CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-2974 | A vulnerability was found in quarkus-core. This vulnerability occurs because the TLS protocol configured with quarkus.http.ssl.protocols is not enforced, and the client can force the selection of the weaker supported TLS protocol. | https://access.redhat.com/errata/RHSA-2023:3809 | 2023-05-30T10:06:53.993Z | 2023-07-04T13:24:29.648Z | 2023-07-04T13:24:29.648Z | {'Vendor': 'n/a', 'Product': 'Quarkus', 'Versions': '2.13.8'} |
CVE-2023-2124 | An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system. | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210 | 2023-04-17T00:00:00 | 2023-05-15T00:00:00 | 2023-10-19T23:07:27.879031 | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel 6.4-rc1'} |
CVE-2023-2574 | Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the device name input field, which can be triggered by authenticated users via a crafted POST request.
| https://www.advantech.com/en/support/details/firmware?id=1-1J9BED3 | 2023-05-08T11:13:35.330Z | 2023-05-08T12:28:59.918Z | 2023-05-11T11:14:52.701Z | {'Vendor': 'Advantech', 'Product': 'EKI-1524', 'Versions': '0'} |
CVE-2023-2827 | SAP Plant Connectivity - version 15.5 (PCo) or the Production Connector for SAP Digital Manufacturing - version 1.0, do not validate the signature of the JSON Web Token (JWT) in the HTTP request sent from SAP Digital Manufacturing. Therefore, unauthorized callers from the internal network could send service requests to PCo or the Production Connector, which could have an impact on the integrity of the integration with SAP Digital Manufacturing.
| https://launchpad.support.sap.com/#/notes/3301942 | 2023-05-22T06:34:19.652Z | 2023-06-13T02:36:18.158Z | 2023-06-13T02:36:18.158Z | {'Vendor': 'SAP_SE', 'Product': 'SAP Plant Connectivity', 'Versions': '1.0'} |
CVE-2023-2962 | A vulnerability, which was classified as critical, has been found in SourceCodester Faculty Evaluation System 1.0. Affected by this issue is some unknown functionality of the file index.php?page=edit_user. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-230150 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.230150 | 2023-05-29T13:27:55.740Z | 2023-05-29T14:00:05.234Z | 2023-10-23T07:21:55.313Z | {'Vendor': 'SourceCodester', 'Product': 'Faculty Evaluation System', 'Versions': '1.0'} |
CVE-2023-2061 | Use of Hard-coded Password vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to obtain a hard-coded password and access to the module via FTP. | https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2023-004.pdf | 2023-04-14T08:44:04.100Z | 2023-06-02T04:03:36.665Z | 2023-06-02T04:03:36.665Z | {'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'MELSEC iQ-R Series EtherNet/IP module RJ71EIP91', 'Versions': 'all versions'} |
CVE-2023-2431 | A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet. | https://groups.google.com/g/kubernetes-security-announce/c/QHmx0HOQa10 | 2023-04-30T22:44:39.597Z | 2023-06-16T07:08:33.476Z | 2023-06-16T07:15:37.445Z | {'Vendor': 'Kubernetes', 'Product': 'Kubernetes', 'Versions': '0, v1.25.0, v1.26.0, v1.27.0'} |
CVE-2023-2718 | The Contact Form Email WordPress plugin before 1.3.38 does not escape submitted values before displaying them in the HTML, leading to a Stored XSS vulnerability. | https://wpscan.com/vulnerability/8ad824a6-2d49-4f02-8252-393c59aa9705 | 2023-05-15T18:27:46.852Z | 2023-06-12T17:28:21.468Z | 2023-10-11T08:42:17.935Z | {'Vendor': 'Unknown', 'Product': 'Contact Form Email', 'Versions': '0'} |
CVE-2023-2348 | A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227591. | https://vuldb.com/?id.227591 | 2023-04-27T13:38:07.559Z | 2023-04-27T15:00:07.235Z | 2023-10-22T16:07:28.175Z | {'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'} |
CVE-2023-2870 | A vulnerability was found in EnTech Monitor Asset Manager 2.9. It has been declared as problematic. Affected by this vulnerability is the function 0x80002014 of the component IoControlCode Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier VDB-229849 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.229849 | 2023-05-24T17:05:10.602Z | 2023-05-24T17:31:02.965Z | 2023-10-23T06:57:31.772Z | {'Vendor': 'EnTech', 'Product': 'Monitor Asset Manager', 'Versions': '2.9'} |
CVE-2023-2523 | A vulnerability was found in Weaver E-Office 9.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file App/Ajax/ajax.php?action=mobile_upload_save. The manipulation of the argument upload_quwan leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-228014 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.228014 | 2023-05-04T16:14:37.080Z | 2023-05-04T18:00:05.694Z | 2023-10-23T05:24:47.040Z | {'Vendor': 'Weaver', 'Product': 'E-Office', 'Versions': '9.5'} |
CVE-2023-2173 | The BadgeOS plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.7.1.6. This is due to improper validation and authorization checks within the badgeos_delete_step_ajax_handler, badgeos_delete_award_step_ajax_handler, badgeos_delete_deduct_step_ajax_handler, and badgeos_delete_rank_req_step_ajax_handler functions. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete arbitrary posts. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ebb9e37c-9e8b-429b-b4ef-cd875351852c?source=cve | 2023-04-18T22:24:29.443Z | 2023-08-31T05:33:14.047Z | 2023-08-31T05:33:14.047Z | {'Vendor': 'learningtimes', 'Product': 'BadgeOS', 'Versions': '*'} |
CVE-2023-2489 | The Stop Spammers Security | Block Spam Users, Comments, Forms WordPress plugin before 2023 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/dcbe3334-357a-4744-b50c-309d10cca30d | 2023-05-03T08:30:23.311Z | 2023-06-05T13:38:59.037Z | 2023-06-05T13:38:59.037Z | {'Vendor': 'Unknown', 'Product': 'Stop Spammers Security | Block Spam Users, Comments, Forms', 'Versions': '0'} |
CVE-2023-2466 | Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to spoof the contents of the security UI via a crafted HTML page. (Chromium security severity: Low) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html | 2023-05-01T23:09:50.637Z | 2023-05-02T23:47:59.220Z | 2023-05-02T23:47:59.220Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.63'} |
