instruction
stringlengths 21
21
| input
stringlengths 40
40
| output
stringlengths 62
37.3k
|
---|---|---|
Explain CVE-2023-1793 | Explain the vulnerability: CVE-2023-1793 | A vulnerability was found in SourceCodester Police Crime Record Management System 1.0. It has been classified as critical. This affects an unknown part of the file /officer/assigncase.php of the component GET Parameter Handler. The manipulation of the argument caseid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224745 was assigned to this vulnerability.
Affected Products: Police Crime Record Management System
References: [{'url': 'https://vuldb.com/?id.224745', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224745', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/fillorkill/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1794 | Explain the vulnerability: CVE-2023-1794 | A vulnerability was found in SourceCodester Police Crime Record Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/casedetails.php of the component GET Parameter Handler. The manipulation of the argument id with the input "><script>alert(233)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224746 is the identifier assigned to this vulnerability.
Affected Products: Police Crime Record Management System
References: [{'url': 'https://vuldb.com/?id.224746', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224746', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/fillorkill/bug_report/blob/main/XSS-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1795 | Explain the vulnerability: CVE-2023-1795 | A vulnerability was found in SourceCodester Gadget Works Online Ordering System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/products/index.php of the component GET Parameter Handler. The manipulation of the argument view with the input <script>alert(666)</script> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224747.
Affected Products: Gadget Works Online Ordering System
References: [{'url': 'https://vuldb.com/?id.224747', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224747', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/FinleyTang/bug_report/blob/main/XSS-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1796 | Explain the vulnerability: CVE-2023-1796 | A vulnerability classified as problematic has been found in SourceCodester Employee Payslip Generator 1.0. Affected is an unknown function of the file /classes/Master.php?f=save_position of the component Create News Handler. The manipulation of the argument name with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224748.
Affected Products: Employee Payslip Generator
References: [{'url': 'https://vuldb.com/?id.224748', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224748', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Jean-Astruc/bug_report/blob/main/XSS-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1797 | Explain the vulnerability: CVE-2023-1797 | A vulnerability classified as critical was found in OTCMS 6.0.1. Affected by this vulnerability is an unknown functionality of the file sysCheckFile.php?mudi=sql. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224749 was assigned to this vulnerability.
Affected Products: OTCMS
References: [{'url': 'https://vuldb.com/?id.224749', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224749', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/wkstestete/cve/blob/master/upload/upload1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1798 | Explain the vulnerability: CVE-2023-1798 | A vulnerability, which was classified as problematic, has been found in EyouCMS up to 1.5.4. Affected by this issue is some unknown functionality of the file login.php. The manipulation of the argument typename leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-224750 is the identifier assigned to this vulnerability.
Affected Products: EyouCMS
References: [{'url': 'https://vuldb.com/?id.224750', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224750', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/wkstestete/cve/blob/master/xss/eyoucms%20xss.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1799 | Explain the vulnerability: CVE-2023-1799 | A vulnerability, which was classified as problematic, was found in EyouCMS up to 1.5.4. This affects an unknown part of the file login.php. The manipulation of the argument tag_tag leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224751.
Affected Products: EyouCMS
References: [{'url': 'https://vuldb.com/?id.224751', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224751', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/wkstestete/cve/blob/master/xss/Eyoucms%20xss2.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1800 | Explain the vulnerability: CVE-2023-1800 | A vulnerability, which was classified as critical, has been found in sjqzhang go-fastdfs up to 1.4.3. Affected by this issue is the function upload of the file /group1/uploa of the component File Upload Handler. The manipulation leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224768.
Affected Products: go-fastdfs
References: [{'url': 'https://vuldb.com/?id.224768', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224768', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/yangyanglo/ForCVE/blob/main/2023-0x05.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1801 | Explain the vulnerability: CVE-2023-1801 | The SMB protocol decoder in tcpdump version 4.99.3 can perform an out-of-bounds write when decoding a crafted network packet.
Affected Products: tcpdump
References: [{'url': 'https://github.com/the-tcpdump-group/tcpdump/commit/7578e1c04ee280dda50c4c2813e7d55f539c6501', 'tags': ['patch']}, {'url': 'https://github.com/the-tcpdump-group/tcpdump/commit/03c037bbd75588beba3ee09f26d17783d21e30bc', 'tags': ['patch']}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOA2BJFERAC3VRQIRHJOWN4HZY4ZA7CH/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WYL5DEVHRJYF2CM5LTCZKEYFYDZAIZSN/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLLZCG23MU6O4QOG2CX3DLEL3YXP6LAI/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1802 | Explain the vulnerability: CVE-2023-1802 | In Docker Desktop 4.17.x the Artifactory Integration falls back to sending registry credentials over plain HTTP if the HTTPS health check has failed. A targeted network sniffing attack can lead to a disclosure of sensitive information. Only users who have Access Experimental Features enabled and have logged in to a private registry are affected.
