CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-2974
A vulnerability was found in quarkus-core. This vulnerability occurs because the TLS protocol configured with quarkus.http.ssl.protocols is not enforced, and the client can force the selection of the weaker supported TLS protocol.
https://access.redhat.com/errata/RHSA-2023:3809
2023-05-30T10:06:53.993Z
2023-07-04T13:24:29.648Z
2023-07-04T13:24:29.648Z
{'Vendor': 'n/a', 'Product': 'Quarkus', 'Versions': '2.13.8'}
CVE-2023-2124
An out-of-bounds memory access flaw was found in the Linux kernel’s XFS file system in how a user restores an XFS image after failure (with a dirty log journal). This flaw allows a local user to crash or potentially escalate their privileges on the system.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/xfs/xfs_buf_item_recover.c?h=v6.4-rc1&id=22ed903eee23a5b174e240f1cdfa9acf393a5210
2023-04-17T00:00:00
2023-05-15T00:00:00
2023-10-19T23:07:27.879031
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': 'Linux kernel 6.4-rc1'}
CVE-2023-2574
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the device name input field, which can be triggered by authenticated users via a crafted POST request.
https://www.advantech.com/en/support/details/firmware?id=1-1J9BED3
2023-05-08T11:13:35.330Z
2023-05-08T12:28:59.918Z
2023-05-11T11:14:52.701Z
{'Vendor': 'Advantech', 'Product': 'EKI-1524', 'Versions': '0'}
CVE-2023-2827
SAP Plant Connectivity - version 15.5 (PCo) or the Production Connector for SAP Digital Manufacturing - version 1.0, do not validate the signature of the JSON Web Token (JWT) in the HTTP request sent from SAP Digital Manufacturing. Therefore, unauthorized callers from the internal network could send service requests to PCo or the Production Connector, which could have an impact on the integrity of the integration with SAP Digital Manufacturing.
https://launchpad.support.sap.com/#/notes/3301942
2023-05-22T06:34:19.652Z
2023-06-13T02:36:18.158Z
2023-06-13T02:36:18.158Z
{'Vendor': 'SAP_SE', 'Product': 'SAP Plant Connectivity', 'Versions': '1.0'}
CVE-2023-2962
A vulnerability, which was classified as critical, has been found in SourceCodester Faculty Evaluation System 1.0. Affected by this issue is some unknown functionality of the file index.php?page=edit_user. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-230150 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.230150
2023-05-29T13:27:55.740Z
2023-05-29T14:00:05.234Z
2023-10-23T07:21:55.313Z
{'Vendor': 'SourceCodester', 'Product': 'Faculty Evaluation System', 'Versions': '1.0'}
CVE-2023-2061
Use of Hard-coded Password vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to obtain a hard-coded password and access to the module via FTP.
https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2023-004.pdf
2023-04-14T08:44:04.100Z
2023-06-02T04:03:36.665Z
2023-06-02T04:03:36.665Z
{'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'MELSEC iQ-R Series EtherNet/IP module RJ71EIP91', 'Versions': 'all versions'}
CVE-2023-2431
A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.
https://groups.google.com/g/kubernetes-security-announce/c/QHmx0HOQa10
2023-04-30T22:44:39.597Z
2023-06-16T07:08:33.476Z
2023-06-16T07:15:37.445Z
{'Vendor': 'Kubernetes', 'Product': 'Kubernetes', 'Versions': '0, v1.25.0, v1.26.0, v1.27.0'}
CVE-2023-2718
The Contact Form Email WordPress plugin before 1.3.38 does not escape submitted values before displaying them in the HTML, leading to a Stored XSS vulnerability.
https://wpscan.com/vulnerability/8ad824a6-2d49-4f02-8252-393c59aa9705
2023-05-15T18:27:46.852Z
2023-06-12T17:28:21.468Z
2023-10-11T08:42:17.935Z
{'Vendor': 'Unknown', 'Product': 'Contact Form Email', 'Versions': '0'}
CVE-2023-2348
A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227591.
https://vuldb.com/?id.227591
2023-04-27T13:38:07.559Z
2023-04-27T15:00:07.235Z
2023-10-22T16:07:28.175Z
{'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'}
CVE-2023-2870
A vulnerability was found in EnTech Monitor Asset Manager 2.9. It has been declared as problematic. Affected by this vulnerability is the function 0x80002014 of the component IoControlCode Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier VDB-229849 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.229849
2023-05-24T17:05:10.602Z
2023-05-24T17:31:02.965Z
2023-10-23T06:57:31.772Z
{'Vendor': 'EnTech', 'Product': 'Monitor Asset Manager', 'Versions': '2.9'}
CVE-2023-2523
A vulnerability was found in Weaver E-Office 9.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file App/Ajax/ajax.php?action=mobile_upload_save. The manipulation of the argument upload_quwan leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-228014 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.228014
2023-05-04T16:14:37.080Z
2023-05-04T18:00:05.694Z
2023-10-23T05:24:47.040Z
{'Vendor': 'Weaver', 'Product': 'E-Office', 'Versions': '9.5'}
CVE-2023-2173
The BadgeOS plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.7.1.6. This is due to improper validation and authorization checks within the badgeos_delete_step_ajax_handler, badgeos_delete_award_step_ajax_handler, badgeos_delete_deduct_step_ajax_handler, and badgeos_delete_rank_req_step_ajax_handler functions. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete arbitrary posts.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ebb9e37c-9e8b-429b-b4ef-cd875351852c?source=cve
2023-04-18T22:24:29.443Z
2023-08-31T05:33:14.047Z
2023-08-31T05:33:14.047Z
{'Vendor': 'learningtimes', 'Product': 'BadgeOS', 'Versions': '*'}
CVE-2023-2489
The Stop Spammers Security | Block Spam Users, Comments, Forms WordPress plugin before 2023 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/dcbe3334-357a-4744-b50c-309d10cca30d
2023-05-03T08:30:23.311Z
2023-06-05T13:38:59.037Z
2023-06-05T13:38:59.037Z
{'Vendor': 'Unknown', 'Product': 'Stop Spammers Security | Block Spam Users, Comments, Forms', 'Versions': '0'}
CVE-2023-2466
Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to spoof the contents of the security UI via a crafted HTML page. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html
2023-05-01T23:09:50.637Z
2023-05-02T23:47:59.220Z
2023-05-02T23:47:59.220Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.63'}
CVE-2023-2036
