instruction
stringlengths
21
21
input
stringlengths
40
40
output
stringlengths
62
37.3k
Explain CVE-2023-1793
Explain the vulnerability: CVE-2023-1793
A vulnerability was found in SourceCodester Police Crime Record Management System 1.0. It has been classified as critical. This affects an unknown part of the file /officer/assigncase.php of the component GET Parameter Handler. The manipulation of the argument caseid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224745 was assigned to this vulnerability. Affected Products: Police Crime Record Management System References: [{'url': 'https://vuldb.com/?id.224745', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224745', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/fillorkill/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1794
Explain the vulnerability: CVE-2023-1794
A vulnerability was found in SourceCodester Police Crime Record Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/casedetails.php of the component GET Parameter Handler. The manipulation of the argument id with the input "><script>alert(233)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224746 is the identifier assigned to this vulnerability. Affected Products: Police Crime Record Management System References: [{'url': 'https://vuldb.com/?id.224746', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224746', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/fillorkill/bug_report/blob/main/XSS-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1795
Explain the vulnerability: CVE-2023-1795
A vulnerability was found in SourceCodester Gadget Works Online Ordering System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/products/index.php of the component GET Parameter Handler. The manipulation of the argument view with the input <script>alert(666)</script> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224747. Affected Products: Gadget Works Online Ordering System References: [{'url': 'https://vuldb.com/?id.224747', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224747', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/FinleyTang/bug_report/blob/main/XSS-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1796
Explain the vulnerability: CVE-2023-1796
A vulnerability classified as problematic has been found in SourceCodester Employee Payslip Generator 1.0. Affected is an unknown function of the file /classes/Master.php?f=save_position of the component Create News Handler. The manipulation of the argument name with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224748. Affected Products: Employee Payslip Generator References: [{'url': 'https://vuldb.com/?id.224748', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224748', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Jean-Astruc/bug_report/blob/main/XSS-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1797
Explain the vulnerability: CVE-2023-1797
A vulnerability classified as critical was found in OTCMS 6.0.1. Affected by this vulnerability is an unknown functionality of the file sysCheckFile.php?mudi=sql. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224749 was assigned to this vulnerability. Affected Products: OTCMS References: [{'url': 'https://vuldb.com/?id.224749', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224749', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/wkstestete/cve/blob/master/upload/upload1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1798
Explain the vulnerability: CVE-2023-1798
A vulnerability, which was classified as problematic, has been found in EyouCMS up to 1.5.4. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument typename leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-224750 is the identifier assigned to this vulnerability. Affected Products: EyouCMS References: [{'url': 'https://vuldb.com/?id.224750', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224750', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/wkstestete/cve/blob/master/xss/eyoucms%20xss.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1799
Explain the vulnerability: CVE-2023-1799
A vulnerability, which was classified as problematic, was found in EyouCMS up to 1.5.4. This affects an unknown part of the file login.php. The manipulation of the argument tag_tag leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224751. Affected Products: EyouCMS References: [{'url': 'https://vuldb.com/?id.224751', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224751', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/wkstestete/cve/blob/master/xss/Eyoucms%20xss2.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1800
Explain the vulnerability: CVE-2023-1800
A vulnerability, which was classified as critical, has been found in sjqzhang go-fastdfs up to 1.4.3. Affected by this issue is the function upload of the file /group1/uploa of the component File Upload Handler. The manipulation leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224768. Affected Products: go-fastdfs References: [{'url': 'https://vuldb.com/?id.224768', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224768', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/yangyanglo/ForCVE/blob/main/2023-0x05.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1801
Explain the vulnerability: CVE-2023-1801
The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-of-bounds write when decoding a crafted network packet. Affected Products: tcpdump References: [{'url': 'https://github.com/the-tcpdump-group/tcpdump/commit/7578e1c04ee280dda50c4c2813e7d55f539c6501', 'tags': ['patch']}, {'url': 'https://github.com/the-tcpdump-group/tcpdump/commit/03c037bbd75588beba3ee09f26d17783d21e30bc', 'tags': ['patch']}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOA2BJFERAC3VRQIRHJOWN4HZY4ZA7CH/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYL5DEVHRJYF2CM5LTCZKEYFYDZAIZSN/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLLZCG23MU6O4QOG2CX3DLEL3YXP6LAI/'}] CVE State: PUBLISHED