Affected Products: Docker Desktop
References: [{'tags': ['release-notes'], 'url': 'https://docs.docker.com/desktop/release-notes/#4180'}, {'tags': ['issue-tracking'], 'url': 'https://github.com/docker/for-win/issues/13344'}]
CVE State: PUBLISHED |
Explain CVE-2023-1803 | Explain the vulnerability: CVE-2023-1803 | Authentication Bypass by Alternate Name vulnerability in DTS Electronics Redline Router firmware allows Authentication Bypass.This issue affects Redline Router: before 7.17.
Affected Products: Redline Router
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0227'}]
CVE State: PUBLISHED |
Explain CVE-2023-1804 | Explain the vulnerability: CVE-2023-1804 | The Product Catalog Feed by PixelYourSite WordPress plugin before 2.1.1 does not sanitise and escape the edit parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrators.
Affected Products: Product Catalog Feed by PixelYourSite
References: [{'url': 'https://wpscan.com/vulnerability/55b28fa6-a54f-4365-9d59-f9e331c1e11b', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1805 | Explain the vulnerability: CVE-2023-1805 | The Product Catalog Feed by PixelYourSite WordPress plugin before 2.1.1 does not sanitise and escape the page parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Affected Products: Product Catalog Feed by PixelYourSite
References: [{'url': 'https://wpscan.com/vulnerability/46b4582f-7651-4b74-a00b-1788587ecfa8', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1806 | Explain the vulnerability: CVE-2023-1806 | The WP Inventory Manager WordPress plugin before 2.1.0.12 does not sanitise and escape the message parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrators.
Affected Products: WP Inventory Manager
References: [{'url': 'https://wpscan.com/vulnerability/38d99c7d-2d10-4910-b95a-1cb545b813c4', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1807 | Explain the vulnerability: CVE-2023-1807 | The Elementor Addons, Widgets and Enhancements – Stax plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.4.3. This is due to missing or incorrect nonce validation on the toggle_widget function. This makes it possible for unauthenticated attackers to enable or disable Elementor widgets via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected Products: Elementor Addons, Widgets and Enhancements – Stax
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/c12094bd-aa23-4f9b-92e1-d1d4284fb2a0?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/stax-addons-for-elementor/trunk/core/admin/pages/Widgets.php#L31'}]
CVE State: PUBLISHED |
Explain CVE-2023-1809 | Explain the vulnerability: CVE-2023-1809 | The Download Manager WordPress plugin before 6.3.0 leaks master key information without the need for a password, allowing attackers to download arbitrary password-protected package files.
Affected Products: Download Manager
References: [{'url': 'https://wpscan.com/vulnerability/57f0a078-fbeb-4b05-8892-e6d99edb82c1', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1810 | Explain the vulnerability: CVE-2023-1810 | Heap buffer overflow in Visuals in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1414018'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}]
CVE State: PUBLISHED |
Explain CVE-2023-1811 | Explain the vulnerability: CVE-2023-1811 | Use after free in Frames in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1420510'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}]
CVE State: PUBLISHED |
Explain CVE-2023-1812 | Explain the vulnerability: CVE-2023-1812 | Out of bounds memory access in DOM Bindings in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1418224'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}]
CVE State: PUBLISHED |
Explain CVE-2023-1813 | Explain the vulnerability: CVE-2023-1813 | Inappropriate implementation in Extensions in Google Chrome prior to 112.0.5615.49 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1423258'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}]
CVE State: PUBLISHED |
Explain CVE-2023-1814 | Explain the vulnerability: CVE-2023-1814 | Insufficient validation of untrusted input in Safe Browsing in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass download checking via a crafted HTML page. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1417325'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}]
CVE State: PUBLISHED |
Explain CVE-2023-1815 | Explain the vulnerability: CVE-2023-1815 | Use after free in Networking APIs in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1278708'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}]
CVE State: PUBLISHED |
Explain CVE-2023-1816 | Explain the vulnerability: CVE-2023-1816 | Incorrect security UI in Picture In Picture in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially perform navigation spoofing via a crafted HTML page. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1413919'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}]
CVE State: PUBLISHED |
Explain CVE-2023-1817 | Explain the vulnerability: CVE-2023-1817 | Insufficient policy enforcement in Intents in Google Chrome on Android prior to 112.0.5615.49 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1418061'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}]
CVE State: PUBLISHED |
Explain CVE-2023-1818 | Explain the vulnerability: CVE-2023-1818 | Use after free in Vulkan in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1223346'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}]
CVE State: PUBLISHED |
Explain CVE-2023-1819 | Explain the vulnerability: CVE-2023-1819 | Out of bounds read in Accessibility in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1406588'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}]
CVE State: PUBLISHED |
Explain CVE-2023-1820 | Explain the vulnerability: CVE-2023-1820 | Heap buffer overflow in Browser History in Google Chrome prior to 112.0.5615.49 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1408120'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}]
CVE State: PUBLISHED |
Explain CVE-2023-1821 | Explain the vulnerability: CVE-2023-1821 | Inappropriate implementation in WebShare in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1413618'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}]
CVE State: PUBLISHED |
Explain CVE-2023-1822 | Explain the vulnerability: CVE-2023-1822 | Incorrect security UI in Navigation in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Low)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1066555'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}]
CVE State: PUBLISHED |
Explain CVE-2023-1823 | Explain the vulnerability: CVE-2023-1823 | Inappropriate implementation in FedCM in Google Chrome prior to 112.0.5615.49 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1406900'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/'}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/'}, {'url': 'https://www.debian.org/security/2023/dsa-5386'}]
CVE State: PUBLISHED |
Explain CVE-2023-1825 | Explain the vulnerability: CVE-2023-1825 | An issue has been discovered in GitLab EE affecting all versions starting from 15.7 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. It was possible to disclose issue notes to an unauthorized user at project export.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/384035'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1825.json'}]
CVE State: PUBLISHED |
Explain CVE-2023-1826 | Explain the vulnerability: CVE-2023-1826 | A vulnerability, which was classified as critical, was found in SourceCodester Online Computer and Laptop Store 1.0. This affects an unknown part of the file php-ocls\admin\system_info\index.php. The manipulation of the argument img leads to unrestricted upload. It is possible to initiate the attack remotely. The identifier VDB-224841 was assigned to this vulnerability.
