instruction
stringlengths
21
21
input
stringlengths
40
40
output
stringlengths
62
37.3k
Explain CVE-2023-1681
Explain the vulnerability: CVE-2023-1681
A vulnerability, which was classified as problematic, was found in Xunrui CMS 4.61. Affected is an unknown function of the file /config/myfield/test.php. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-224238 is the identifier assigned to this vulnerability. Affected Products: CMS References: [{'url': 'https://vuldb.com/?id.224238', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224238', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/2714925725/CMS-bug/blob/main/Informationdisclosure-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1682
Explain the vulnerability: CVE-2023-1682
A vulnerability has been found in Xunrui CMS 4.61 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dayrui/My/Config/Install.txt. The manipulation leads to direct request. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224239. Affected Products: CMS References: [{'url': 'https://vuldb.com/?id.224239', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224239', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/2714925725/CMS-bug/blob/main/Informationdisclosure-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1683
Explain the vulnerability: CVE-2023-1683
A vulnerability was found in Xunrui CMS 4.61 and classified as problematic. Affected by this issue is some unknown functionality of the file /dayrui/Fcms/View/system_log.html. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224240. Affected Products: CMS References: [{'url': 'https://vuldb.com/?id.224240', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224240', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/2714925725/CMS-bug/blob/main/Informationdisclosure-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1684
Explain the vulnerability: CVE-2023-1684
A vulnerability was found in HadSky 7.7.16. It has been classified as problematic. This affects an unknown part of the file upload/index.php?c=app&a=superadmin:index. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224241 was assigned to this vulnerability. Affected Products: HadSky References: [{'url': 'https://vuldb.com/?id.224241', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224241', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/wkstestete/cve/blob/master/upload/HadSky.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1685
Explain the vulnerability: CVE-2023-1685
A vulnerability was found in HadSky up to 7.11.8. It has been declared as critical. This vulnerability affects unknown code of the file /install/index.php of the component Installation Interface. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224242 is the identifier assigned to this vulnerability. Affected Products: HadSky References: [{'url': 'https://vuldb.com/?id.224242', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224242', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/xinbate/cve/blob/master/HadSky%20rce.md', 'tags': ['exploit']}, {'url': 'https://gitee.com/galaxies2580/cve/blob/master/hadSky.md', 'tags': ['related']}] CVE State: PUBLISHED
Explain CVE-2023-1686
Explain the vulnerability: CVE-2023-1686
A vulnerability was found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file bsenordering/admin/category/index.php of the component GET Parameter Handler. The manipulation of the argument view with the input <script>alert(233)</script> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224243. Affected Products: Young Entrepreneur E-Negosyo System References: [{'url': 'https://vuldb.com/?id.224243', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224243', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Apeng96/bug_report/blob/main/XSS-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1687
Explain the vulnerability: CVE-2023-1687
A vulnerability classified as problematic has been found in SourceCodester Simple Task Allocation System 1.0. Affected is an unknown function of the file LoginRegistration.php?a=register_user. The manipulation of the argument Fullname leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-224244. Affected Products: Simple Task Allocation System References: [{'url': 'https://vuldb.com/?id.224244', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224244', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1688
Explain the vulnerability: CVE-2023-1688
A vulnerability classified as problematic has been found in SourceCodester Earnings and Expense Tracker App 1.0. This affects an unknown part of the file Master.php?a=save_expense. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-224307. Affected Products: Earnings and Expense Tracker App References: [{'url': 'https://vuldb.com/?id.224307', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224307', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1689
Explain the vulnerability: CVE-2023-1689
A vulnerability classified as problematic was found in SourceCodester Earnings and Expense Tracker App 1.0. This vulnerability affects unknown code of the file Master.php?a=save_earning. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-224308. Affected Products: Earnings and Expense Tracker App References: [{'url': 'https://vuldb.com/?id.224308', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224308', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1690
Explain the vulnerability: CVE-2023-1690
A vulnerability, which was classified as problematic, has been found in SourceCodester Earnings and Expense Tracker App 1.0. This issue affects some unknown processing of the file LoginRegistration.php?a=register_user. The manipulation of the argument fullname leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-224309 was assigned to this vulnerability. Affected Products: Earnings and Expense Tracker App References: [{'url': 'https://vuldb.com/?id.224309', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224309', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1691
Explain the vulnerability: CVE-2023-1691
Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally. Affected Products: HarmonyOS References: [{'url': 'https://consumer.huawei.com/en/support/bulletin/2023/7/'}, {'url': 'https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858'}] CVE State: PUBLISHED
Explain CVE-2023-1692
Explain the vulnerability: CVE-2023-1692
The window management module lacks permission verification.Successful exploitation of this vulnerability may affect confidentiality. Affected Products: HarmonyOS References: [{'url': 'https://consumer.huawei.com/en/support/bulletin/2023/4/'}, {'url': 'https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486'}] CVE State: PUBLISHED
Explain CVE-2023-1693
Explain the vulnerability: CVE-2023-1693
The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality. Affected Products: HarmonyOS References: [{'url': 'https://consumer.huawei.com/en/support/bulletin/2023/4/'}, {'url': 'https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486'}] CVE State: PUBLISHED
Explain CVE-2023-1694
Explain the vulnerability: CVE-2023-1694
The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality. Affected Products: HarmonyOS References: [{'url': 'https://consumer.huawei.com/en/support/bulletin/2023/4/'}, {'url': 'https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486'}] CVE State: PUBLISHED
Explain CVE-2023-1695
Explain the vulnerability: CVE-2023-1695
Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally. Affected Products: HarmonyOS References: [{'url': 'https://consumer.huawei.com/en/support/bulletin/2023/7/'}, {'url': 'https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858'}] CVE State: PUBLISHED
Explain CVE-2023-1696
Explain the vulnerability: CVE-2023-1696
The multimedia video module has a vulnerability in data processing.Successful exploitation of this vulnerability may affect availability. Affected Products: HarmonyOS References: [{'url': 'https://consumer.huawei.com/en/support/bulletin/2023/4/'}, {'url': 'https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486'}] CVE State: PUBLISHED
Explain CVE-2023-1697
Explain the vulnerability: CVE-2023-1697
An Improper Handling of Missing Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause a dcpfe process core and thereby a Denial of Service (DoS). Continued receipt of these specific frames will cause a sustained Denial of Service condition. This issue occurs when a specific malformed ethernet frame is received. This issue affects Juniper Networks Junos OS on QFX10000 Series, PTX1000 Series Series: All versions prior to 19.4R3-S10; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S1; 22.1 versions prior to 22.1R2-S1, 22.1R3; 22.2 versions prior to 22.2R1-S2, 22.2R2. Affected Products: Junos OS References: [{'url': 'https://supportportal.juniper.net/JSA70612'}] CVE State: PUBLISHED
Explain CVE-2023-1698
Explain the vulnerability: CVE-2023-1698
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise. Affected Products: Compact Controller CC100 References: [{'url': 'https://cert.vde.com/en/advisories/VDE-2023-007/'}] CVE State: PUBLISHED
Explain CVE-2023-1699
Explain the vulnerability: CVE-2023-1699
Rapid7 Nexpose versions 6.6.186 and below suffer from a forced browsing vulnerability.  This vulnerability allows an attacker to manipulate URLs to forcefully browse to and access administrative pages. This vulnerability is fixed in version 6.6.187.   Affected Products: Nexpose References: [{'url': 'https://docs.rapid7.com/release-notes/nexpose/20230329/'}] CVE State: PUBLISHED
Explain CVE-2023-1701
Explain the vulnerability: CVE-2023-1701
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.20. Affected Products: pimcore/pimcore References: [{'url': 'https://huntr.dev/bounties/64f943c4-68e5-4ef8-82f6-9c4abe928256'}, {'url': 'https://github.com/pimcore/pimcore/commit/2b997737dd6a60be2239a51dd6d9ef5881568e6d'}] CVE State: PUBLISHED
Explain CVE-2023-1702
Explain the vulnerability: CVE-2023-1702
Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.20. Affected Products: pimcore/pimcore References: [{'url': 'https://github.com/pimcore/pimcore/commit/2b997737dd6a60be2239a51dd6d9ef5881568e6d'}, {'url': 'https://huntr.dev/bounties/d8a47f29-3297-4fce-b534-e1d95a2b3e19'}] CVE State: PUBLISHED
Explain CVE-2023-1703
Explain the vulnerability: CVE-2023-1703
Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.20. Affected Products: pimcore/pimcore References: [{'url': 'https://huntr.dev/bounties/d12d105c-18fa-4d08-b591-b0e89e39eec1'}, {'url': 'https://github.com/pimcore/pimcore/commit/765832f0dc5f6cfb296a82e089b701066f27bcef'}] CVE State: PUBLISHED
Explain CVE-2023-1704
Explain the vulnerability: CVE-2023-1704
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.20. Affected Products: pimcore/pimcore References: [{'url': 'https://huntr.dev/bounties/84419c7b-ae29-401b-bdfd-5d0c498d320f'}, {'url': 'https://github.com/pimcore/pimcore/commit/295f5e8d108b68198e36399bea0f69598eb108a0'}] CVE State: PUBLISHED
Explain CVE-2023-1706
Explain the vulnerability: CVE-2023-1706
N\A Affected Products: N\A References: N\A CVE State: REJECTED
Explain CVE-2023-1707
Explain the vulnerability: CVE-2023-1707
Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to information disclosure when IPsec is enabled with FutureSmart version 5.6. Affected Products: HP Enterprise LaserJet and HP LaserJet Managed Printers References: [{'url': 'https://support.hp.com/us-en/document/ish_7905330-7905358-16/hpsbpi03838'}] CVE State: PUBLISHED
Explain CVE-2023-1708
Explain the vulnerability: CVE-2023-1708
An issue was identified in GitLab CE/EE affecting all versions from 1.0 prior to 15.8.5, 15.9 prior to 15.9.4, and 15.10 prior to 15.10.1 where non-printable characters gets copied from clipboard, allowing unexpected commands to be executed on victim machine. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/387185'}, {'url': 'https://hackerone.com/reports/1805604'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1708.json'}] CVE State: PUBLISHED
Explain CVE-2023-1709
Explain the vulnerability: CVE-2023-1709
