CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-2155 | A vulnerability was found in SourceCodester Air Cargo Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file classes/Master.php?f=save_cargo_type. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226276. | https://vuldb.com/?id.226276 | 2023-04-18T11:17:02.557Z | 2023-04-18T14:31:03.901Z | 2023-10-22T14:33:01.430Z | {'Vendor': 'SourceCodester', 'Product': 'Air Cargo Management System', 'Versions': '1.0'} |
CVE-2023-2856 | VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file | https://www.wireshark.org/security/wnpa-sec-2023-16.html | 2023-05-24T00:00:00 | 2023-05-26T00:00:00 | 2023-09-17T06:06:23.392046 | {'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.6, >=3.6.0, <3.6.14'} |
CVE-2023-2790 | A vulnerability classified as problematic has been found in TOTOLINK N200RE 9.3.5u.6255_B20211224. Affected is an unknown function of the file /squashfs-root/etc_ro/custom.conf of the component Telnet Service. The manipulation leads to password in configuration file. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-229374 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.229374 | 2023-05-18T12:08:59.033Z | 2023-05-18T12:31:04.424Z | 2023-10-23T06:41:40.586Z | {'Vendor': 'TOTOLINK', 'Product': 'N200RE', 'Versions': '9.3.5u.6255_B20211224'} |
CVE-2023-2285 | The WP Activity Log Premium plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.0. This is due to missing or incorrect nonce validation on the ajax_switch_db function. This makes it possible for unauthenticated attackers to make changes to the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/4c659f6d-e02b-42ab-ba02-eb9b00602ad4?source=cve | 2023-04-25T19:26:20.272Z | 2023-06-09T12:31:59.732Z | 2023-06-09T12:31:59.732Z | {'Vendor': 'wpwhitesecurity', 'Product': 'WP Activity Log Premium', 'Versions': '*'} |
CVE-2023-2006 | A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel. | https://bugzilla.redhat.com/show_bug.cgi?id=2189112 | 2023-04-12T00:00:00 | 2023-04-24T00:00:00 | 2023-06-09T00:00:00 | {'Vendor': 'n/a', 'Product': "Linux kernel's RxRPC network protocol", 'Versions': 'Fixed in kernel v6.1-rc7'} |
CVE-2023-2905 | Due to a failure in validating the length of a provided MQTT_CMD_PUBLISH parsed message with a variable length header, Cesanta Mongoose, an embeddable web server, version 7.10 is susceptible to a heap-based buffer overflow vulnerability in the default configuration. Version 7.9 and prior does not appear to be vulnerable. This issue is resolved in version 7.11.
| https://takeonme.org/cves/CVE-2023-2905.html | 2023-05-26T00:46:11.667Z | 2023-08-09T04:46:14.972Z | 2023-08-09T04:46:14.972Z | {'Vendor': 'Cesanta', 'Product': 'Mongoose', 'Versions': '7.10, 7.11'} |
CVE-2023-2840 | NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2. | https://huntr.dev/bounties/21926fc2-6eb1-4e24-8a36-e60f487d0257 | 2023-05-22T00:00:00 | 2023-05-22T00:00:00 | 2023-05-27T00:00:00 | {'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'} |
CVE-2023-2143 | The Enable SVG, WebP & ICO Upload WordPress plugin through 1.0.3 does not sanitize SVG file contents, leading to a Cross-Site Scripting vulnerability. | https://wpscan.com/vulnerability/91898762-aa7d-4fbc-a016-3de48901e5de | 2023-04-18T10:17:47.588Z | 2023-07-17T13:29:52.707Z | 2023-07-17T13:29:52.707Z | {'Vendor': 'Unknown', 'Product': 'Enable SVG, WebP & ICO Upload', 'Versions': '0'} |
CVE-2023-2513 | A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors. | https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/ | 2023-05-04T00:00:00 | 2023-05-08T00:00:00 | 2023-05-08T00:00:00 | {'Vendor': 'n/a', 'Product': 'Linux kernel ext4 filesystem', 'Versions': 'Fixed in kernel 6.0-rc1'} |
CVE-2023-2397 | A vulnerability, which was classified as problematic, has been found in SourceCodester Simple Mobile Comparison Website 1.0. This issue affects some unknown processing of the file classes/Master.php?f=save_field. The manipulation of the argument Field Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227675. | https://vuldb.com/?id.227675 | 2023-04-28T11:49:15.768Z | 2023-04-28T22:00:06.520Z | 2023-10-22T18:59:54.231Z | {'Vendor': 'SourceCodester', 'Product': 'Simple Mobile Comparison Website', 'Versions': '1.0'} |
CVE-2023-2378 | A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. It has been rated as critical. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation of the argument suffix-rate-up leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227654 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.227654 | 2023-04-28T11:30:06.728Z | 2023-04-28T16:00:04.575Z | 2023-10-22T18:36:44.132Z | {'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.0, 2.0.9-hotfix.1, 2.0.9-hotfix.2, 2.0.9-hotfix.3, 2.0.9-hotfix.4, 2.0.9-hotfix.5, 2.0.9-hotfix.6'} |
CVE-2023-2682 | A vulnerability was found in Caton Live up to 2023-04-26 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/ping.cgi of the component Mini_HTTPD. The manipulation of the argument address with the input ;id;uname${IFS}-a leads to command injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-228911. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.228911 | 2023-05-12T12:17:09.253Z | 2023-05-12T12:31:06.112Z | 2023-10-23T06:08:43.143Z | {'Vendor': 'Caton', 'Product': 'Live', 'Versions': '2023-04-26'} |
CVE-2023-2728 | Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.