A vulnerability was found in Campcodes Video Sharing Website 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file upload.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-225914 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.225914
2023-04-14T06:20:53.606Z
2023-04-14T07:00:07.188Z
2023-10-22T09:41:33.986Z
{'Vendor': 'Campcodes', 'Product': 'Video Sharing Website', 'Versions': '1.0'}
CVE-2023-2935
Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
2023-05-27T19:39:14.478Z
2023-05-30T21:31:40.249Z
2023-05-30T21:31:40.249Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'}
CVE-2023-2871
A vulnerability was found in FabulaTech USB for Remote Desktop 6.1.0.0. It has been rated as problematic. Affected by this issue is the function 0x220448/0x220420/0x22040c/0x220408 of the component IoControlCode Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. VDB-229850 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.229850
2023-05-24T17:07:48.153Z
2023-05-24T17:31:03.915Z
2023-10-23T06:58:44.903Z
{'Vendor': 'FabulaTech', 'Product': 'USB for Remote Desktop', 'Versions': '6.1.0.0'}
CVE-2023-2522
A vulnerability was found in Chengdu VEC40G 3.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /send_order.cgi?parameter=access_detect of the component Network Detection. The manipulation of the argument COUNT with the input 3 | netstat -an leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-228013 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.228013
2023-05-04T16:08:12.168Z
2023-05-04T17:31:03.169Z
2023-10-23T05:23:33.871Z
{'Vendor': 'Chengdu', 'Product': 'VEC40G', 'Versions': '3.0'}
CVE-2023-2172
The BadgeOS plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.7.1.6. This is due to improper validation and authorization checks within the badgeos_update_steps_ajax_handler, badgeos_update_award_steps_ajax_handler, badgeos_update_deduct_steps_ajax_handler, and badgeos_update_ranks_req_steps_ajax_handler functions. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to overwrite arbitrary post titles.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5dae8e82-e252-48d9-ae1f-62acfcd17e2b?source=cve
2023-04-18T22:17:25.706Z
2023-08-31T05:33:08.078Z
2023-08-31T05:33:08.078Z
{'Vendor': 'learningtimes', 'Product': 'BadgeOS', 'Versions': '*'}
CVE-2023-2488
The Stop Spammers Security | Block Spam Users, Comments, Forms WordPress plugin before 2023 does not sanitise and escape various parameters before outputting them back in admin dashboard pages, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/60226669-0b7b-441f-93d4-b5933e69478f
2023-05-03T08:02:49.516Z
2023-06-05T13:38:59.394Z
2023-06-05T13:38:59.394Z
{'Vendor': 'Unknown', 'Product': 'Stop Spammers Security | Block Spam Users, Comments, Forms', 'Versions': '0'}
CVE-2023-2467
Inappropriate implementation in Prompts in Google Chrome on Android prior to 113.0.5672.63 allowed a remote attacker to bypass permissions restrictions via a crafted HTML page. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop.html
2023-05-01T23:09:50.744Z
2023-05-02T23:47:59.444Z
2023-05-02T23:47:59.444Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.63'}
CVE-2023-2037
A vulnerability was found in Campcodes Video Sharing Website 1.0. It has been classified as critical. This affects an unknown part of the file watch.php. The manipulation of the argument code leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225915.
https://vuldb.com/?id.225915
2023-04-14T06:20:57.382Z
2023-04-14T07:31:03.421Z
2023-10-22T09:42:47.118Z
{'Vendor': 'Campcodes', 'Product': 'Video Sharing Website', 'Versions': '1.0'}
CVE-2023-2934
Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
2023-05-27T19:39:14.343Z
2023-05-30T21:31:39.922Z
2023-05-30T21:31:39.922Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'}
CVE-2023-2719
The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the `id` parameter for an Agent in the REST API before using it in an SQL statement, leading to an SQL Injection exploitable by users with a role as low as Subscriber.
https://wpscan.com/vulnerability/d9f6f4e7-a237-49c0-aba0-2934ab019e35
2023-05-15T19:35:28.158Z
2023-06-19T10:52:42.822Z
2023-06-19T10:52:42.822Z
{'Vendor': 'Unknown', 'Product': 'SupportCandy', 'Versions': '0'}
CVE-2023-2349
A vulnerability classified as problematic has been found in SourceCodester Service Provider Management System 1.0. Affected is an unknown function of the file /admin/index.php. The manipulation of the argument page leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227592.
https://vuldb.com/?id.227592
2023-04-27T13:38:11.152Z
2023-04-27T15:00:09.075Z
2023-10-22T16:08:41.325Z
{'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'}
CVE-2023-2575
Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a Stack-based Buffer Overflow vulnerability, which can be triggered by authenticated users via a crafted POST request.
https://www.advantech.com/en/support/details/firmware?id=1-1J9BED3
2023-05-08T11:13:38.539Z
2023-05-08T12:11:34.963Z
2023-05-11T11:15:12.646Z
{'Vendor': 'Advantech', 'Product': 'EKI-1524', 'Versions': '0'}
CVE-2023-2826
A vulnerability has been found in SourceCodester Class Scheduling System 1.0 and classified as problematic. This vulnerability affects unknown code of the file search_teacher_result.php of the component POST Parameter Handler. The manipulation of the argument teacher leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229612.
https://vuldb.com/?id.229612
2023-05-21T06:55:57.026Z
2023-05-21T07:31:03.746Z
2023-10-23T06:51:26.055Z
{'Vendor': 'SourceCodester', 'Product': 'Class Scheduling System', 'Versions': '1.0'}
CVE-2023-2963
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Oliva Expertise Oliva Expertise EKS allows SQL Injection.This issue affects Oliva Expertise EKS: before 1.2.
https://www.usom.gov.tr/bildirim/tr-23-0409
2023-05-29T17:42:18.481Z
2023-07-17T13:33:37.952Z
2023-07-17T13:33:37.952Z
{'Vendor': 'Oliva Expertise', 'Product': 'Oliva Expertise EKS', 'Versions': '0'}
CVE-2023-2060
Weak Password Requirements vulnerability in FTP function on Mitsubishi Electric Corporation MELSEC iQ-R Series EtherNet/IP module RJ71EIP91 and MELSEC iQ-F Series EtherNet/IP module FX5-ENET/IP allows a remote unauthenticated attacker to access to the module via FTP by dictionary attack or password sniffing.