Datalogics Library APDFLThe v18.0.4PlusP1e and prior contains a stack-based buffer overflow due to documents containing corrupted fonts, which could allow an attack that causes an unhandled crash during the rendering process. Affected Products: JT2Go References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-103-11'}, {'url': 'https://cert-portal.siemens.com/productcert/html/ssa-629917.html'}, {'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-164-01'}] CVE State: PUBLISHED
Explain CVE-2023-1710
Explain the vulnerability: CVE-2023-1710
A sensitive information disclosure vulnerability in GitLab affecting all versions from 15.0 prior to 15.8.5, 15.9 prior to 15.9.4 and 15.10 prior to 15.10.1 allows an attacker to view the count of internal notes for a given issue. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/388242'}, {'url': 'https://hackerone.com/reports/1829768'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1710.json'}] CVE State: PUBLISHED
Explain CVE-2023-1711
Explain the vulnerability: CVE-2023-1711
A vulnerability exists in a FOXMAN-UN and UNEM logging component, it only affects systems that use remote authentication to the network elements. If exploited an attacker could obtain confidential information. List of CPEs: * cpe:2.3:a:hitachienergy:foxman_un:R9C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R10C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R11A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R11B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R14A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R14B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R15A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R15B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy:foxman_un:R16A:*:*:*:*:*:*:* * * cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R10C:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R11A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R11B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R14A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R14B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R15A:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R15B:*:*:*:*:*:*:* * cpe:2.3:a:hitachienergy: unem :R16A:*:*:*:*:*:*:* Affected Products: FOXMAN-UN References: [{'url': 'https://search.abb.com/library/Download.aspx?DocumentID=8DBD000155&LanguageCode=en&DocumentPartId=&Action=Launch'}, {'url': 'https://search.abb.com/library/Download.aspx?DocumentID=8DBD000166&LanguageCode=en&DocumentPartId=&Action=Launch'}] CVE State: PUBLISHED
Explain CVE-2023-1712
Explain the vulnerability: CVE-2023-1712
Use of Hard-coded, Security-relevant Constants in GitHub repository deepset-ai/haystack prior to 0.1.30. Affected Products: deepset-ai/haystack References: [{'url': 'https://huntr.dev/bounties/9a6b1fb4-ec9b-4cfa-af1e-9ce304924829'}, {'url': 'https://github.com/deepset-ai/haystack/commit/5fc84904f198de661d5b933fde756aa922bf09f1'}] CVE State: PUBLISHED
Explain CVE-2023-1721
Explain the vulnerability: CVE-2023-1721
Yoga Class Registration System version 1.0 allows an administrator to execute commands on the server. This is possible because the application does not correctly validate the thumbnails of the classes uploaded by the administrators. Affected Products: Yoga Class Registration System References: [{'url': 'https://fluidattacks.com/advisories/blessd/'}, {'url': 'https://www.sourcecodester.com/php/16097/yoga-class-registration-system-php-and-mysql-free-source-code.html'}] CVE State: PUBLISHED
Explain CVE-2023-1722
Explain the vulnerability: CVE-2023-1722
Yoga Class Registration System version 1.0 allows an administrator to execute commands on the server. This is possible because the application does not correctly validate the thumbnails of the classes uploaded by the administrators. Affected Products: Yoga Class Registration System References: [{'url': 'https://fluidattacks.com/advisories/wyckoff/'}, {'url': 'https://www.sourcecodester.com/php/16097/yoga-class-registration-system-php-and-mysql-free-source-code.html'}] CVE State: PUBLISHED
Explain CVE-2023-1723
Explain the vulnerability: CVE-2023-1723
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Veragroup Mobile Assistant allows SQL Injection.This issue affects Mobile Assistant: before 21.S.2343. Affected Products: Mobile Assistant References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0228'}] CVE State: PUBLISHED
Explain CVE-2023-1724
Explain the vulnerability: CVE-2023-1724
Faveo Helpdesk Enterprise version 6.0.1 allows an attacker with agent permissions to perform privilege escalation on the application. This occurs because the application is vulnerable to stored XSS. Affected Products: Faveo Helpdesk References: [{'url': 'https://github.com/ladybirdweb/faveo-helpdesk/'}, {'url': 'https://fluidattacks.com/advisories/towers/'}] CVE State: PUBLISHED
Explain CVE-2023-1725
Explain the vulnerability: CVE-2023-1725
Server-Side Request Forgery (SSRF) vulnerability in Infoline Project Management System allows Server Side Request Forgery.This issue affects Project Management System: before 4.09.31.125. Affected Products: Project Management System References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0187'}] CVE State: PUBLISHED
Explain CVE-2023-1726
Explain the vulnerability: CVE-2023-1726
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Proliz OBS allows Stored XSS for an authenticated user.This issue affects OBS: before 23.04.01. Affected Products: OBS References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0205'}] CVE State: PUBLISHED
Explain CVE-2023-1728
Explain the vulnerability: CVE-2023-1728
Unrestricted Upload of File with Dangerous Type vulnerability in Fernus Informatics LMS allows OS Command Injection, Server Side Include (SSI) Injection.This issue affects LMS: before 23.04.03. Affected Products: LMS References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0194'}] CVE State: PUBLISHED
Explain CVE-2023-1729
Explain the vulnerability: CVE-2023-1729