CVE-2023-2036 | A vulnerability was found in Campcodes Video Sharing Website 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file upload.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-225914 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.225914 | 2023-04-14T06:20:53.606Z | 2023-04-14T07:00:07.188Z | 2023-10-22T09:41:33.986Z | {'Vendor': 'Campcodes', 'Product': 'Video Sharing Website', 'Versions': '1.0'} |
CVE-2023-2935 | Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html | 2023-05-27T19:39:14.478Z | 2023-05-30T21:31:40.249Z | 2023-05-30T21:31:40.249Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'} |
CVE-2023-2871 | A vulnerability was found in FabulaTech USB for Remote Desktop 6.1.0.0. It has been rated as problematic. Affected by this issue is the function 0x220448/0x220420/0x22040c/0x220408 of the component IoControlCode Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. VDB-229850 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.229850 | 2023-05-24T17:07:48.153Z | 2023-05-24T17:31:03.915Z | 2023-10-23T06:58:44.903Z | {'Vendor': 'FabulaTech', 'Product': 'USB for Remote Desktop', 'Versions': '6.1.0.0'} |
CVE-2023-2522 | A vulnerability was found in Chengdu VEC40G 3.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /send_order.cgi?parameter=access_detect of the component Network Detection. The manipulation of the argument COUNT with the input 3 | netstat -an leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228013 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.228013 | 2023-05-04T16:08:12.168Z | 2023-05-04T17:31:03.169Z | 2023-10-23T05:23:33.871Z | {'Vendor': 'Chengdu', 'Product': 'VEC40G', 'Versions': '3.0'} |
CVE-2023-2172 | The BadgeOS plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.7.1.6. This is due to improper validation and authorization checks within the badgeos_update_steps_ajax_handler, badgeos_update_award_steps_ajax_handler, badgeos_update_deduct_steps_ajax_handler, and badgeos_update_ranks_req_steps_ajax_handler functions. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to overwrite arbitrary post titles. | https://www.wordfence.com/threat-intel/vulnerabilities/id/5dae8e82-e252-48d9-ae1f-62acfcd17e2b?source=cve | 2023-04-18T22:17:25.706Z | 2023-08-31T05:33:08.078Z | 2023-08-31T05:33:08.078Z | {'Vendor': 'learningtimes', 'Product': 'BadgeOS', 'Versions': '*'} |
CVE-2023-2488 | The Stop Spammers Security | Block Spam Users, Comments, Forms WordPress plugin before 2023 does not sanitise and escape various parameters before outputting them back in admin dashboard pages, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/60226669-0b7b-441f-93d4-b5933e69478f | 2023-05-03T08:02:49.516Z | 2023-06-05T13:38:59.394Z | 2023-06-05T13:38:59.394Z | {'Vendor': 'Unknown', 'Product': 'Stop Spammers Security | Block Spam Users, Comments, Forms', 'Versions': '0'} |
CVE-2023-2467 | Inappropriate implementation in Prompts in Google Chrome on Android prior to 113.0.5672.63 allowed a remote attacker to bypass permissions restrictions via a crafted HTML page. (Chromium security severity: Low) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html | 2023-05-01T23:09:50.744Z | 2023-05-02T23:47:59.444Z | 2023-05-02T23:47:59.444Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.63'} |
CVE-2023-2037 | A vulnerability was found in Campcodes Video Sharing Website 1.0. It has been classified as critical. This affects an unknown part of the file watch.php. The manipulation of the argument code leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225915. | https://vuldb.com/?id.225915 | 2023-04-14T06:20:57.382Z | 2023-04-14T07:31:03.421Z | 2023-10-22T09:42:47.118Z | {'Vendor': 'Campcodes', 'Product': 'Video Sharing Website', 'Versions': '1.0'} |
CVE-2023-2934 | Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html | 2023-05-27T19:39:14.343Z | 2023-05-30T21:31:39.922Z | 2023-05-30T21:31:39.922Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'} |
CVE-2023-2719 | The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the `id` parameter for an Agent in the REST API before using it in an SQL statement, leading to an SQL Injection exploitable by users with a role as low as Subscriber. | https://wpscan.com/vulnerability/d9f6f4e7-a237-49c0-aba0-2934ab019e35 | 2023-05-15T19:35:28.158Z | 2023-06-19T10:52:42.822Z | 2023-06-19T10:52:42.822Z | {'Vendor': 'Unknown', 'Product': 'SupportCandy', 'Versions': '0'} |
CVE-2023-2349 | A vulnerability classified as problematic has been found in SourceCodester Service Provider Management System 1.0. Affected is an unknown function of the file /admin/index.php. The manipulation of the argument page leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227592. | https://vuldb.com/?id.227592 | 2023-04-27T13:38:11.152Z | 2023-04-27T15:00:09.075Z | 2023-10-22T16:08:41.325Z | {'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'} |
CVE-2023-2575 | Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stack-based Buffer Overflow vulnerability, which can be triggered by authenticated users via a crafted POST request. | https://www.advantech.com/en/support/details/firmware?id=1-1J9BED3 | 2023-05-08T11:13:38.539Z | 2023-05-08T12:11:34.963Z | 2023-05-11T11:15:12.646Z | {'Vendor': 'Advantech', 'Product': 'EKI-1524', 'Versions': '0'} |
CVE-2023-2826 | A vulnerability has been found in SourceCodester Class Scheduling System 1.0 and classified as problematic. This vulnerability affects unknown code of the file search_teacher_result.php of the component POST Parameter Handler. The manipulation of the argument teacher leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229612. | https://vuldb.com/?id.229612 | 2023-05-21T06:55:57.026Z | 2023-05-21T07:31:03.746Z | 2023-10-23T06:51:26.055Z | {'Vendor': 'SourceCodester', 'Product': 'Class Scheduling System', 'Versions': '1.0'} |
CVE-2023-2963 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Oliva Expertise Oliva Expertise EKS allows SQL Injection.This issue affects Oliva Expertise EKS: before 1.2.