https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2023-004.pdf
2023-04-14T08:43:59.259Z
2023-06-02T04:02:32.377Z
2023-06-02T04:02:32.377Z
{'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'MELSEC iQ-R Series EtherNet/IP module RJ71EIP91', 'Versions': 'all versions'}
CVE-2023-2430
A vulnerability was found due to missing lock for IOPOLL flaw in io_cqring_event_overflow() in io_uring.c in Linux Kernel. This flaw allows a local attacker with user privilege to trigger a Denial of Service threat.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e12d7a46f65ae4b7d58a5e0c1cbfa825cf8
2023-04-30T00:00:00
2023-07-23T00:00:00
2023-09-10T11:06:42.102647
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': 'Kernel Linux prior to Kernel 6.2 RC5'}
CVE-2023-2830
Cross-Site Request Forgery (CSRF) vulnerability in Trustindex.Io WP Testimonials plugin <= 1.4.2 versions.
https://patchstack.com/database/vulnerability/testimonial-widgets/wordpress-wp-testimonials-plugin-1-4-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-05-22T09:06:39.689Z
2023-10-03T11:22:49.483Z
2023-10-03T11:22:49.483Z
{'Vendor': 'Trustindex.io', 'Product': 'WP Testimonials', 'Versions': 'n/a'}
CVE-2023-2563
The WordPress Contact Forms by Cimatti plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.7. This is due to missing or incorrect nonce validation on the function _accua_forms_form_edit_action. This makes it possible for unauthenticated attackers to delete forms created with this plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/f80a1f13-c1b9-4259-8d96-71a3cbcaf4ca?source=cve
2023-05-06T16:08:47.985Z
2023-06-13T01:48:07.662Z
2023-06-13T01:48:07.662Z
{'Vendor': 'cimatti', 'Product': 'WordPress Contact Forms by Cimatti', 'Versions': '*'}
CVE-2023-2099
A vulnerability classified as problematic has been found in SourceCodester Vehicle Service Management System 1.0. This affects an unknown part of the file /classes/Users.php. The manipulation of the argument id leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226107.
https://vuldb.com/?id.226107
2023-04-15T09:12:01.261Z
2023-04-15T12:00:06.750Z
2023-10-22T14:12:17.071Z
{'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'}
CVE-2023-2133
Out of bounds memory access in Service Worker API in Google Chrome prior to 112.0.5615.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html
2023-04-17T22:26:59.870Z
2023-04-19T03:40:25.735Z
2023-04-19T03:40:25.735Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.137'}
CVE-2023-2426
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 9.0.1499.
https://huntr.dev/bounties/3451be4c-91c8-4d08-926b-cbff7396f425
2023-04-29T00:00:00
2023-04-29T00:00:00
2023-12-23T07:06:19.413263
{'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'}
CVE-2023-2076
A vulnerability classified as problematic was found in Campcodes Online Traffic Offense Management System 1.0. This vulnerability affects unknown code of the file /classes/Users.phpp. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-226054 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.226054
2023-04-14T18:33:19.222Z
2023-04-14T19:31:04.234Z
2023-10-22T13:57:37.157Z
{'Vendor': 'Campcodes', 'Product': 'Online Traffic Offense Management System', 'Versions': '1.0'}
CVE-2023-2975
Issue summary: The AES-SIV cipher implementation contains a bug that causes it to ignore empty associated data entries which are unauthenticated as a consequence. Impact summary: Applications that use the AES-SIV algorithm and want to authenticate empty data entries as associated data can be mislead by removing adding or reordering such empty entries as these are ignored by the OpenSSL implementation. We are currently unaware of any such applications. The AES-SIV algorithm allows for authentication of multiple associated data entries along with the encryption. To authenticate empty data the application has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with NULL pointer as the output buffer and 0 as the input buffer length. The AES-SIV implementation in OpenSSL just returns success for such a call instead of performing the associated data authentication operation. The empty data thus will not be authenticated. As this issue does not affect non-empty associated data authentication and we expect it to be rare for an application to use empty associated data entries this is qualified as Low severity issue.
https://www.openssl.org/news/secadv/20230714.txt
2023-05-30T10:29:34.539Z
2023-07-14T11:16:25.151Z
2023-07-14T11:16:25.151Z
{'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.1.0, 3.0.0'}
CVE-2023-2758
A denial of service vulnerability exists in Contec CONPROSYS HMI System versions 3.5.2 and prior. When there is a time-zone mismatch in certain configuration files, a remote, unauthenticated attacker may deny logins for an extended period of time.
https://www.tenable.com/security/research/tra-2023-21
2023-05-17T12:46:36.673Z
2023-05-31T14:09:49.809Z
2023-05-31T14:09:49.809Z
{'Vendor': 'Contec', 'Product': 'CONPROSYS HMI System', 'Versions': '0'}
CVE-2023-2164
An issue has been discovered in GitLab affecting all versions starting from 15.9 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. It was possible for an attacker to trigger a stored XSS vulnerability via user interaction with a crafted URL in the WebIDE beta.
https://gitlab.com/gitlab-org/gitlab/-/issues/407783
2023-04-18T18:24:29.692Z
2023-08-01T23:36:10.665Z
2023-08-01T23:36:10.665Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '15.9, 16.1.0, 16.2.0'}
CVE-2023-2534
Improper Authorization vulnerability in OTRS AG OTRS 8 (Websocket API backend) allows any as Agent authenticated attacker to track user behaviour and to gain live insight into overall system usage. User IDs can easily be correlated with real names e. g. via ticket histories by any user. (Fuzzing for garnering other adjacent user/sensitive data). Subscribing to all possible push events could also lead to performance implications on the server side, depending on the size of the installation and the number of active users. (Flooding)This issue affects OTRS: from 8.0.X before 8.0.32.
https://otrs.com/release-notes/otrs-security-advisory-2023-03/
2023-05-05T06:14:04.360Z
2023-05-08T07:29:49.293Z
2023-05-08T07:55:19.365Z
{'Vendor': 'OTRS AG', 'Product': 'OTRS', 'Versions': '8.0.x'}
CVE-2023-2922
A vulnerability classified as problematic has been found in SourceCodester Comment System 1.0. Affected is an unknown function of the file index.php of the component GET Parameter Handler. The manipulation of the argument msg leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230076.