Affected Products: Online Computer and Laptop Store
References: [{'url': 'https://vuldb.com/?id.224841', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224841', 'tags': ['signature', 'permissions-required']}, {'url': 'http://packetstormsecurity.com/files/171790/Online-Computer-And-Laptop-Store-1.0-Shell-Upload.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-1827 | Explain the vulnerability: CVE-2023-1827 | A vulnerability has been found in SourceCodester Centralized Covid Vaccination Records System 1.0 and classified as critical. This vulnerability affects unknown code of the file /vaccinated/admin/maintenance/manage_location.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224842 is the identifier assigned to this vulnerability.
Affected Products: Centralized Covid Vaccination Records System
References: [{'url': 'https://vuldb.com/?id.224842', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224842', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ZERO-XX-ONE/bug_report/blob/main/SQLi.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1829 | Explain the vulnerability: CVE-2023-1829 | A use-after-free vulnerability in the Linux Kernel traffic control index filter (tcindex) can be exploited to achieve local privilege escalation. The tcindex_delete function which does not properly deactivate filters in case of a perfect hashes while deleting the underlying structure which can later lead to double freeing the structure. A local attacker user can use this vulnerability to elevate its privileges to root.
We recommend upgrading past commit 8c710f75256bb3cf05ac7b1672c82b92c43f3d28.
Affected Products: Linux Kernel
References: [{'url': 'https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28'}, {'url': 'https://kernel.dance/#8c710f75256bb3cf05ac7b1672c82b92c43f3d28'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html'}, {'url': 'https://security.netapp.com/advisory/ntap-20230601-0001/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1831 | Explain the vulnerability: CVE-2023-1831 | Mattermost fails to redact from audit logs the user password during user creation and the user password hash in other operations if the experimental audit logging configuration was enabled (ExperimentalAuditSettings section in config).
Affected Products: Mattermost
References: [{'url': 'https://mattermost.com/security-updates/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1833 | Explain the vulnerability: CVE-2023-1833 | Authentication Bypass by Primary Weakness vulnerability in DTS Electronics Redline Router firmware allows Authentication Bypass.This issue affects Redline Router: before 7.17.
Affected Products: Redline Router
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0227'}]
CVE State: PUBLISHED |
Explain CVE-2023-1834 | Explain the vulnerability: CVE-2023-1834 |
Rockwell Automation was made aware that Kinetix 5500 drives, manufactured between May 2022 and January 2023, and are running v7.13 may have the telnet and FTP ports open by default. This could potentially allow attackers unauthorized access to the device through the open ports.
Affected Products: Kinetix 5500 EtherNet/IP Servo Drive
References: [{'url': 'https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1139441'}]
CVE State: PUBLISHED |
Explain CVE-2023-1835 | Explain the vulnerability: CVE-2023-1835 | The Ninja Forms Contact Form WordPress plugin before 3.6.22 does not properly escape user input before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Affected Products: Ninja Forms Contact Form
References: [{'url': 'https://wpscan.com/vulnerability/b5fc223c-5ec0-44b2-b2f6-b35f9942d341', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1836 | Explain the vulnerability: CVE-2023-1836 | A cross-site scripting issue has been discovered in GitLab affecting all versions starting from 5.1 before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. When viewing an XML file in a repository in "raw" mode, it can be made to render as HTML if viewed under specific circumstances
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/404613'}, {'url': 'https://hackerone.com/reports/1923293'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1836.json'}]
CVE State: PUBLISHED |
Explain CVE-2023-1837 | Explain the vulnerability: CVE-2023-1837 | Missing Authentication for critical function vulnerability in HYPR Server allows Authentication Bypass when using Legacy APIs.This issue affects HYPR Server: before 8.0 (with enabled Legacy APIs)
Affected Products: HYPR Server
References: [{'url': 'https://www.hypr.com/security-advisories'}]
CVE State: PUBLISHED |
Explain CVE-2023-1838 | Explain the vulnerability: CVE-2023-1838 | A use-after-free flaw was found in vhost_net_set_backend in drivers/vhost/net.c in virtio network subcomponent in the Linux kernel due to a double fget. This flaw could allow a local attacker to crash the system, and could even lead to a kernel information leak problem.