A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash. Affected Products: LibRaw References: [{'url': 'https://github.com/LibRaw/LibRaw/issues/557'}, {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2188240'}, {'name': 'FEDORA-2023-b19f236bc7', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5ZJ3UBTJBZHNPJQFOSGM5L7WAHHE2GY/'}, {'name': 'FEDORA-2023-88c87f6191', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGZ6XF5WTPJ4GLXQ62JVRDZSVSJHXNQU/'}, {'name': '[debian-lts-announce] 20230527 [SECURITY] [DLA 3433-1] libraw security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html'}, {'name': 'DSA-5412', 'tags': ['vendor-advisory'], 'url': 'https://www.debian.org/security/2023/dsa-5412'}] CVE State: PUBLISHED
Explain CVE-2023-1730
Explain the vulnerability: CVE-2023-1730
The SupportCandy WordPress plugin before 3.1.5 does not validate and escape user input before using it in an SQL statement, which could allow unauthenticated attackers to perform SQL injection attacks Affected Products: SupportCandy References: [{'url': 'https://wpscan.com/vulnerability/44b51a56-ff05-4d50-9327-fc9bab74d4b7', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1731
Explain the vulnerability: CVE-2023-1731
In Meinbergs LTOS versions prior to V7.06.013, the configuration file upload function would not correctly validate the input, which would allow an remote authenticated attacker with high privileges to execute arbitrary commands. Affected Products: LTOS References: [{'url': 'https://www.meinbergglobal.com/english/news/meinberg-security-advisory-mbgsa-2023-02-lantime-firmware-v7-06-013.htm'}] CVE State: PUBLISHED
Explain CVE-2023-1732
Explain the vulnerability: CVE-2023-1732
When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret. The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20. Affected Products: CIRCL References: [{'url': 'https://github.com/cloudflare/circl/security/advisories/GHSA-2q89-485c-9j2x'}] CVE State: PUBLISHED
Explain CVE-2023-1733
Explain the vulnerability: CVE-2023-1733
A denial of service condition exists in the Prometheus server bundled with GitLab affecting all versions from 11.10 to 15.8.5, 15.9 to 15.9.4 and 15.10 to 15.10.1. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/392665'}, {'url': 'https://hackerone.com/reports/1723124'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1733.json'}] CVE State: PUBLISHED
Explain CVE-2023-1734
Explain the vulnerability: CVE-2023-1734
A vulnerability classified as critical has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. Affected is an unknown function of the file admin/products/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. VDB-224622 is the identifier assigned to this vulnerability. Affected Products: Young Entrepreneur E-Negosyo System References: [{'url': 'https://vuldb.com/?id.224622', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224622', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1735
Explain the vulnerability: CVE-2023-1735
A vulnerability classified as critical was found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. Affected by this vulnerability is an unknown functionality of the file passwordrecover.php. The manipulation of the argument phonenumber leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-224623. Affected Products: Young Entrepreneur E-Negosyo System References: [{'url': 'https://vuldb.com/?id.224623', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224623', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1736
Explain the vulnerability: CVE-2023-1736
A vulnerability, which was classified as critical, has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. Affected by this issue is some unknown functionality of the file cart/controller.php?action=add. The manipulation of the argument PROID leads to sql injection. The identifier of this vulnerability is VDB-224624. Affected Products: Young Entrepreneur E-Negosyo System References: [{'url': 'https://vuldb.com/?id.224624', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224624', 'tags': ['signature', 'permissions-required']}, {'url': 'https://www.sourcecodester.com/php/12684/young-entrepreneur-e-negosyo-system.html', 'tags': ['related']}] CVE State: PUBLISHED
Explain CVE-2023-1737
Explain the vulnerability: CVE-2023-1737
A vulnerability, which was classified as critical, was found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument U_USERNAME leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-224625 was assigned to this vulnerability. Affected Products: Young Entrepreneur E-Negosyo System References: [{'url': 'https://vuldb.com/?id.224625', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224625', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1738
Explain the vulnerability: CVE-2023-1738
A vulnerability has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0 and classified as critical. This vulnerability affects unknown code of the file index.php?q=product. The manipulation of the argument search leads to sql injection. The attack can be initiated remotely. VDB-224626 is the identifier assigned to this vulnerability. Affected Products: Young Entrepreneur E-Negosyo System References: [{'url': 'https://vuldb.com/?id.224626', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224626', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1739
Explain the vulnerability: CVE-2023-1739
A vulnerability was found in SourceCodester Simple and Beautiful Shopping Cart System 1.0 and classified as critical. This issue affects some unknown processing of the file upload.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224627. Affected Products: Simple and Beautiful Shopping Cart System References: [{'url': 'https://vuldb.com/?id.224627', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224627', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/misak7in/cve/blob/master/simple%20and%20beautiful%20shopping%20cart%20system/simple%20and%20beautiful%20shopping%20cart%20system%20upload.php%20has%20a%20file%20upload%20vulnerability.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1740
Explain the vulnerability: CVE-2023-1740