| https://www.usom.gov.tr/bildirim/tr-23-0409 | 2023-05-29T17:42:18.481Z | 2023-07-17T13:33:37.952Z | 2023-07-17T13:33:37.952Z | {'Vendor': 'Oliva Expertise', 'Product': 'Oliva Expertise EKS', 'Versions': '0'} |
CVE-2023-2060 | Weak Password Requirements vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to access to the module via FTP by dictionary attack or password sniffing. | https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2023-004.pdf | 2023-04-14T08:43:59.259Z | 2023-06-02T04:02:32.377Z | 2023-06-02T04:02:32.377Z | {'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'MELSEC iQ-R Series EtherNet/IP module RJ71EIP91', 'Versions': 'all versions'} |
CVE-2023-2430 | A vulnerability was found due to missing lock for IOPOLL flaw in io_cqring_event_overflow() in io_uring.c in Linux Kernel. This flaw allows a local attacker with user privilege to trigger a Denial of Service threat. | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e12d7a46f65ae4b7d58a5e0c1cbfa825cf8 | 2023-04-30T00:00:00 | 2023-07-23T00:00:00 | 2023-09-10T11:06:42.102647 | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': 'Kernel Linux prior to Kernel 6.2 RC5'} |
CVE-2023-2830 | Cross-Site Request Forgery (CSRF) vulnerability in Trustindex.Io WP Testimonials plugin <= 1.4.2 versions. | https://patchstack.com/database/vulnerability/testimonial-widgets/wordpress-wp-testimonials-plugin-1-4-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-05-22T09:06:39.689Z | 2023-10-03T11:22:49.483Z | 2023-10-03T11:22:49.483Z | {'Vendor': 'Trustindex.io', 'Product': 'WP Testimonials', 'Versions': 'n/a'} |
CVE-2023-2563 | The WordPress Contact Forms by Cimatti plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.7. This is due to missing or incorrect nonce validation on the function _accua_forms_form_edit_action. This makes it possible for unauthenticated attackers to delete forms created with this plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/f80a1f13-c1b9-4259-8d96-71a3cbcaf4ca?source=cve | 2023-05-06T16:08:47.985Z | 2023-06-13T01:48:07.662Z | 2023-06-13T01:48:07.662Z | {'Vendor': 'cimatti', 'Product': 'WordPress Contact Forms by Cimatti', 'Versions': '*'} |
CVE-2023-2099 | A vulnerability classified as problematic has been found in SourceCodester Vehicle Service Management System 1.0. This affects an unknown part of the file /classes/Users.php. The manipulation of the argument id leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226107. | https://vuldb.com/?id.226107 | 2023-04-15T09:12:01.261Z | 2023-04-15T12:00:06.750Z | 2023-10-22T14:12:17.071Z | {'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'} |
CVE-2023-2133 | Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html | 2023-04-17T22:26:59.870Z | 2023-04-19T03:40:25.735Z | 2023-04-19T03:40:25.735Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.137'} |
CVE-2023-2426 | Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 9.0.1499. | https://huntr.dev/bounties/3451be4c-91c8-4d08-926b-cbff7396f425 | 2023-04-29T00:00:00 | 2023-04-29T00:00:00 | 2023-12-23T07:06:19.413263 | {'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'} |
CVE-2023-2076 | A vulnerability classified as problematic was found in Campcodes Online Traffic Offense Management System 1.0. This vulnerability affects unknown code of the file /classes/Users.phpp. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226054 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.226054 | 2023-04-14T18:33:19.222Z | 2023-04-14T19:31:04.234Z | 2023-10-22T13:57:37.157Z | {'Vendor': 'Campcodes', 'Product': 'Online Traffic Offense Management System', 'Versions': '1.0'} |
CVE-2023-2975 | Issue summary: The AES-SIV cipher implementation contains a bug that causes
it to ignore empty associated data entries which are unauthenticated as
a consequence.
Impact summary: Applications that use the AES-SIV algorithm and want to
authenticate empty data entries as associated data can be mislead by removing
adding or reordering such empty entries as these are ignored by the OpenSSL
implementation. We are currently unaware of any such applications.
The AES-SIV algorithm allows for authentication of multiple associated
data entries along with the encryption. To authenticate empty data the
application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with
NULL pointer as the output buffer and 0 as the input buffer length.
The AES-SIV implementation in OpenSSL just returns success for such a call
instead of performing the associated data authentication operation.
The empty data thus will not be authenticated.
As this issue does not affect non-empty associated data authentication and
we expect it to be rare for an application to use empty associated data
entries this is qualified as Low severity issue. | https://www.openssl.org/news/secadv/20230714.txt | 2023-05-30T10:29:34.539Z | 2023-07-14T11:16:25.151Z | 2023-07-14T11:16:25.151Z | {'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.1.0, 3.0.0'} |
CVE-2023-2758 | A denial of service vulnerability exists in Contec CONPROSYS HMI System versions 3.5.2 and prior. When there is a time-zone mismatch in certain configuration files, a remote, unauthenticated attacker may deny logins for an extended period of time. | https://www.tenable.com/security/research/tra-2023-21 | 2023-05-17T12:46:36.673Z | 2023-05-31T14:09:49.809Z | 2023-05-31T14:09:49.809Z | {'Vendor': 'Contec', 'Product': 'CONPROSYS HMI System', 'Versions': '0'} |
CVE-2023-2164 | An issue has been discovered in GitLab affecting all versions starting from 15.9 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for an attacker to trigger a stored XSS vulnerability via user interaction with a crafted URL in the WebIDE beta. | https://gitlab.com/gitlab-org/gitlab/-/issues/407783 | 2023-04-18T18:24:29.692Z | 2023-08-01T23:36:10.665Z | 2023-08-01T23:36:10.665Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '15.9, 16.1.0, 16.2.0'} |
CVE-2023-2534 | Improper Authorization vulnerability in OTRS AG OTRS 8 (Websocket API backend) allows any as Agent authenticated attacker to track user behaviour and to gain live insight into overall system usage. User IDs can easily be correlated with real names e. g. via
ticket histories by any user. (Fuzzing for garnering other adjacent user/sensitive data). Subscribing to all possible push events could also lead to performance implications on the server side, depending on the size of the installation
and the number of active users. (Flooding)This issue affects OTRS: from 8.0.X before 8.0.32.