Explain CVE-2023-1802
Explain the vulnerability: CVE-2023-1802
In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a disclosure of sensitive information. Only users who have Access Experimental Features enabled and have logged in to a private registry are affected. Affected Products: Docker Desktop References: [{'tags': ['release-notes'], 'url': 'https://docs.docker.com/desktop/release-notes/#4180'}, {'tags': ['issue-tracking'], 'url': 'https://github.com/docker/for-win/issues/13344'}] CVE State: PUBLISHED
Explain CVE-2023-1803
Explain the vulnerability: CVE-2023-1803
Authentication Bypass by Alternate Name vulnerability in DTS Electronics Redline Router firmware allows Authentication Bypass.This issue affects Redline Router: before 7.17. Affected Products: Redline Router References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0227'}] CVE State: PUBLISHED
Explain CVE-2023-1804
Explain the vulnerability: CVE-2023-1804
The Product Catalog Feed by PixelYourSite WordPress plugin before 2.1.1 does not sanitise and escape the edit parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrators. Affected Products: Product Catalog Feed by PixelYourSite References: [{'url': 'https://wpscan.com/vulnerability/55b28fa6-a54f-4365-9d59-f9e331c1e11b', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1805
Explain the vulnerability: CVE-2023-1805
The Product Catalog Feed by PixelYourSite WordPress plugin before 2.1.1 does not sanitise and escape the page parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin Affected Products: Product Catalog Feed by PixelYourSite References: [{'url': 'https://wpscan.com/vulnerability/46b4582f-7651-4b74-a00b-1788587ecfa8', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1806
Explain the vulnerability: CVE-2023-1806
The WP Inventory Manager WordPress plugin before 2.1.0.12 does not sanitise and escape the message parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrators. Affected Products: WP Inventory Manager References: [{'url': 'https://wpscan.com/vulnerability/38d99c7d-2d10-4910-b95a-1cb545b813c4', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1807
Explain the vulnerability: CVE-2023-1807
The Elementor Addons, Widgets and Enhancements – Stax plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.4.3. This is due to missing or incorrect nonce validation on the toggle_widget function. This makes it possible for unauthenticated attackers to enable or disable Elementor widgets via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Affected Products: Elementor Addons, Widgets and Enhancements – Stax References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/c12094bd-aa23-4f9b-92e1-d1d4284fb2a0?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/stax-addons-for-elementor/trunk/core/admin/pages/Widgets.php#L31'}] CVE State: PUBLISHED
Explain CVE-2023-1809
Explain the vulnerability: CVE-2023-1809
The Download Manager WordPress plugin before 6.3.0 leaks master key information without the need for a password, allowing attackers to download arbitrary password-protected package files. Affected Products: Download Manager References: [{'url': 'https://wpscan.com/vulnerability/57f0a078-fbeb-4b05-8892-e6d99edb82c1', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1810
Explain the vulnerability: CVE-2023-1810
Heap buffer overflow in Visuals in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1414018'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}] CVE State: PUBLISHED
Explain CVE-2023-1811
Explain the vulnerability: CVE-2023-1811
Use after free in Frames in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1420510'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}] CVE State: PUBLISHED
Explain CVE-2023-1812
Explain the vulnerability: CVE-2023-1812
Out of bounds memory access in DOM Bindings in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1418224'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}] CVE State: PUBLISHED
Explain CVE-2023-1813
Explain the vulnerability: CVE-2023-1813
Inappropriate implementation in Extensions in Google Chrome prior to 112.0.5615.49 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1423258'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}] CVE State: PUBLISHED
Explain CVE-2023-1814
Explain the vulnerability: CVE-2023-1814
Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass download checking via a crafted HTML page. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1417325'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}] CVE State: PUBLISHED
Explain CVE-2023-1815
Explain the vulnerability: CVE-2023-1815
Use after free in Networking APIs in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1278708'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}] CVE State: PUBLISHED
Explain CVE-2023-1816
Explain the vulnerability: CVE-2023-1816
Incorrect security UI in Picture In Picture in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially perform navigation spoofing via a crafted HTML page. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1413919'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}] CVE State: PUBLISHED
Explain CVE-2023-1817
Explain the vulnerability: CVE-2023-1817
Insufficient policy enforcement in Intents in Google Chrome on Android prior to 112.0.5615.49 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1418061'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}] CVE State: PUBLISHED
Explain CVE-2023-1818
Explain the vulnerability: CVE-2023-1818
Use after free in Vulkan in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1223346'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}] CVE State: PUBLISHED
Explain CVE-2023-1819
Explain the vulnerability: CVE-2023-1819
Out of bounds read in Accessibility in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1406588'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}] CVE State: PUBLISHED
