTTP POST Request Handler. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247156. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.247156 | 2023-12-07T12:48:54.181Z | 2023-12-07T20:31:04.084Z | 2023-12-07T20:31:04.084Z | {'Vendor': 'Beijing Baichuo', 'Product': 'S210', 'Versions': '20231123'} |
CVE-2023-6126 | Code Injection in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2. | https://huntr.com/bounties/e22a9be3-3273-42cb-bfcc-c67a1025684e | 2023-11-14T15:51:26.576Z | 2023-11-14T15:51:44.501Z | 2023-11-14T15:51:44.501Z | {'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm', 'Versions': 'unspecified'} |
CVE-2023-6433 | A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /inventory/suppliers_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products | 2023-11-30T10:46:07.063Z | 2023-11-30T13:55:24.467Z | 2023-11-30T13:55:24.467Z | {'Vendor': 'BigProf ', 'Product': 'Online Inventory Manager', 'Versions': '3.2'} |
CVE-2023-6599 | Missing Standardized Error Handling Mechanism in GitHub repository microweber/microweber prior to 2.0. | https://huntr.com/bounties/6198785c-bf60-422e-9b80-68a6e658a10e | 2023-12-08T00:00:10.842Z | 2023-12-08T00:00:32.714Z | 2023-12-08T00:00:32.714Z | {'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'} |
CVE-2023-6063 | The WP Fastest Cache WordPress plugin before 1.2.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users. | https://wpscan.com/vulnerability/30a74105-8ade-4198-abe2-1c6f2967443e | 2023-11-09T19:22:57.391Z | 2023-12-04T21:29:41.536Z | 2023-12-04T21:29:41.536Z | {'Vendor': 'Unknown', 'Product': 'WP Fastest Cache', 'Versions': '0'} |
CVE-2023-6872 | Browser tab titles were being leaked by GNOME to system logs. This could potentially expose the browsing habits of users running in a private tab. This vulnerability affects Firefox < 121. | https://bugzilla.mozilla.org/show_bug.cgi?id=1849186 | 2023-12-15T17:42:58.045Z | 2023-12-19T13:38:54.985Z | 2023-12-19T13:38:54.985Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-6034 | null | null | 2023-11-08T15:19:44.484Z | null | 2023-11-13T23:39:52.077Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-6464 | A vulnerability was found in SourceCodester User Registration and Login System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /endpoint/add-user.php. The manipulation of the argument user leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-246614 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.246614 | 2023-12-01T16:05:28.504Z | 2023-12-02T09:00:07.949Z | 2023-12-02T09:00:07.949Z | {'Vendor': 'SourceCodester', 'Product': 'User Registration and Login System', 'Versions': '1.0'} |
CVE-2023-6608 | A vulnerability was found in Tongda OA 2017 up to 11.9 and classified as critical. Affected by this issue is some unknown functionality of the file general/notify/manage/delete.php. The manipulation of the argument DELETE_STR leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-247244. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.247244 | 2023-12-08T08:00:23.294Z | 2023-12-08T14:31:04.296Z | 2023-12-08T14:31:04.296Z | {'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'} |
CVE-2023-6864 | Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121. | https://bugzilla.mozilla.org/buglist.cgi?bug_id=1736385%2C1810805%2C1846328%2C1856090%2C1858033%2C1858509%2C1862089%2C1862777%2C1864015 | 2023-12-15T17:42:56.544Z | 2023-12-19T13:38:45.300Z | 2023-12-19T13:38:45.300Z | {'Vendor': 'Mozilla', 'Product': 'Firefox ESR', 'Versions': 'unspecified'} |
CVE-2023-6188 | A vulnerability was found in GetSimpleCMS 3.3.16/3.4.0a. It has been rated as critical. This issue affects some unknown processing of the file /admin/theme-edit.php. The manipulation leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-245735. | https://vuldb.com/?id.245735 | 2023-11-17T12:18:08.127Z | 2023-11-17T17:31:04.595Z | 2023-11-17T17:31:04.595Z | {'Vendor': 'n/a', 'Product': 'GetSimpleCMS', 'Versions': '3.3.16, 3.4.0a'} |
CVE-2023-6472 | A vulnerability, which was classified as problematic, has been found in PHPEMS 7.0. This issue affects some unknown processing of the file app\content\cls\api.cls.php of the component Content Section Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246629 was assigned to this vulnerability. | https://vuldb.com/?id.246629 | 2023-12-02T03:01:51.529Z | 2023-12-02T18:31:03.772Z | 2023-12-02T18:31:03.772Z | {'Vendor': 'n/a', 'Product': 'PHPEMS', 'Versions': '7.0'} |
Subsets and Splits