| https://otrs.com/release-notes/otrs-security-advisory-2023-03/ | 2023-05-05T06:14:04.360Z | 2023-05-08T07:29:49.293Z | 2023-05-08T07:55:19.365Z | {'Vendor': 'OTRS AG', 'Product': 'OTRS', 'Versions': '8.0.x'} |
CVE-2023-2922 | A vulnerability classified as problematic has been found in SourceCodester Comment System 1.0. Affected is an unknown function of the file index.php of the component GET Parameter Handler. The manipulation of the argument msg leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230076. | https://vuldb.com/?id.230076 | 2023-05-27T07:02:58.879Z | 2023-05-27T07:31:03.391Z | 2023-10-23T07:10:56.586Z | {'Vendor': 'SourceCodester', 'Product': 'Comment System', 'Versions': '1.0'} |
CVE-2023-2888 | A vulnerability, which was classified as problematic, was found in PHPOK 6.4.100. This affects an unknown part of the file /admin.php?c=upload&f=zip&_noCache=0.1683794968. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The identifier VDB-229953 was assigned to this vulnerability. | https://vuldb.com/?id.229953 | 2023-05-25T12:37:30.077Z | 2023-05-25T13:00:04.633Z | 2023-10-23T07:04:50.673Z | {'Vendor': 'n/a', 'Product': 'PHPOK', 'Versions': '6.4.100'} |
CVE-2023-2021 | Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.3. | https://huntr.dev/bounties/2e31082d-7aeb-46ff-84d6-9561758e3bf0 | 2023-04-13T00:00:00 | 2023-04-13T00:00:00 | 2023-04-13T00:00:00 | {'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'} |
CVE-2023-2666 | Allocation of Resources Without Limits or Throttling in GitHub repository froxlor/froxlor prior to 2.0.16. | https://huntr.dev/bounties/0bbdc9d4-d9dc-4490-93ef-0a83b451a20f | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | {'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'} |
CVE-2023-2236 | A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation.
Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability.
We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d94c04c0db024922e886c9fd429659f22f48ea4 | 2023-04-21T17:43:28.315Z | 2023-05-01T12:50:47.742Z | 2023-05-01T12:50:47.742Z | {'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '5.19'} |
CVE-2023-2723 | Use after free in DevTools in Google Chrome prior to 113.0.5672.126 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html | 2023-05-15T21:16:58.172Z | 2023-05-16T18:45:34.099Z | 2023-05-16T18:45:34.099Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.126'} |
CVE-2023-2373 | A vulnerability, which was classified as critical, was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. This affects an unknown part of the component Web Management Interface. The manipulation of the argument ecn-up leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227649 was assigned to this vulnerability. | https://vuldb.com/?id.227649 | 2023-04-28T11:29:50.552Z | 2023-04-28T14:00:07.264Z | 2023-10-22T18:30:38.267Z | {'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.0, 2.0.9-hotfix.1, 2.0.9-hotfix.2, 2.0.9-hotfix.3, 2.0.9-hotfix.4, 2.0.9-hotfix.5, 2.0.9-hotfix.6'} |
CVE-2023-2689 | A vulnerability classified as critical was found in SourceCodester Billing Management System 1.0. This vulnerability affects unknown code of the file editproduct.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-228970 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.228970 | 2023-05-14T07:36:31.799Z | 2023-05-14T08:00:03.745Z | 2023-10-23T06:09:56.363Z | {'Vendor': 'SourceCodester', 'Product': 'Billing Management System', 'Versions': '1.0'} |
CVE-2023-2959 | Authentication Bypass by Primary Weakness vulnerability in Oliva Expertise Oliva Expertise EKS allows Collect Data as Provided by Users.This issue affects Oliva Expertise EKS: before 1.2.
| https://www.usom.gov.tr/bildirim/tr-23-0409 | 2023-05-29T12:27:05.534Z | 2023-07-17T13:25:14.769Z | 2023-08-16T07:25:45.148Z | {'Vendor': 'Oliva Expertise', 'Product': 'Oliva Expertise EKS', 'Versions': '0'} |
CVE-2023-2261 | The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the handle_ajax_call function in versions up to, and including, 4.5.0. This makes it possible for authenticated attackers, with subscriber-level access or higher, to obtain a list of users with accounts on the site. This includes ids, usernames and emails. | https://www.wordfence.com/threat-intel/vulnerabilities/id/f51f0919-498e-4f86-a933-1b7f2c4a10a4?source=cve | 2023-04-24T20:43:01.943Z | 2023-06-09T12:32:01.124Z | 2023-06-09T12:32:01.124Z | {'Vendor': 'wpwhitesecurity', 'Product': 'WP Activity Log', 'Versions': '*'} |
CVE-2023-2631 | A missing permission check in Jenkins Code Dx Plugin 3.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. | https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3118 | 2023-05-10T15:00:43.923Z | 2023-05-16T18:06:59.001Z | 2023-05-16T18:06:59.001Z | {'Vendor': 'Jenkins', 'Product': 'Jenkins Code Dx Plugin', 'Versions': '0'} |
CVE-2023-2324 | The Elementor Forms Google Sheet Connector WordPress plugin before 1.0.7, gsheetconnector-for-elementor-forms-pro WordPress plugin through 1.0.7 does not escape some parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/50d81eec-f324-4445-b10f-96e94153917e | 2023-04-27T08:04:41.555Z | 2023-07-04T07:23:25.652Z | 2023-07-05T10:47:56.883Z | {'Vendor': 'Unknown', 'Product': 'Elementor Forms Google Sheet Connector', 'Versions': '0'} |
CVE-2023-2774 | A vulnerability was found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file view_branch.php. The manipulation of the argument branchid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229280. | https://vuldb.com/?id.229280 | 2023-05-17T16:58:17.747Z | 2023-05-17T19:31:02.929Z | 2023-10-23T06:36:47.701Z | {'Vendor': 'code-projects', 'Product': 'Bus Dispatch and Information System', 'Versions': '1.0'} |
CVE-2023-2518 | The Easy Forms for Mailchimp WordPress plugin before 6.8.9 does not sanitise and escape a parameter before outputting it back in the page when the debug option is enabled, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | https://wpscan.com/vulnerability/ca120255-2c50-4906-97f3-ea660486db4c | 2023-05-04T14:55:42.680Z | 2023-05-30T07:49:12.307Z | 2023-06-13T07:29:13.834Z | {'Vendor': 'Unknown', 'Product': 'Easy Forms for Mailchimp', 'Versions': '0'} |
CVE-2023-2148 | A vulnerability classified as critical has been found in Campcodes Online Thesis Archiving System 1.0. This affects an unknown part of the file /admin/curriculum/view_curriculum.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226269 was assigned to this vulnerability. | https://vuldb.com/?id.226269 | 2023-04-18T10:47:17.214Z | 2023-04-18T12:00:10.080Z | 2023-10-22T14:24:29.191Z | {'Vendor': 'Campcodes', 'Product': 'Online Thesis Archiving System', 'Versions': '1.0'} |
CVE-2023-2627 | The KiviCare WordPress plugin before 3.2.1 does not have proper CSRF and authorisation checks in various AJAX actions, allowing any authenticated users, such as subscriber to call them. Attacks include but are not limited to: Add arbitrary Clinic Admin/Doctors/etc and update plugin's settings | https://wpscan.com/vulnerability/162d0029-2adc-4925-9985-1d5d672dbe75 | 2023-05-10T13:37:17.129Z | 2023-06-27T13:17:06.660Z | 2023-06-27T13:17:06.660Z | {'Vendor': 'Unknown', 'Product': 'KiviCare', 'Versions': '0'} |