Explain CVE-2023-1820
Explain the vulnerability: CVE-2023-1820
Heap buffer overflow in Browser History in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1408120'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}] CVE State: PUBLISHED
Explain CVE-2023-1821
Explain the vulnerability: CVE-2023-1821
Inappropriate implementation in WebShare in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1413618'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}] CVE State: PUBLISHED
Explain CVE-2023-1822
Explain the vulnerability: CVE-2023-1822
Incorrect security UI in Navigation in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1066555'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}] CVE State: PUBLISHED
Explain CVE-2023-1823
Explain the vulnerability: CVE-2023-1823
Inappropriate implementation in FedCM in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1406900'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}] CVE State: PUBLISHED
Explain CVE-2023-1825
Explain the vulnerability: CVE-2023-1825
An issue has been discovered in GitLab EE affecting all versions starting from 15.7 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. It was possible to disclose issue notes to an unauthorized user at project export. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/384035'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1825.json'}] CVE State: PUBLISHED
Explain CVE-2023-1826
Explain the vulnerability: CVE-2023-1826
A vulnerability, which was classified as critical, was found in SourceCodester Online Computer and Laptop Store 1.0. This affects an unknown part of the file php-ocls\admin\system_info\index.php. The manipulation of the argument img leads to unrestricted upload. It is possible to initiate the attack remotely. The identifier VDB-224841 was assigned to this vulnerability. Affected Products: Online Computer and Laptop Store References: [{'url': 'https://vuldb.com/?id.224841', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224841', 'tags': ['signature', 'permissions-required']}, {'url': 'http://packetstormsecurity.com/files/171790/Online-Computer-And-Laptop-Store-1.0-Shell-Upload.html'}] CVE State: PUBLISHED
Explain CVE-2023-1827
Explain the vulnerability: CVE-2023-1827
A vulnerability has been found in SourceCodester Centralized Covid Vaccination Records System 1.0 and classified as critical. This vulnerability affects unknown code of the file /vaccinated/admin/maintenance/manage_location.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224842 is the identifier assigned to this vulnerability. Affected Products: Centralized Covid Vaccination Records System References: [{'url': 'https://vuldb.com/?id.224842', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224842', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ZERO-XX-ONE/bug_report/blob/main/SQLi.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1829
Explain the vulnerability: CVE-2023-1829
A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root. We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28. Affected Products: Linux Kernel References: [{'url': 'https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28'}, {'url': 'https://kernel.dance/#8c710f75256bb3cf05ac7b1672c82b92c43f3d28'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html'}, {'url': 'https://security.netapp.com/advisory/ntap-20230601-0001/'}] CVE State: PUBLISHED
Explain CVE-2023-1831
Explain the vulnerability: CVE-2023-1831
Mattermost fails to redact from audit logs the user password during user creation and the user password hash in other operations if the experimental audit logging configuration was enabled (ExperimentalAuditSettings section in config). Affected Products: Mattermost References: [{'url': 'https://mattermost.com/security-updates/'}] CVE State: PUBLISHED
Explain CVE-2023-1833
Explain the vulnerability: CVE-2023-1833
Authentication Bypass by Primary Weakness vulnerability in DTS Electronics Redline Router firmware allows Authentication Bypass.This issue affects Redline Router: before 7.17. Affected Products: Redline Router References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0227'}] CVE State: PUBLISHED
Explain CVE-2023-1834
Explain the vulnerability: CVE-2023-1834
Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and January 2023, and are running v7.13 may have the telnet and FTP ports open by default.  This could potentially allow attackers unauthorized access to the device through the open ports. Affected Products: Kinetix 5500 EtherNet/IP Servo Drive References: [{'url': 'https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139441'}] CVE State: PUBLISHED
Explain CVE-2023-1835
Explain the vulnerability: CVE-2023-1835
The Ninja Forms Contact Form WordPress plugin before 3.6.22 does not properly escape user input before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin Affected Products: Ninja Forms Contact Form References: [{'url': 'https://wpscan.com/vulnerability/b5fc223c-5ec0-44b2-b2f6-b35f9942d341', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1836
Explain the vulnerability: CVE-2023-1836
A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. When viewing an XML file in a repository in "raw" mode, it can be made to render as HTML if viewed under specific circumstances Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/404613'}, {'url': 'https://hackerone.com/reports/1923293'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1836.json'}] CVE State: PUBLISHED
Explain CVE-2023-1837
Explain the vulnerability: CVE-2023-1837
Missing Authentication for critical function vulnerability in HYPR Server allows Authentication Bypass when using Legacy APIs.This issue affects HYPR Server: before 8.0 (with enabled Legacy APIs) Affected Products: HYPR Server References: [{'url': 'https://www.hypr.com/security-advisories'}] CVE State: PUBLISHED
Explain CVE-2023-1838
Explain the vulnerability: CVE-2023-1838