https://vuldb.com/?id.230076
2023-05-27T07:02:58.879Z
2023-05-27T07:31:03.391Z
2023-10-23T07:10:56.586Z
{'Vendor': 'SourceCodester', 'Product': 'Comment System', 'Versions': '1.0'}
CVE-2023-2888
A vulnerability, which was classified as problematic, was found in PHPOK 6.4.100. This affects an unknown part of the file /admin.php?c=upload&f=zip&_noCache=0.1683794968. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The identifier VDB-229953 was assigned to this vulnerability.
https://vuldb.com/?id.229953
2023-05-25T12:37:30.077Z
2023-05-25T13:00:04.633Z
2023-10-23T07:04:50.673Z
{'Vendor': 'n/a', 'Product': 'PHPOK', 'Versions': '6.4.100'}
CVE-2023-2021
Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.3.
https://huntr.dev/bounties/2e31082d-7aeb-46ff-84d6-9561758e3bf0
2023-04-13T00:00:00
2023-04-13T00:00:00
2023-04-13T00:00:00
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-2666
Allocation of Resources Without Limits or Throttling in GitHub repository froxlor/froxlor prior to 2.0.16.
https://huntr.dev/bounties/0bbdc9d4-d9dc-4490-93ef-0a83b451a20f
2023-05-12T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'}
CVE-2023-2236
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Both io_install_fixed_file and its callers call fput in a file in case of an error, causing a reference underflow which leads to a use-after-free vulnerability. We recommend upgrading past commit 9d94c04c0db024922e886c9fd429659f22f48ea4.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d94c04c0db024922e886c9fd429659f22f48ea4
2023-04-21T17:43:28.315Z
2023-05-01T12:50:47.742Z
2023-05-01T12:50:47.742Z
{'Vendor': 'Linux', 'Product': 'Linux Kernel', 'Versions': '5.19'}
CVE-2023-2723
Use after free in DevTools in Google Chrome prior to 113.0.5672.126 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html
2023-05-15T21:16:58.172Z
2023-05-16T18:45:34.099Z
2023-05-16T18:45:34.099Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.126'}
CVE-2023-2373
A vulnerability, which was classified as critical, was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. This affects an unknown part of the component Web Management Interface. The manipulation of the argument ecn-up leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227649 was assigned to this vulnerability.
https://vuldb.com/?id.227649
2023-04-28T11:29:50.552Z
2023-04-28T14:00:07.264Z
2023-10-22T18:30:38.267Z
{'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.0, 2.0.9-hotfix.1, 2.0.9-hotfix.2, 2.0.9-hotfix.3, 2.0.9-hotfix.4, 2.0.9-hotfix.5, 2.0.9-hotfix.6'}
CVE-2023-2689
A vulnerability classified as critical was found in SourceCodester Billing Management System 1.0. This vulnerability affects unknown code of the file editproduct.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-228970 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.228970
2023-05-14T07:36:31.799Z
2023-05-14T08:00:03.745Z
2023-10-23T06:09:56.363Z
{'Vendor': 'SourceCodester', 'Product': 'Billing Management System', 'Versions': '1.0'}
CVE-2023-2959
Authentication Bypass by Primary Weakness vulnerability in Oliva Expertise Oliva Expertise EKS allows Collect Data as Provided by Users.This issue affects Oliva Expertise EKS: before 1.2.
https://www.usom.gov.tr/bildirim/tr-23-0409
2023-05-29T12:27:05.534Z
2023-07-17T13:25:14.769Z
2023-08-16T07:25:45.148Z
{'Vendor': 'Oliva Expertise', 'Product': 'Oliva Expertise EKS', 'Versions': '0'}
CVE-2023-2261
The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the handle_ajax_call function in versions up to, and including, 4.5.0. This makes it possible for authenticated attackers, with subscriber-level access or higher, to obtain a list of users with accounts on the site. This includes ids, usernames and emails.
https://www.wordfence.com/threat-intel/vulnerabilities/id/f51f0919-498e-4f86-a933-1b7f2c4a10a4?source=cve
2023-04-24T20:43:01.943Z
2023-06-09T12:32:01.124Z
2023-06-09T12:32:01.124Z
{'Vendor': 'wpwhitesecurity', 'Product': 'WP Activity Log', 'Versions': '*'}
CVE-2023-2631
A missing permission check in Jenkins Code Dx Plugin 3.1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL.
https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3118
2023-05-10T15:00:43.923Z
2023-05-16T18:06:59.001Z
2023-05-16T18:06:59.001Z
{'Vendor': 'Jenkins', 'Product': 'Jenkins Code Dx Plugin', 'Versions': '0'}
CVE-2023-2324
The Elementor Forms Google Sheet Connector WordPress plugin before 1.0.7, gsheetconnector-for-elementor-forms-pro WordPress plugin through 1.0.7 does not escape some parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/50d81eec-f324-4445-b10f-96e94153917e
2023-04-27T08:04:41.555Z
2023-07-04T07:23:25.652Z
2023-07-05T10:47:56.883Z
{'Vendor': 'Unknown', 'Product': 'Elementor Forms Google Sheet Connector', 'Versions': '0'}
CVE-2023-2774
A vulnerability was found in code-projects Bus Dispatch and Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file view_branch.php. The manipulation of the argument branchid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-229280.
https://vuldb.com/?id.229280
2023-05-17T16:58:17.747Z
2023-05-17T19:31:02.929Z
2023-10-23T06:36:47.701Z
{'Vendor': 'code-projects', 'Product': 'Bus Dispatch and Information System', 'Versions': '1.0'}
CVE-2023-2518
The Easy Forms for Mailchimp WordPress plugin before 6.8.9 does not sanitise and escape a parameter before outputting it back in the page when the debug option is enabled, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
https://wpscan.com/vulnerability/ca120255-2c50-4906-97f3-ea660486db4c
2023-05-04T14:55:42.680Z
2023-05-30T07:49:12.307Z
2023-06-13T07:29:13.834Z
{'Vendor': 'Unknown', 'Product': 'Easy Forms for Mailchimp', 'Versions': '0'}
CVE-2023-2148
A vulnerability classified as critical has been found in Campcodes Online Thesis Archiving System 1.0. This affects an unknown part of the file /admin/curriculum/view_curriculum.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226269 was assigned to this vulnerability.