Affected Products: Kernel
References: [{'url': 'https://lore.kernel.org/netdev/20220516084213.26854-1-jasowang%40redhat.com/T/'}, {'url': 'https://security.netapp.com/advisory/ntap-20230517-0003/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1839 | Explain the vulnerability: CVE-2023-1839 | The Product Addons & Fields for WooCommerce WordPress plugin before 32.0.6 does not sanitize and escape some of its setting fields, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).
Affected Products: Product Addons & Fields for WooCommerce
References: [{'url': 'https://wpscan.com/vulnerability/fddc5a1c-f267-4ef4-8acf-731dbecac450', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1840 | Explain the vulnerability: CVE-2023-1840 | The Sp*tify Play Button for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 2.07 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Affected Products: Sp*tify Play Button for WordPress
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/308f6887-7c1c-4efd-85e2-b71bb6d26dab?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2893653%40spotify-play-button-for-wordpress%2Ftrunk&old=2870608%40spotify-play-button-for-wordpress%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-1842 | Explain the vulnerability: CVE-2023-1842 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-2023-1843 | Explain the vulnerability: CVE-2023-1843 | The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to unauthorized permalink structure update due to a missing capability check on the permalink_setup function in versions up to, and including, 3.3.0. This makes it possible for unauthenticated attackers to change the permalink structure.
Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/5db00eb6-3e05-42fa-bb84-2df4bcae3955?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/plugin.php#L544'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2907471/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1844 | Explain the vulnerability: CVE-2023-1844 | The Subscribe2 plugin for WordPress is vulnerable to unauthorized access to email functionality due to a missing capability check when sending test emails in versions up to, and including, 10.40. This makes it possible for author-level attackers to send emails with arbitrary content and attachments to site users.
Affected Products: Subscribe2 – Form, Email Subscribers & Newsletters
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/c34ce601-5cf9-433f-bc9d-5c705eba6b08?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/subscribe2/trunk/admin/send-email.php#L12'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2930676'}]
CVE State: PUBLISHED |
Explain CVE-2023-1845 | Explain the vulnerability: CVE-2023-1845 | A vulnerability, which was classified as critical, was found in SourceCodester Online Payroll System 1.0. This affects an unknown part of the file /admin/employee_row.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224985 was assigned to this vulnerability.
Affected Products: Online Payroll System
References: [{'url': 'https://vuldb.com/?id.224985', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224985', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%202.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1846 | Explain the vulnerability: CVE-2023-1846 | A vulnerability has been found in SourceCodester Online Payroll System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/deduction_row.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224986 is the identifier assigned to this vulnerability.
Affected Products: Online Payroll System
References: [{'url': 'https://vuldb.com/?id.224986', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224986', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%204.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1847 | Explain the vulnerability: CVE-2023-1847 | A vulnerability was found in SourceCodester Online Payroll System 1.0 and classified as critical. This issue affects some unknown processing of the file attendance.php. The manipulation of the argument employee leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224987.
Affected Products: Online Payroll System
References: [{'url': 'https://vuldb.com/?id.224987', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224987', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%201.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1848 | Explain the vulnerability: CVE-2023-1848 | A vulnerability was found in SourceCodester Online Payroll System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/attendance_row.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224988.
Affected Products: Online Payroll System
References: [{'url': 'https://vuldb.com/?id.224988', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224988', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%203.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1849 | Explain the vulnerability: CVE-2023-1849 | A vulnerability was found in SourceCodester Online Payroll System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/cashadvance_row.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224989 was assigned to this vulnerability.
Affected Products: Online Payroll System
References: [{'url': 'https://vuldb.com/?id.224989', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224989', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%205.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1850 | Explain the vulnerability: CVE-2023-1850 | A vulnerability was found in SourceCodester Online Payroll System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/login.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-224990 is the identifier assigned to this vulnerability.
Affected Products: Online Payroll System
References: [{'url': 'https://vuldb.com/?id.224990', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224990', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%206.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1851 | Explain the vulnerability: CVE-2023-1851 | A vulnerability classified as problematic has been found in SourceCodester Online Payroll System 1.0. This affects an unknown part of the file /admin/employee_add.php. The manipulation of the argument of leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224991.
Affected Products: Online Payroll System
References: [{'url': 'https://vuldb.com/?id.224991', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224991', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%207.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1852 | Explain the vulnerability: CVE-2023-1852 | A vulnerability classified as problematic was found in SourceCodester Online Payroll System 1.0. This vulnerability affects unknown code of the file /admin/deduction_edit.php. The manipulation of the argument description leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-224992.
Affected Products: Online Payroll System
References: [{'url': 'https://vuldb.com/?id.224992', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224992', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%208.pdf', 'tags': ['related']}]
CVE State: PUBLISHED |
Explain CVE-2023-1853 | Explain the vulnerability: CVE-2023-1853 | A vulnerability, which was classified as problematic, has been found in SourceCodester Online Payroll System 1.0. This issue affects some unknown processing of the file /admin/employee_edit.php. The manipulation of the argument of leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224993 was assigned to this vulnerability.