| https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8 | 2023-05-16T00:32:00.189Z | 2023-07-03T20:06:11.796Z | 2023-07-03T20:06:11.796Z | {'Vendor': 'Kubernetes', 'Product': 'Kubernetes', 'Versions': 'v1.24.14, v1.25.0 - v1.25.10, v1.26.0 - v1.26.5, v1.27.0 - v1.27.2'} |
CVE-2023-2952 | XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file | https://www.wireshark.org/security/wnpa-sec-2023-20.html | 2023-05-29T00:00:00 | 2023-05-30T00:00:00 | 2023-09-17T06:06:16.682771 | {'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.6, >=3.6.0, <3.6.14'} |
CVE-2023-2401 | The QuBot WordPress plugin before 1.1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/0746ea56-dd88-4fc3-86a3-54408eef1f94 | 2023-04-28T13:29:32.372Z | 2023-06-19T10:52:46.396Z | 2023-06-19T10:52:46.396Z | {'Vendor': 'Unknown', 'Product': 'QuBot', 'Versions': '0'} |
CVE-2023-2051 | A vulnerability classified as critical has been found in Campcodes Advanced Online Voting System 1.0. Affected is an unknown function of the file /admin/positions_row.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225936. | https://vuldb.com/?id.225936 | 2023-04-14T07:41:55.673Z | 2023-04-14T11:31:04.754Z | 2023-10-22T09:57:25.748Z | {'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'} |
CVE-2023-2544 | Authorization bypass vulnerability in UPV PEIX, affecting the component "pdf_curri_new.php". Through a POST request, an authenticated user could change the ID parameter to retrieve all the stored information of other registered users. | https://www.incibe.es/en/incibe-cert/notices/aviso/authorization-bypass-upv-peix | 2023-05-05T10:22:39.108Z | 2023-10-03T13:03:13.218Z | 2023-10-03T13:03:13.218Z | {'Vendor': 'Universitat Politècnica de València (UPV)', 'Product': 'UPV PEIX', 'Versions': '0'} |
CVE-2023-2114 | The NEX-Forms WordPress plugin before 8.4 does not properly escape the `table` parameter, which is populated with user input, before concatenating it to an SQL query. | https://wpscan.com/vulnerability/3d8ab3a5-1bf8-4216-91fa-e89541e5c43d | 2023-04-17T09:57:53.143Z | 2023-05-08T13:58:08.740Z | 2023-05-08T13:58:08.740Z | {'Vendor': 'Unknown', 'Product': 'NEX-Forms', 'Versions': '0'} |
CVE-2023-2817 | A post-authentication stored cross-site scripting vulnerability exists in Craft CMS versions <= 4.4.11. HTML, including script tags can be injected into field names which, when the field is added to a category or section, will trigger when users visit the Categories or Entries pages respectively. | https://www.tenable.com/security/research/tra-2023-20%2C | 2023-05-19T00:00:00 | 2023-05-26T00:00:00 | 2023-05-26T00:00:00 | {'Vendor': 'n/a', 'Product': 'Craft CMS', 'Versions': 'versions prior or equal to version 4.4.11'} |
CVE-2023-2303 | The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.6.4. This is due to missing nonce validation in the vcita-callback.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/2345c972-9fd4-4709-8bde-315ab54f60e2?source=cve | 2023-04-26T12:33:54.006Z | 2023-06-03T04:35:13.759Z | 2023-06-03T04:35:13.759Z | {'Vendor': 'eyale-vc', 'Product': 'Contact Form Builder by vcita', 'Versions': '*'} |
CVE-2023-2753 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta. | https://huntr.dev/bounties/eca2284d-e81a-4ab8-91bb-7afeca557628 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-2246 | A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. This vulnerability affects unknown code of the file admin/ajax.php?action=save_settings. The manipulation of the argument img leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227236. | https://vuldb.com/?id.227236 | 2023-04-23T15:10:14.559Z | 2023-04-23T15:31:04.034Z | 2023-10-22T15:58:55.942Z | {'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'} |
CVE-2023-2616 | Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/564cb512-2bcc-4458-8c20-88110ab45801 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2495 | The Greeklish-permalink WordPress plugin through 3.3 does not implement correct authorization or nonce checks in the cyrtrans_ajax_old AJAX action, allowing unauthenticated and low-privilege users to trigger the plugin's functionality to change Post slugs either directly or through CSRF. | https://wpscan.com/vulnerability/45878983-7e9b-49c2-8f99-4c28aab24f09 | 2023-05-03T14:19:24.270Z | 2023-07-10T12:40:36.457Z | 2023-08-15T14:10:30.890Z | {'Vendor': 'Unknown', 'Product': 'Greeklish-permalink', 'Versions': '0'} |
CVE-2023-2883 | Authorization Bypass Through User-Controlled Key vulnerability in CBOT Chatbot allows Authentication Abuse, Authentication Bypass.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.