A vulnerability was found in SourceCodester Air Cargo Management System 1.0. It has been classified as critical. Affected is an unknown function of the file admin/user/manage_user.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224628. Affected Products: Air Cargo Management System References: [{'url': 'https://vuldb.com/?id.224628', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224628', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/west9b/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1741
Explain the vulnerability: CVE-2023-1741
A vulnerability was found in jeecg-boot 3.5.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file SysDictMapper.java of the component Sleep Command Handler. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224629 was assigned to this vulnerability. Affected Products: jeecg-boot References: [{'url': 'https://vuldb.com/?id.224629', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224629', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/private-null/report/blob/main/README.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1742
Explain the vulnerability: CVE-2023-1742
A vulnerability was found in IBOS 4.5.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file /?r=report/api/getlist of the component Report Search. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-224630 is the identifier assigned to this vulnerability. Affected Products: IBOS References: [{'url': 'https://vuldb.com/?id.224630', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224630', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/wkstestete/cve/blob/master/sql/ibos%20sql%20injection3.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1743
Explain the vulnerability: CVE-2023-1743
A vulnerability classified as problematic has been found in SourceCodester Grade Point Average GPA Calculator 1.0. This affects an unknown part of the file index.php. The manipulation of the argument page leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224631. Affected Products: Grade Point Average GPA Calculator References: [{'url': 'https://vuldb.com/?id.224631', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224631', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Grade%20Point%20Average%20(GPA)%20Calculator%20in%20PHP%20and%20SQLite3/Grade%20Point%20Average%20(GPA)%20Calculator%20in%20PHP%20and%20SQLite3%20vlun%202.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1744
Explain the vulnerability: CVE-2023-1744
A vulnerability classified as critical was found in IBOS 4.5.5. This vulnerability affects unknown code of the component htaccess Handler. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224632. Affected Products: IBOS References: [{'url': 'https://vuldb.com/?id.224632', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224632', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/xieqiangweb/cve/blob/master/cve/IBOS%20oa%20v4.5.5%20upload.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1745
Explain the vulnerability: CVE-2023-1745
A vulnerability, which was classified as problematic, has been found in KMPlayer 4.2.2.73. This issue affects some unknown processing in the library SHFOLDER.dll. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-224633 was assigned to this vulnerability. Affected Products: KMPlayer References: [{'url': 'https://vuldb.com/?id.224633', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224633', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/10cksYiqiyinHangzhouTechnology/KMPlayer_Poc', 'tags': ['exploit']}, {'url': 'https://drive.google.com/file/d/1bdYaDmtWhnjaHkzv3bZ4PUSMzDJ8JjSV/view', 'tags': ['exploit']}, {'url': 'https://youtu.be/7bh2BQOqxFo', 'tags': ['media-coverage']}] CVE State: PUBLISHED
Explain CVE-2023-1746
Explain the vulnerability: CVE-2023-1746
A vulnerability, which was classified as problematic, was found in Dreamer CMS up to 3.5.0. Affected is an unknown function of the component File Upload Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. VDB-224634 is the identifier assigned to this vulnerability. Affected Products: Dreamer CMS References: [{'url': 'https://vuldb.com/?id.224634', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224634', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/iteachyou-wjn/dreamer_cms/issues/11', 'tags': ['issue-tracking']}] CVE State: PUBLISHED
Explain CVE-2023-1747
Explain the vulnerability: CVE-2023-1747
A vulnerability has been found in IBOS up to 4.5.4 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /?r=email/api/mark&op=delFromSend. The manipulation of the argument emailids leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.5.5 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-224635. Affected Products: IBOS References: [{'url': 'https://vuldb.com/?id.224635', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224635', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/wkstestete/cve/blob/master/sql/ibos%20sql%20injection.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1748
Explain the vulnerability: CVE-2023-1748
The listed versions of Nexx Smart Home devices use hard-coded credentials. An attacker with unauthenticated access to the Nexx Home mobile application or the affected firmware could view the credentials and access the MQ Telemetry Server (MQTT) server and the ability to remotely control garage doors or smart plugs for any customer. Affected Products: Smart Alarm NXAL-100 References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01'}] CVE State: PUBLISHED
Explain CVE-2023-1749
Explain the vulnerability: CVE-2023-1749
The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could send API requests that the affected devices would execute. Affected Products: Smart Alarm NXAL-100 References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01'}] CVE State: PUBLISHED
Explain CVE-2023-1750
Explain the vulnerability: CVE-2023-1750
The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could retrieve device history, set device settings, and retrieve device information. Affected Products: Smart Alarm NXAL-100 References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01'}] CVE State: PUBLISHED
Explain CVE-2023-1751
Explain the vulnerability: CVE-2023-1751