A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem. Affected Products: Kernel References: [{'url': 'https://lore.kernel.org/netdev/20220516084213.26854-1-jasowang%40redhat.com/T/'}, {'url': 'https://security.netapp.com/advisory/ntap-20230517-0003/'}] CVE State: PUBLISHED
Explain CVE-2023-1839
Explain the vulnerability: CVE-2023-1839
The Product Addons & Fields for WooCommerce WordPress plugin before 32.0.6 does not sanitize and escape some of its setting fields, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup). Affected Products: Product Addons & Fields for WooCommerce References: [{'url': 'https://wpscan.com/vulnerability/fddc5a1c-f267-4ef4-8acf-731dbecac450', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1840
Explain the vulnerability: CVE-2023-1840
The Sp*tify Play Button for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 2.07 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Affected Products: Sp*tify Play Button for WordPress References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/308f6887-7c1c-4efd-85e2-b71bb6d26dab?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2893653%40spotify-play-button-for-wordpress%2Ftrunk&old=2870608%40spotify-play-button-for-wordpress%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-1842
Explain the vulnerability: CVE-2023-1842
N\A Affected Products: N\A References: N\A CVE State: REJECTED
Explain CVE-2023-1843
Explain the vulnerability: CVE-2023-1843
The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to unauthorized permalink structure update due to a missing capability check on the permalink_setup function in versions up to, and including, 3.3.0. This makes it possible for unauthenticated attackers to change the permalink structure. Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/5db00eb6-3e05-42fa-bb84-2df4bcae3955?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/plugin.php#L544'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2907471/'}] CVE State: PUBLISHED
Explain CVE-2023-1844
Explain the vulnerability: CVE-2023-1844
The Subscribe2 plugin for WordPress is vulnerable to unauthorized access to email functionality due to a missing capability check when sending test emails in versions up to, and including, 10.40. This makes it possible for author-level attackers to send emails with arbitrary content and attachments to site users. Affected Products: Subscribe2 – Form, Email Subscribers & Newsletters References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/c34ce601-5cf9-433f-bc9d-5c705eba6b08?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/subscribe2/trunk/admin/send-email.php#L12'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2930676'}] CVE State: PUBLISHED
Explain CVE-2023-1845
Explain the vulnerability: CVE-2023-1845
A vulnerability, which was classified as critical, was found in SourceCodester Online Payroll System 1.0. This affects an unknown part of the file /admin/employee_row.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224985 was assigned to this vulnerability. Affected Products: Online Payroll System References: [{'url': 'https://vuldb.com/?id.224985', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224985', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%202.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1846
Explain the vulnerability: CVE-2023-1846
A vulnerability has been found in SourceCodester Online Payroll System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/deduction_row.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224986 is the identifier assigned to this vulnerability. Affected Products: Online Payroll System References: [{'url': 'https://vuldb.com/?id.224986', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224986', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%204.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1847
Explain the vulnerability: CVE-2023-1847
A vulnerability was found in SourceCodester Online Payroll System 1.0 and classified as critical. This issue affects some unknown processing of the file attendance.php. The manipulation of the argument employee leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224987. Affected Products: Online Payroll System References: [{'url': 'https://vuldb.com/?id.224987', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224987', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%201.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1848
Explain the vulnerability: CVE-2023-1848
A vulnerability was found in SourceCodester Online Payroll System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/attendance_row.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224988. Affected Products: Online Payroll System References: [{'url': 'https://vuldb.com/?id.224988', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224988', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%203.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1849
Explain the vulnerability: CVE-2023-1849
A vulnerability was found in SourceCodester Online Payroll System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/cashadvance_row.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224989 was assigned to this vulnerability. Affected Products: Online Payroll System References: [{'url': 'https://vuldb.com/?id.224989', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224989', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%205.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1850
Explain the vulnerability: CVE-2023-1850
A vulnerability was found in SourceCodester Online Payroll System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-224990 is the identifier assigned to this vulnerability. Affected Products: Online Payroll System References: [{'url': 'https://vuldb.com/?id.224990', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224990', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%206.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1851