| https://www.usom.gov.tr/bildirim/tr-23-0293 | 2023-05-25T08:03:26.413Z | 2023-05-25T08:20:44.289Z | 2023-05-25T08:20:44.289Z | {'Vendor': 'CBOT', 'Product': 'Chatbot', 'Versions': '0'} |
CVE-2023-2929 | Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html | 2023-05-27T19:39:13.428Z | 2023-05-30T21:31:38.474Z | 2023-05-30T21:31:38.474Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'} |
CVE-2023-2180 | The KIWIZ Invoices Certification & PDF System WordPress plugin through 2.1.3 does not validate the path of files to be downloaded, which could allow unauthenticated attacker to read/downlaod arbitrary files, as well as perform PHAR unserialization (assuming they can upload a file on the server) | https://wpscan.com/vulnerability/4d3b90d8-8a6d-4b72-8bc7-21f861259a1b | 2023-04-19T09:48:55.861Z | 2023-05-15T12:15:35.070Z | 2023-05-15T12:15:35.070Z | {'Vendor': 'Unknown', 'Product': 'KIWIZ Invoices Certification & PDF System', 'Versions': '0'} |
CVE-2023-2704 | The BP Social Connect plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.5. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email. | https://www.wordfence.com/threat-intel/vulnerabilities/id/44c96df2-530a-4ebe-b722-c606a7b135f9?source=cve | 2023-05-15T12:01:40.971Z | 2023-05-19T02:03:19.169Z | 2023-06-05T21:25:44.536Z | {'Vendor': 'vibethemes', 'Product': 'BP Social Connect', 'Versions': '*'} |
CVE-2023-2354 | The CHP Ads Block Detector plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings reachable though an AJAX action in versions up to, and including, 3.9.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/6f8514c9-0e11-4e26-ba0b-1d08a990b56c?source=cve | 2023-04-27T15:55:18.622Z | 2023-08-31T05:33:10.827Z | 2023-08-31T05:33:10.827Z | {'Vendor': 'sureshchand12a', 'Product': 'CHP Ads Block Detector', 'Versions': '*'} |
CVE-2023-2641 | A vulnerability was found in SourceCodester Online Internship Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file admin/login.php of the component POST Parameter Handler. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-228770 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.228770 | 2023-05-11T05:16:09.357Z | 2023-05-11T05:31:03.735Z | 2023-10-23T05:36:59.008Z | {'Vendor': 'SourceCodester', 'Product': 'Online Internship Management System', 'Versions': '1.0'} |
CVE-2023-2211 | A vulnerability was found in Campcodes Coffee Shop POS System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/categories/manage_category.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226976. | https://vuldb.com/?id.226976 | 2023-04-21T06:28:57.899Z | 2023-04-21T09:00:05.645Z | 2023-10-22T14:42:48.663Z | {'Vendor': 'Campcodes', 'Product': 'Coffee Shop POS System', 'Versions': '1.0'} |
CVE-2023-2991 | Fortra Globalscape EFT's administration server suffers from an information disclosure vulnerability where the serial number of the harddrive that Globalscape is installed on can be remotely determined via a "trial extension request" message
| https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/ | 2023-05-30T15:58:57.699Z | 2023-06-22T19:22:24.434Z | 2023-06-22T19:22:24.434Z | {'Vendor': 'Fortra', 'Product': 'Globalscape EFT', 'Versions': '8.0.0'} |
CVE-2023-2138 | Use of Hard-coded Credentials in GitHub repository nuxtlabs/github-module prior to 1.6.2. | https://huntr.dev/bounties/65096ef9-eafc-49da-b49a-5b88c0203ca6 | 2023-04-18T00:00:00 | 2023-04-18T00:00:00 | 2023-04-18T00:00:00 | {'Vendor': 'nuxtlabs', 'Product': 'nuxtlabs/github-module', 'Versions': 'unspecified'} |
CVE-2023-2568 | The Photo Gallery by Ays WordPress plugin before 5.1.7 does not escape some parameters before outputting it back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/b1704a12-459b-4f5d-aa2d-a96646ddaf3e | 2023-05-08T09:43:38.240Z | 2023-06-12T17:28:23.093Z | 2023-06-12T17:28:23.093Z | {'Vendor': 'Unknown', 'Product': 'Photo Gallery by Ays', 'Versions': '0'} |
CVE-2023-2092 | A vulnerability, which was classified as critical, has been found in SourceCodester Vehicle Service Management System 1.0. Affected by this issue is some unknown functionality of the file view_service.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226100. | https://vuldb.com/?id.226100 | 2023-04-15T09:11:34.504Z | 2023-04-15T09:31:03.458Z | 2023-10-22T14:03:44.652Z | {'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'} |
CVE-2023-2587 |
Teltonika’s Remote Management System versions prior to 4.10.0 contain a cross-site scripting (XSS) vulnerability in the main page of the web interface. An attacker with the MAC address and serial number of a connected device could send a maliciously crafted JSON file with an HTML object to trigger the vulnerability. This could allow the attacker to execute scripts in the account context and obtain remote code execution on managed devices.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08 | 2023-05-08T22:09:42.680Z | 2023-05-22T15:06:30.677Z | 2023-05-22T15:06:30.677Z | {'Vendor': 'Teltonika', 'Product': 'Remote Management System', 'Versions': '0'} |
CVE-2023-2342 | Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/01cd3ed5-dce8-4021-9de0-81cb14bf1829 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2712 | Unrestricted Upload of File with Dangerous Type vulnerability in "Rental Module" developed by third-party for Ideasoft's E-commerce Platform allows Command Injection, Using Malicious Files, Upload a Web Shell to a Web Server.This issue affects Rental Module: before 23.05.15.
| https://www.usom.gov.tr/bildirim/tr-23-0276 | 2023-05-15T13:58:02.132Z | 2023-05-20T09:49:53.583Z | 2023-07-26T09:04:37.601Z | {'Vendor': 'Unknown', 'Product': 'Rental Module', 'Versions': '0'} |
CVE-2023-2207 | A vulnerability classified as critical was found in Campcodes Retro Basketball Shoes Online Store 1.0. This vulnerability affects unknown code of the file contactus1.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226972. | https://vuldb.com/?id.226972 | 2023-04-21T06:21:25.652Z | 2023-04-21T07:31:04.400Z | 2023-10-22T14:37:55.452Z | {'Vendor': 'Campcodes', 'Product': 'Retro Basketball Shoes Online Store', 'Versions': '1.0'} |
CVE-2023-2657 | A vulnerability classified as problematic was found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this vulnerability is an unknown functionality of the file products.php. The manipulation of the argument search leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228799. | https://vuldb.com/?id.228799 | 2023-05-11T13:01:29.025Z | 2023-05-11T13:31:04.095Z | 2023-10-23T05:51:37.026Z | {'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'} |
CVE-2023-2084 | The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the get function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin settings. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check. | https://www.wordfence.com/threat-intel/vulnerabilities/id/0be8c668-0f1c-4f83-8a71-49c8bb9b67ae?source=cve | 2023-04-14T20:31:06.873Z | 2023-06-09T05:33:10.327Z | 2023-06-09T05:33:10.327Z | {'Vendor': 'wpdevteam', 'Product': 'Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates', 'Versions': '*'} |
CVE-2023-2987 | The Wordapp plugin for WordPress is vulnerable to authorization bypass due to an use of insufficiently unique cryptographic signature on the 'wa_pdx_op_config_set' function in versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to the plugin to change the 'validation_token' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation. | https://www.wordfence.com/threat-intel/vulnerabilities/id/80440bfa-4a02-4441-bbdb-52d7dd065a9d?source=cve | 2023-05-30T14:13:59.154Z | 2023-05-31T02:40:20.868Z | 2023-05-31T02:40:20.868Z | {'Vendor': 'wordapp', 'Product': 'Wordapp', 'Versions': '*'} |
CVE-2023-2968 | A remote attacker can trigger a denial of service in the socket.remoteAddress variable, by sending a crafted HTTP request. Usage of the undefined variable raises a TypeError exception.