CVE-2023-2277 | The WP Directory Kit plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.9. This is due to missing or incorrect nonce validation on the 'insert' function. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious JavaScript via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/82c6ed2f-20e8-46d1-a460-16d32b7536cd?source=cve | 2023-04-25T11:46:18.442Z | 2023-06-13T01:48:06.807Z | 2023-06-13T01:48:06.807Z | {'Vendor': 'listingthemes', 'Product': 'WP Directory Kit', 'Versions': '*'} |
CVE-2023-2762 | A Use-After-Free vulnerability in SLDPRT file reading procedure exists in SOLIDWORKS Desktop from Release SOLIDWORKS 2021 through Release SOLIDWORKS 2023. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted SLDPRT file. | https://www.3ds.com/vulnerability/advisories | 2023-05-17T15:42:19.316Z | 2023-07-12T07:05:26.301Z | 2023-07-12T07:10:20.317Z | {'Vendor': 'Dassault Systèmes', 'Product': 'SOLIDWORKS Desktop', 'Versions': 'Release SOLIDWORKS 2021 Golden, Release SOLIDWORKS 2022 Golden, Release SOLIDWORKS 2023 Golden'} |
CVE-2023-2298 | The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'business_id' parameter in versions up to, and including, 4.2.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/7e6a0bf9-4767-4d4c-9a1e-adcb3c7719d9?source=cve | 2023-04-26T12:10:04.237Z | 2023-06-03T04:35:15.934Z | 2023-06-03T04:35:15.934Z | {'Vendor': 'vcita', 'Product': 'Online Booking & Scheduling Calendar for WordPress by vcita', 'Versions': '*'} |
CVE-2023-2918 | null | null | 2023-05-26T15:33:51.990Z | null | 2023-06-16T16:54:00.228Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2220 | A vulnerability was found in Dream Technology mica up to 3.0.5. It has been classified as problematic. Affected is an unknown function of the component Form Object Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. VDB-226986 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.226986 | 2023-04-21T06:47:18.346Z | 2023-04-21T11:31:03.118Z | 2023-10-22T14:53:47.360Z | {'Vendor': 'Dream Technology', 'Product': 'mica', 'Versions': '3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5'} |
CVE-2023-2670 | A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file admin/?page=user/manage_user. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-228886 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.228886 | 2023-05-12T06:01:24.900Z | 2023-05-12T08:00:05.906Z | 2023-10-23T06:01:23.338Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
CVE-2023-2365 | A vulnerability has been found in SourceCodester Faculty Evaluation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file ajax.php?action=delete_subject. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227641 was assigned to this vulnerability. | https://vuldb.com/?id.227641 | 2023-04-28T11:08:07.257Z | 2023-04-28T11:31:03.087Z | 2023-10-22T16:13:33.988Z | {'Vendor': 'SourceCodester', 'Product': 'Faculty Evaluation System', 'Versions': '1.0'} |
CVE-2023-2735 | The Groundhogg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'gh_form' shortcode in versions up to, and including, 2.7.9.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Please note this only works with legacy contact forms. | https://www.wordfence.com/threat-intel/vulnerabilities/id/4938206e-2ea4-47ed-a307-87cf67dd74a4?source=cve | 2023-05-16T13:00:19.968Z | 2023-05-20T02:03:22.910Z | 2023-05-20T02:03:22.910Z | {'Vendor': 'trainingbusinesspros', 'Product': 'WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg', 'Versions': '*'} |
CVE-2023-2109 | Cross-site Scripting (XSS) - DOM in GitHub repository chatwoot/chatwoot prior to 2.14.0. | https://huntr.dev/bounties/fd5999fd-b1fd-44b4-ae2e-8f95b5c3d1b6 | 2023-04-17T00:00:00 | 2023-04-17T00:00:00 | 2023-04-17T00:00:00 | {'Vendor': 'chatwoot', 'Product': 'chatwoot/chatwoot', 'Versions': 'unspecified'} |
CVE-2023-2484 | The Active Directory Integration plugin for WordPress is vulnerable to time-based SQL Injection via the orderby and order parameters in versions up to, and including, 4.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/3eedc57b-79cc-4569-b6d6-676a22aa1e06?source=cve | 2023-05-02T21:08:21.340Z | 2023-06-09T05:33:14.991Z | 2023-06-09T05:33:14.991Z | {'Vendor': 'cyberlord92', 'Product': 'Active Directory Integration / LDAP Integration', 'Versions': '*'} |
CVE-2023-2938 | Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html | 2023-05-27T19:39:14.897Z | 2023-05-30T21:31:40.894Z | 2023-05-30T21:31:40.894Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'} |
CVE-2023-2892 | The WP EasyCart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.4.8. This is due to missing or incorrect nonce validation on the process_bulk_delete_product function. This makes it possible for unauthenticated attackers to bulk delete products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b36e94e4-b1e8-4803-9377-c4d710b029de?source=cve | 2023-05-25T16:04:33.232Z | 2023-06-09T06:48:50.216Z | 2023-06-09T06:48:50.216Z | {'Vendor': 'levelfourstorefront', 'Product': 'Shopping Cart & eCommerce Store', 'Versions': '*'} |
CVE-2023-2191 | Cross-site Scripting (XSS) - Stored in GitHub repository azuracast/azuracast prior to 0.18. | https://huntr.dev/bounties/0814f5f9-8b58-40e5-b08c-7c488947cf31 | 2023-04-20T00:00:00 | 2023-04-20T00:00:00 | 2023-04-20T00:00:00 | {'Vendor': 'azuracast', 'Product': 'azuracast/azuracast', 'Versions': 'unspecified'} |
CVE-2023-2742 | The AI ChatBot WordPress plugin before 4.5.5 does not sanitize and escape its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | https://wpscan.com/vulnerability/f689442a-a851-4140-a10c-ac579f9da142 | 2023-05-16T18:39:27.427Z | 2023-06-19T10:52:43.675Z | 2023-06-19T10:52:43.675Z | {'Vendor': 'Unknown', 'Product': 'AI ChatBot', 'Versions': '0'} |
CVE-2023-2312 | Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html | 2023-04-26T18:49:35.319Z | 2023-08-15T17:07:09.753Z | 2023-08-15T17:07:09.753Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '116.0.5845.96'} |
CVE-2023-2607 | The Multiple Page Generator Plugin for WordPress is vulnerable to time-based SQL Injection via the orderby and order parameters in versions up to, and including, 3.3.17 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/1575f0ad-0a77-4047-844c-48db4c8b4e91?source=cve | 2023-05-09T16:26:49.316Z | 2023-06-09T05:33:10.746Z | 2023-06-09T05:33:10.746Z | {'Vendor': 'themeisle', 'Product': 'Multiple Page Generator Plugin – MPG', 'Versions': '*'} |
CVE-2023-2257 | Authentication Bypass in Hub Business integration in Devolutions Workspace Desktop 2023.1.1.3 and earlier on Windows and macOS allows an attacker with access to the user interface to unlock a Hub
Business space without being prompted to enter the password via an
unimplemented "Force Login" security feature.