Explain the vulnerability: CVE-2023-1851
A vulnerability classified as problematic has been found in SourceCodester Online Payroll System 1.0. This affects an unknown part of the file /admin/employee_add.php. The manipulation of the argument of leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224991. Affected Products: Online Payroll System References: [{'url': 'https://vuldb.com/?id.224991', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224991', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%207.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1852
Explain the vulnerability: CVE-2023-1852
A vulnerability classified as problematic was found in SourceCodester Online Payroll System 1.0. This vulnerability affects unknown code of the file /admin/deduction_edit.php. The manipulation of the argument description leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-224992. Affected Products: Online Payroll System References: [{'url': 'https://vuldb.com/?id.224992', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224992', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%208.pdf', 'tags': ['related']}] CVE State: PUBLISHED
Explain CVE-2023-1853
Explain the vulnerability: CVE-2023-1853
A vulnerability, which was classified as problematic, has been found in SourceCodester Online Payroll System 1.0. This issue affects some unknown processing of the file /admin/employee_edit.php. The manipulation of the argument of leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224993 was assigned to this vulnerability. Affected Products: Online Payroll System References: [{'url': 'https://vuldb.com/?id.224993', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224993', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%209.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1854
Explain the vulnerability: CVE-2023-1854
A vulnerability, which was classified as problematic, was found in SourceCodester Online Graduate Tracer System 1.0. Affected is an unknown function of the file admin/. The manipulation leads to session expiration. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-224994 is the identifier assigned to this vulnerability. Affected Products: Online Graduate Tracer System References: [{'url': 'https://vuldb.com/?id.224994', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224994', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Jlan45/OGTSFCOIA/blob/main/unauthorizedaccess.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1855
Explain the vulnerability: CVE-2023-1855
A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem. Affected Products: Kernel References: [{'url': 'https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/'}, {'name': '[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html'}, {'name': '[debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html'}, {'url': 'https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1'}] CVE State: PUBLISHED
Explain CVE-2023-1856
Explain the vulnerability: CVE-2023-1856
A vulnerability has been found in SourceCodester Air Cargo Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/transactions/track_shipment.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224995. Affected Products: Air Cargo Management System References: [{'url': 'https://vuldb.com/?id.224995', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224995', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Hackergrave/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1857
Explain the vulnerability: CVE-2023-1857
A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/?page=product/manage_product&id=2. The manipulation of the argument Product Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224996. Affected Products: Online Computer and Laptop Store References: [{'url': 'https://vuldb.com/?id.224996', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224996', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/v2ish1yan/mycve/blob/main/ocls.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1858
Explain the vulnerability: CVE-2023-1858
A vulnerability was found in SourceCodester Earnings and Expense Tracker App 1.0. It has been classified as problematic. This affects an unknown part of the file index.php. The manipulation of the argument page leads to information disclosure. It is possible to initiate the attack remotely. The identifier VDB-224997 was assigned to this vulnerability. Affected Products: Earnings and Expense Tracker App References: [{'url': 'https://vuldb.com/?id.224997', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224997', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1859
Explain the vulnerability: CVE-2023-1859
A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak. Affected Products: Kernel References: [{'url': 'https://lore.kernel.org/all/20230313090002.3308025-1-zyytlz.wz%40163.com/'}] CVE State: PUBLISHED
Explain CVE-2023-1860
Explain the vulnerability: CVE-2023-1860
A vulnerability was found in Keysight IXIA Hawkeye 3.3.16.28. It has been declared as problematic. This vulnerability affects unknown code of the file /licenses. The manipulation of the argument view with the input teste"><script>alert(%27c4ng4c3ir0%27)</script> leads to cross site scripting. The attack can be initiated remotely. VDB-224998 is the identifier assigned to this vulnerability. NOTE: Vendor did not respond if and how they may handle this issue. Affected Products: IXIA Hawkeye References: [{'url': 'https://vuldb.com/?id.224998', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224998', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1861
Explain the vulnerability: CVE-2023-1861
The Limit Login Attempts WordPress plugin through 1.7.2 does not sanitize and escape usernames when outputting them back in the logs dashboard, which could allow any authenticated users, such as subscriber to perform Stored Cross-Site Scripting attacks Affected Products: Limit Login Attempts References: [{'url': 'https://wpscan.com/vulnerability/461cbcca-aed7-4c92-ba35-ebabf4fcd810', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1862