| https://research.jfrog.com/vulnerabilities/undefined-variable-usage-in-proxy-leads-to-remote-denial-of-service-xray-520917 | 2023-05-29T21:15:17.688Z | 2023-05-30T17:37:45.166Z | 2023-05-30T17:37:45.166Z | {'Vendor': '', 'Product': '', 'Versions': '0'} |
CVE-2023-2591 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitHub repository nilsteampassnet/teampass prior to 3.0.7. | https://huntr.dev/bounties/705f79f4-f5e3-41d7-82a5-f00441cd984b | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | 2023-05-15T00:00:00 | {'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'} |
CVE-2023-2745 | WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack. | https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve | 2023-05-16T19:53:02.398Z | 2023-05-17T08:36:44.034Z | 2023-05-17T08:36:44.034Z | {'Vendor': 'WordPress Foundation', 'Product': 'WordPress', 'Versions': '*, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6, 4.7, 4.8, 4.9, 5.0, 5.1, 5.2, 5.3, 5.4, 5.5, 5.6, 5.7, 5.8, 5.9, 6.0, 6.1, 6.2'} |
CVE-2023-2315 | Path Traversal in OpenCart versions 4.0.0.0 to 4.0.2.2 allows an authenticated user with access/modify privilege on the Log component to empty out arbitrary files on the server | https://starlabs.sg/advisories/23/23-2315/ | 2023-04-27T03:23:57.023Z | 2023-09-26T04:36:21.668Z | 2023-09-26T04:36:21.668Z | {'Vendor': 'Opencart', 'Product': 'Opencart', 'Versions': '4.0.0.0'} |
CVE-2023-2600 | The Custom Base Terms WordPress plugin before 1.0.3 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/8e1d65c3-14e4-482f-ae9e-323e847a8613 | 2023-05-09T14:54:08.567Z | 2023-06-19T10:52:47.286Z | 2023-06-19T10:52:47.286Z | {'Vendor': 'Unknown', 'Product': 'Custom Base Terms', 'Versions': '0'} |
CVE-2023-2250 | A flaw was found in the Open Cluster Management (OCM) when a user have access to the worker nodes which has the cluster-manager-registration-controller or cluster-manager deployments. A malicious user can take advantage of this and bind the cluster-admin to any service account or using the service account to list all secrets for all kubernetes namespaces, leading into a cluster-level privilege escalation. | https://github.com/open-cluster-management-io/registration-operator/pull/344 | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | {'Vendor': 'n/a', 'Product': 'MCE', 'Versions': '2.3.0'} |
CVE-2023-2179 | The WooCommerce Order Status Change Notifier WordPress plugin through 1.1.0 does not have authorisation and CSRF when updating status orders via an AJAX action available to any authenticated users, which could allow low privilege users such as subscriber to update arbitrary order status, making them paid without actually paying for them for example | https://wpscan.com/vulnerability/fbc56973-4225-4f44-8c38-d488e57cd551 | 2023-04-19T09:47:37.440Z | 2023-05-15T12:15:35.876Z | 2023-05-15T12:15:35.876Z | {'Vendor': 'Unknown', 'Product': 'WooCommerce Order Status Change Notifier', 'Versions': '0'} |
CVE-2023-2483 | null | null | 2023-05-02T00:00:00 | null | 2023-05-23T00:00:00 | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2529 | The Enable SVG Uploads WordPress plugin through 2.1.5 does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads. | https://wpscan.com/vulnerability/4ac03907-2373-48f0-bca1-8f7073c06b18 | 2023-05-04T19:17:32.491Z | 2023-07-10T12:40:43.491Z | 2023-07-10T13:05:46.674Z | {'Vendor': 'Unknown', 'Product': 'Enable SVG Uploads', 'Versions': '0'} |
CVE-2023-2196 | A missing permission check in Jenkins Code Dx Plugin 3.1.0 and earlier allows attackers with Item/Read permission to check for the existence of an attacker-specified file path on an agent file system. | https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3145 | 2023-04-20T18:13:36.647Z | 2023-05-16T17:46:59.742Z | 2023-05-16T17:46:59.742Z | {'Vendor': 'Jenkins', 'Product': 'Jenkins Code Dx Plugin', 'Versions': '0'} |
CVE-2023-2895 | The WP EasyCart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.4.8. This is due to missing or incorrect nonce validation on the process_bulk_activate_product function. This makes it possible for unauthenticated attackers to bulk activate products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/02fd8469-cd99-42dc-9a28-c0ea08512bb0?source=cve | 2023-05-25T16:16:52.256Z | 2023-06-09T06:48:38.488Z | 2023-06-09T06:48:38.488Z | {'Vendor': 'levelfourstorefront', 'Product': 'Shopping Cart & eCommerce Store', 'Versions': '*'} |
CVE-2023-2178 | The Aajoda Testimonials WordPress plugin before 2.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/e84b71f9-4208-4efb-90e8-1c778e7d2ebb | 2023-04-19T09:19:35.735Z | 2023-06-27T13:17:09.127Z | 2023-06-27T13:17:09.127Z | {'Vendor': 'Unknown', 'Product': 'Aajoda Testimonials', 'Versions': '0'} |
CVE-2023-2482 | The Responsive CSS EDITOR WordPress plugin through 1.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high-privilege users such as admin. | https://wpscan.com/vulnerability/c0f73781-be7e-482e-91de-ad7991ad4bd5 | 2023-05-02T15:19:01.411Z | 2023-06-27T13:17:10.255Z | 2023-06-27T13:17:10.255Z | {'Vendor': 'Unknown', 'Product': 'Responsive CSS EDITOR', 'Versions': '0'} |