Affected Products: Online Payroll System
References: [{'url': 'https://vuldb.com/?id.224993', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224993', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide/Online%20Payroll%20System%20in%20PHP%20and%20MySQL%20Free%20Download%20A%20Comprehensive%20Guide%20-%20vlun%209.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1854 | Explain the vulnerability: CVE-2023-1854 | A vulnerability, which was classified as problematic, was found in SourceCodester Online Graduate Tracer System 1.0. Affected is an unknown function of the file admin/. The manipulation leads to session expiration. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-224994 is the identifier assigned to this vulnerability.
Affected Products: Online Graduate Tracer System
References: [{'url': 'https://vuldb.com/?id.224994', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224994', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Jlan45/OGTSFCOIA/blob/main/unauthorizedaccess.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1855 | Explain the vulnerability: CVE-2023-1855 | A use-after-free flaw was found in xgene_hwmon_remove in drivers/hwmon/xgene-hwmon.c in the Hardware Monitoring Linux Kernel Driver (xgene-hwmon). This flaw could allow a local attacker to crash the system due to a race problem. This vulnerability could even lead to a kernel information leak problem.
Affected Products: Kernel
References: [{'url': 'https://lore.kernel.org/all/20230318122758.2140868-1-linux%40roeck-us.net/'}, {'name': '[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html'}, {'name': '[debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html'}, {'url': 'https://github.com/torvalds/linux/commit/cb090e64cf25602b9adaf32d5dfc9c8bec493cd1'}]
CVE State: PUBLISHED |
Explain CVE-2023-1856 | Explain the vulnerability: CVE-2023-1856 | A vulnerability has been found in SourceCodester Air Cargo Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/transactions/track_shipment.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224995.
Affected Products: Air Cargo Management System
References: [{'url': 'https://vuldb.com/?id.224995', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224995', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Hackergrave/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1857 | Explain the vulnerability: CVE-2023-1857 | A vulnerability was found in SourceCodester Online Computer and Laptop Store 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/?page=product/manage_product&id=2. The manipulation of the argument Product Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224996.
Affected Products: Online Computer and Laptop Store
References: [{'url': 'https://vuldb.com/?id.224996', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224996', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/v2ish1yan/mycve/blob/main/ocls.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1858 | Explain the vulnerability: CVE-2023-1858 | A vulnerability was found in SourceCodester Earnings and Expense Tracker App 1.0. It has been classified as problematic. This affects an unknown part of the file index.php. The manipulation of the argument page leads to information disclosure. It is possible to initiate the attack remotely. The identifier VDB-224997 was assigned to this vulnerability.
Affected Products: Earnings and Expense Tracker App
References: [{'url': 'https://vuldb.com/?id.224997', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224997', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1859 | Explain the vulnerability: CVE-2023-1859 | A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak.
Affected Products: Kernel
References: [{'url': 'https://lore.kernel.org/all/20230313090002.3308025-1-zyytlz.wz%40163.com/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1860 | Explain the vulnerability: CVE-2023-1860 | A vulnerability was found in Keysight IXIA Hawkeye 3.3.16.28. It has been declared as problematic. This vulnerability affects unknown code of the file /licenses. The manipulation of the argument view with the input teste"><script>alert(%27c4ng4c3ir0%27)</script> leads to cross site scripting. The attack can be initiated remotely. VDB-224998 is the identifier assigned to this vulnerability. NOTE: Vendor did not respond if and how they may handle this issue.
Affected Products: IXIA Hawkeye
References: [{'url': 'https://vuldb.com/?id.224998', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224998', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1861 | Explain the vulnerability: CVE-2023-1861 | The Limit Login Attempts WordPress plugin through 1.7.2 does not sanitize and escape usernames when outputting them back in the logs dashboard, which could allow any authenticated users, such as subscriber to perform Stored Cross-Site Scripting attacks
Affected Products: Limit Login Attempts
References: [{'url': 'https://wpscan.com/vulnerability/461cbcca-aed7-4c92-ba35-ebabf4fcd810', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1862 | Explain the vulnerability: CVE-2023-1862 | Cloudflare WARP client for Windows (up to v2023.3.381.0) allowed a malicious actor to remotely access the warp-svc.exe binary due to an insufficient access control policy on an IPC Named Pipe. This would have enabled an attacker to trigger WARP connect and disconnect commands, as well as obtaining network diagnostics and application configuration from the target's device. It is important to note that in order to exploit this, a set of requirements would need to be met, such as the target's device must've been reachable on port 445, allowed authentication with NULL sessions or otherwise having knowledge of the target's credentials.