Explain the vulnerability: CVE-2023-1862
Cloudflare WARP client for Windows (up to v2023.3.381.0) allowed a malicious actor to remotely access the warp-svc.exe binary due to an insufficient access control policy on an IPC Named Pipe. This would have enabled an attacker to trigger WARP connect and disconnect commands, as well as obtaining network diagnostics and application configuration from the target's device. It is important to note that in order to exploit this, a set of requirements would need to be met, such as the target's device must've been reachable on port 445, allowed authentication with NULL sessions or otherwise having knowledge of the target's credentials. Affected Products: WARP Client References: [{'url': 'https://developers.cloudflare.com/warp-client/get-started/windows/'}, {'url': 'https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release'}, {'url': 'https://github.com/cloudflare/advisories/security/advisories/GHSA-q55r-53c8-5642'}] CVE State: PUBLISHED
Explain CVE-2023-1863
Explain the vulnerability: CVE-2023-1863
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eskom Computer Water Metering Software allows Command Line Execution through SQL Injection.This issue affects Water Metering Software: before 23.04.06. Affected Products: Water Metering Software References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0225'}] CVE State: PUBLISHED
Explain CVE-2023-1864
Explain the vulnerability: CVE-2023-1864
FANUC ROBOGUIDE-HandlingPRO Versions 9 Rev.ZD and prior is vulnerable to a path traversal, which could allow an attacker to remotely read files on the system running the affected software. Affected Products: ROBOGUIDE-HandlingPRO References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-101-01'}] CVE State: PUBLISHED
Explain CVE-2023-1865
Explain the vulnerability: CVE-2023-1865
The YourChannel plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check when resetting plugin settings via the yrc_nuke GET parameter in versions up to, and including, 1.2.3. This makes it possible for unauthenticated attackers to delete YouTube channels from the plugin. Affected Products: YourChannel: Everything you want in a YouTube plugin. References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/34817e32-d5a3-403a-85f0-1d60af8945de?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/yourchannel/trunk/YourChannel.php?rev=2844975#L772'}, {'url': 'https://wordpress.org/plugins/yourchannel/'}] CVE State: PUBLISHED
Explain CVE-2023-1866
Explain the vulnerability: CVE-2023-1866
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the clearKeys function. This makes it possible for unauthenticated attackers to reset the plugin's channel settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Affected Products: YourChannel: Everything you want in a YouTube plugin. References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/45851efe-2584-4b5e-8e4c-24f289d3bc32?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/yourchannel/trunk/YourChannel.php?rev=2844975#L107'}] CVE State: PUBLISHED
Explain CVE-2023-1867
Explain the vulnerability: CVE-2023-1867
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the save function. This makes it possible for unauthenticated attackers to change the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Affected Products: YourChannel: Everything you want in a YouTube plugin. References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/4c20db2d-f73d-4e52-a275-ab1975ae4b17?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/yourchannel/trunk/YourChannel.php?rev=2844975#L426'}, {'url': 'https://wordpress.org/plugins/yourchannel/'}] CVE State: PUBLISHED
Explain CVE-2023-1868
Explain the vulnerability: CVE-2023-1868
The YourChannel plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check when clearing the plugin cache via the yrc_clear_cache GET parameter in versions up to, and including, 1.2.3. This makes it possible for unauthenticated attackers to clear the plugin's cache. Affected Products: YourChannel: Everything you want in a YouTube plugin. References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/541d202b-f3ed-44d8-93a6-e158209db885?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/yourchannel/trunk/YourChannel.php?rev=2844975#L768'}, {'url': 'https://wordpress.org/plugins/yourchannel/'}] CVE State: PUBLISHED
Explain CVE-2023-1869
Explain the vulnerability: CVE-2023-1869
The YourChannel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrative-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Affected Products: YourChannel: Everything you want in a YouTube plugin. References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/a81d5615-0b96-4d89-a525-7e80a10a9317?source=cve'}, {'url': 'https://wordpress.org/plugins/yourchannel/'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2899732%40yourchannel&new=2899732%40yourchannel&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-1870
Explain the vulnerability: CVE-2023-1870
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the saveLang function. This makes it possible for unauthenticated attackers to change the plugin's quick language translation settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Affected Products: YourChannel: Everything you want in a YouTube plugin. References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/c1cec0b1-b77c-4d21-a3d2-c79fd3250bb0?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/yourchannel/trunk/YourChannel.php?rev=2844975#L498'}, {'url': 'https://wordpress.org/plugins/yourchannel/'}] CVE State: PUBLISHED
Explain CVE-2023-1871
Explain the vulnerability: CVE-2023-1871