CVE-2023-2528 | The Contact Form by Supsystic plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.24. This is due to missing or incorrect nonce validation on the AJAX action handler. This makes it possible for unauthenticated attackers to execute AJAX actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/1c387b07-baf6-4c62-943e-4bd121160ceb?source=cve | 2023-05-04T18:34:30.681Z | 2023-05-16T23:35:31.193Z | 2023-05-16T23:35:31.193Z | {'Vendor': 'supsysticcom', 'Product': 'Contact Form by Supsystic', 'Versions': '*'} |
CVE-2023-2197 | HashiCorp Vault Enterprise 1.13.0 up to 1.13.1 is vulnerable to a padding oracle attack when using an HSM in conjunction with the CKM_AES_CBC_PAD or CKM_AES_CBC encryption mechanisms. An attacker with privileges to modify storage and restart Vault may be able to intercept or modify cipher text in order to derive Vault’s root key. Fixed in 1.13.2 | https://discuss.hashicorp.com/t/hcsec-2023-14-vault-enterprise-vulnerable-to-padding-oracle-attacks-when-using-a-cbc-based-encryption-mechanism-with-a-hsm/53322 | 2023-04-20T19:03:10.324Z | 2023-05-01T19:41:17.600Z | 2023-05-01T19:41:17.600Z | {'Vendor': 'HashiCorp', 'Product': 'Vault Enterprise', 'Versions': '1.13.0'} |
CVE-2023-2894 | The WP EasyCart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.4.8. This is due to missing or incorrect nonce validation on the process_bulk_deactivate_product function. This makes it possible for unauthenticated attackers to bulk deactivate products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/a68b8df9-9b50-4617-9308-76a2a9036d7a?source=cve | 2023-05-25T16:16:18.586Z | 2023-06-09T06:48:48.886Z | 2023-06-09T06:48:48.886Z | {'Vendor': 'levelfourstorefront', 'Product': 'Shopping Cart & eCommerce Store', 'Versions': '*'} |
CVE-2023-2744 | The ERP WordPress plugin before 1.12.4 does not properly sanitise and escape the `type` parameter in the `erp/v1/accounting/v1/people` REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin. | https://wpscan.com/vulnerability/435da8a1-9955-46d7-a508-b5738259e731 | 2023-05-16T19:19:15.835Z | 2023-06-27T13:17:11.163Z | 2023-06-27T13:17:11.163Z | {'Vendor': 'Unknown', 'Product': 'WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting', 'Versions': '0'} |
CVE-2023-2314 | Insufficient data validation in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low) | https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html | 2023-04-26T18:49:35.630Z | 2023-07-28T23:26:55.094Z | 2023-07-28T23:26:55.094Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'} |
CVE-2023-2601 | The wpbrutalai WordPress plugin before 2.0.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by admin via CSRF. | https://wpscan.com/vulnerability/57769468-3802-4985-bf5e-44ec1d59f5fd | 2023-05-09T15:12:13.644Z | 2023-06-27T13:17:12.040Z | 2023-06-27T13:17:12.040Z | {'Vendor': 'Unknown', 'Product': 'wpbrutalai', 'Versions': '0'} |
CVE-2023-2251 | Uncaught Exception in GitHub repository eemeli/yaml prior to 2.0.0-5. | https://huntr.dev/bounties/4b494e99-5a3e-40d9-8678-277f3060e96c | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | 2023-05-08T00:00:00 | {'Vendor': 'eemeli', 'Product': 'eemeli/yaml', 'Versions': 'unspecified'} |
CVE-2023-2085 | The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the templates function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin template information. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ad2c1ab6-5c78-4317-b5e7-c86e2eebeb4f?source=cve | 2023-04-14T20:31:21.823Z | 2023-06-09T05:33:26.919Z | 2023-06-09T05:33:26.919Z | {'Vendor': 'wpdevteam', 'Product': 'Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates', 'Versions': '*'} |
CVE-2023-2986 | The Abandoned Cart Lite for WooCommerce plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.14.2. This is due to insufficient encryption on the user being supplied during the abandoned cart link decode through the plugin. This allows unauthenticated attackers to log in as users who have abandoned the cart, who are typically customers. Further security hardening was introduced in version 5.15.1 that ensures sites are no longer vulnerable through historical check-out links, and additional hardening was introduced in version 5.15.2 that ensured null key values wouldn't permit the authentication bypass. | https://www.wordfence.com/threat-intel/vulnerabilities/id/68052614-204f-4237-af0e-4b8210ebd59f?source=cve | 2023-05-30T14:08:19.514Z | 2023-06-08T01:56:22.856Z | 2023-06-23T15:52:14.732Z | {'Vendor': 'tychesoftwares', 'Product': 'Abandoned Cart Lite for WooCommerce', 'Versions': '*'} |
CVE-2023-2590 | Missing Authorization in GitHub repository answerdev/answer prior to 1.0.9. | https://huntr.dev/bounties/a4238a30-3ddb-4415-9055-e179c3d4dea7 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | {'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'} |
CVE-2023-2343 | Cross-site Scripting (XSS) - DOM in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/2fa17227-a717-4b66-ab5a-16bffbb4edb2 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | 2023-04-27T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2713 | Authorization Bypass Through User-Controlled Key vulnerability in "Rental Module" developed by third-party for Ideasoft's E-commerce Platform allows Authentication Abuse, Authentication Bypass.This issue affects Rental Module: before 23.05.15.