Affected Products: WARP Client
References: [{'url': 'https://developers.cloudflare.com/warp-client/get-started/windows/'}, {'url': 'https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release'}, {'url': 'https://github.com/cloudflare/advisories/security/advisories/GHSA-q55r-53c8-5642'}]
CVE State: PUBLISHED |
Explain CVE-2023-1863 | Explain the vulnerability: CVE-2023-1863 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Eskom Computer Water Metering Software allows Command Line Execution through SQL Injection.This issue affects Water Metering Software: before 23.04.06.
Affected Products: Water Metering Software
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0225'}]
CVE State: PUBLISHED |
Explain CVE-2023-1864 | Explain the vulnerability: CVE-2023-1864 | FANUC ROBOGUIDE-HandlingPRO Versions 9 Rev.ZD and prior is vulnerable to
a path traversal, which could allow an attacker to remotely read files
on the system running the affected software.
Affected Products: ROBOGUIDE-HandlingPRO
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-101-01'}]
CVE State: PUBLISHED |
Explain CVE-2023-1865 | Explain the vulnerability: CVE-2023-1865 | The YourChannel plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check when resetting plugin settings via the yrc_nuke GET parameter in versions up to, and including, 1.2.3. This makes it possible for unauthenticated attackers to delete YouTube channels from the plugin.
Affected Products: YourChannel: Everything you want in a YouTube plugin.
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/34817e32-d5a3-403a-85f0-1d60af8945de?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/yourchannel/trunk/YourChannel.php?rev=2844975#L772'}, {'url': 'https://wordpress.org/plugins/yourchannel/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1866 | Explain the vulnerability: CVE-2023-1866 | The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the clearKeys function. This makes it possible for unauthenticated attackers to reset the plugin's channel settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected Products: YourChannel: Everything you want in a YouTube plugin.
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/45851efe-2584-4b5e-8e4c-24f289d3bc32?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/yourchannel/trunk/YourChannel.php?rev=2844975#L107'}]
CVE State: PUBLISHED |
Explain CVE-2023-1867 | Explain the vulnerability: CVE-2023-1867 | The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the save function. This makes it possible for unauthenticated attackers to change the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected Products: YourChannel: Everything you want in a YouTube plugin.
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/4c20db2d-f73d-4e52-a275-ab1975ae4b17?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/yourchannel/trunk/YourChannel.php?rev=2844975#L426'}, {'url': 'https://wordpress.org/plugins/yourchannel/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1868 | Explain the vulnerability: CVE-2023-1868 | The YourChannel plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check when clearing the plugin cache via the yrc_clear_cache GET parameter in versions up to, and including, 1.2.3. This makes it possible for unauthenticated attackers to clear the plugin's cache.
Affected Products: YourChannel: Everything you want in a YouTube plugin.
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/541d202b-f3ed-44d8-93a6-e158209db885?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/yourchannel/trunk/YourChannel.php?rev=2844975#L768'}, {'url': 'https://wordpress.org/plugins/yourchannel/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1869 | Explain the vulnerability: CVE-2023-1869 | The YourChannel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrative-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Affected Products: YourChannel: Everything you want in a YouTube plugin.
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/a81d5615-0b96-4d89-a525-7e80a10a9317?source=cve'}, {'url': 'https://wordpress.org/plugins/yourchannel/'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2899732%40yourchannel&new=2899732%40yourchannel&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-1870 | Explain the vulnerability: CVE-2023-1870 | The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the saveLang function. This makes it possible for unauthenticated attackers to change the plugin's quick language translation settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected Products: YourChannel: Everything you want in a YouTube plugin.
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/c1cec0b1-b77c-4d21-a3d2-c79fd3250bb0?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/yourchannel/trunk/YourChannel.php?rev=2844975#L498'}, {'url': 'https://wordpress.org/plugins/yourchannel/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1871 | Explain the vulnerability: CVE-2023-1871 | The YourChannel plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.3. This is due to missing or incorrect nonce validation on the deleteLang function. This makes it possible for unauthenticated attackers to reset the plugin's quick language translation settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected Products: YourChannel: Everything you want in a YouTube plugin.
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/f7ae863c-4638-49ab-bb1f-52346884c3aa?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/yourchannel/trunk/YourChannel.php?rev=2844975#L505'}, {'url': 'https://wordpress.org/plugins/yourchannel/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1872 | Explain the vulnerability: CVE-2023-1872 | A use-after-free vulnerability in the Linux Kernel io_uring system can be exploited to achieve local privilege escalation.
The io_file_get_fixed function lacks the presence of ctx->uring_lock which can lead to a Use-After-Free vulnerability due a race condition with fixed files getting unregistered.
We recommend upgrading past commit da24142b1ef9fd5d36b76e36bab328a5b27523e8.
Affected Products: Linux Kernel
References: [{'url': 'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=08681391b84da27133deefaaddefd0acfa90c2be'}, {'url': 'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=da24142b1ef9fd5d36b76e36bab328a5b27523e8'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html'}, {'url': 'https://security.netapp.com/advisory/ntap-20230601-0002/'}, {'url': 'http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-1873 | Explain the vulnerability: CVE-2023-1873 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Faturamatik Bircard allows SQL Injection.This issue affects Bircard: before 23.04.05.
