CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-2155
A vulnerability was found in SourceCodester Air Cargo Management System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file classes/Master.php?f=save_cargo_type. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226276.
https://vuldb.com/?id.226276
2023-04-18T11:17:02.557Z
2023-04-18T14:31:03.901Z
2023-10-22T14:33:01.430Z
{'Vendor': 'SourceCodester', 'Product': 'Air Cargo Management System', 'Versions': '1.0'}
CVE-2023-2856
VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
https://www.wireshark.org/security/wnpa-sec-2023-16.html
2023-05-24T00:00:00
2023-05-26T00:00:00
2023-09-17T06:06:23.392046
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.6, >=3.6.0, <3.6.14'}
CVE-2023-2790
A vulnerability classified as problematic has been found in TOTOLINK N200RE 9.3.5u.6255_B20211224. Affected is an unknown function of the file /squashfs-root/etc_ro/custom.conf of the component Telnet Service. The manipulation leads to password in configuration file. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-229374 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.229374
2023-05-18T12:08:59.033Z
2023-05-18T12:31:04.424Z
2023-10-23T06:41:40.586Z
{'Vendor': 'TOTOLINK', 'Product': 'N200RE', 'Versions': '9.3.5u.6255_B20211224'}
CVE-2023-2285
The WP Activity Log Premium plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.0. This is due to missing or incorrect nonce validation on the ajax_switch_db function. This makes it possible for unauthenticated attackers to make changes to the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4c659f6d-e02b-42ab-ba02-eb9b00602ad4?source=cve
2023-04-25T19:26:20.272Z
2023-06-09T12:31:59.732Z
2023-06-09T12:31:59.732Z
{'Vendor': 'wpwhitesecurity', 'Product': 'WP Activity Log Premium', 'Versions': '*'}
CVE-2023-2006
A race condition was found in the Linux kernel's RxRPC network protocol, within the processing of RxRPC bundles. This issue results from the lack of proper locking when performing operations on an object. This may allow an attacker to escalate privileges and execute arbitrary code in the context of the kernel.
https://bugzilla.redhat.com/show_bug.cgi?id=2189112
2023-04-12T00:00:00
2023-04-24T00:00:00
2023-06-09T00:00:00
{'Vendor': 'n/a', 'Product': "Linux kernel's RxRPC network protocol", 'Versions': 'Fixed in kernel v6.1-rc7'}
CVE-2023-2905
Due to a failure in validating the length of a provided MQTT_CMD_PUBLISH parsed message with a variable length header, Cesanta Mongoose, an embeddable web server, version 7.10 is susceptible to a heap-based buffer overflow vulnerability in the default configuration. Version 7.9 and prior does not appear to be vulnerable. This issue is resolved in version 7.11.
https://takeonme.org/cves/CVE-2023-2905.html
2023-05-26T00:46:11.667Z
2023-08-09T04:46:14.972Z
2023-08-09T04:46:14.972Z
{'Vendor': 'Cesanta', 'Product': 'Mongoose', 'Versions': '7.10, 7.11'}
CVE-2023-2840
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2.
https://huntr.dev/bounties/21926fc2-6eb1-4e24-8a36-e60f487d0257
2023-05-22T00:00:00
2023-05-22T00:00:00
2023-05-27T00:00:00
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
CVE-2023-2143
The Enable SVG, WebP & ICO Upload WordPress plugin through 1.0.3 does not sanitize SVG file contents, leading to a Cross-Site Scripting vulnerability.
https://wpscan.com/vulnerability/91898762-aa7d-4fbc-a016-3de48901e5de
2023-04-18T10:17:47.588Z
2023-07-17T13:29:52.707Z
2023-07-17T13:29:52.707Z
{'Vendor': 'Unknown', 'Product': 'Enable SVG, WebP & ICO Upload', 'Versions': '0'}
CVE-2023-2513
A use-after-free vulnerability was found in the Linux kernel's ext4 filesystem in the way it handled the extra inode size for extended attributes. This flaw could allow a privileged local user to cause a system crash or other undefined behaviors.
https://lore.kernel.org/all/20220616021358.2504451-1-libaokun1%40huawei.com/
2023-05-04T00:00:00
2023-05-08T00:00:00
2023-05-08T00:00:00
{'Vendor': 'n/a', 'Product': 'Linux kernel ext4 filesystem', 'Versions': 'Fixed in kernel 6.0-rc1'}
CVE-2023-2397
A vulnerability, which was classified as problematic, has been found in SourceCodester Simple Mobile Comparison Website 1.0. This issue affects some unknown processing of the file classes/Master.php?f=save_field. The manipulation of the argument Field Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227675.
https://vuldb.com/?id.227675
2023-04-28T11:49:15.768Z
2023-04-28T22:00:06.520Z
2023-10-22T18:59:54.231Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Mobile Comparison Website', 'Versions': '1.0'}
CVE-2023-2378
A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. It has been rated as critical. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation of the argument suffix-rate-up leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227654 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.227654
2023-04-28T11:30:06.728Z
2023-04-28T16:00:04.575Z
2023-10-22T18:36:44.132Z
{'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.0, 2.0.9-hotfix.1, 2.0.9-hotfix.2, 2.0.9-hotfix.3, 2.0.9-hotfix.4, 2.0.9-hotfix.5, 2.0.9-hotfix.6'}
CVE-2023-2682
A vulnerability was found in Caton Live up to 2023-04-26 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/ping.cgi of the component Mini_HTTPD. The manipulation of the argument address with the input ;id;uname${IFS}-a leads to command injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-228911. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.228911
2023-05-12T12:17:09.253Z
2023-05-12T12:31:06.112Z
2023-10-23T06:08:43.143Z
{'Vendor': 'Caton', 'Product': 'Live', 'Versions': '2023-04-26'}
CVE-2023-2728
Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the `kubernetes.io/enforce-mountable-secrets` annotation are used together with ephemeral containers.