https://vuldb.com/?id.226269
2023-04-18T10:47:17.214Z
2023-04-18T12:00:10.080Z
2023-10-22T14:24:29.191Z
{'Vendor': 'Campcodes', 'Product': 'Online Thesis Archiving System', 'Versions': '1.0'}
CVE-2023-2627
The KiviCare WordPress plugin before 3.2.1 does not have proper CSRF and authorisation checks in various AJAX actions, allowing any authenticated users, such as subscriber to call them. Attacks include but are not limited to: Add arbitrary Clinic Admin/Doctors/etc and update plugin's settings
https://wpscan.com/vulnerability/162d0029-2adc-4925-9985-1d5d672dbe75
2023-05-10T13:37:17.129Z
2023-06-27T13:17:06.660Z
2023-06-27T13:17:06.660Z
{'Vendor': 'Unknown', 'Product': 'KiviCare', 'Versions': '0'}
CVE-2023-2277
The WP Directory Kit plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.9. This is due to missing or incorrect nonce validation on the 'insert' function. This makes it possible for unauthenticated attackers to update the plugin's settings and inject malicious JavaScript via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/82c6ed2f-20e8-46d1-a460-16d32b7536cd?source=cve
2023-04-25T11:46:18.442Z
2023-06-13T01:48:06.807Z
2023-06-13T01:48:06.807Z
{'Vendor': 'listingthemes', 'Product': 'WP Directory Kit', 'Versions': '*'}
CVE-2023-2762
A Use-After-Free vulnerability in SLDPRT file reading procedure exists in SOLIDWORKS Desktop from Release SOLIDWORKS 2021 through Release SOLIDWORKS 2023. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted SLDPRT file.
https://www.3ds.com/vulnerability/advisories
2023-05-17T15:42:19.316Z
2023-07-12T07:05:26.301Z
2023-07-12T07:10:20.317Z
{'Vendor': 'Dassault Systèmes', 'Product': 'SOLIDWORKS Desktop', 'Versions': 'Release SOLIDWORKS 2021 Golden, Release SOLIDWORKS 2022 Golden, Release SOLIDWORKS 2023 Golden'}
CVE-2023-2298
The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'business_id' parameter in versions up to, and including, 4.2.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/7e6a0bf9-4767-4d4c-9a1e-adcb3c7719d9?source=cve
2023-04-26T12:10:04.237Z
2023-06-03T04:35:15.934Z
2023-06-03T04:35:15.934Z
{'Vendor': 'vcita', 'Product': 'Online Booking & Scheduling Calendar for WordPress by vcita', 'Versions': '*'}
CVE-2023-2918
null
null
2023-05-26T15:33:51.990Z
null
2023-06-16T16:54:00.228Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2220
A vulnerability was found in Dream Technology mica up to 3.0.5. It has been classified as problematic. Affected is an unknown function of the component Form Object Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. VDB-226986 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.226986
2023-04-21T06:47:18.346Z
2023-04-21T11:31:03.118Z
2023-10-22T14:53:47.360Z
{'Vendor': 'Dream Technology', 'Product': 'mica', 'Versions': '3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5'}
CVE-2023-2670
A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file admin/?page=user/manage_user. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-228886 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.228886
2023-05-12T06:01:24.900Z
2023-05-12T08:00:05.906Z
2023-10-23T06:01:23.338Z
{'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'}
CVE-2023-2365
A vulnerability has been found in SourceCodester Faculty Evaluation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file ajax.php?action=delete_subject. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227641 was assigned to this vulnerability.
https://vuldb.com/?id.227641
2023-04-28T11:08:07.257Z
2023-04-28T11:31:03.087Z
2023-10-22T16:13:33.988Z
{'Vendor': 'SourceCodester', 'Product': 'Faculty Evaluation System', 'Versions': '1.0'}
CVE-2023-2735
The Groundhogg plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'gh_form' shortcode in versions up to, and including, 2.7.9.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Please note this only works with legacy contact forms.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4938206e-2ea4-47ed-a307-87cf67dd74a4?source=cve
2023-05-16T13:00:19.968Z
2023-05-20T02:03:22.910Z
2023-05-20T02:03:22.910Z
{'Vendor': 'trainingbusinesspros', 'Product': 'WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg', 'Versions': '*'}
CVE-2023-2109
Cross-site Scripting (XSS) - DOM in GitHub repository chatwoot/chatwoot prior to 2.14.0.
https://huntr.dev/bounties/fd5999fd-b1fd-44b4-ae2e-8f95b5c3d1b6
2023-04-17T00:00:00
2023-04-17T00:00:00
2023-04-17T00:00:00
{'Vendor': 'chatwoot', 'Product': 'chatwoot/chatwoot', 'Versions': 'unspecified'}
CVE-2023-2484
The Active Directory Integration plugin for WordPress is vulnerable to time-based SQL Injection via the orderby and order parameters in versions up to, and including, 4.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/3eedc57b-79cc-4569-b6d6-676a22aa1e06?source=cve
2023-05-02T21:08:21.340Z
2023-06-09T05:33:14.991Z
2023-06-09T05:33:14.991Z
{'Vendor': 'cyberlord92', 'Product': 'Active Directory Integration / LDAP Integration', 'Versions': '*'}
CVE-2023-2938
Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
2023-05-27T19:39:14.897Z
2023-05-30T21:31:40.894Z
2023-05-30T21:31:40.894Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'}
CVE-2023-2892
The WP EasyCart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.4.8. This is due to missing or incorrect nonce validation on the process_bulk_delete_product function. This makes it possible for unauthenticated attackers to bulk delete products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b36e94e4-b1e8-4803-9377-c4d710b029de?source=cve
2023-05-25T16:04:33.232Z
2023-06-09T06:48:50.216Z
2023-06-09T06:48:50.216Z
{'Vendor': 'levelfourstorefront', 'Product': 'Shopping Cart & eCommerce Store', 'Versions': '*'}
CVE-2023-2191
Cross-site Scripting (XSS) - Stored in GitHub repository azuracast/azuracast prior to 0.18.