The listed versions of Nexx Smart Home devices use a WebSocket server that does not validate if the bearer token in the Authorization header belongs to the device attempting to associate. This could allow any authorized user to receive alarm information and signals meant for other devices which leak a deviceId. Affected Products: Smart Alarm NXAL-100 References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01'}] CVE State: PUBLISHED
Explain CVE-2023-1752
Explain the vulnerability: CVE-2023-1752
The listed versions of Nexx Smart Home devices could allow any user to register an already registered alarm or associated device with only the device’s MAC address. Affected Products: Smart Alarm NXAL-100 References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01'}] CVE State: PUBLISHED
Explain CVE-2023-1753
Explain the vulnerability: CVE-2023-1753
Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/01d6ae23-3a8f-42a8-99f4-10246187d71b'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/f612a72494080e04947da7028340fee4493fe8a5'}] CVE State: PUBLISHED
Explain CVE-2023-1754
Explain the vulnerability: CVE-2023-1754
Improper Neutralization of Input During Web Page Generation in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/529f2361-eb2e-476f-b7ef-4e561a712e28'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/d773df925cb74e874527458beed1f66f966ec491'}] CVE State: PUBLISHED
Explain CVE-2023-1755
Explain the vulnerability: CVE-2023-1755
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/882ffa07-5397-4dbb-886f-4626859d711a'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/2156573100fd3abf4c65270def77aed20ffc8994'}] CVE State: PUBLISHED
Explain CVE-2023-1756
Explain the vulnerability: CVE-2023-1756
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/e495b443-b328-42f5-aed5-d68b929b4cb9'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/ca75f4688a8b0f14d5d0697b9f4b6ea66088f726'}] CVE State: PUBLISHED
Explain CVE-2023-1757
Explain the vulnerability: CVE-2023-1757
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/584a200a-6ff8-4d53-a3c0-e7893edff60c'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/5061e5841be6c218ebb0de0cbf7b7f195dc46d19'}] CVE State: PUBLISHED
Explain CVE-2023-1758
Explain the vulnerability: CVE-2023-1758
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/0854328e-eb00-41a3-9573-8da8f00e369c'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/f3380f46c464d1bc6f3ded29213c79be0de8fc57'}] CVE State: PUBLISHED
Explain CVE-2023-1759
Explain the vulnerability: CVE-2023-1759
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/e8109aed-d364-4c0c-9545-4de0347b10e1'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/ecbd8107fe954b6be95dab315862d1caa0b94efa'}] CVE State: PUBLISHED
Explain CVE-2023-1760
Explain the vulnerability: CVE-2023-1760
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/2d0ac48a-490d-4548-8d98-7447042dd1b5'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/56295b54062a284020fccce12a5044f9fa7d2770'}] CVE State: PUBLISHED
Explain CVE-2023-1761
Explain the vulnerability: CVE-2023-1761
Cross-site Scripting in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/24c0a65f-0751-4ff8-af63-4b325ac8879f'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/128ef85f8e3ab7869d3107aa4d0b6867b53391d7'}] CVE State: PUBLISHED
Explain CVE-2023-1762
Explain the vulnerability: CVE-2023-1762
Improper Privilege Management in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/3c2374cc-7082-44b7-a6a6-ccff7a650a3a'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/ae6c1d8c3eab05d6e2227c7a9998707f4f891514'}] CVE State: PUBLISHED
Explain CVE-2023-1763
Explain the vulnerability: CVE-2023-1763
Canon IJ Network Tool/Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13),IJ Network Tool/Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8) allows an attacker to acquire sensitive information on the Wi-Fi connection setup of the printer from the software. Affected Products: Canon IJ NW Tool References: [{'url': 'https://psirt.canon/advisory-information/cp2023-002/'}, {'url': 'https://psirt.canon/hardening/'}] CVE State: PUBLISHED
Explain CVE-2023-1764
Explain the vulnerability: CVE-2023-1764
Canon IJ Network Tool/Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13),IJ Network Tool/Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8) allows an attacker to acquire sensitive information on the Wi-Fi connection setup of the printer from the communication of the software. Affected Products: Canon IJ NW Tool References: [{'url': 'https://psirt.canon/advisory-information/cp2023-002/'}, {'url': 'https://psirt.canon/hardening/'}] CVE State: PUBLISHED
Explain CVE-2023-1765
Explain the vulnerability: CVE-2023-1765
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Akbim Computer Panon allows SQL Injection.This issue affects Panon: before 1.0.2. Affected Products: Panon References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0193'}] CVE State: PUBLISHED
Explain CVE-2023-1766
Explain the vulnerability: CVE-2023-1766
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Akbim Computer Panon allows Reflected XSS.This issue affects Panon: before 1.0.2. Affected Products: Panon References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0193'}] CVE State: PUBLISHED
Explain CVE-2023-1767
Explain the vulnerability: CVE-2023-1767
The Snyk Advisor website (https://snyk.io/advisor/) was vulnerable to a stored XSS prior to 28th March 2023. A feature of Snyk Advisor is to display the contents of a scanned package's Readme on its package health page. An attacker could create a package in NPM with an associated markdown README file containing XSS-able HTML tags. Upon Snyk Advisor importing the package, the XSS would run each time an end user browsed to the package's page on Snyk Advisor. Affected Products: Snyk Advisor References: [{'url': 'https://support.snyk.io/hc/en-us/articles/10146704933405'}, {'url': 'https://weizman.github.io/2023/04/10/snyk-xss/'}] CVE State: PUBLISHED
Explain CVE-2023-1768
Explain the vulnerability: CVE-2023-1768