https://groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
2023-05-16T00:32:00.189Z
2023-07-03T20:06:11.796Z
2023-07-03T20:06:11.796Z
{'Vendor': 'Kubernetes', 'Product': 'Kubernetes', 'Versions': 'v1.24.14, v1.25.0 - v1.25.10, v1.26.0 - v1.26.5, v1.27.0 - v1.27.2'}
CVE-2023-2952
XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
https://www.wireshark.org/security/wnpa-sec-2023-20.html
2023-05-29T00:00:00
2023-05-30T00:00:00
2023-09-17T06:06:16.682771
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '>=4.0.0, <4.0.6, >=3.6.0, <3.6.14'}
CVE-2023-2401
The QuBot WordPress plugin before 1.1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/0746ea56-dd88-4fc3-86a3-54408eef1f94
2023-04-28T13:29:32.372Z
2023-06-19T10:52:46.396Z
2023-06-19T10:52:46.396Z
{'Vendor': 'Unknown', 'Product': 'QuBot', 'Versions': '0'}
CVE-2023-2051
A vulnerability classified as critical has been found in Campcodes Advanced Online Voting System 1.0. Affected is an unknown function of the file /admin/positions_row.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225936.
https://vuldb.com/?id.225936
2023-04-14T07:41:55.673Z
2023-04-14T11:31:04.754Z
2023-10-22T09:57:25.748Z
{'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'}
CVE-2023-2544
Authorization bypass vulnerability in UPV PEIX, affecting the component "pdf_curri_new.php". Through a POST request, an authenticated user could change the ID parameter to retrieve all the stored information of other registered users.
https://www.incibe.es/en/incibe-cert/notices/aviso/authorization-bypass-upv-peix
2023-05-05T10:22:39.108Z
2023-10-03T13:03:13.218Z
2023-10-03T13:03:13.218Z
{'Vendor': 'Universitat Politècnica de València (UPV)', 'Product': 'UPV PEIX', 'Versions': '0'}
CVE-2023-2114
The NEX-Forms WordPress plugin before 8.4 does not properly escape the `table` parameter, which is populated with user input, before concatenating it to an SQL query.
https://wpscan.com/vulnerability/3d8ab3a5-1bf8-4216-91fa-e89541e5c43d
2023-04-17T09:57:53.143Z
2023-05-08T13:58:08.740Z
2023-05-08T13:58:08.740Z
{'Vendor': 'Unknown', 'Product': 'NEX-Forms', 'Versions': '0'}
CVE-2023-2817
A post-authentication stored cross-site scripting vulnerability exists in Craft CMS versions <= 4.4.11. HTML, including script tags can be injected into field names which, when the field is added to a category or section, will trigger when users visit the Categories or Entries pages respectively.
https://www.tenable.com/security/research/tra-2023-20%2C
2023-05-19T00:00:00
2023-05-26T00:00:00
2023-05-26T00:00:00
{'Vendor': 'n/a', 'Product': 'Craft CMS', 'Versions': 'versions prior or equal to version 4.4.11'}
CVE-2023-2303
The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.6.4. This is due to missing nonce validation in the vcita-callback.php file. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/2345c972-9fd4-4709-8bde-315ab54f60e2?source=cve
2023-04-26T12:33:54.006Z
2023-06-03T04:35:13.759Z
2023-06-03T04:35:13.759Z
{'Vendor': 'eyale-vc', 'Product': 'Contact Form Builder by vcita', 'Versions': '*'}
CVE-2023-2753
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.
https://huntr.dev/bounties/eca2284d-e81a-4ab8-91bb-7afeca557628
2023-05-17T00:00:00
2023-05-17T00:00:00
2023-05-17T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-2246
A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. This vulnerability affects unknown code of the file admin/ajax.php?action=save_settings. The manipulation of the argument img leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227236.
https://vuldb.com/?id.227236
2023-04-23T15:10:14.559Z
2023-04-23T15:31:04.034Z
2023-10-22T15:58:55.942Z
{'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'}
CVE-2023-2616
Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/564cb512-2bcc-4458-8c20-88110ab45801
2023-05-10T00:00:00
2023-05-10T00:00:00
2023-05-10T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2495
The Greeklish-permalink WordPress plugin through 3.3 does not implement correct authorization or nonce checks in the cyrtrans_ajax_old AJAX action, allowing unauthenticated and low-privilege users to trigger the plugin's functionality to change Post slugs either directly or through CSRF.
https://wpscan.com/vulnerability/45878983-7e9b-49c2-8f99-4c28aab24f09
2023-05-03T14:19:24.270Z
2023-07-10T12:40:36.457Z
2023-08-15T14:10:30.890Z
{'Vendor': 'Unknown', 'Product': 'Greeklish-permalink', 'Versions': '0'}
CVE-2023-2883
Authorization Bypass Through User-Controlled Key vulnerability in CBOT Chatbot allows Authentication Abuse, Authentication Bypass.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.
https://www.usom.gov.tr/bildirim/tr-23-0293
2023-05-25T08:03:26.413Z
2023-05-25T08:20:44.289Z
2023-05-25T08:20:44.289Z
{'Vendor': 'CBOT', 'Product': 'Chatbot', 'Versions': '0'}
CVE-2023-2929
Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
2023-05-27T19:39:13.428Z
2023-05-30T21:31:38.474Z
2023-05-30T21:31:38.474Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'}
CVE-2023-2180
The KIWIZ Invoices Certification & PDF System WordPress plugin through 2.1.3 does not validate the path of files to be downloaded, which could allow unauthenticated attacker to read/downlaod arbitrary files, as well as perform PHAR unserialization (assuming they can upload a file on the server)
https://wpscan.com/vulnerability/4d3b90d8-8a6d-4b72-8bc7-21f861259a1b
2023-04-19T09:48:55.861Z
2023-05-15T12:15:35.070Z
2023-05-15T12:15:35.070Z
{'Vendor': 'Unknown', 'Product': 'KIWIZ Invoices Certification & PDF System', 'Versions': '0'}
CVE-2023-2704
The BP Social Connect plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.5. This is due to insufficient verification on the user being supplied during a Facebook login through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email.