This vulnerability occurs only if "Force Login" feature is enabled on the Hub Business instance and that an attacker has access to a locked Workspace desktop application configured with a Hub Business space.
| https://devolutions.net/security/advisories/DEVO-2023-0011 | 2023-04-24T16:48:54.917Z | 2023-04-24T18:48:52.039Z | 2023-04-24T18:48:52.039Z | {'Vendor': 'Devolutions', 'Product': 'Workspace Desktop', 'Versions': '0'} |
CVE-2023-2980 | A vulnerability classified as critical was found in Abstrium Pydio Cells 4.2.0. This vulnerability affects unknown code of the component User Creation Handler. The manipulation leads to improper control of resource identifiers. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-230212. | https://vuldb.com/?id.230212 | 2023-05-30T13:30:42.089Z | 2023-05-30T14:31:03.238Z | 2023-10-23T07:28:01.104Z | {'Vendor': 'Abstrium', 'Product': 'Pydio Cells', 'Versions': '4.2.0'} |
CVE-2023-2579 | The InventoryPress WordPress plugin through 1.7 does not sanitise and escape some of its settings, which could allow users with the role of author and above to perform Stored Cross-Site Scripting attacks. | https://wpscan.com/vulnerability/3cfcb8cc-9c4f-409c-934f-9f3f043de6fe | 2023-05-08T13:04:37.391Z | 2023-07-17T13:29:49.306Z | 2023-07-17T13:29:49.306Z | {'Vendor': 'Unknown', 'Product': 'InventoryPress', 'Versions': '0'} |
CVE-2023-2083 | The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the save function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to save plugin settings. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check. | https://www.wordfence.com/threat-intel/vulnerabilities/id/f8bf0933-1c97-4374-b323-c55b91fe4d27?source=cve | 2023-04-14T20:18:29.400Z | 2023-06-09T05:33:39.357Z | 2023-06-09T05:33:39.357Z | {'Vendor': 'wpdevteam', 'Product': 'Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates', 'Versions': '*'} |
CVE-2023-2596 | A vulnerability was found in SourceCodester Online Reviewer System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /reviewer/system/system/admins/manage/users/user-update.php of the component GET Parameter Handler. The manipulation of the argument user_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-228398 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.228398 | 2023-05-09T12:16:25.948Z | 2023-05-09T13:00:05.254Z | 2023-10-23T05:32:06.393Z | {'Vendor': 'SourceCodester', 'Product': 'Online Reviewer System', 'Versions': '1.0'} |
CVE-2023-2345 | A vulnerability was found in SourceCodester Service Provider Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /classes/Master.php?f=delete_inquiry. The manipulation leads to improper authorization. The attack may be launched remotely. The identifier of this vulnerability is VDB-227588. | https://vuldb.com/?id.227588 | 2023-04-27T13:37:55.673Z | 2023-04-27T14:00:08.074Z | 2023-10-22T16:03:48.617Z | {'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'} |
CVE-2023-2715 | The Groundhogg plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'submit_ticket' function in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers to create a support ticket that sends the website's data to the plugin developer, and it is also possible to create an admin access with an auto login link that is also sent to the plugin developer with the ticket. It only works if the plugin is activated with a valid license. | https://www.wordfence.com/threat-intel/vulnerabilities/id/24747507-8f24-499e-a257-d379dc171e18?source=cve | 2023-05-15T16:35:19.330Z | 2023-05-20T02:03:18.674Z | 2023-05-20T02:03:18.674Z | {'Vendor': 'trainingbusinesspros', 'Product': 'WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg', 'Versions': '*'} |
CVE-2023-2200 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 7.14 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to inject HTML in an email address field. | https://gitlab.com/gitlab-org/gitlab/-/issues/408281 | 2023-04-20T21:24:10.913Z | 2023-07-13T02:02:34.411Z | 2023-07-13T02:02:34.411Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '7.14, 16.0, 16.1'} |
CVE-2023-2650 | Issue summary: Processing some specially crafted ASN.1 object identifiers or
data containing them may be very slow.
Impact summary: Applications that use OBJ_obj2txt() directly, or use any of
the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message
size limit may experience notable to very long delays when processing those
messages, which may lead to a Denial of Service.
An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers -
most of which have no size limit. OBJ_obj2txt() may be used to translate
an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL
type ASN1_OBJECT) to its canonical numeric text form, which are the
sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by
periods.
When one of the sub-identifiers in the OBJECT IDENTIFIER is very large
(these are sizes that are seen as absurdly large, taking up tens or hundreds
of KiBs), the translation to a decimal number in text may take a very long
time. The time complexity is O(n^2) with 'n' being the size of the
sub-identifiers in bytes (*).
With OpenSSL 3.0, support to fetch cryptographic algorithms using names /
identifiers in string form was introduced. This includes using OBJECT
IDENTIFIERs in canonical numeric text form as identifiers for fetching
algorithms.
Such OBJECT IDENTIFIERs may be received through the ASN.1 structure
AlgorithmIdentifier, which is commonly used in multiple protocols to specify
what cryptographic algorithm should be used to sign or verify, encrypt or
decrypt, or digest passed data.
Applications that call OBJ_obj2txt() directly with untrusted data are
affected, with any version of OpenSSL. If the use is for the mere purpose
of display, the severity is considered low.