https://huntr.dev/bounties/0814f5f9-8b58-40e5-b08c-7c488947cf31
2023-04-20T00:00:00
2023-04-20T00:00:00
2023-04-20T00:00:00
{'Vendor': 'azuracast', 'Product': 'azuracast/azuracast', 'Versions': 'unspecified'}
CVE-2023-2742
The AI ChatBot WordPress plugin before 4.5.5 does not sanitize and escape its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
https://wpscan.com/vulnerability/f689442a-a851-4140-a10c-ac579f9da142
2023-05-16T18:39:27.427Z
2023-06-19T10:52:43.675Z
2023-06-19T10:52:43.675Z
{'Vendor': 'Unknown', 'Product': 'AI ChatBot', 'Versions': '0'}
CVE-2023-2312
Use after free in Offline in Google Chrome on Android prior to 116.0.5845.96 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
2023-04-26T18:49:35.319Z
2023-08-15T17:07:09.753Z
2023-08-15T17:07:09.753Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '116.0.5845.96'}
CVE-2023-2607
The Multiple Page Generator Plugin for WordPress is vulnerable to time-based SQL Injection via the orderby and order parameters in versions up to, and including, 3.3.17 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrator privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/1575f0ad-0a77-4047-844c-48db4c8b4e91?source=cve
2023-05-09T16:26:49.316Z
2023-06-09T05:33:10.746Z
2023-06-09T05:33:10.746Z
{'Vendor': 'themeisle', 'Product': 'Multiple Page Generator Plugin – MPG', 'Versions': '*'}
CVE-2023-2257
Authentication Bypass in Hub Business integration in Devolutions Workspace Desktop 2023.1.1.3 and earlier on Windows and macOS allows an attacker with access to the user interface to unlock a Hub Business space without being prompted to enter the password via an unimplemented "Force Login" security feature. This vulnerability occurs only if "Force Login" feature is enabled on the Hub Business instance and that an attacker has access to a locked Workspace desktop application configured with a Hub Business space.
https://devolutions.net/security/advisories/DEVO-2023-0011
2023-04-24T16:48:54.917Z
2023-04-24T18:48:52.039Z
2023-04-24T18:48:52.039Z
{'Vendor': 'Devolutions', 'Product': 'Workspace Desktop', 'Versions': '0'}
CVE-2023-2980
A vulnerability classified as critical was found in Abstrium Pydio Cells 4.2.0. This vulnerability affects unknown code of the component User Creation Handler. The manipulation leads to improper control of resource identifiers. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-230212.
https://vuldb.com/?id.230212
2023-05-30T13:30:42.089Z
2023-05-30T14:31:03.238Z
2023-10-23T07:28:01.104Z
{'Vendor': 'Abstrium', 'Product': 'Pydio Cells', 'Versions': '4.2.0'}
CVE-2023-2579
The InventoryPress WordPress plugin through 1.7 does not sanitise and escape some of its settings, which could allow users with the role of author and above to perform Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/3cfcb8cc-9c4f-409c-934f-9f3f043de6fe
2023-05-08T13:04:37.391Z
2023-07-17T13:29:49.306Z
2023-07-17T13:29:49.306Z
{'Vendor': 'Unknown', 'Product': 'InventoryPress', 'Versions': '0'}
CVE-2023-2083
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the save function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to save plugin settings. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
https://www.wordfence.com/threat-intel/vulnerabilities/id/f8bf0933-1c97-4374-b323-c55b91fe4d27?source=cve
2023-04-14T20:18:29.400Z
2023-06-09T05:33:39.357Z
2023-06-09T05:33:39.357Z
{'Vendor': 'wpdevteam', 'Product': 'Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates', 'Versions': '*'}
CVE-2023-2596
A vulnerability was found in SourceCodester Online Reviewer System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /reviewer/system/system/admins/manage/users/user-update.php of the component GET Parameter Handler. The manipulation of the argument user_id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-228398 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.228398
2023-05-09T12:16:25.948Z
2023-05-09T13:00:05.254Z
2023-10-23T05:32:06.393Z
{'Vendor': 'SourceCodester', 'Product': 'Online Reviewer System', 'Versions': '1.0'}
CVE-2023-2345
A vulnerability was found in SourceCodester Service Provider Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /classes/Master.php?f=delete_inquiry. The manipulation leads to improper authorization. The attack may be launched remotely. The identifier of this vulnerability is VDB-227588.
https://vuldb.com/?id.227588
2023-04-27T13:37:55.673Z
2023-04-27T14:00:08.074Z
2023-10-22T16:03:48.617Z
{'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'}
CVE-2023-2715
The Groundhogg plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'submit_ticket' function in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers to create a support ticket that sends the website's data to the plugin developer, and it is also possible to create an admin access with an auto login link that is also sent to the plugin developer with the ticket. It only works if the plugin is activated with a valid license.
https://www.wordfence.com/threat-intel/vulnerabilities/id/24747507-8f24-499e-a257-d379dc171e18?source=cve
2023-05-15T16:35:19.330Z
2023-05-20T02:03:18.674Z
2023-05-20T02:03:18.674Z
{'Vendor': 'trainingbusinesspros', 'Product': 'WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg', 'Versions': '*'}
CVE-2023-2200
An issue has been discovered in GitLab CE/EE affecting all versions starting from 7.14 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1, which allows an attacker to inject HTML in an email address field.
https://gitlab.com/gitlab-org/gitlab/-/issues/408281
2023-04-20T21:24:10.913Z
2023-07-13T02:02:34.411Z
2023-07-13T02:02:34.411Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '7.14, 16.0, 16.1'}
CVE-2023-2650
Issue summary: Processing some specially crafted ASN.1 object identifiers or data containing them may be very slow. Impact summary: Applications that use OBJ_obj2txt() directly, or use any of the OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message size limit may experience notable to very long delays when processing those messages, which may lead to a Denial of Service. An OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers - most of which have no size limit. OBJ_obj2txt() may be used to translate an ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL type ASN1_OBJECT) to its canonical numeric text form, which are the sub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by periods. When one of the sub-identifiers in the OBJECT IDENTIFIER is very large (these are sizes that are seen as absurdly large, taking up tens or hundreds of KiBs), the translation to a decimal number in text may take a very long time. The time complexity is O(n^2) with 'n' being the size of the sub-identifiers in bytes (*). With OpenSSL 3.0, support to fetch cryptographic algorithms using names / identifiers in string form was introduced. This includes using OBJECT IDENTIFIERs in canonical numeric text form as identifiers for fetching algorithms. Such OBJECT IDENTIFIERs may be received through the ASN.1 structure AlgorithmIdentifier, which is commonly used in multiple protocols to specify what cryptographic algorithm should be used to sign or verify, encrypt or decrypt, or digest passed data. Applications that call OBJ_obj2txt() directly with untrusted data are affected, with any version of OpenSSL. If the use is for the mere purpose of display, the severity is considered low. In OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS. It also impacts anything that processes X.509 certificates, including simple things like verifying its signature. The impact on TLS is relatively low, because all versions of OpenSSL have a 100KiB limit on the peer's certificate chain. Additionally, this only impacts clients, or servers that have explicitly enabled client authentication. In OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects, such as X.509 certificates. This is assumed to not happen in such a way that it would cause a Denial of Service, so these versions are considered not affected by this issue in such a way that it would be cause for concern, and the severity is therefore considered low.