Inappropriate error handling in Tribe29 Checkmk <= 2.1.0p25, <= 2.0.0p34, <= 2.2.0b3 (beta), and all versions of Checkmk 1.6.0 causes the symmetric encryption of agent data to fail silently and transmit the data in plaintext in certain configurations. Affected Products: Checkmk References: [{'url': 'https://checkmk.com/werk/15423'}] CVE State: PUBLISHED
Explain CVE-2023-1769
Explain the vulnerability: CVE-2023-1769
A vulnerability, which was classified as problematic, was found in SourceCodester Grade Point Average GPA Calculator 1.0. Affected is an unknown function of the file index.php. The manipulation of the argument page with the input php://filter/read=convert.base64-encode/resource=grade_table leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-224670 is the identifier assigned to this vulnerability. Affected Products: Grade Point Average GPA Calculator References: [{'url': 'https://vuldb.com/?id.224670', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224670', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Pe4cefulSnow/CVE-Advisory/blob/main/README.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1770
Explain the vulnerability: CVE-2023-1770
A vulnerability has been found in SourceCodester Grade Point Average GPA Calculator 1.0 and classified as critical. Affected by this vulnerability is the function get_scale of the file Master.php. The manipulation of the argument perc leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224671. Affected Products: Grade Point Average GPA Calculator References: [{'url': 'https://vuldb.com/?id.224671', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224671', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Pe4cefulSnow/SQL-Injection/blob/main/README.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1771
Explain the vulnerability: CVE-2023-1771
A vulnerability was found in SourceCodester Grade Point Average GPA Calculator 1.0 and classified as problematic. Affected by this issue is the function get_scale of the file Master.php. The manipulation of the argument perc leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224672. Affected Products: Grade Point Average GPA Calculator References: [{'url': 'https://vuldb.com/?id.224672', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224672', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Grade%20Point%20Average%20(GPA)%20Calculator%20in%20PHP%20and%20SQLite3/Grade%20Point%20Average%20(GPA)%20Calculator%20in%20PHP%20and%20SQLite3%20vlun%201.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1772
Explain the vulnerability: CVE-2023-1772
A vulnerability was found in DataGear up to 4.5.1. It has been classified as problematic. This affects an unknown part of the component Diagram Type Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224673 was assigned to this vulnerability. Affected Products: DataGear References: [{'url': 'https://vuldb.com/?id.224673', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224673', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/yangyanglo/ForCVE/blob/main/2023-0x02.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1773
Explain the vulnerability: CVE-2023-1773
A vulnerability was found in Rockoa 2.3.2. It has been declared as critical. This vulnerability affects unknown code of the file webmainConfig.php of the component Configuration File Handler. The manipulation leads to code injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224674 is the identifier assigned to this vulnerability. Affected Products: Rockoa References: [{'url': 'https://vuldb.com/?id.224674', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224674', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/galaxies2580/cve/blob/master/xinhuv2.3.2.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1774
Explain the vulnerability: CVE-2023-1774
When processing an email invite to a private channel on a team, Mattermost fails to validate the inviter's permission to that channel, allowing an attacker to invite themselves to a private channel. Affected Products: Mattermost References: [{'url': 'https://mattermost.com/security-updates/'}] CVE State: PUBLISHED
Explain CVE-2023-1775
Explain the vulnerability: CVE-2023-1775
When running in a High Availability configuration, Mattermost fails to sanitize some of the user_updated and post_deleted events broadcast to all users, leading to disclosure of sensitive information to some of the users with currently connected Websocket clients. Affected Products: Mattermost References: [{'url': 'https://mattermost.com/security-updates/'}] CVE State: PUBLISHED
Explain CVE-2023-1776
Explain the vulnerability: CVE-2023-1776
Boards in Mattermost allows an attacker to upload a malicious SVG image file as an attachment to a card and share it using a direct link to the file. Affected Products: Mattermost References: [{'url': 'https://mattermost.com/security-updates/'}] CVE State: PUBLISHED
Explain CVE-2023-1777
Explain the vulnerability: CVE-2023-1777
Mattermost allows an attacker to request a preview of an existing message when creating a new message via the createPost API call, disclosing the contents of the linked message. Affected Products: Mattermost References: [{'url': 'https://mattermost.com/security-updates/'}] CVE State: PUBLISHED
Explain CVE-2023-1778
Explain the vulnerability: CVE-2023-1778
This vulnerability exists in GajShield Data Security Firewall firmware versions prior to v4.28 (except v4.21) due to insecure default credentials which allows remote attacker to login as superuser by using default username/password via web-based management interface and/or exposed SSH port thereby enabling remote attackers to execute arbitrary commands with administrative/superuser privileges on the targeted systems. The vulnerability has been addressed by forcing the user to change their default password to a new non-default password. Affected Products: Data Security Firewall References: [{'url': 'https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0119'}] CVE State: PUBLISHED
Explain CVE-2023-1779
Explain the vulnerability: CVE-2023-1779