In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME,
CMS, CMP/CRMF or TS. It also impacts anything that processes X.509
certificates, including simple things like verifying its signature.
The impact on TLS is relatively low, because all versions of OpenSSL have a
100KiB limit on the peer's certificate chain. Additionally, this only
impacts clients, or servers that have explicitly enabled client
authentication.
In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects,
such as X.509 certificates. This is assumed to not happen in such a way
that it would cause a Denial of Service, so these versions are considered
not affected by this issue in such a way that it would be cause for concern,
and the severity is therefore considered low. | https://www.openssl.org/news/secadv/20230530.txt | 2023-05-11T06:09:26.543Z | 2023-05-30T13:40:11.963Z | 2023-05-30T13:40:11.963Z | {'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.1.1, 3.0.0, 1.1.1, 1.0.2'} |
CVE-2023-2095 | A vulnerability was found in SourceCodester Vehicle Service Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/maintenance/manage_category.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226103. | https://vuldb.com/?id.226103 | 2023-04-15T09:11:44.716Z | 2023-04-15T10:31:05.041Z | 2023-10-22T14:07:24.271Z | {'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'} |
CVE-2023-2996 | The Jetpack WordPress plugin before 12.1.1 does not validate uploaded files, allowing users with author roles or above to manipulate existing files on the site, deleting arbitrary files, and in rare cases achieve Remote Code Execution via phar deserialization. | https://wpscan.com/vulnerability/52d221bd-ae42-435d-a90a-60a5ae530663 | 2023-05-30T19:10:08.911Z | 2023-06-27T13:17:07.479Z | 2023-06-27T13:17:07.479Z | {'Vendor': 'Unknown', 'Product': 'Jetpack', 'Versions': '1.9, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 3.0, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 4.0, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6, 4.7, 4.8, 4.9, 5.0, 5.1, 5.2, 5.3, 5.4, 5.5, 5.6, 5.7, 5.8, 5.9, 6.0, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 7.0, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 8.5, 8.6, 8.7, 8.8, 8.9, 9.0, 9.1, 9.2, 9.3, 9.4, 9.5, 9.6, 9.7, 9.8, 9.9, 10.0, 10.1, 10.2, 10.3, 10.4, 10.5, 10.6, 10.7, 10.8, 10.9, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9, 12.0, 12.1'} |
CVE-2023-2979 | A vulnerability classified as critical has been found in Abstrium Pydio Cells 4.2.0. This affects an unknown part of the component User Creation Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230211. | https://vuldb.com/?id.230211 | 2023-05-30T13:30:37.990Z | 2023-05-30T14:00:06.300Z | 2023-10-23T07:26:47.948Z | {'Vendor': 'Abstrium', 'Product': 'Pydio Cells', 'Versions': '4.2.0'} |
CVE-2023-2580 | The AI Engine WordPress plugin before 1.6.83 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup). | https://wpscan.com/vulnerability/7ee1efb1-9969-40b2-8ab2-ea427091bbd8 | 2023-05-08T13:33:33.999Z | 2023-06-27T13:17:08.326Z | 2023-06-27T13:17:08.326Z | {'Vendor': 'Unknown', 'Product': 'AI Engine: ChatGPT Chatbot, Content Generator, GPT 3 & 4, Ultra-Customizable', 'Versions': '0'} |
CVE-2023-2703 | Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Finex Media Competition Management System allows Retrieve Embedded Sensitive Data, Collect Data as Provided by Users.This issue affects Competition Management System: before 23.07.
| https://www.usom.gov.tr/bildirim/tr-23-0283 | 2023-05-15T11:02:25.945Z | 2023-05-23T19:19:47.883Z | 2023-07-26T09:04:23.322Z | {'Vendor': 'Finex Media', 'Product': 'Competition Management System', 'Versions': '0'} |
CVE-2023-2353 | The CHP Ads Block Detector plugin for WordPress is vulnerable to unauthorized plugin settings update and reset due to a missing capability check on the chp_abd_action function in versions up to, and including, 3.9.4. This makes it possible for subscriber-level attackers to change or reset plugin settings. CVE-2023-36509 appears to be a duplicate of this issue. | https://www.wordfence.com/threat-intel/vulnerabilities/id/4eca64d7-6e33-4b8e-af37-a3e8bbf2b76f?source=cve | 2023-04-27T15:54:59.751Z | 2023-08-31T05:33:07.617Z | 2023-08-31T05:33:07.617Z | {'Vendor': 'sureshchand12a', 'Product': 'CHP Ads Block Detector', 'Versions': '*'} |
CVE-2023-2646 | A vulnerability has been found in TP-Link Archer C7v2 v2_en_us_180114 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component GET Request Parameter Handler. The manipulation leads to denial of service. The attack can only be done within the local network. The associated identifier of this vulnerability is VDB-228775. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.228775 | 2023-05-11T05:29:05.402Z | 2023-05-11T07:31:04.076Z | 2023-10-23T05:43:04.879Z | {'Vendor': 'TP-Link', 'Product': 'Archer C7v2', 'Versions': 'v2_en_us_180114'} |
CVE-2023-2216 | A vulnerability classified as problematic was found in Campcodes Coffee Shop POS System 1.0. Affected by this vulnerability is an unknown functionality of the file /classes/Users.php. The manipulation of the argument firstname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226981 was assigned to this vulnerability. | https://vuldb.com/?id.226981 | 2023-04-21T06:29:16.254Z | 2023-04-21T10:31:03.863Z | 2023-10-22T14:48:54.645Z | {'Vendor': 'Campcodes', 'Product': 'Coffee Shop POS System', 'Versions': '1.0'} |
CVE-2023-2538 | A CWE-552 "Files or Directories Accessible to External Parties” in the web interface of the Tyan S5552 BMC version 3.00 allows an unauthenticated remote attacker to retrieve the private key of the TLS certificate in use by the BMC via forced browsing. This can then be abused to perform Man-in-the-Middle (MitM) attacks against victims that access the web interface through HTTPS. | https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-2538/ | 2023-05-05T07:00:43.400Z | 2023-07-05T12:11:53.397Z | 2023-07-05T12:11:53.397Z | {'Vendor': 'tyan', 'Product': 's5552_bmc', 'Versions': '3.00'} |
CVE-2023-2168 | The TaxoPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Suggest Terms Title field in versions up to, and including, 3.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Editor+ permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/1c051bfd-2754-4faf-8062-91752555166c?source=cve | 2023-04-18T20:37:54.193Z | 2023-04-19T09:38:18.815Z | 2023-04-19T09:38:18.815Z | {'Vendor': 'stevejburge', 'Product': 'TaxoPress is the WordPress Tag, Category, and Taxonomy Manager', 'Versions': '*'} |
CVE-2023-2492 | The QueryWall: Plug'n Play Firewall WordPress plugin through 1.1.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin. | https://wpscan.com/vulnerability/fa7c54c2-5653-4d3d-8163-f3d63272c050 | 2023-05-03T12:48:38.186Z | 2023-06-19T10:52:44.610Z | 2023-06-19T10:52:44.610Z | {'Vendor': 'Unknown', 'Product': "QueryWall: Plug'n Play Firewall", 'Versions': '0'} |
CVE-2023-2187 | On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send broadcast events to any user via the WebMonitor.An unauthenticated user can use this vulnerability to forcefully log out of any currently logged-in user by sending a "password change event". Furthermore, an attacker could use this vulnerability to spam the logged-in user with false events. | https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html | 2023-04-19T15:35:09.146Z | 2023-06-07T06:42:31.345Z | 2023-06-07T06:42:31.345Z | {'Vendor': 'Triangle MicroWorks', 'Product': 'SCADA Data Gateway', 'Versions': '5.01.03'} |
CVE-2023-2884 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG), Use of Insufficiently Random Values vulnerability in CBOT Chatbot allows Signature Spoofing by Key Recreation.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.