https://www.openssl.org/news/secadv/20230530.txt
2023-05-11T06:09:26.543Z
2023-05-30T13:40:11.963Z
2023-05-30T13:40:11.963Z
{'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.1.1, 3.0.0, 1.1.1, 1.0.2'}
CVE-2023-2095
A vulnerability was found in SourceCodester Vehicle Service Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/maintenance/manage_category.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226103.
https://vuldb.com/?id.226103
2023-04-15T09:11:44.716Z
2023-04-15T10:31:05.041Z
2023-10-22T14:07:24.271Z
{'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'}
CVE-2023-2996
The Jetpack WordPress plugin before 12.1.1 does not validate uploaded files, allowing users with author roles or above to manipulate existing files on the site, deleting arbitrary files, and in rare cases achieve Remote Code Execution via phar deserialization.
https://wpscan.com/vulnerability/52d221bd-ae42-435d-a90a-60a5ae530663
2023-05-30T19:10:08.911Z
2023-06-27T13:17:07.479Z
2023-06-27T13:17:07.479Z
{'Vendor': 'Unknown', 'Product': 'Jetpack', 'Versions': '1.9, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 3.0, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 4.0, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6, 4.7, 4.8, 4.9, 5.0, 5.1, 5.2, 5.3, 5.4, 5.5, 5.6, 5.7, 5.8, 5.9, 6.0, 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 7.0, 7.1, 7.2, 7.3, 7.4, 7.5, 7.6, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 8.5, 8.6, 8.7, 8.8, 8.9, 9.0, 9.1, 9.2, 9.3, 9.4, 9.5, 9.6, 9.7, 9.8, 9.9, 10.0, 10.1, 10.2, 10.3, 10.4, 10.5, 10.6, 10.7, 10.8, 10.9, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9, 12.0, 12.1'}
CVE-2023-2979
A vulnerability classified as critical has been found in Abstrium Pydio Cells 4.2.0. This affects an unknown part of the component User Creation Handler. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.2.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230211.
https://vuldb.com/?id.230211
2023-05-30T13:30:37.990Z
2023-05-30T14:00:06.300Z
2023-10-23T07:26:47.948Z
{'Vendor': 'Abstrium', 'Product': 'Pydio Cells', 'Versions': '4.2.0'}
CVE-2023-2580
The AI Engine WordPress plugin before 1.6.83 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).
https://wpscan.com/vulnerability/7ee1efb1-9969-40b2-8ab2-ea427091bbd8
2023-05-08T13:33:33.999Z
2023-06-27T13:17:08.326Z
2023-06-27T13:17:08.326Z
{'Vendor': 'Unknown', 'Product': 'AI Engine: ChatGPT Chatbot, Content Generator, GPT 3 & 4, Ultra-Customizable', 'Versions': '0'}
CVE-2023-2703
Exposure of Private Personal Information to an Unauthorized Actor vulnerability in Finex Media Competition Management System allows Retrieve Embedded Sensitive Data, Collect Data as Provided by Users.This issue affects Competition Management System: before 23.07.
https://www.usom.gov.tr/bildirim/tr-23-0283
2023-05-15T11:02:25.945Z
2023-05-23T19:19:47.883Z
2023-07-26T09:04:23.322Z
{'Vendor': 'Finex Media', 'Product': 'Competition Management System', 'Versions': '0'}
CVE-2023-2353
The CHP Ads Block Detector plugin for WordPress is vulnerable to unauthorized plugin settings update and reset due to a missing capability check on the chp_abd_action function in versions up to, and including, 3.9.4. This makes it possible for subscriber-level attackers to change or reset plugin settings. CVE-2023-36509 appears to be a duplicate of this issue.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4eca64d7-6e33-4b8e-af37-a3e8bbf2b76f?source=cve
2023-04-27T15:54:59.751Z
2023-08-31T05:33:07.617Z
2023-08-31T05:33:07.617Z
{'Vendor': 'sureshchand12a', 'Product': 'CHP Ads Block Detector', 'Versions': '*'}
CVE-2023-2646
A vulnerability has been found in TP-Link Archer C7v2 v2_en_us_180114 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component GET Request Parameter Handler. The manipulation leads to denial of service. The attack can only be done within the local network. The associated identifier of this vulnerability is VDB-228775. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.228775
2023-05-11T05:29:05.402Z
2023-05-11T07:31:04.076Z
2023-10-23T05:43:04.879Z
{'Vendor': 'TP-Link', 'Product': 'Archer C7v2', 'Versions': 'v2_en_us_180114'}
CVE-2023-2216
A vulnerability classified as problematic was found in Campcodes Coffee Shop POS System 1.0. Affected by this vulnerability is an unknown functionality of the file /classes/Users.php. The manipulation of the argument firstname leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226981 was assigned to this vulnerability.
https://vuldb.com/?id.226981
2023-04-21T06:29:16.254Z
2023-04-21T10:31:03.863Z
2023-10-22T14:48:54.645Z
{'Vendor': 'Campcodes', 'Product': 'Coffee Shop POS System', 'Versions': '1.0'}
CVE-2023-2538
A CWE-552 "Files or Directories Accessible to External Parties” in the web interface of the Tyan S5552 BMC version 3.00 allows an unauthenticated remote attacker to retrieve the private key of the TLS certificate in use by the BMC via forced browsing. This can then be abused to perform Man-in-the-Middle (MitM) attacks against victims that access the web interface through HTTPS.