Affected Products: Bircard
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0231'}, {'tags': ['product'], 'url': 'https://www.faturamatik.com.tr/tr/hizmetlerimiz/bircard'}]
CVE State: PUBLISHED |
Explain CVE-2023-1874 | Explain the vulnerability: CVE-2023-1874 | The WP Data Access plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.3.7. This is due to a lack of authorization checks on the multiple_roles_update function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wpda_role[]' parameter during a profile update. This requires the 'Enable role management' setting to be enabled for the site.
Affected Products: WP Data Access
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/8f562e33-2aef-46f0-8a65-691155ede9e7?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/wp-data-access/tags/5.3.7/WPDataRoles/WPDA_Roles.php#L50'}, {'url': 'https://plugins.trac.wordpress.org/browser/wp-data-access/tags/5.3.8/WPDataRoles/WPDA_Roles.php#L50'}, {'url': 'https://plugins.trac.wordpress.org/browser/wp-data-access/tags/5.3.8/WPDataRoles/WPDA_Roles.php#L23'}, {'url': 'http://packetstormsecurity.com/files/171825/WordPress-WP-Data-Access-5.3.7-Privilege-Escalation.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-1875 | Explain the vulnerability: CVE-2023-1875 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/39715aaf-e798-4c60-97c4-45f4f2cd5c61'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/dcf7dd43a3412aa951d7087b86a8b917fae2133a'}]
CVE State: PUBLISHED |
Explain CVE-2023-1876 | Explain the vulnerability: CVE-2023-1876 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-2023-1877 | Explain the vulnerability: CVE-2023-1877 | Command Injection in GitHub repository microweber/microweber prior to 1.3.3.
Affected Products: microweber/microweber
References: [{'url': 'https://huntr.dev/bounties/71fe4b3b-20ac-448c-8191-7b99d7ffaf55'}, {'url': 'https://github.com/microweber/microweber/commit/93a906d0bf096c3ab1674012a90c88d101e76c8d'}]
CVE State: PUBLISHED |
Explain CVE-2023-1878 | Explain the vulnerability: CVE-2023-1878 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/93f981a3-231d-460d-a239-bb960e8c2fdc'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/e018823f8e3bca103c11e5a98b0dd469e41ed417'}]
CVE State: PUBLISHED |
Explain CVE-2023-1879 | Explain the vulnerability: CVE-2023-1879 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/1dc7f818-c8ea-4f80-b000-31b48a426334'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/0dc8e527c375007cd4b8dbf61f7167393a6f6e91'}]
CVE State: PUBLISHED |
Explain CVE-2023-1880 | Explain the vulnerability: CVE-2023-1880 | Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/ece5f051-674e-4919-b998-594714910f9e'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/bbc5d4aa4a4375c14e34dd9fcad2042066fe476d'}]
CVE State: PUBLISHED |
Explain CVE-2023-1881 | Explain the vulnerability: CVE-2023-1881 | Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.3.3.
Affected Products: microweber/microweber
References: [{'url': 'https://huntr.dev/bounties/d5ebc2bd-8638-41c4-bf72-7c906c601344'}, {'url': 'https://github.com/microweber/microweber/commit/8d039de2d615956f6df8df0bb1045ff3be88f183'}]
CVE State: PUBLISHED |
Explain CVE-2023-1882 | Explain the vulnerability: CVE-2023-1882 | Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/8ab09a1c-cfd5-4ce0-aae3-d33c93318957'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/49db615c300ae0f87795f20570f6f5bdccb1d2f2'}]
CVE State: PUBLISHED |
Explain CVE-2023-1883 | Explain the vulnerability: CVE-2023-1883 | Improper Access Control in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/2f1e417d-cf64-4cfb-954b-3a9cb2f38191'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/db77df888178766987398597d4f153831c62a503'}]
CVE State: PUBLISHED |
Explain CVE-2023-1884 | Explain the vulnerability: CVE-2023-1884 | Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/dda73cb6-9344-4822-97a1-2e31efb6a73e'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/7f0f921de74c88038826c46bbd2a123518d9d611'}]
CVE State: PUBLISHED |
Explain CVE-2023-1885 | Explain the vulnerability: CVE-2023-1885 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/bce84c02-abb2-474f-a67b-1468c9dcabb8'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/fecc803ab9c3e82718c4bcea7fe919d7a22ec024'}]
CVE State: PUBLISHED |
Explain CVE-2023-1886 | Explain the vulnerability: CVE-2023-1886 | Authentication Bypass by Capture-replay in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/b7d244b7-5ac3-4964-81ee-8dbb5bb5e33a'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/27eaaae16850694634ac52416a0bd38b35d7330a'}]
CVE State: PUBLISHED |
Explain CVE-2023-1887 | Explain the vulnerability: CVE-2023-1887 | Business Logic Errors in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/e4a58835-96b5-412c-a17e-3ceed30231e1'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/400d9cd988d3287515c56b2ad6343026966f1a89'}]
CVE State: PUBLISHED |
Explain CVE-2023-1888 | Explain the vulnerability: CVE-2023-1888 | The Directorist plugin for WordPress is vulnerable to an arbitrary user password reset in versions up to, and including, 7.5.4. This is due to a lack of validation checks within login.php. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to reset the password of an arbitrary user and gain elevated (e.g., administrator) privileges.