| https://www.usom.gov.tr/bildirim/tr-23-0293 | 2023-05-25T08:03:27.613Z | 2023-05-25T08:26:39.535Z | 2023-07-26T09:05:54.625Z | {'Vendor': 'CBOT', 'Product': 'Chatbot', 'Versions': '0'} |
CVE-2023-2304 | The Favorites plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'user_favorites' shortcode in versions up to, and including, 2.3.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/5bd03cd0-34f0-491c-8247-79656eba32a8?source=cve | 2023-04-26T13:50:36.883Z | 2023-05-31T04:35:41.279Z | 2023-05-31T04:35:41.279Z | {'Vendor': 'kylephillips', 'Product': 'Favorites', 'Versions': '*'} |
CVE-2023-2754 | The Cloudflare WARP client for Windows assigns loopback IPv4 addresses for the DNS Servers, since WARP acts as local DNS server that performs DNS queries in a secure manner, however, if a user is connected to WARP over an IPv6-capable network, te WARP client did not assign loopback IPv6 addresses but Unique Local Addresses, which under certain conditions could point towards unknown devices in the same local network which enables an Attacker to view DNS queries made by the device.
| https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release | 2023-05-17T07:55:45.392Z | 2023-08-03T13:53:00.634Z | 2023-08-03T13:53:00.634Z | {'Vendor': 'Cloudflare', 'Product': 'WARP', 'Versions': '0'} |
CVE-2023-2241 | A vulnerability, which was classified as critical, was found in PoDoFo 0.10.0. Affected is the function readXRefStreamEntry of the file PdfXRefStreamParserObject.cpp. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 535a786f124b739e3c857529cecc29e4eeb79778. It is recommended to apply a patch to fix this issue. VDB-227226 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.227226 | 2023-04-22T15:42:11.291Z | 2023-04-22T16:00:04.467Z | 2023-10-22T14:56:13.623Z | {'Vendor': 'n/a', 'Product': 'PoDoFo', 'Versions': '0.10.0'} |
CVE-2023-2611 | Advantech R-SeeNet
versions 2.4.22
is installed with a hidden root-level user that is not available in the
users list. This hidden user has a password that cannot be changed by
users.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-173-02 | 2023-05-09T22:01:40.730Z | 2023-06-22T16:22:49.087Z | 2023-06-22T16:22:49.087Z | {'Vendor': 'Advantech ', 'Product': 'R-SeeNet', 'Versions': '0'} |
CVE-2023-2406 | The Event Registration Calendar By vcita plugin, versions up to and including 3.9.1, and Online Payments – Get Paid with PayPal, Square & Stripe plugin, for WordPress are vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/1ab05954-9999-43ff-8e3c-a987e2da1956?source=cve | 2023-04-28T16:10:47.991Z | 2023-06-03T04:35:12.933Z | 2023-06-03T04:35:12.933Z | {'Vendor': 'vcita', 'Product': 'Event Registration Calendar By vcita', 'Versions': '*'} |
CVE-2023-2056 | A vulnerability was found in DedeCMS up to 5.7.87 and classified as critical. This issue affects the function GetSystemFile of the file module_main.php. The manipulation leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225941 was assigned to this vulnerability. | https://vuldb.com/?id.225941 | 2023-04-14T07:59:39.257Z | 2023-04-14T13:31:03.193Z | 2023-10-22T10:03:31.629Z | {'Vendor': 'n/a', 'Product': 'DedeCMS', 'Versions': '5.7.0, 5.7.1, 5.7.2, 5.7.3, 5.7.4, 5.7.5, 5.7.6, 5.7.7, 5.7.8, 5.7.9, 5.7.10, 5.7.11, 5.7.12, 5.7.13, 5.7.14, 5.7.15, 5.7.16, 5.7.17, 5.7.18, 5.7.19, 5.7.20, 5.7.21, 5.7.22, 5.7.23, 5.7.24, 5.7.25, 5.7.26, 5.7.27, 5.7.28, 5.7.29, 5.7.30, 5.7.31, 5.7.32, 5.7.33, 5.7.34, 5.7.35, 5.7.36, 5.7.37, 5.7.38, 5.7.39, 5.7.40, 5.7.41, 5.7.42, 5.7.43, 5.7.44, 5.7.45, 5.7.46, 5.7.47, 5.7.48, 5.7.49, 5.7.50, 5.7.51, 5.7.52, 5.7.53, 5.7.54, 5.7.55, 5.7.56, 5.7.57, 5.7.58, 5.7.59, 5.7.60, 5.7.61, 5.7.62, 5.7.63, 5.7.64, 5.7.65, 5.7.66, 5.7.67, 5.7.68, 5.7.69, 5.7.70, 5.7.71, 5.7.72, 5.7.73, 5.7.74, 5.7.75, 5.7.76, 5.7.77, 5.7.78, 5.7.79, 5.7.80, 5.7.81, 5.7.82, 5.7.83, 5.7.84, 5.7.85, 5.7.86, 5.7.87'} |
Subsets and Splits