| https://www.usom.gov.tr/bildirim/tr-23-0276 | 2023-05-15T13:58:04.027Z | 2023-05-20T09:52:22.896Z | 2023-07-26T09:04:54.034Z | {'Vendor': 'Unknown', 'Product': 'Rental Module', 'Versions': '0'} |
CVE-2023-2206 | A vulnerability classified as critical has been found in Campcodes Retro Basketball Shoes Online Store 1.0. This affects an unknown part of the file contactus.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226971. | https://vuldb.com/?id.226971 | 2023-04-21T06:21:22.237Z | 2023-04-21T07:31:03.384Z | 2023-10-22T14:36:42.010Z | {'Vendor': 'Campcodes', 'Product': 'Retro Basketball Shoes Online Store', 'Versions': '1.0'} |
CVE-2023-2656 | A vulnerability classified as critical has been found in SourceCodester AC Repair and Services System 1.0. Affected is an unknown function of the file /classes/Master.php?f=delete_service. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-228798 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.228798 | 2023-05-11T12:53:15.061Z | 2023-05-11T13:00:04.868Z | 2023-10-23T05:50:23.894Z | {'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'} |
CVE-2023-2990 | Fortra Globalscape EFT versions before 8.1.0.16 suffer from a denial of service vulnerability, where a compressed message that decompresses to itself can cause infinite recursion and crash the service
| https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/ | 2023-05-30T15:58:56.752Z | 2023-06-22T19:17:28.531Z | 2023-06-22T19:17:28.531Z | {'Vendor': 'Fortra', 'Product': 'Globalscape EFT', 'Versions': '8.0.0'} |
CVE-2023-2139 |
A reflected Cross-site Scripting (XSS) Vulnerability in DELMIA Apriso Release 2017 through Release 2022 allows an attacker to execute arbitrary script code.
| https://www.3ds.com/vulnerability/advisories | 2023-04-18T07:52:15.175Z | 2023-04-21T15:44:51.948Z | 2023-04-21T15:46:00.830Z | {'Vendor': 'Dassault Systèmes', 'Product': 'DELMIA Apriso', 'Versions': 'Apriso 2017 Golden, Apriso 2018 Golden, Apriso 2019 Golden, Apriso 2020 Golden, Apriso 2021 Golden, Apriso 2022 Golden'} |
CVE-2023-2569 |
A CWE-787: Out-of-Bounds Write vulnerability exists that could cause local denial-of-service,
elevation of privilege, and potentially kernel execution when a malicious actor with local user
access crafts a script/program using an IOCTL call in the Foxboro.sys driver.
| https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-164-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-164-04.pdf | 2023-05-08T09:53:24.084Z | 2023-06-14T07:50:11.254Z | 2023-06-14T07:50:11.254Z | {'Vendor': 'Schneider Electric', 'Product': 'EcoStruxure Foxboro DCS Control Core Services', 'Versions': 'All versions prior to patch HF9857795'} |
CVE-2023-2093 | A vulnerability, which was classified as critical, was found in SourceCodester Vehicle Service Management System 1.0. This affects an unknown part of the file /classes/Login.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226101 was assigned to this vulnerability. | https://vuldb.com/?id.226101 | 2023-04-15T09:11:36.478Z | 2023-04-15T10:00:06.190Z | 2023-10-22T14:04:57.869Z | {'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'} |
CVE-2023-2586 |
Teltonika’s Remote Management System versions 4.14.0 is vulnerable to an unauthorized attacker registering previously unregistered devices through the RMS platform. If the user has not disabled the "RMS management feature" enabled by default, then an attacker could register that device to themselves. This could enable the attacker to perform different operations on the user's devices, including remote code execution with 'root' privileges (using the 'Task Manager' feature on RMS).
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08 | 2023-05-08T22:09:41.566Z | 2023-05-22T15:05:15.519Z | 2023-05-22T15:05:15.519Z | {'Vendor': 'Teltonika', 'Product': 'Remote Management System', 'Versions': '0'} |
CVE-2023-2705 | The gAppointments WordPress plugin before 1.10.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against admin | https://wpscan.com/vulnerability/0b3c83ad-d490-4ca3-8589-39163ea5e24b | 2023-05-15T12:17:32.551Z | 2023-09-11T19:46:06.500Z | 2023-09-11T19:46:06.500Z | {'Vendor': 'Unknown', 'Product': 'gAppointments', 'Versions': '0'} |
CVE-2023-2355 | Local privilege escalation due to a DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 3900. | https://security-advisory.acronis.com/advisories/SEC-4048 | 2023-04-27T17:41:37.597Z | 2023-04-27T18:45:26.176Z | 2023-04-27T18:45:26.176Z | {'Vendor': 'Acronis', 'Product': 'Acronis Snap Deploy', 'Versions': 'unspecified'} |
CVE-2023-2640 | On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks. | https://ubuntu.com/security/notices/USN-6250-1 | 2023-05-10T21:23:35.226Z | 2023-07-26T01:59:23.543Z | 2023-07-26T01:59:23.543Z | {'Vendor': 'Canonical', 'Product': 'Ubuntu Kernel', 'Versions': '0, 0, 0'} |
CVE-2023-2210 | A vulnerability has been found in Campcodes Coffee Shop POS System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/categories/view_category.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226975. | https://vuldb.com/?id.226975 | 2023-04-21T06:28:54.316Z | 2023-04-21T08:31:03.116Z | 2023-10-22T14:41:35.449Z | {'Vendor': 'Campcodes', 'Product': 'Coffee Shop POS System', 'Versions': '1.0'} |
CVE-2023-2494 | The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'process_postdata' function in versions up to, and including, 3.3.19. This makes it possible for authenticated attackers with a role that the administrator previously granted access to the plugin to modify access to the plugin when it should only be the administrator's privilege. | https://www.wordfence.com/threat-intel/vulnerabilities/id/5779914a-a168-4835-8aea-e0ab2b3be4f6?source=cve | 2023-05-03T13:52:10.836Z | 2023-05-23T23:36:47.546Z | 2023-05-23T23:36:47.546Z | {'Vendor': 'Granth', 'Product': 'Go Pricing - WordPress Responsive Pricing Tables', 'Versions': '*'} |
CVE-2023-2882 | Generation of Incorrect Security Tokens vulnerability in CBOT Chatbot allows Token Impersonation, Privilege Abuse.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.