https://www.wordfence.com/threat-intel/vulnerabilities/id/44c96df2-530a-4ebe-b722-c606a7b135f9?source=cve
2023-05-15T12:01:40.971Z
2023-05-19T02:03:19.169Z
2023-06-05T21:25:44.536Z
{'Vendor': 'vibethemes', 'Product': 'BP Social Connect', 'Versions': '*'}
CVE-2023-2354
The CHP Ads Block Detector plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings reachable though an AJAX action in versions up to, and including, 3.9.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/6f8514c9-0e11-4e26-ba0b-1d08a990b56c?source=cve
2023-04-27T15:55:18.622Z
2023-08-31T05:33:10.827Z
2023-08-31T05:33:10.827Z
{'Vendor': 'sureshchand12a', 'Product': 'CHP Ads Block Detector', 'Versions': '*'}
CVE-2023-2641
A vulnerability was found in SourceCodester Online Internship Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file admin/login.php of the component POST Parameter Handler. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-228770 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.228770
2023-05-11T05:16:09.357Z
2023-05-11T05:31:03.735Z
2023-10-23T05:36:59.008Z
{'Vendor': 'SourceCodester', 'Product': 'Online Internship Management System', 'Versions': '1.0'}
CVE-2023-2211
A vulnerability was found in Campcodes Coffee Shop POS System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/categories/manage_category.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226976.
https://vuldb.com/?id.226976
2023-04-21T06:28:57.899Z
2023-04-21T09:00:05.645Z
2023-10-22T14:42:48.663Z
{'Vendor': 'Campcodes', 'Product': 'Coffee Shop POS System', 'Versions': '1.0'}
CVE-2023-2991
Fortra Globalscape EFT's administration server suffers from an information disclosure vulnerability where the serial number of the harddrive that Globalscape is installed on can be remotely determined via a "trial extension request" message
https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/
2023-05-30T15:58:57.699Z
2023-06-22T19:22:24.434Z
2023-06-22T19:22:24.434Z
{'Vendor': 'Fortra', 'Product': 'Globalscape EFT', 'Versions': '8.0.0'}
CVE-2023-2138
Use of Hard-coded Credentials in GitHub repository nuxtlabs/github-module prior to 1.6.2.
https://huntr.dev/bounties/65096ef9-eafc-49da-b49a-5b88c0203ca6
2023-04-18T00:00:00
2023-04-18T00:00:00
2023-04-18T00:00:00
{'Vendor': 'nuxtlabs', 'Product': 'nuxtlabs/github-module', 'Versions': 'unspecified'}
CVE-2023-2568
The Photo Gallery by Ays WordPress plugin before 5.1.7 does not escape some parameters before outputting it back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/b1704a12-459b-4f5d-aa2d-a96646ddaf3e
2023-05-08T09:43:38.240Z
2023-06-12T17:28:23.093Z
2023-06-12T17:28:23.093Z
{'Vendor': 'Unknown', 'Product': 'Photo Gallery by Ays', 'Versions': '0'}
CVE-2023-2092
A vulnerability, which was classified as critical, has been found in SourceCodester Vehicle Service Management System 1.0. Affected by this issue is some unknown functionality of the file view_service.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226100.
https://vuldb.com/?id.226100
2023-04-15T09:11:34.504Z
2023-04-15T09:31:03.458Z
2023-10-22T14:03:44.652Z
{'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'}
CVE-2023-2587
Teltonika’s Remote Management System versions prior to 4.10.0 contain a cross-site scripting (XSS) vulnerability in the main page of the web interface. An attacker with the MAC address and serial number of a connected device could send a maliciously crafted JSON file with an HTML object to trigger the vulnerability. This could allow the attacker to execute scripts in the account context and obtain remote code execution on managed devices.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08
2023-05-08T22:09:42.680Z
2023-05-22T15:06:30.677Z
2023-05-22T15:06:30.677Z
{'Vendor': 'Teltonika', 'Product': 'Remote Management System', 'Versions': '0'}
CVE-2023-2342
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/01cd3ed5-dce8-4021-9de0-81cb14bf1829
2023-04-27T00:00:00
2023-04-27T00:00:00
2023-04-27T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2712
Unrestricted Upload of File with Dangerous Type vulnerability in "Rental Module" developed by third-party for Ideasoft's E-commerce Platform allows Command Injection, Using Malicious Files, Upload a Web Shell to a Web Server.This issue affects Rental Module: before 23.05.15.
https://www.usom.gov.tr/bildirim/tr-23-0276
2023-05-15T13:58:02.132Z
2023-05-20T09:49:53.583Z
2023-07-26T09:04:37.601Z
{'Vendor': 'Unknown', 'Product': 'Rental Module', 'Versions': '0'}
CVE-2023-2207
A vulnerability classified as critical was found in Campcodes Retro Basketball Shoes Online Store 1.0. This vulnerability affects unknown code of the file contactus1.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-226972.
https://vuldb.com/?id.226972
2023-04-21T06:21:25.652Z
2023-04-21T07:31:04.400Z
2023-10-22T14:37:55.452Z
{'Vendor': 'Campcodes', 'Product': 'Retro Basketball Shoes Online Store', 'Versions': '1.0'}
CVE-2023-2657
A vulnerability classified as problematic was found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this vulnerability is an unknown functionality of the file products.php. The manipulation of the argument search leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228799.
https://vuldb.com/?id.228799
2023-05-11T13:01:29.025Z
2023-05-11T13:31:04.095Z
2023-10-23T05:51:37.026Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
CVE-2023-2084
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the get function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin settings. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
https://www.wordfence.com/threat-intel/vulnerabilities/id/0be8c668-0f1c-4f83-8a71-49c8bb9b67ae?source=cve
2023-04-14T20:31:06.873Z
2023-06-09T05:33:10.327Z
2023-06-09T05:33:10.327Z
{'Vendor': 'wpdevteam', 'Product': 'Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates', 'Versions': '*'}
CVE-2023-2987
The Wordapp plugin for WordPress is vulnerable to authorization bypass due to an use of insufficiently unique cryptographic signature on the 'wa_pdx_op_config_set' function in versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to the plugin to change the 'validation_token' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation.