The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the deleteLang function. This makes it possible for unauthenticated attackers to reset the plugin's quick language translation settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Affected Products: YourChannel: Everything you want in a YouTube plugin. References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/f7ae863c-4638-49ab-bb1f-52346884c3aa?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/yourchannel/trunk/YourChannel.php?rev=2844975#L505'}, {'url': 'https://wordpress.org/plugins/yourchannel/'}] CVE State: PUBLISHED
Explain CVE-2023-1872
Explain the vulnerability: CVE-2023-1872
A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation. The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered. We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8. Affected Products: Linux Kernel References: [{'url': 'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=08681391b84da27133deefaaddefd0acfa90c2be'}, {'url': 'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=da24142b1ef9fd5d36b76e36bab328a5b27523e8'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html'}, {'url': 'https://security.netapp.com/advisory/ntap-20230601-0002/'}, {'url': 'http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html'}] CVE State: PUBLISHED
Explain CVE-2023-1873
Explain the vulnerability: CVE-2023-1873
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Faturamatik Bircard allows SQL Injection.This issue affects Bircard: before 23.04.05. Affected Products: Bircard References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0231'}, {'tags': ['product'], 'url': 'https://www.faturamatik.com.tr/tr/hizmetlerimiz/bircard'}] CVE State: PUBLISHED
Explain CVE-2023-1874
Explain the vulnerability: CVE-2023-1874
The WP Data Access plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.3.7. This is due to a lack of authorization checks on the multiple_roles_update function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wpda_role[]' parameter during a profile update. This requires the 'Enable role management' setting to be enabled for the site. Affected Products: WP Data Access References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/8f562e33-2aef-46f0-8a65-691155ede9e7?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/wp-data-access/tags/5.3.7/WPDataRoles/WPDA_Roles.php#L50'}, {'url': 'https://plugins.trac.wordpress.org/browser/wp-data-access/tags/5.3.8/WPDataRoles/WPDA_Roles.php#L50'}, {'url': 'https://plugins.trac.wordpress.org/browser/wp-data-access/tags/5.3.8/WPDataRoles/WPDA_Roles.php#L23'}, {'url': 'http://packetstormsecurity.com/files/171825/WordPress-WP-Data-Access-5.3.7-Privilege-Escalation.html'}] CVE State: PUBLISHED
Explain CVE-2023-1875
Explain the vulnerability: CVE-2023-1875
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/39715aaf-e798-4c60-97c4-45f4f2cd5c61'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/dcf7dd43a3412aa951d7087b86a8b917fae2133a'}] CVE State: PUBLISHED
Explain CVE-2023-1876
Explain the vulnerability: CVE-2023-1876
N\A Affected Products: N\A References: N\A CVE State: REJECTED
Explain CVE-2023-1877
Explain the vulnerability: CVE-2023-1877
Command Injection in GitHub repository microweber/microweber prior to 1.3.3. Affected Products: microweber/microweber References: [{'url': 'https://huntr.dev/bounties/71fe4b3b-20ac-448c-8191-7b99d7ffaf55'}, {'url': 'https://github.com/microweber/microweber/commit/93a906d0bf096c3ab1674012a90c88d101e76c8d'}] CVE State: PUBLISHED
Explain CVE-2023-1878
Explain the vulnerability: CVE-2023-1878
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/93f981a3-231d-460d-a239-bb960e8c2fdc'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/e018823f8e3bca103c11e5a98b0dd469e41ed417'}] CVE State: PUBLISHED
Explain CVE-2023-1879
Explain the vulnerability: CVE-2023-1879
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/1dc7f818-c8ea-4f80-b000-31b48a426334'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/0dc8e527c375007cd4b8dbf61f7167393a6f6e91'}] CVE State: PUBLISHED
Explain CVE-2023-1880
Explain the vulnerability: CVE-2023-1880
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/ece5f051-674e-4919-b998-594714910f9e'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/bbc5d4aa4a4375c14e34dd9fcad2042066fe476d'}] CVE State: PUBLISHED
Explain CVE-2023-1881
Explain the vulnerability: CVE-2023-1881
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.3.3. Affected Products: microweber/microweber References: [{'url': 'https://huntr.dev/bounties/d5ebc2bd-8638-41c4-bf72-7c906c601344'}, {'url': 'https://github.com/microweber/microweber/commit/8d039de2d615956f6df8df0bb1045ff3be88f183'}] CVE State: PUBLISHED
Explain CVE-2023-1882
Explain the vulnerability: CVE-2023-1882
Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/8ab09a1c-cfd5-4ce0-aae3-d33c93318957'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/49db615c300ae0f87795f20570f6f5bdccb1d2f2'}] CVE State: PUBLISHED
Explain CVE-2023-1883
Explain the vulnerability: CVE-2023-1883
Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/2f1e417d-cf64-4cfb-954b-3a9cb2f38191'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/db77df888178766987398597d4f153831c62a503'}] CVE State: PUBLISHED
Explain CVE-2023-1884
Explain the vulnerability: CVE-2023-1884
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/dda73cb6-9344-4822-97a1-2e31efb6a73e'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/7f0f921de74c88038826c46bbd2a123518d9d611'}] CVE State: PUBLISHED
Explain CVE-2023-1885
Explain the vulnerability: CVE-2023-1885
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/bce84c02-abb2-474f-a67b-1468c9dcabb8'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/fecc803ab9c3e82718c4bcea7fe919d7a22ec024'}] CVE State: PUBLISHED
Explain CVE-2023-1886
Explain the vulnerability: CVE-2023-1886
Authentication Bypass by Capture-replay in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/b7d244b7-5ac3-4964-81ee-8dbb5bb5e33a'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/27eaaae16850694634ac52416a0bd38b35d7330a'}] CVE State: PUBLISHED