| https://www.usom.gov.tr/bildirim/tr-23-0293 | 2023-05-25T08:03:24.288Z | 2023-05-25T08:18:23.610Z | 2023-07-26T09:05:26.893Z | {'Vendor': 'CBOT', 'Product': 'Chatbot', 'Versions': '0'} |
CVE-2023-2928 | A vulnerability was found in DedeCMS up to 5.7.106. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file uploads/dede/article_allowurl_edit.php. The manipulation of the argument allurls leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230083. | https://vuldb.com/?id.230083 | 2023-05-27T07:41:00.886Z | 2023-05-27T09:31:02.849Z | 2023-10-23T07:18:15.711Z | {'Vendor': 'n/a', 'Product': 'DedeCMS', 'Versions': '5.7.106'} |
CVE-2023-2181 | An issue has been discovered in GitLab affecting all versions before 15.9.8, 15.10.0 before 15.10.7, and 15.11.0 before 15.11.3. A malicious developer could use a git feature called refs/replace to smuggle content into a merge request which would not be visible during review in the UI. | https://gitlab.com/gitlab-org/gitlab/-/issues/407859 | 2023-04-19T00:00:00 | 2023-05-12T00:00:00 | 2023-05-12T00:00:00 | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '<15.9.8, >=15.10, <15.10.7, >=15.11, <15.11.3'} |
CVE-2023-2302 | The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 2.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/4dfc237a-9157-4da9-ba8f-9daf2ba4f20b?source=cve | 2023-04-26T12:31:49.204Z | 2023-06-03T04:35:14.577Z | 2023-06-03T04:35:14.577Z | {'Vendor': 'vcita', 'Product': 'Contact Form and Calls To Action by vcita', 'Versions': '*'} |
CVE-2023-2752 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta. | https://huntr.dev/bounties/efdf5b24-6d30-4d57-a5b0-13b253ba3ea4 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-2247 | In affected versions of Octopus Deploy it is possible to unmask variable secrets using the variable preview function
| https://advisories.octopus.com/post/2023/sa2023-07/ | 2023-04-24T00:00:00 | 2023-05-02T00:00:00 | 2023-12-14T07:10:25.398Z | {'Vendor': 'Octopus Deploy', 'Product': 'Octopus Server', 'Versions': '2018.3.0, unspecified, unspecified, unspecified'} |
CVE-2023-2617 | A vulnerability classified as problematic was found in OpenCV wechat_qrcode Module up to 4.7.0. Affected by this vulnerability is the function DecodedBitStreamParser::decodeByteSegment of the file qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-228547. | https://vuldb.com/?id.228547 | 2023-05-10T05:06:27.204Z | 2023-05-10T05:31:03.420Z | 2023-10-23T05:33:19.516Z | {'Vendor': 'OpenCV', 'Product': 'wechat_qrcode Module', 'Versions': '4.0, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6, 4.7'} |
CVE-2023-2953 | A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function. | https://bugs.openldap.org/show_bug.cgi?id=9904 | 2023-05-29T00:00:00 | 2023-05-30T00:00:00 | 2023-07-25T00:00:00 | {'Vendor': 'n/a', 'Product': 'openldap', 'Versions': 'openldap-2.4'} |
CVE-2023-2400 | Improper deletion of resource in the user management feature in Devolutions Server 2023.1.8 and earlier allows an administrator to view users vaults of deleted users via database access.