https://www.wordfence.com/threat-intel/vulnerabilities/id/80440bfa-4a02-4441-bbdb-52d7dd065a9d?source=cve
2023-05-30T14:13:59.154Z
2023-05-31T02:40:20.868Z
2023-05-31T02:40:20.868Z
{'Vendor': 'wordapp', 'Product': 'Wordapp', 'Versions': '*'}
CVE-2023-2968
A remote attacker can trigger a denial of service in the socket.remoteAddress variable, by sending a crafted HTTP request. Usage of the undefined variable raises a TypeError exception.
https://research.jfrog.com/vulnerabilities/undefined-variable-usage-in-proxy-leads-to-remote-denial-of-service-xray-520917
2023-05-29T21:15:17.688Z
2023-05-30T17:37:45.166Z
2023-05-30T17:37:45.166Z
{'Vendor': '', 'Product': '', 'Versions': '0'}
CVE-2023-2591
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in GitHub repository nilsteampassnet/teampass prior to 3.0.7.
https://huntr.dev/bounties/705f79f4-f5e3-41d7-82a5-f00441cd984b
2023-05-09T00:00:00
2023-05-09T00:00:00
2023-05-15T00:00:00
{'Vendor': 'nilsteampassnet', 'Product': 'nilsteampassnet/teampass', 'Versions': 'unspecified'}
CVE-2023-2745
WordPress Core is vulnerable to Directory Traversal in versions up to, and including, 6.2, via the ‘wp_lang’ parameter. This allows unauthenticated attackers to access and load arbitrary translation files. In cases where an attacker is able to upload a crafted translation file onto the site, such as via an upload form, this could be also used to perform a Cross-Site Scripting attack.
https://www.wordfence.com/threat-intel/vulnerabilities/id/edcf46b6-368e-49c0-b2c3-99bf6e2d358f?source=cve
2023-05-16T19:53:02.398Z
2023-05-17T08:36:44.034Z
2023-05-17T08:36:44.034Z
{'Vendor': 'WordPress Foundation', 'Product': 'WordPress', 'Versions': '*, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6, 4.7, 4.8, 4.9, 5.0, 5.1, 5.2, 5.3, 5.4, 5.5, 5.6, 5.7, 5.8, 5.9, 6.0, 6.1, 6.2'}
CVE-2023-2315
Path Traversal in OpenCart versions 4.0.0.0 to 4.0.2.2 allows an authenticated user with access/modify privilege on the Log component to empty out arbitrary files on the server
https://starlabs.sg/advisories/23/23-2315/
2023-04-27T03:23:57.023Z
2023-09-26T04:36:21.668Z
2023-09-26T04:36:21.668Z
{'Vendor': 'Opencart', 'Product': 'Opencart', 'Versions': '4.0.0.0'}
CVE-2023-2600
The Custom Base Terms WordPress plugin before 1.0.3 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/8e1d65c3-14e4-482f-ae9e-323e847a8613
2023-05-09T14:54:08.567Z
2023-06-19T10:52:47.286Z
2023-06-19T10:52:47.286Z
{'Vendor': 'Unknown', 'Product': 'Custom Base Terms', 'Versions': '0'}
CVE-2023-2250
A flaw was found in the Open Cluster Management (OCM) when a user have access to the worker nodes which has the cluster-manager-registration-controller or cluster-manager deployments. A malicious user can take advantage of this and bind the cluster-admin to any service account or using the service account to list all secrets for all kubernetes namespaces, leading into a cluster-level privilege escalation.
https://github.com/open-cluster-management-io/registration-operator/pull/344
2023-04-24T00:00:00
2023-04-24T00:00:00
2023-04-24T00:00:00
{'Vendor': 'n/a', 'Product': 'MCE', 'Versions': '2.3.0'}
CVE-2023-2179
The WooCommerce Order Status Change Notifier WordPress plugin through 1.1.0 does not have authorisation and CSRF when updating status orders via an AJAX action available to any authenticated users, which could allow low privilege users such as subscriber to update arbitrary order status, making them paid without actually paying for them for example
https://wpscan.com/vulnerability/fbc56973-4225-4f44-8c38-d488e57cd551
2023-04-19T09:47:37.440Z
2023-05-15T12:15:35.876Z
2023-05-15T12:15:35.876Z
{'Vendor': 'Unknown', 'Product': 'WooCommerce Order Status Change Notifier', 'Versions': '0'}
CVE-2023-2483
null
null
2023-05-02T00:00:00
null
2023-05-23T00:00:00
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-2529
The Enable SVG Uploads WordPress plugin through 2.1.5 does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads.
https://wpscan.com/vulnerability/4ac03907-2373-48f0-bca1-8f7073c06b18
2023-05-04T19:17:32.491Z
2023-07-10T12:40:43.491Z
2023-07-10T13:05:46.674Z
{'Vendor': 'Unknown', 'Product': 'Enable SVG Uploads', 'Versions': '0'}
CVE-2023-2196
A missing permission check in Jenkins Code Dx Plugin 3.1.0 and earlier allows attackers with Item/Read permission to check for the existence of an attacker-specified file path on an agent file system.
https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3145
2023-04-20T18:13:36.647Z
2023-05-16T17:46:59.742Z
2023-05-16T17:46:59.742Z
{'Vendor': 'Jenkins', 'Product': 'Jenkins Code Dx Plugin', 'Versions': '0'}
CVE-2023-2895
The WP EasyCart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.4.8. This is due to missing or incorrect nonce validation on the process_bulk_activate_product function. This makes it possible for unauthenticated attackers to bulk activate products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/02fd8469-cd99-42dc-9a28-c0ea08512bb0?source=cve
2023-05-25T16:16:52.256Z
2023-06-09T06:48:38.488Z
2023-06-09T06:48:38.488Z
{'Vendor': 'levelfourstorefront', 'Product': 'Shopping Cart & eCommerce Store', 'Versions': '*'}
CVE-2023-2178
The Aajoda Testimonials WordPress plugin before 2.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/e84b71f9-4208-4efb-90e8-1c778e7d2ebb
2023-04-19T09:19:35.735Z
2023-06-27T13:17:09.127Z
2023-06-27T13:17:09.127Z
{'Vendor': 'Unknown', 'Product': 'Aajoda Testimonials', 'Versions': '0'}
CVE-2023-2482
The Responsive CSS EDITOR WordPress plugin through 1.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high-privilege users such as admin.