Explain CVE-2023-1887
Explain the vulnerability: CVE-2023-1887
Business Logic Errors in GitHub repository thorsten/phpmyfaq prior to 3.1.12. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/e4a58835-96b5-412c-a17e-3ceed30231e1'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/400d9cd988d3287515c56b2ad6343026966f1a89'}] CVE State: PUBLISHED
Explain CVE-2023-1888
Explain the vulnerability: CVE-2023-1888
The Directorist plugin for WordPress is vulnerable to an arbitrary user password reset in versions up to, and including, 7.5.4. This is due to a lack of validation checks within login.php. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to reset the password of an arbitrary user and gain elevated (e.g., administrator) privileges. Affected Products: Directorist – WordPress Business Directory Plugin with Classified Ads Listings References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/01943559-e05b-4dca-b322-d880b2729ee7?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2920100/directorist'}] CVE State: PUBLISHED
Explain CVE-2023-1889
Explain the vulnerability: CVE-2023-1889
The Directorist plugin for WordPress is vulnerable to an Insecure Direct Object Reference in versions up to, and including, 7.5.4. This is due to improper validation and authorization checks within the listing_task function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete arbitrary posts. Affected Products: Directorist – WordPress Business Directory Plugin with Classified Ads Listings References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/b47edd57-cac7-463f-88cc-8922f1b34612?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2920100/directorist'}] CVE State: PUBLISHED
Explain CVE-2023-1890
Explain the vulnerability: CVE-2023-1890
The Tablesome WordPress plugin before 1.0.9 does not escape various generated URLs, before outputting them in attributes when some notices are displayed, leading to Reflected Cross-Site Scripting Affected Products: Tablesome References: [{'url': 'https://wpscan.com/vulnerability/8ef64490-30cd-4e07-9b7c-64f551944f3d', 'tags': ['exploit', 'vdb-entry', 'technical-description']}, {'url': 'http://packetstormsecurity.com/files/173727/WordPress-Tablesome-Cross-Site-Scripting.html'}] CVE State: PUBLISHED
Explain CVE-2023-1891
Explain the vulnerability: CVE-2023-1891
The Accordion & FAQ WordPress plugin before 1.9.9 does not escape various generated URLs, before outputting them in attributes when some notices are displayed, leading to Reflected Cross-Site Scripting Affected Products: Accordion & FAQ References: [{'url': 'https://wpscan.com/vulnerability/4e5d993f-cc20-4b5f-b4c8-c13004151828', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1892
Explain the vulnerability: CVE-2023-1892
Cross-site Scripting (XSS) - Reflected in GitHub repository sidekiq/sidekiq prior to 7.0.8. Affected Products: sidekiq/sidekiq References: [{'url': 'https://huntr.dev/bounties/e35e5653-c429-4fb8-94a3-cbc123ae4777'}, {'url': 'https://github.com/sidekiq/sidekiq/commit/458fdf74176a9881478c48dc5cf0269107b22214'}] CVE State: PUBLISHED
Explain CVE-2023-1893
Explain the vulnerability: CVE-2023-1893
The Login Configurator WordPress plugin through 2.1 does not properly escape a URL parameter before outputting it to the page, leading to a reflected cross-site scripting vulnerability targeting site administrators. Affected Products: Login Configurator References: [{'url': 'https://wpscan.com/vulnerability/dbe6cf09-971f-42e9-b744-9339454168c7', 'tags': ['exploit', 'vdb-entry', 'technical-description']}, {'url': 'http://packetstormsecurity.com/files/173723/WordPress-Login-Configurator-2.1-Cross-Site-Scripting.html'}] CVE State: PUBLISHED
Explain CVE-2023-1894
Explain the vulnerability: CVE-2023-1894
A Regular Expression Denial of Service (ReDoS) issue was discovered in Puppet Server 7.9.2 certificate validation. An issue related to specifically crafted certificate names significantly slowed down server operations. Affected Products: Puppet Enterprise References: [{'url': 'https://www.puppet.com/security/cve/cve-2023-1894-puppet-server-redos'}] CVE State: PUBLISHED
Explain CVE-2023-1895
Explain the vulnerability: CVE-2023-1895
The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Server Side Request Forgery via the get_remote_content REST API endpoint in versions up to, and including, 1.8.3. This can allow authenticated attackers with subscriber-level permissions or above to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. Affected Products: Getwid – Gutenberg Blocks References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/e9c2a942-c14c-4b59-92a7-6946b2e4731b?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/getwid/tags/1.8.3/includes/rest-api.php'}] CVE State: PUBLISHED
Explain CVE-2023-1897
Explain the vulnerability: CVE-2023-1897
Atlas Copco Power Focus 6000 web server does not sanitize the login information stored by the authenticated user’s browser, which could allow an attacker with access to the user’s computer to gain credential information of the controller. Affected Products: Power Focus References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-159-01'}] CVE State: PUBLISHED
Explain CVE-2023-1898
Explain the vulnerability: CVE-2023-1898
Atlas Copco Power Focus 6000 web server uses a small amount of session ID numbers. An attacker could enter a session ID number to retrieve data for an active user’s session. Affected Products: Power Focus References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-159-01'}] CVE State: PUBLISHED
Explain CVE-2023-1899
Explain the vulnerability: CVE-2023-1899
Atlas Copco Power Focus 6000 web server is not a secure connection by default, which could allow an attacker to gain sensitive information by monitoring network traffic between user and controller. Affected Products: Power Focus References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-159-01'}] CVE State: PUBLISHED