| https://devolutions.net/security/advisories/DEVO-2023-0014 | 2023-04-28T13:17:13.624Z | 2023-06-20T16:19:50.629Z | 2023-06-20T16:19:50.629Z | {'Vendor': 'Devolutions', 'Product': 'Server', 'Versions': '0'} |
CVE-2023-2050 | A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/positions_add.php. The manipulation of the argument description leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225935. | https://vuldb.com/?id.225935 | 2023-04-14T07:41:50.957Z | 2023-04-14T11:31:03.679Z | 2023-10-22T09:56:12.610Z | {'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'} |
CVE-2023-2545 | The Feather Login Page plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'getListOfUsers' function in versions starting from 1.0.7 up to, and including, 1.1.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to access the login links, which can be used for privilege escalation. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b2ab2178-7438-43ef-961e-b54d0d230f4a?source=cve | 2023-05-05T17:11:22.662Z | 2023-05-31T02:40:21.280Z | 2023-05-31T02:40:21.280Z | {'Vendor': 'featherplugins', 'Product': 'Custom Login Page | Temporary Users | Rebrand Login | Login Captcha', 'Versions': '1.0.7'} |
CVE-2023-2816 | Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies. | https://discuss.hashicorp.com/t/hcsec-2023-16-consul-envoy-extension-downstream-proxy-configuration-by-upstream-service-owner/54525 | 2023-05-19T18:11:06.618Z | 2023-06-02T22:43:34.553Z | 2023-06-02T22:43:34.553Z | {'Vendor': 'HashiCorp', 'Product': 'Consul', 'Versions': '1.15.0, 1.15.1, 1.15.2'} |
CVE-2023-2396 | A vulnerability classified as problematic was found in Netgear SRX5308 up to 4.3.5-3. This vulnerability affects unknown code of the component Web Management Interface. The manipulation of the argument USERDBUsers.Password leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227674 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.227674 | 2023-04-28T11:49:10.800Z | 2023-04-28T22:00:05.104Z | 2023-10-22T18:58:41.057Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2379 | A vulnerability classified as critical has been found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. This affects an unknown part of the component Web Service. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227655. | https://vuldb.com/?id.227655 | 2023-04-28T11:30:10.404Z | 2023-04-28T16:31:03.591Z | 2023-10-22T18:37:57.257Z | {'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.0, 2.0.9-hotfix.1, 2.0.9-hotfix.2, 2.0.9-hotfix.3, 2.0.9-hotfix.4, 2.0.9-hotfix.5, 2.0.9-hotfix.6'} |
CVE-2023-2683 |
A memory leak in the EFR32 Bluetooth LE stack 5.1.0 through 5.1.1 allows an attacker to send an invalid pairing message and cause future legitimate connection attempts to fail. A reset of the device immediately clears the error.
| https://github.com/SiliconLabs | 2023-05-12T13:32:54.352Z | 2023-06-15T19:05:21.365Z | 2023-06-15T19:05:21.365Z | {'Vendor': 'silabs.com', 'Product': 'Bluetooth SDK', 'Versions': '5.0.0'} |
CVE-2023-2729 | Use of insufficiently random values vulnerability in User Management Functionality in Synology DiskStation Manager (DSM) before 7.2-64561 allows remote attackers to obtain user credential via unspecified vectors. | https://www.synology.com/en-global/security/advisory/Synology_SA_23_07 | 2023-05-16T03:36:11.521Z | 2023-06-13T07:11:54.850Z | 2023-06-13T11:14:57.295Z | {'Vendor': 'Synology', 'Product': 'DiskStation Manager (DSM)', 'Versions': '7.2, 7.1, 7.0, 6.2, 0'} |
CVE-2023-2007 | The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel. | https://github.com/torvalds/linux/commit/b04e75a4a8a81887386a0d2dbf605a48e779d2a0 | 2023-04-12T00:00:00 | 2023-04-24T00:00:00 | 2024-01-19T16:06:21.861961 | {'Vendor': 'n/a', 'Product': "Linux kernel's DPT I2O Controller driver", 'Versions': 'Fixed in kernel v6.0-rc1'} |
CVE-2023-2457 | Out of bounds write in ChromeOS Audio Server in Google Chrome on ChromeOS prior to 113.0.5672.114 allowed a remote attacker to potentially exploit heap corruption via crafted audio file. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-chromeos.html | 2023-05-01T23:09:48.622Z | 2023-05-12T17:36:05.679Z | 2023-05-12T17:36:05.679Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.114'} |
CVE-2023-2904 | The External Visitor Manager portal of HID’s SAFE versions 5.8.0 through 5.11.3 are vulnerable to manipulation within web fields in the application programmable interface (API). An attacker could log in using account credentials available through a request generated by an internal user and then manipulate the visitor-id within the web API to access the personal data of other users. There is no limit on the number of requests that can be made to the HID SAFE Web Server, so an attacker could also exploit this vulnerability to create a denial-of-service condition.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-152-02 | 2023-05-25T22:32:37.541Z | 2023-06-07T21:59:24.478Z | 2023-06-29T20:58:27.466Z | {'Vendor': 'HID Global', 'Product': 'SAFE', 'Versions': '5.8.0'} |
CVE-2023-2841 | The Advanced Local Pickup for WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the id parameter in versions up to, and including, 1.5.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with admin-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/125e7ea3-574a-4760-b10b-7a98d94c87a5?source=cve | 2023-05-22T17:51:43.587Z | 2023-11-22T15:33:19.683Z | 2023-11-22T15:33:19.683Z | {'Vendor': 'zorem', 'Product': 'Advanced Local Pickup for WooCommerce', 'Versions': '*'} |
CVE-2023-2512 | Prior to version v1.20230419.0, the FormData API implementation was subject to an integer overflow. If a FormData instance contained more than 2^31 elements, the forEach() method could end up reading from the wrong location in memory while iterating over elements. This would most likely lead to a segmentation fault, but could theoretically allow arbitrary undefined behavior.
In order for the bug to be exploitable, the process would need to be able to allocate 160GB of RAM. Due to this, the bug was never exploitable on the Cloudflare Workers platform, but could theoretically be exploitable on deployments of workerd running on machines with a huge amount of memory. Moreover, in order to be remotely exploited, an attacker would have to upload a single form-encoded HTTP request of at least tens of gigabytes in size. The application code would then have to use request.formData() to parse the request and formData.forEach() to iterate over this data. Due to these limitations, the exploitation likelihood was considered Low.
A fix that addresses this vulnerability has been released in version v1.20230419.0 and users are encouraged to update to the latest version available.
| https://github.com/cloudflare/workerd/releases/tag/v1.20230419.0 | 2023-05-04T08:31:01.013Z | 2023-05-12T10:09:06.905Z | 2023-05-12T10:10:21.870Z | {'Vendor': 'Cloudflare', 'Product': 'workerd', 'Versions': 'v1.20221108.0'} |
Subsets and Splits