Affected Products: Directorist – WordPress Business Directory Plugin with Classified Ads Listings
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/01943559-e05b-4dca-b322-d880b2729ee7?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2920100/directorist'}]
CVE State: PUBLISHED |
Explain CVE-2023-1889 | Explain the vulnerability: CVE-2023-1889 | The Directorist plugin for WordPress is vulnerable to an Insecure Direct Object Reference in versions up to, and including, 7.5.4. This is due to improper validation and authorization checks within the listing_task function. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete arbitrary posts.
Affected Products: Directorist – WordPress Business Directory Plugin with Classified Ads Listings
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/b47edd57-cac7-463f-88cc-8922f1b34612?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2920100/directorist'}]
CVE State: PUBLISHED |
Explain CVE-2023-1890 | Explain the vulnerability: CVE-2023-1890 | The Tablesome WordPress plugin before 1.0.9 does not escape various generated URLs, before outputting them in attributes when some notices are displayed, leading to Reflected Cross-Site Scripting
Affected Products: Tablesome
References: [{'url': 'https://wpscan.com/vulnerability/8ef64490-30cd-4e07-9b7c-64f551944f3d', 'tags': ['exploit', 'vdb-entry', 'technical-description']}, {'url': 'http://packetstormsecurity.com/files/173727/WordPress-Tablesome-Cross-Site-Scripting.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-1891 | Explain the vulnerability: CVE-2023-1891 | The Accordion & FAQ WordPress plugin before 1.9.9 does not escape various generated URLs, before outputting them in attributes when some notices are displayed, leading to Reflected Cross-Site Scripting
Affected Products: Accordion & FAQ
References: [{'url': 'https://wpscan.com/vulnerability/4e5d993f-cc20-4b5f-b4c8-c13004151828', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1892 | Explain the vulnerability: CVE-2023-1892 | Cross-site Scripting (XSS) - Reflected in GitHub repository sidekiq/sidekiq prior to 7.0.8.
Affected Products: sidekiq/sidekiq
References: [{'url': 'https://huntr.dev/bounties/e35e5653-c429-4fb8-94a3-cbc123ae4777'}, {'url': 'https://github.com/sidekiq/sidekiq/commit/458fdf74176a9881478c48dc5cf0269107b22214'}]
CVE State: PUBLISHED |
Explain CVE-2023-1893 | Explain the vulnerability: CVE-2023-1893 | The Login Configurator WordPress plugin through 2.1 does not properly escape a URL parameter before outputting it to the page, leading to a reflected cross-site scripting vulnerability targeting site administrators.
Affected Products: Login Configurator
References: [{'url': 'https://wpscan.com/vulnerability/dbe6cf09-971f-42e9-b744-9339454168c7', 'tags': ['exploit', 'vdb-entry', 'technical-description']}, {'url': 'http://packetstormsecurity.com/files/173723/WordPress-Login-Configurator-2.1-Cross-Site-Scripting.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-1894 | Explain the vulnerability: CVE-2023-1894 | A Regular Expression Denial of Service (ReDoS) issue was discovered in Puppet Server 7.9.2 certificate validation. An issue related to specifically crafted certificate names significantly slowed down server operations.
Affected Products: Puppet Enterprise
References: [{'url': 'https://www.puppet.com/security/cve/cve-2023-1894-puppet-server-redos'}]
CVE State: PUBLISHED |
Explain CVE-2023-1895 | Explain the vulnerability: CVE-2023-1895 | The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to Server Side Request Forgery via the get_remote_content REST API endpoint in versions up to, and including, 1.8.3. This can allow authenticated attackers with subscriber-level permissions or above to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Affected Products: Getwid – Gutenberg Blocks
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/e9c2a942-c14c-4b59-92a7-6946b2e4731b?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/getwid/tags/1.8.3/includes/rest-api.php'}]
CVE State: PUBLISHED |
Explain CVE-2023-1897 | Explain the vulnerability: CVE-2023-1897 | Atlas Copco Power Focus 6000 web server does not sanitize the login information stored by the authenticated user’s browser, which could allow an attacker with access to the user’s computer to gain credential information of the controller.
Affected Products: Power Focus
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-159-01'}]
CVE State: PUBLISHED |
Explain CVE-2023-1898 | Explain the vulnerability: CVE-2023-1898 | Atlas Copco Power Focus 6000 web server uses a small amount of session ID numbers. An attacker could enter a session ID number to retrieve data for an active user’s session.
Affected Products: Power Focus
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-159-01'}]
CVE State: PUBLISHED |
Explain CVE-2023-1899 | Explain the vulnerability: CVE-2023-1899 | Atlas Copco Power Focus 6000 web server is not a secure connection by default, which could allow an attacker to gain sensitive information by monitoring network traffic between user and controller.
Affected Products: Power Focus
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-159-01'}]
CVE State: PUBLISHED |