https://wpscan.com/vulnerability/c0f73781-be7e-482e-91de-ad7991ad4bd5
2023-05-02T15:19:01.411Z
2023-06-27T13:17:10.255Z
2023-06-27T13:17:10.255Z
{'Vendor': 'Unknown', 'Product': 'Responsive CSS EDITOR', 'Versions': '0'}
CVE-2023-2528
The Contact Form by Supsystic plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.24. This is due to missing or incorrect nonce validation on the AJAX action handler. This makes it possible for unauthenticated attackers to execute AJAX actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/1c387b07-baf6-4c62-943e-4bd121160ceb?source=cve
2023-05-04T18:34:30.681Z
2023-05-16T23:35:31.193Z
2023-05-16T23:35:31.193Z
{'Vendor': 'supsysticcom', 'Product': 'Contact Form by Supsystic', 'Versions': '*'}
CVE-2023-2197
HashiCorp Vault Enterprise 1.13.0 up to 1.13.1 is vulnerable to a padding oracle attack when using an HSM in conjunction with the CKM_AES_CBC_PAD or CKM_AES_CBC encryption mechanisms. An attacker with privileges to modify storage and restart Vault may be able to intercept or modify cipher text in order to derive Vault’s root key. Fixed in 1.13.2
https://discuss.hashicorp.com/t/hcsec-2023-14-vault-enterprise-vulnerable-to-padding-oracle-attacks-when-using-a-cbc-based-encryption-mechanism-with-a-hsm/53322
2023-04-20T19:03:10.324Z
2023-05-01T19:41:17.600Z
2023-05-01T19:41:17.600Z
{'Vendor': 'HashiCorp', 'Product': 'Vault Enterprise', 'Versions': '1.13.0'}
CVE-2023-2894
The WP EasyCart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.4.8. This is due to missing or incorrect nonce validation on the process_bulk_deactivate_product function. This makes it possible for unauthenticated attackers to bulk deactivate products via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/a68b8df9-9b50-4617-9308-76a2a9036d7a?source=cve
2023-05-25T16:16:18.586Z
2023-06-09T06:48:48.886Z
2023-06-09T06:48:48.886Z
{'Vendor': 'levelfourstorefront', 'Product': 'Shopping Cart & eCommerce Store', 'Versions': '*'}
CVE-2023-2744
The ERP WordPress plugin before 1.12.4 does not properly sanitise and escape the `type` parameter in the `erp/v1/accounting/v1/people` REST API endpoint before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin.
https://wpscan.com/vulnerability/435da8a1-9955-46d7-a508-b5738259e731
2023-05-16T19:19:15.835Z
2023-06-27T13:17:11.163Z
2023-06-27T13:17:11.163Z
{'Vendor': 'Unknown', 'Product': 'WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting', 'Versions': '0'}
CVE-2023-2314
Insufficient data validation in DevTools in Google Chrome prior to 111.0.5563.64 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/03/stable-channel-update-for-desktop.html
2023-04-26T18:49:35.630Z
2023-07-28T23:26:55.094Z
2023-07-28T23:26:55.094Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '111.0.5563.64'}
CVE-2023-2601
The wpbrutalai WordPress plugin before 2.0.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by admin via CSRF.
https://wpscan.com/vulnerability/57769468-3802-4985-bf5e-44ec1d59f5fd
2023-05-09T15:12:13.644Z
2023-06-27T13:17:12.040Z
2023-06-27T13:17:12.040Z
{'Vendor': 'Unknown', 'Product': 'wpbrutalai', 'Versions': '0'}
CVE-2023-2251
Uncaught Exception in GitHub repository eemeli/yaml prior to 2.0.0-5.
https://huntr.dev/bounties/4b494e99-5a3e-40d9-8678-277f3060e96c
2023-04-24T00:00:00
2023-04-24T00:00:00
2023-05-08T00:00:00
{'Vendor': 'eemeli', 'Product': 'eemeli/yaml', 'Versions': 'unspecified'}
CVE-2023-2085
The Essential Blocks plugin for WordPress is vulnerable to unauthorized use of functionality due to a missing capability check on the templates function in versions up to, and including, 4.0.6. This makes it possible for subscriber-level attackers to obtain plugin template information. While a nonce check is present, it is only executed when a nonce is provided. Not providing a nonce results in the nonce verification to be skipped. There is no capability check.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ad2c1ab6-5c78-4317-b5e7-c86e2eebeb4f?source=cve
2023-04-14T20:31:21.823Z
2023-06-09T05:33:26.919Z
2023-06-09T05:33:26.919Z
{'Vendor': 'wpdevteam', 'Product': 'Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates', 'Versions': '*'}
CVE-2023-2986
The Abandoned Cart Lite for WooCommerce plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 5.14.2. This is due to insufficient encryption on the user being supplied during the abandoned cart link decode through the plugin. This allows unauthenticated attackers to log in as users who have abandoned the cart, who are typically customers. Further security hardening was introduced in version 5.15.1 that ensures sites are no longer vulnerable through historical check-out links, and additional hardening was introduced in version 5.15.2 that ensured null key values wouldn't permit the authentication bypass.
https://www.wordfence.com/threat-intel/vulnerabilities/id/68052614-204f-4237-af0e-4b8210ebd59f?source=cve
2023-05-30T14:08:19.514Z
2023-06-08T01:56:22.856Z
2023-06-23T15:52:14.732Z
{'Vendor': 'tychesoftwares', 'Product': 'Abandoned Cart Lite for WooCommerce', 'Versions': '*'}
CVE-2023-2590
Missing Authorization in GitHub repository answerdev/answer prior to 1.0.9.
https://huntr.dev/bounties/a4238a30-3ddb-4415-9055-e179c3d4dea7
2023-05-09T00:00:00
2023-05-09T00:00:00
2023-05-09T00:00:00
{'Vendor': 'answerdev', 'Product': 'answerdev/answer', 'Versions': 'unspecified'}
CVE-2023-2343
Cross-site Scripting (XSS) - DOM in GitHub repository pimcore/pimcore prior to 10.5.21.
https://huntr.dev/bounties/2fa17227-a717-4b66-ab5a-16bffbb4edb2
2023-04-27T00:00:00
2023-04-27T00:00:00
2023-04-27T00:00:00
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-2713
Authorization Bypass Through User-Controlled Key vulnerability in "Rental Module" developed by third-party for Ideasoft's E-commerce Platform allows Authentication Abuse, Authentication Bypass.This issue affects Rental Module: before 23.05.15.
https://www.usom.gov.tr/bildirim/tr-23-0276
2023-05-15T13:58:04.027Z
2023-05-20T09:52:22.896Z
2023-07-26T09:04:54.034Z
{'Vendor': 'Unknown', 'Product': 'Rental Module', 'Versions': '0'}
CVE-2023-2206
A vulnerability classified as critical has been found in Campcodes Retro Basketball Shoes Online Store 1.0. This affects an unknown part of the file contactus.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226971.
https://vuldb.com/?id.226971
2023-04-21T06:21:22.237Z
2023-04-21T07:31:03.384Z
2023-10-22T14:36:42.010Z
{'Vendor': 'Campcodes', 'Product': 'Retro Basketball Shoes Online Store', 'Versions': '1.0'}
CVE-2023-2656
A vulnerability classified as critical has been found in SourceCodester AC Repair and Services System 1.0. Affected is an unknown function of the file /classes/Master.php?f=delete_service. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-228798 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.228798
2023-05-11T12:53:15.061Z
2023-05-11T13:00:04.868Z
2023-10-23T05:50:23.894Z
{'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'}
CVE-2023-2990
Fortra Globalscape EFT versions before 8.1.0.16 suffer from a denial of service vulnerability, where a compressed message that decompresses to itself can cause infinite recursion and crash the service
https://www.rapid7.com/blog/post/2023/06/22/multiple-vulnerabilities-in-fortra-globalscape-eft-administration-server-fixed/
2023-05-30T15:58:56.752Z
2023-06-22T19:17:28.531Z
2023-06-22T19:17:28.531Z
{'Vendor': 'Fortra', 'Product': 'Globalscape EFT', 'Versions': '8.0.0'}
CVE-2023-2139
A reflected Cross-site Scripting (XSS) Vulnerability in DELMIA Apriso Release 2017 through Release 2022 allows an attacker to execute arbitrary script code.
https://www.3ds.com/vulnerability/advisories
2023-04-18T07:52:15.175Z
2023-04-21T15:44:51.948Z
2023-04-21T15:46:00.830Z
{'Vendor': 'Dassault Systèmes', 'Product': 'DELMIA Apriso', 'Versions': 'Apriso 2017 Golden, Apriso 2018 Golden, Apriso 2019 Golden, Apriso 2020 Golden, Apriso 2021 Golden, Apriso 2022 Golden'}
CVE-2023-2569
A CWE-787: Out-of-Bounds Write vulnerability exists that could cause local denial-of-service, elevation of privilege, and potentially kernel execution when a malicious actor with local user access crafts a script/program using an IOCTL call in the Foxboro.sys driver.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-164-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-164-04.pdf
2023-05-08T09:53:24.084Z
2023-06-14T07:50:11.254Z
2023-06-14T07:50:11.254Z
{'Vendor': 'Schneider Electric', 'Product': 'EcoStruxure Foxboro DCS Control Core Services', 'Versions': 'All versions prior to patch HF9857795'}
CVE-2023-2093
A vulnerability, which was classified as critical, was found in SourceCodester Vehicle Service Management System 1.0. This affects an unknown part of the file /classes/Login.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-226101 was assigned to this vulnerability.
https://vuldb.com/?id.226101
2023-04-15T09:11:36.478Z
2023-04-15T10:00:06.190Z
2023-10-22T14:04:57.869Z
{'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'}
CVE-2023-2586
Teltonika’s Remote Management System versions 4.14.0 is vulnerable to an unauthorized attacker registering previously unregistered devices through the RMS platform. If the user has not disabled the "RMS management feature" enabled by default, then an attacker could register that device to themselves. This could enable the attacker to perform different operations on the user's devices, including remote code execution with 'root' privileges (using the 'Task Manager' feature on RMS).
https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08
2023-05-08T22:09:41.566Z
2023-05-22T15:05:15.519Z
2023-05-22T15:05:15.519Z
{'Vendor': 'Teltonika', 'Product': 'Remote Management System', 'Versions': '0'}
CVE-2023-2705
The gAppointments WordPress plugin before 1.10.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against admin
https://wpscan.com/vulnerability/0b3c83ad-d490-4ca3-8589-39163ea5e24b
2023-05-15T12:17:32.551Z
2023-09-11T19:46:06.500Z
2023-09-11T19:46:06.500Z
{'Vendor': 'Unknown', 'Product': 'gAppointments', 'Versions': '0'}
CVE-2023-2355
Local privilege escalation due to a DLL hijacking vulnerability. The following products are affected: Acronis Snap Deploy (Windows) before build 3900.
https://security-advisory.acronis.com/advisories/SEC-4048
2023-04-27T17:41:37.597Z
2023-04-27T18:45:26.176Z
2023-04-27T18:45:26.176Z
{'Vendor': 'Acronis', 'Product': 'Acronis Snap Deploy', 'Versions': 'unspecified'}
CVE-2023-2640
On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.
https://ubuntu.com/security/notices/USN-6250-1
2023-05-10T21:23:35.226Z
2023-07-26T01:59:23.543Z
2023-07-26T01:59:23.543Z
{'Vendor': 'Canonical', 'Product': 'Ubuntu Kernel', 'Versions': '0, 0, 0'}
CVE-2023-2210
A vulnerability has been found in Campcodes Coffee Shop POS System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/categories/view_category.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-226975.
https://vuldb.com/?id.226975
2023-04-21T06:28:54.316Z
2023-04-21T08:31:03.116Z
2023-10-22T14:41:35.449Z
{'Vendor': 'Campcodes', 'Product': 'Coffee Shop POS System', 'Versions': '1.0'}
CVE-2023-2494
The Go Pricing - WordPress Responsive Pricing Tables plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'process_postdata' function in versions up to, and including, 3.3.19. This makes it possible for authenticated attackers with a role that the administrator previously granted access to the plugin to modify access to the plugin when it should only be the administrator's privilege.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5779914a-a168-4835-8aea-e0ab2b3be4f6?source=cve
2023-05-03T13:52:10.836Z
2023-05-23T23:36:47.546Z
2023-05-23T23:36:47.546Z
{'Vendor': 'Granth', 'Product': 'Go Pricing - WordPress Responsive Pricing Tables', 'Versions': '*'}
CVE-2023-2882
Generation of Incorrect Security Tokens vulnerability in CBOT Chatbot allows Token Impersonation, Privilege Abuse.This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.
https://www.usom.gov.tr/bildirim/tr-23-0293
2023-05-25T08:03:24.288Z
2023-05-25T08:18:23.610Z
2023-07-26T09:05:26.893Z
{'Vendor': 'CBOT', 'Product': 'Chatbot', 'Versions': '0'}
CVE-2023-2928
A vulnerability was found in DedeCMS up to 5.7.106. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file uploads/dede/article_allowurl_edit.php. The manipulation of the argument allurls leads to code injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230083.
https://vuldb.com/?id.230083
2023-05-27T07:41:00.886Z
2023-05-27T09:31:02.849Z
2023-10-23T07:18:15.711Z
{'Vendor': 'n/a', 'Product': 'DedeCMS', 'Versions': '5.7.106'}
CVE-2023-2181
An issue has been discovered in GitLab affecting all versions before 15.9.8, 15.10.0 before 15.10.7, and 15.11.0 before 15.11.3. A malicious developer could use a git feature called refs/replace to smuggle content into a merge request which would not be visible during review in the UI.
https://gitlab.com/gitlab-org/gitlab/-/issues/407859
2023-04-19T00:00:00
2023-05-12T00:00:00
2023-05-12T00:00:00
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '<15.9.8, >=15.10, <15.10.7, >=15.11, <15.11.3'}
CVE-2023-2302
The Contact Form and Calls To Action by vcita plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 2.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4dfc237a-9157-4da9-ba8f-9daf2ba4f20b?source=cve
2023-04-26T12:31:49.204Z
2023-06-03T04:35:14.577Z
2023-06-03T04:35:14.577Z
{'Vendor': 'vcita', 'Product': 'Contact Form and Calls To Action by vcita', 'Versions': '*'}
CVE-2023-2752
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.0-beta.
https://huntr.dev/bounties/efdf5b24-6d30-4d57-a5b0-13b253ba3ea4
2023-05-17T00:00:00
2023-05-17T00:00:00
2023-05-17T00:00:00
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-2247
In affected versions of Octopus Deploy it is possible to unmask variable secrets using the variable preview function
https://advisories.octopus.com/post/2023/sa2023-07/
2023-04-24T00:00:00
2023-05-02T00:00:00
2023-12-14T07:10:25.398Z
{'Vendor': 'Octopus Deploy', 'Product': 'Octopus Server', 'Versions': '2018.3.0, unspecified, unspecified, unspecified'}
CVE-2023-2617
A vulnerability classified as problematic was found in OpenCV wechat_qrcode Module up to 4.7.0. Affected by this vulnerability is the function DecodedBitStreamParser::decodeByteSegment of the file qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-228547.
https://vuldb.com/?id.228547
2023-05-10T05:06:27.204Z
2023-05-10T05:31:03.420Z
2023-10-23T05:33:19.516Z
{'Vendor': 'OpenCV', 'Product': 'wechat_qrcode Module', 'Versions': '4.0, 4.1, 4.2, 4.3, 4.4, 4.5, 4.6, 4.7'}
CVE-2023-2953
A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function.
https://bugs.openldap.org/show_bug.cgi?id=9904
2023-05-29T00:00:00
2023-05-30T00:00:00
2023-07-25T00:00:00
{'Vendor': 'n/a', 'Product': 'openldap', 'Versions': 'openldap-2.4'}
CVE-2023-2400
Improper deletion of resource in the user management feature in Devolutions Server 2023.1.8 and earlier allows an administrator to view users vaults of deleted users via database access.
https://devolutions.net/security/advisories/DEVO-2023-0014
2023-04-28T13:17:13.624Z
2023-06-20T16:19:50.629Z
2023-06-20T16:19:50.629Z
{'Vendor': 'Devolutions', 'Product': 'Server', 'Versions': '0'}
CVE-2023-2050
A vulnerability was found in Campcodes Advanced Online Voting System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /admin/positions_add.php. The manipulation of the argument description leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-225935.
https://vuldb.com/?id.225935
2023-04-14T07:41:50.957Z
2023-04-14T11:31:03.679Z
2023-10-22T09:56:12.610Z
{'Vendor': 'Campcodes', 'Product': 'Advanced Online Voting System', 'Versions': '1.0'}
CVE-2023-2545
The Feather Login Page plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'getListOfUsers' function in versions starting from 1.0.7 up to, and including, 1.1.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to access the login links, which can be used for privilege escalation.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b2ab2178-7438-43ef-961e-b54d0d230f4a?source=cve
2023-05-05T17:11:22.662Z
2023-05-31T02:40:21.280Z
2023-05-31T02:40:21.280Z
{'Vendor': 'featherplugins', 'Product': 'Custom Login Page | Temporary Users | Rebrand Login | Login Captcha', 'Versions': '1.0.7'}
CVE-2023-2816
Consul and Consul Enterprise allowed any user with service:write permissions to use Envoy extensions configured via service-defaults to patch remote proxy instances that target the configured service, regardless of whether the user has permission to modify the service(s) corresponding to those modified proxies.
https://discuss.hashicorp.com/t/hcsec-2023-16-consul-envoy-extension-downstream-proxy-configuration-by-upstream-service-owner/54525
2023-05-19T18:11:06.618Z
2023-06-02T22:43:34.553Z
2023-06-02T22:43:34.553Z
{'Vendor': 'HashiCorp', 'Product': 'Consul', 'Versions': '1.15.0, 1.15.1, 1.15.2'}
CVE-2023-2396
A vulnerability classified as problematic was found in Netgear SRX5308 up to 4.3.5-3. This vulnerability affects unknown code of the component Web Management Interface. The manipulation of the argument USERDBUsers.Password leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-227674 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.227674
2023-04-28T11:49:10.800Z
2023-04-28T22:00:05.104Z
2023-10-22T18:58:41.057Z
{'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'}
CVE-2023-2379
A vulnerability classified as critical has been found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. This affects an unknown part of the component Web Service. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227655.
https://vuldb.com/?id.227655
2023-04-28T11:30:10.404Z
2023-04-28T16:31:03.591Z
2023-10-22T18:37:57.257Z
{'Vendor': 'Ubiquiti', 'Product': 'EdgeRouter X', 'Versions': '2.0.9-hotfix.0, 2.0.9-hotfix.1, 2.0.9-hotfix.2, 2.0.9-hotfix.3, 2.0.9-hotfix.4, 2.0.9-hotfix.5, 2.0.9-hotfix.6'}
CVE-2023-2683
A memory leak in the EFR32 Bluetooth LE stack 5.1.0 through 5.1.1 allows an attacker to send an invalid pairing message and cause future legitimate connection attempts to fail. A reset of the device immediately clears the error.
https://github.com/SiliconLabs
2023-05-12T13:32:54.352Z
2023-06-15T19:05:21.365Z
2023-06-15T19:05:21.365Z
{'Vendor': 'silabs.com', 'Product': 'Bluetooth SDK', 'Versions': '5.0.0'}
CVE-2023-2729
Use of insufficiently random values vulnerability in User Management Functionality in Synology DiskStation Manager (DSM) before 7.2-64561 allows remote attackers to obtain user credential via unspecified vectors.
https://www.synology.com/en-global/security/advisory/Synology_SA_23_07
2023-05-16T03:36:11.521Z
2023-06-13T07:11:54.850Z
2023-06-13T11:14:57.295Z
{'Vendor': 'Synology', 'Product': 'DiskStation Manager (DSM)', 'Versions': '7.2, 7.1, 7.0, 6.2, 0'}
CVE-2023-2007
The specific flaw exists within the DPT I2O Controller driver. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to escalate privileges and execute arbitrary code in the context of the kernel.
https://github.com/torvalds/linux/commit/b04e75a4a8a81887386a0d2dbf605a48e779d2a0
2023-04-12T00:00:00
2023-04-24T00:00:00
2024-01-19T16:06:21.861961
{'Vendor': 'n/a', 'Product': "Linux kernel's DPT I2O Controller driver", 'Versions': 'Fixed in kernel v6.0-rc1'}
CVE-2023-2457
Out of bounds write in ChromeOS Audio Server in Google Chrome on ChromeOS prior to 113.0.5672.114 allowed a remote attacker to potentially exploit heap corruption via crafted audio file. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-chromeos.html
2023-05-01T23:09:48.622Z
2023-05-12T17:36:05.679Z
2023-05-12T17:36:05.679Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.114'}
CVE-2023-2904
The External Visitor Manager portal of HID’s SAFE versions 5.8.0 through 5.11.3 are vulnerable to manipulation within web fields in the application programmable interface (API). An attacker could log in using account credentials available through a request generated by an internal user and then manipulate the visitor-id within the web API to access the personal data of other users. There is no limit on the number of requests that can be made to the HID SAFE Web Server, so an attacker could also exploit this vulnerability to create a denial-of-service condition.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-152-02
2023-05-25T22:32:37.541Z
2023-06-07T21:59:24.478Z
2023-06-29T20:58:27.466Z
{'Vendor': 'HID Global', 'Product': 'SAFE', 'Versions': '5.8.0'}
CVE-2023-2841
The Advanced Local Pickup for WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the id parameter in versions up to, and including, 1.5.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with admin-level privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/125e7ea3-574a-4760-b10b-7a98d94c87a5?source=cve
2023-05-22T17:51:43.587Z
2023-11-22T15:33:19.683Z
2023-11-22T15:33:19.683Z
{'Vendor': 'zorem', 'Product': 'Advanced Local Pickup for WooCommerce', 'Versions': '*'}
CVE-2023-2512
Prior to version v1.20230419.0, the FormData API implementation was subject to an integer overflow. If a FormData instance contained more than 2^31 elements, the forEach() method could end up reading from the wrong location in memory while iterating over elements. This would most likely lead to a segmentation fault, but could theoretically allow arbitrary undefined behavior. In order for the bug to be exploitable, the process would need to be able to allocate 160GB of RAM. Due to this, the bug was never exploitable on the Cloudflare Workers platform, but could theoretically be exploitable on deployments of workerd running on machines with a huge amount of memory. Moreover, in order to be remotely exploited, an attacker would have to upload a single form-encoded HTTP request of at least tens of gigabytes in size. The application code would then have to use request.formData() to parse the request and formData.forEach() to iterate over this data. Due to these limitations, the exploitation likelihood was considered Low. A fix that addresses this vulnerability has been released in version v1.20230419.0 and users are encouraged to update to the latest version available.
https://github.com/cloudflare/workerd/releases/tag/v1.20230419.0
2023-05-04T08:31:01.013Z
2023-05-12T10:09:06.905Z
2023-05-12T10:10:21.870Z
{'Vendor': 'Cloudflare', 'Product': 'workerd', 'Versions': 'v1.20221108.0'}