https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2023-2538/
2023-05-05T07:00:43.400Z
2023-07-05T12:11:53.397Z
2023-07-05T12:11:53.397Z
{'Vendor': 'tyan', 'Product': 's5552_bmc', 'Versions': '3.00'}
CVE-2023-2168
The TaxoPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Suggest Terms Title field in versions up to, and including, 3.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Editor+ permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/1c051bfd-2754-4faf-8062-91752555166c?source=cve
2023-04-18T20:37:54.193Z
2023-04-19T09:38:18.815Z
2023-04-19T09:38:18.815Z
{'Vendor': 'stevejburge', 'Product': 'TaxoPress is the WordPress Tag, Category, and Taxonomy Manager', 'Versions': '*'}
CVE-2023-2492
The QueryWall: Plug'n Play Firewall WordPress plugin through 1.1.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
https://wpscan.com/vulnerability/fa7c54c2-5653-4d3d-8163-f3d63272c050
2023-05-03T12:48:38.186Z
2023-06-19T10:52:44.610Z
2023-06-19T10:52:44.610Z
{'Vendor': 'Unknown', 'Product': "QueryWall: Plug'n Play Firewall", 'Versions': '0'}
CVE-2023-2187
On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send broadcast events to any user via the WebMonitor.An unauthenticated user can use this vulnerability to forcefully log out of any currently logged-in user by sending a "password change event". Furthermore, an attacker could use this vulnerability to spam the logged-in user with false events.
https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html
2023-04-19T15:35:09.146Z
2023-06-07T06:42:31.345Z
2023-06-07T06:42:31.345Z
{'Vendor': 'Triangle MicroWorks', 'Product': 'SCADA Data Gateway', 'Versions': '5.01.03'}
CVE-2023-2884
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG), Use of Insufficiently Random Values vulnerability in CBOT Chatbot allows Signature Spoofing by Key Recreation.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.
https://www.usom.gov.tr/bildirim/tr-23-0293
2023-05-25T08:03:27.613Z
2023-05-25T08:26:39.535Z
2023-07-26T09:05:54.625Z
{'Vendor': 'CBOT', 'Product': 'Chatbot', 'Versions': '0'}
CVE-2023-2304
The Favorites plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'user_favorites' shortcode in versions up to, and including, 2.3.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5bd03cd0-34f0-491c-8247-79656eba32a8?source=cve
2023-04-26T13:50:36.883Z
2023-05-31T04:35:41.279Z
2023-05-31T04:35:41.279Z
{'Vendor': 'kylephillips', 'Product': 'Favorites', 'Versions': '*'}
CVE-2023-2754
The Cloudflare WARP client for Windows assigns loopback IPv4 addresses for the DNS Servers, since WARP acts as local DNS server that performs DNS queries in a secure manner, however, if a user is connected to WARP over an IPv6-capable network, te WARP client did not assign loopback IPv6 addresses but Unique Local Addresses, which under certain conditions could point towards unknown devices in the same local network which enables an Attacker to view DNS queries made by the device.
https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release
2023-05-17T07:55:45.392Z
2023-08-03T13:53:00.634Z
2023-08-03T13:53:00.634Z
{'Vendor': 'Cloudflare', 'Product': 'WARP', 'Versions': '0'}
CVE-2023-2241
A vulnerability, which was classified as critical, was found in PoDoFo 0.10.0. Affected is the function readXRefStreamEntry of the file PdfXRefStreamParserObject.cpp. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 535a786f124b739e3c857529cecc29e4eeb79778. It is recommended to apply a patch to fix this issue. VDB-227226 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.227226
2023-04-22T15:42:11.291Z
2023-04-22T16:00:04.467Z
2023-10-22T14:56:13.623Z
{'Vendor': 'n/a', 'Product': 'PoDoFo', 'Versions': '0.10.0'}
CVE-2023-2611
Advantech R-SeeNet versions 2.4.22 is installed with a hidden root-level user that is not available in the users list. This hidden user has a password that cannot be changed by users.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-173-02
2023-05-09T22:01:40.730Z
2023-06-22T16:22:49.087Z
2023-06-22T16:22:49.087Z
{'Vendor': 'Advantech ', 'Product': 'R-SeeNet', 'Versions': '0'}
CVE-2023-2406
The Event Registration Calendar By vcita plugin, versions up to and including 3.9.1, and Online Payments – Get Paid with PayPal, Square & Stripe plugin, for WordPress are vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/1ab05954-9999-43ff-8e3c-a987e2da1956?source=cve
2023-04-28T16:10:47.991Z
2023-06-03T04:35:12.933Z
2023-06-03T04:35:12.933Z
{'Vendor': 'vcita', 'Product': 'Event Registration Calendar By vcita', 'Versions': '*'}
CVE-2023-2056
A vulnerability was found in DedeCMS up to 5.7.87 and classified as critical. This issue affects the function GetSystemFile of the file module_main.php. The manipulation leads to code injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-225941 was assigned to this vulnerability.
https://vuldb.com/?id.225941
2023-04-14T07:59:39.257Z
2023-04-14T13:31:03.193Z
2023-10-22T10:03:31.629Z
{'Vendor': 'n/a', 'Product': 'DedeCMS', 'Versions': '5.7.0, 5.7.1, 5.7.2, 5.7.3, 5.7.4, 5.7.5, 5.7.6, 5.7.7, 5.7.8, 5.7.9, 5.7.10, 5.7.11, 5.7.12, 5.7.13, 5.7.14, 5.7.15, 5.7.16, 5.7.17, 5.7.18, 5.7.19, 5.7.20, 5.7.21, 5.7.22, 5.7.23, 5.7.24, 5.7.25, 5.7.26, 5.7.27, 5.7.28, 5.7.29, 5.7.30, 5.7.31, 5.7.32, 5.7.33, 5.7.34, 5.7.35, 5.7.36, 5.7.37, 5.7.38, 5.7.39, 5.7.40, 5.7.41, 5.7.42, 5.7.43, 5.7.44, 5.7.45, 5.7.46, 5.7.47, 5.7.48, 5.7.49, 5.7.50, 5.7.51, 5.7.52, 5.7.53, 5.7.54, 5.7.55, 5.7.56, 5.7.57, 5.7.58, 5.7.59, 5.7.60, 5.7.61, 5.7.62, 5.7.63, 5.7.64, 5.7.65, 5.7.66, 5.7.67, 5.7.68, 5.7.69, 5.7.70, 5.7.71, 5.7.72, 5.7.73, 5.7.74, 5.7.75, 5.7.76, 5.7.77, 5.7.78, 5.7.79, 5.7.80, 5.7.81, 5.7.82, 5.7.83, 5.7.84, 5.7.85, 5.7.86, 5.7.87'}