Exposure of Sensitive Information to an unauthorized actor vulnerability in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual in versions <=2.13.3 allow an authorized remote attacker with low privileges to view a limited amount of another accounts contact information. Affected Products: mbCONNECT24 References: [{'url': 'https://cert.vde.com/en/advisories/VDE-2023-008/'}] CVE State: PUBLISHED
Explain CVE-2023-1780
Explain the vulnerability: CVE-2023-1780
The Companion Sitemap Generator WordPress plugin before 4.5.3 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin. Affected Products: Companion Sitemap Generator References: [{'url': 'https://wpscan.com/vulnerability/8176308f-f210-4109-9c88-9372415dbed3', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1782
Explain the vulnerability: CVE-2023-1782
HashiCorp Nomad and Nomad Enterprise versions 1.5.0 up to 1.5.2 allow unauthenticated users to bypass intended ACL authorizations for clusters where mTLS is not enabled. This issue is fixed in version 1.5.3. Affected Products: Nomad References: [{'url': 'https://discuss.hashicorp.com/t/hcsec-2023-12-nomad-unauthenticated-client-agent-http-request-privilege-escalation/52375'}] CVE State: PUBLISHED
Explain CVE-2023-1783
Explain the vulnerability: CVE-2023-1783
OrangeScrum version 2.0.11 allows an external attacker to remotely obtain AWS instance credentials. This is possible because the application does not properly validate the HTML content to be converted to PDF. Affected Products: Orangescrum References: [{'url': 'https://github.com/Orangescrum/orangescrum/'}, {'url': 'https://fluidattacks.com/advisories/stirling/'}] CVE State: PUBLISHED
Explain CVE-2023-1784
Explain the vulnerability: CVE-2023-1784
A vulnerability was found in jeecg-boot 3.5.0 and classified as critical. This issue affects some unknown processing of the component API Documentation. The manipulation leads to improper authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224699. Affected Products: jeecg-boot References: [{'url': 'https://vuldb.com/?id.224699', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224699', 'tags': ['signature', 'permissions-required']}, {'url': 'https://note.youdao.com/ynoteshare/index.html?id=7eb8fc804ea3544d8add43749a09173e', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1785
Explain the vulnerability: CVE-2023-1785
A vulnerability was found in SourceCodester Earnings and Expense Tracker App 1.0. It has been classified as critical. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-224700. Affected Products: Earnings and Expense Tracker App References: [{'url': 'https://vuldb.com/?id.224700', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224700', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/web-zxl/img/blob/main/4.png', 'tags': ['related']}] CVE State: PUBLISHED
Explain CVE-2023-1786
Explain the vulnerability: CVE-2023-1786
Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege. Affected Products: cloud-init References: [{'tags': ['patch'], 'url': 'https://github.com/canonical/cloud-init/commit/a378b7e4f47375458651c0972e7cd813f6fe0a6b'}, {'url': 'https://bugs.launchpad.net/cloud-init/+bug/2013967', 'tags': ['issue-tracking']}, {'url': 'https://ubuntu.com/security/notices/USN-6042-1', 'tags': ['vendor-advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ATBJSXPL2IOAD2LDQRKWPLIC7QXS44GZ/'}] CVE State: PUBLISHED
Explain CVE-2023-1787
Explain the vulnerability: CVE-2023-1787
An issue has been discovered in GitLab affecting all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. A search timeout could be triggered if a specific HTML payload was used in the issue description. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/394817'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1787.json'}] CVE State: PUBLISHED
Explain CVE-2023-1788
Explain the vulnerability: CVE-2023-1788
Insufficient Session Expiration in GitHub repository firefly-iii/firefly-iii prior to 6. Affected Products: firefly-iii/firefly-iii References: [{'url': 'https://huntr.dev/bounties/79323c9e-e0e5-48ef-bd19-d0b09587ccb2'}, {'url': 'https://github.com/firefly-iii/firefly-iii/commit/68f398f97cbe1870fc098d8460bf903b9c3fab30'}] CVE State: PUBLISHED
Explain CVE-2023-1789
Explain the vulnerability: CVE-2023-1789
Improper Input Validation in GitHub repository firefly-iii/firefly-iii prior to 6.0.0. Affected Products: firefly-iii/firefly-iii References: [{'url': 'https://huntr.dev/bounties/2c3489f7-6b84-48f8-9368-9cea67cf373d'}, {'url': 'https://github.com/firefly-iii/firefly-iii/commit/6b05c0fbd3e8c40ae9b24dc2698821786fccf0c5'}] CVE State: PUBLISHED
Explain CVE-2023-1790
Explain the vulnerability: CVE-2023-1790
A vulnerability, which was classified as problematic, was found in SourceCodester Simple Task Allocation System 1.0. Affected is an unknown function of the file index.php. The manipulation of the argument page leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224724. Affected Products: Simple Task Allocation System References: [{'url': 'https://vuldb.com/?id.224724', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224724', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Pe4cefulSnow/CVE-Advisory/blob/main/uploadcve.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1791
Explain the vulnerability: CVE-2023-1791
A vulnerability has been found in SourceCodester Simple Task Allocation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224743. Affected Products: Simple Task Allocation System References: [{'url': 'https://vuldb.com/?id.224743', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224743', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Pe4cefulSnow/SQL-Injection/blob/main/SQLcve.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1792
Explain the vulnerability: CVE-2023-1792
A vulnerability was found in SourceCodester Simple Mobile Comparison Website 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/fields/manage_field.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224744. Affected Products: Simple Mobile Comparison Website References: [{'url': 'https://vuldb.com/?id.224744', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224744', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/LOBSSSA5DD5/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED