CVE_ID stringlengths 9 213 ⌀ | Description stringlengths 24 3.87k ⌀ | URL stringlengths 12 306 ⌀ | DateReserved stringlengths 19 24 ⌀ | DatePublished stringlengths 19 75 ⌀ | DateUpdated stringlengths 19 61 ⌀ | AffectedProducts stringlengths 46 143k ⌀ |
|---|---|---|---|---|---|---|
CVE-2023-2387 | A vulnerability classified as problematic was found in Netgear SRX5308 up to 4.3.5-3. Affected by this vulnerability is an unknown functionality of the file scgi-bin/platform.cgi?page=dmz_setup.htm of the component Web Management Interface. The manipulation of the argument winsServer1 leads to cross site scripting. The... | https://vuldb.com/?id.227665 | 2023-04-28T11:48:36.408Z | 2023-04-28T19:00:05.399Z | 2023-10-22T18:47:42.601Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2738 | A vulnerability classified as critical has been found in Tongda OA 11.10. This affects the function actionGetdata of the file GatewayController.php. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier... | https://vuldb.com/?id.229149 | 2023-05-16T14:32:59.091Z | 2023-05-16T15:00:04.971Z | 2023-10-23T06:23:22.266Z | {'Vendor': 'Tongda', 'Product': 'OA', 'Versions': '11.10'} |
CVE-2023-2368 | A vulnerability was found in SourceCodester Faculty Evaluation System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php?page=manage_questionnaire. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been dis... | https://vuldb.com/?id.227644 | 2023-04-28T11:08:18.422Z | 2023-04-28T12:31:04.224Z | 2023-10-22T18:24:32.512Z | {'Vendor': 'SourceCodester', 'Product': 'Faculty Evaluation System', 'Versions': '1.0'} |
CVE-2023-2692 | A vulnerability has been found in SourceCodester ICT Laboratory Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file views/room_info.php of the component GET Parameter Handler. The manipulation of the argument name leads to cross site scripting. The... | https://vuldb.com/?id.228973 | 2023-05-14T07:47:36.240Z | 2023-05-14T09:00:03.763Z | 2023-10-23T06:13:36.029Z | {'Vendor': 'SourceCodester', 'Product': 'ICT Laboratory Management System', 'Versions': '1.0'} |
CVE-2023-2942 | Improper Input Validation in GitHub repository openemr/openemr prior to 7.0.1. | https://github.com/openemr/openemr/commit/c1c0805696ca68577c37bf30e29f90e5f3e0f1a9 | 2023-05-27T00:00:00 | 2023-05-27T00:00:00 | 2023-05-27T00:00:00 | {'Vendor': 'openemr', 'Product': 'openemr/openemr', 'Versions': 'unspecified'} |
CVE-2023-2041 | A vulnerability classified as critical was found in novel-plus 3.6.2. Affected by this vulnerability is an unknown functionality of the file /category/list?limit=10&offset=0&order=desc. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to t... | https://vuldb.com/?id.225919 | 2023-04-14T06:30:56.860Z | 2023-04-14T09:00:06.961Z | 2023-10-22T09:47:40.025Z | {'Vendor': 'n/a', 'Product': 'novel-plus', 'Versions': '3.6.2'} |
CVE-2023-2411 | A vulnerability was found in SourceCodester AC Repair and Services System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/inquiries/view_inquiry.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been discl... | https://vuldb.com/?id.227705 | 2023-04-28T16:30:47.455Z | 2023-04-28T23:00:06.229Z | 2023-10-22T19:04:46.974Z | {'Vendor': 'SourceCodester', 'Product': 'AC Repair and Services System', 'Versions': '1.0'} |
CVE-2023-2104 | Improper Access Control in GitHub repository alextselegidis/easyappointments prior to 1.5.0. | https://huntr.dev/bounties/3099b8d1-c49c-41b8-a929-73ccded6fc7c | 2023-04-15T00:00:00 | 2023-04-15T00:00:00 | 2023-04-15T00:00:00 | {'Vendor': 'alextselegidis', 'Product': 'alextselegidis/easyappointments', 'Versions': 'unspecified'} |
CVE-2023-2554 | External Control of File Name or Path in GitHub repository unilogies/bumsys prior to 2.2.0. | https://huntr.dev/bounties/396785a0-7bb6-4db4-b4cb-607b0fd4ab4b | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | {'Vendor': 'unilogies', 'Product': 'unilogies/bumsys', 'Versions': 'unspecified'} |
CVE-2023-2807 | Authentication Bypass by Spoofing vulnerability in the password reset process of Pandora FMS allows an unauthenticated attacker to initiate a password reset process for any user account without proper authentication. This issue affects PandoraFMS v771 and prior versions on all platforms. | https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/ | 2023-05-19T08:29:18.021Z | 2023-06-13T11:10:59.966Z | 2023-09-26T10:25:07.973Z | {'Vendor': 'Artica PFMS', 'Product': 'Pandora FMS', 'Versions': 'v0'} |
CVE-2023-2780 | Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.3.1. | https://huntr.dev/bounties/b12b0073-0bb0-4bd1-8fc2-ec7f17fd7689 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'} |
CVE-2023-2295 | A vulnerability was found in the libreswan library. This security issue occurs when an IKEv1 Aggressive Mode packet is received with only unacceptable crypto algorithms, and the response packet is not sent with a zero responder SPI. When a subsequent packet is received where the sender reuses the libreswan responder SP... | https://bugzilla.redhat.com/show_bug.cgi?id=2189777 | 2023-04-26T00:00:00 | 2023-05-17T00:00:00 | 2023-05-17T00:00:00 | {'Vendor': 'n/a', 'Product': 'libreswan', 'Versions': 'Affects libreswan v4.9-1.el8 and libreswan v4.9-1.el9, Fixed in libreswan v4.9-3.el8_8 and libreswan v4.9-4.el9_2'} |
CVE-2023-2446 | The UserPro plugin for WordPress is vulnerable to sensitive information disclosure via the 'userpro' shortcode in versions up to, and including 5.1.1. This is due to insufficient restriction on sensitive user meta values that can be called via that shortcode. This makes it possible for authenticated attackers, with sub... | https://www.wordfence.com/threat-intel/vulnerabilities/id/4072ba5f-6385-4fa3-85b6-89dac7b60a92?source=cve | 2023-05-01T14:17:16.045Z | 2023-11-22T07:32:12.130Z | 2023-11-22T07:32:12.130Z | {'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'} |
CVE-2023-2915 | The Rockwell Automation Thinmanager Thinserver is impacted by an improper input validation vulnerability, Due to improper input validation, a path traversal vulnerability exists when the ThinManager software processes a certain function. If exploited, an unauthenticated remote threat actor can delete arbitrary files wi... | https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1140471 | 2023-05-26T13:45:57.862Z | 2023-08-17T15:05:52.368Z | 2023-08-17T15:05:52.368Z | {'Vendor': 'Rockwell Automation', 'Product': 'ThinManager ThinServer', 'Versions': '11.0.0 - 11.2.6, 11.1.0 - 11.1.6, 11.2.0 - 11.2.7, 12.0.0 - 12.0.5, 12.1.0 - 12.1.6, 13.0.0 - 13.0.2, 13.1.0'} |
CVE-2023-2850 | NodeBB is affected by a Cross-Site WebSocket Hijacking vulnerability due to missing validation of the request origin. Exploitation of this vulnerability allows certain user information to be extracted by attacker. | https://github.com/NodeBB/NodeBB/security/advisories/GHSA-4qcv-qf38-5j3j | 2023-05-23T11:27:01.949Z | 2023-07-25T11:13:18.100Z | 2023-07-25T13:42:38.643Z | {'Vendor': 'NodeBB', 'Product': 'NodeBB', 'Versions': '< 2.8.13, >= 3.0.0, < 3.1.3'} |
CVE-2023-2503 | The 10Web Social Post Feed WordPress plugin before 1.2.9 does not sanitise and escape some parameter before outputting it back in a page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/07b1caf1-d00b-4075-b71a-0516d5604286 | 2023-05-03T15:15:59.963Z | 2023-06-05T13:38:58.202Z | 2023-06-05T13:38:58.202Z | {'Vendor': 'Unknown', 'Product': '10Web Social Post Feed', 'Versions': '0'} |
CVE-2023-2153 | A vulnerability was found in SourceCodester Complaint Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file admin/assets/plugins/DataTables/examples/examples_support/editable_ajax.php of the component POST Parameter Handler. The manipulation of the argumen... | https://vuldb.com/?id.226274 | 2023-04-18T10:56:14.857Z | 2023-04-18T14:00:05.924Z | 2023-10-22T14:30:34.999Z | {'Vendor': 'SourceCodester', 'Product': 'Complaint Management System', 'Versions': '1.0'} |
CVE-2023-2796 | The EventON WordPress plugin before 2.1.2 lacks authentication and authorization in its eventon_ics_download ajax action, allowing unauthenticated visitors to access private and password protected Events by guessing their numeric id. | https://wpscan.com/vulnerability/e9ef793c-e5a3-4c55-beee-56b0909f7a0d | 2023-05-18T13:09:17.354Z | 2023-07-10T12:40:07.475Z | 2023-07-10T12:40:07.475Z | {'Vendor': 'Unknown', 'Product': 'EventON', 'Versions': '0'} |
CVE-2023-2779 | The Social Share, Social Login and Social Comments WordPress plugin before 7.13.52 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | https://wpscan.com/vulnerability/fe9b7696-3b0e-42e2-9dbc-55167605f5c5 | 2023-05-17T19:48:16.127Z | 2023-06-19T10:52:39.566Z | 2023-06-19T10:52:39.566Z | {'Vendor': 'Unknown', 'Product': 'Social Share, Social Login and Social Comments Plugin', 'Versions': '0'} |
CVE-2023-2283 | A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` whi... | https://access.redhat.com/security/cve/CVE-2023-2283 | 2023-04-25T00:00:00 | 2023-05-26T00:00:00 | 2023-12-22T10:06:16.415494 | {'Vendor': 'n/a', 'Product': 'libssh', 'Versions': 'libssh-2'} |
CVE-2023-2329 | The WooCommerce Google Sheet Connector WordPress plugin before 1.3.6 does not have CSRF check when updating its Access Code, which could allow attackers to make logged in admin change the access code to an arbitrary one via a CSRF attack | https://wpscan.com/vulnerability/6e58f099-e8d6-49e4-9f02-d6a556c5b1d2 | 2023-04-27T09:07:06.197Z | 2023-07-17T13:29:48.544Z | 2023-08-08T08:04:24.970Z | {'Vendor': 'Unknown', 'Product': 'WooCommerce Google Sheet Connector', 'Versions': '0'} |
CVE-2023-2903 | A vulnerability classified as problematic has been found in NFine Rapid Development Platform 20230511. This affects an unknown part of the file /SystemManage/Role/GetGridJson?keyword=&page=1&rows=20. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been... | https://vuldb.com/?id.229977 | 2023-05-25T20:36:45.522Z | 2023-05-25T22:31:03.689Z | 2023-10-23T07:09:43.326Z | {'Vendor': 'NFine', 'Product': 'Rapid Development Platform', 'Versions': '20230511'} |
CVE-2023-2000 | Mattermost Desktop App fails to validate a mattermost server redirection and navigates to an arbitrary website
| https://mattermost.com/security-updates | 2023-04-12T09:56:00.685Z | 2023-05-02T08:57:39.331Z | 2023-05-02T08:57:39.331Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 5.3.0'} |
CVE-2023-2450 | The FiboSearch - AJAX Search for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 1.23.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions... | https://www.wordfence.com/threat-intel/vulnerabilities/id/880573d8-6dad-4a1b-a5db-33e1dc243062?source=cve | 2023-05-01T14:58:53.154Z | 2023-06-09T05:33:23.112Z | 2023-06-09T05:33:23.112Z | {'Vendor': 'damian-gora', 'Product': 'FiboSearch – Ajax Search for WooCommerce', 'Versions': '1.23.0'} |
CVE-2023-2145 | A vulnerability was found in Campcodes Online Thesis Archiving System 1.0. It has been classified as critical. Affected is an unknown function of the file projects_per_curriculum.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed... | https://vuldb.com/?id.226266 | 2023-04-18T10:47:06.396Z | 2023-04-18T11:00:07.358Z | 2023-10-22T14:20:49.368Z | {'Vendor': 'Campcodes', 'Product': 'Online Thesis Archiving System', 'Versions': '1.0'} |
CVE-2023-2515 | Mattermost fails to restrict a user with permissions to edit other users and to create personal access tokens from elevating their privileges to system admin
| https://mattermost.com/security-updates | 2023-05-04T11:36:47.883Z | 2023-05-12T08:53:44.111Z | 2023-05-12T08:53:44.111Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 7.1.8, 7.7.4, 7.8.3, 7.9.2'} |
CVE-2023-2846 | Authentication Bypass by Capture-replay vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series main modules allows a remote unauthenticated attacker to cancel the password/keyword setting and login to the affected products by sending specially crafted packets. | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-005_en.pdf | 2023-05-23T07:15:33.185Z | 2023-06-30T04:05:26.423Z | 2023-06-30T04:05:26.423Z | {'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'MELSEC-F Series FX3U-16MR/ES', 'Versions': 'all versions'} |
CVE-2023-2391 | A vulnerability was found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. This issue affects some unknown processing of the file scgi-bin/platform.cgi?page=time_zone.htm of the component Web Management Interface. The manipulation of the argument ntp.server2 leads to cross site scripting. The attack may ... | https://vuldb.com/?id.227669 | 2023-04-28T11:48:52.572Z | 2023-04-28T20:31:04.092Z | 2023-10-22T18:52:35.209Z | {'Vendor': 'Netgear', 'Product': 'SRX5308', 'Versions': '4.3.5-3'} |
CVE-2023-2684 | The File Renaming on Upload WordPress plugin before 2.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/42b1f017-c497-4825-b12a-8dce3e108a55 | 2023-05-12T15:02:36.630Z | 2023-06-19T10:52:40.415Z | 2023-06-19T10:52:40.415Z | {'Vendor': 'Unknown', 'Product': 'File Renaming on Upload', 'Versions': '0'} |
CVE-2023-2407 | The Event Registration Calendar By vcita plugin, versions up to and including 3.9.1, and Online Payments – Get Paid with PayPal, Square & Stripe plugin, for WordPress are vulnerable to Cross-Site Request Forgery. This is due to missing nonce validation in the ls_parse_vcita_callback() function. This makes it possible f... | https://www.wordfence.com/threat-intel/vulnerabilities/id/207b40fa-2062-48d6-990b-f05cbbf8fb8e?source=cve | 2023-04-28T16:12:20.755Z | 2023-06-03T04:35:13.332Z | 2023-06-03T04:35:13.332Z | {'Vendor': 'vcita', 'Product': 'Event Registration Calendar By vcita', 'Versions': '*'} |
CVE-2023-2057 | A vulnerability was found in EyouCms 1.5.4. It has been classified as problematic. Affected is an unknown function of the file login.php?m=admin&c=Arctype&a=edit of the component New Picture Handler. The manipulation of the argument litpic_loca leads to cross site scripting. It is possible to launch the attack remotely... | https://vuldb.com/?id.225942 | 2023-04-14T08:33:41.592Z | 2023-04-14T13:31:04.204Z | 2023-10-22T10:04:44.772Z | {'Vendor': 'n/a', 'Product': 'EyouCms', 'Versions': '1.5.4'} |
CVE-2023-2954 | Cross-site Scripting (XSS) - Stored in GitHub repository liangliangyy/djangoblog prior to master. | https://huntr.dev/bounties/47f08086-aaae-4ca7-b0ca-24c616d3ad7d | 2023-05-29T00:00:00 | 2023-05-29T00:00:00 | 2023-05-29T00:00:00 | {'Vendor': 'liangliangyy', 'Product': 'liangliangyy/djangoblog', 'Versions': 'unspecified'} |
CVE-2023-2811 | The AI ChatBot WordPress plugin before 4.5.6 does not sanitise and escape numerous of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks to all admin when setting chatbot and all client when using chatbot | https://wpscan.com/vulnerability/82a81721-0435-45a6-bd5b-dc90186cf803 | 2023-05-19T13:17:23.743Z | 2023-06-19T10:52:41.241Z | 2023-06-19T10:52:41.241Z | {'Vendor': 'Unknown', 'Product': 'AI ChatBot', 'Versions': '0'} |
CVE-2023-2112 | Desktop component service allows lateral movement between sessions in M-Files before 23.4.12455.0. | https://www.m-files.com/about/trust-center/security-advisories/cve-2023-2112/ | 2023-04-17T08:52:30.318Z | 2023-04-20T08:05:52.085Z | 2023-04-20T08:05:52.085Z | {'Vendor': 'M-Files', 'Product': 'M-Files Desktop', 'Versions': '0'} |
CVE-2023-2305 | The Download Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wpdm_members', 'wpdm_login_form', 'wpdm_reg_form' shortcodes in versions up to, and including, 3.2.70 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authent... | https://www.wordfence.com/threat-intel/vulnerabilities/id/a66bc196-e5f8-46b4-a81c-c888eb64021c?source=cve | 2023-04-26T13:52:44.616Z | 2023-06-09T05:33:25.665Z | 2023-06-09T05:33:25.665Z | {'Vendor': 'codename065', 'Product': 'Download Manager', 'Versions': '*'} |
CVE-2023-2240 | Improper Privilege Management in GitHub repository microweber/microweber prior to 1.3.4. | https://huntr.dev/bounties/8f595559-7b4b-4b00-954c-7a627766e203 | 2023-04-22T00:00:00 | 2023-04-22T00:00:00 | 2023-04-22T00:00:00 | {'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'} |
CVE-2023-2610 | Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1532. | https://huntr.dev/bounties/31e67340-935b-4f6c-a923-f7246bc29c7d | 2023-05-09T00:00:00 | 2023-05-09T00:00:00 | 2023-12-23T07:06:26.300355 | {'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'} |
CVE-2023-2539 | null | null | 2023-05-05T08:21:24.484Z | 2023-05-05T08:25:33.868Z | 2023-05-05T08:26:16.959Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2169 | The TaxoPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Related Posts functionality in versions up to, and including, 3.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Editor+ permissions to inject arbitrary web scri... | https://www.wordfence.com/threat-intel/vulnerabilities/id/52574d99-1ffe-4152-bf13-9cdd11d7300a?source=cve | 2023-04-18T20:38:56.206Z | 2023-04-19T09:38:19.339Z | 2023-04-19T09:38:19.339Z | {'Vendor': 'stevejburge', 'Product': 'TaxoPress is the WordPress Tag, Category, and Taxonomy Manager', 'Versions': '*'} |
CVE-2023-2493 | The All In One Redirection WordPress plugin before 2.2.0 does not properly sanitise and escape multiple parameters before using them in an SQL statement, leading to a SQL injection exploitable by high privilege users such as admin. | https://wpscan.com/vulnerability/a9a205a4-eef9-4f30-877a-4c562930650c | 2023-05-03T13:44:36.032Z | 2023-07-10T12:40:10.450Z | 2023-07-10T13:05:41.028Z | {'Vendor': 'Unknown', 'Product': 'All In One Redirection', 'Versions': '0'} |
CVE-2023-2186 | On Triangle MicroWorks' SCADA Data Gateway version <= v5.01.03, an unauthenticated attacker can send a specially crafted broadcast message including format string characters to the SCADA Data Gateway to perform unrestricted memory reads.An unauthenticated user can use this format string vulnerability to repeatedly cras... | https://www.trellix.com/en-us/about/newsroom/stories/research/industrial-and-manufacturing-cves.html | 2023-04-19T15:35:06.060Z | 2023-06-07T06:37:33.280Z | 2023-06-07T06:37:33.280Z | {'Vendor': 'Triangle MicroWorks', 'Product': 'SCADA Data Gateway', 'Versions': '5.01.03'} |
CVE-2023-2885 | Improper Enforcement of Message Integrity During Transmission in a Communication Channel vulnerability in CBOT Chatbot allows Adversary in the Middle (AiTM).This issue affects Chatbot: before Core: v4.0.3.4 Panel: v4.0.3.7.
| https://www.usom.gov.tr/bildirim/tr-23-0293 | 2023-05-25T08:03:28.810Z | 2023-05-25T08:28:56.312Z | 2023-08-05T15:44:34.953Z | {'Vendor': 'CBOT', 'Product': 'Chatbot', 'Versions': '0'} |
CVE-2023-2702 | Authorization Bypass Through User-Controlled Key vulnerability in Finex Media Competition Management System allows Authentication Abuse, Authentication Bypass.This issue affects Competition Management System: before 23.07.
| https://www.usom.gov.tr/bildirim/tr-23-0283 | 2023-05-15T11:02:24.164Z | 2023-05-23T19:14:36.748Z | 2023-05-23T19:14:36.748Z | {'Vendor': 'Finex Media', 'Product': 'Competition Management System', 'Versions': '0'} |
CVE-2023-2352 | The CHP Ads Block Detector plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.9.4. This is due to missing or incorrect nonce validation on the chp_abd_action function. This makes it possible for unauthenticated attackers to update or reset plugin settings via a forged r... | https://www.wordfence.com/threat-intel/vulnerabilities/id/e5a9cced-0e5e-4b6e-8291-0a862c9f9523?source=cve | 2023-04-27T15:54:41.964Z | 2023-08-31T05:33:13.592Z | 2023-08-31T05:33:13.592Z | {'Vendor': 'sureshchand12a', 'Product': 'CHP Ads Block Detector', 'Versions': '*'} |
CVE-2023-2647 | A vulnerability was found in Weaver E-Office 9.5 and classified as critical. Affected by this issue is some unknown functionality of the file /webroot/inc/utility_all.php of the component File Upload Handler. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclose... | https://vuldb.com/?id.228776 | 2023-05-11T05:32:00.452Z | 2023-05-11T07:31:05.039Z | 2023-10-23T05:44:18.035Z | {'Vendor': 'Weaver', 'Product': 'E-Office', 'Versions': '9.5'} |
CVE-2023-2217 | A vulnerability, which was classified as critical, was found in SourceCodester Task Reminder System 1.0. This affects an unknown part of the file /admin/reminders/manage_reminder.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclos... | https://vuldb.com/?id.226983 | 2023-04-21T06:42:29.225Z | 2023-04-21T10:31:04.905Z | 2023-10-22T14:50:07.794Z | {'Vendor': 'SourceCodester', 'Product': 'Task Reminder System', 'Versions': '1.0'} |
CVE-2023-2094 | A vulnerability has been found in SourceCodester Vehicle Service Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/mechanics/manage_mechanic.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has b... | https://vuldb.com/?id.226102 | 2023-04-15T09:11:40.071Z | 2023-04-15T10:31:04.007Z | 2023-10-22T14:06:11.031Z | {'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'} |
CVE-2023-2978 | A vulnerability was found in Abstrium Pydio Cells 4.2.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Change Subscription Handler. The manipulation leads to authorization bypass. The exploit has been disclosed to the public and may be used. Upgrading to version... | https://vuldb.com/?id.230210 | 2023-05-30T13:30:34.971Z | 2023-05-30T14:00:05.299Z | 2023-10-23T07:25:34.783Z | {'Vendor': 'Abstrium', 'Product': 'Pydio Cells', 'Versions': '4.2.0'} |
CVE-2023-2344 | A vulnerability has been found in SourceCodester Service Provider Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /classes/Master.php?f=save_service of the component HTTP POST Request Handler. The manipulation of the argument name leads to sql inj... | https://vuldb.com/?id.227587 | 2023-04-27T13:37:53.193Z | 2023-04-27T14:00:06.340Z | 2023-10-22T16:02:35.454Z | {'Vendor': 'SourceCodester', 'Product': 'Service Provider Management System', 'Versions': '1.0'} |
CVE-2023-2714 | The Groundhogg plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'check_license' functions in versions up to, and including, 2.7.9.8. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to change the license key ... | https://www.wordfence.com/threat-intel/vulnerabilities/id/29700844-b41d-4f10-90a7-06c8574d8d2a?source=cve | 2023-05-15T16:34:21.224Z | 2023-05-20T02:03:20.188Z | 2023-05-20T02:03:20.188Z | {'Vendor': 'trainingbusinesspros', 'Product': 'WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg', 'Versions': '*'} |
CVE-2023-2201 | The Web Directory Free for WordPress is vulnerable to SQL Injection via the ‘post_id’ parameter in versions up to, and including, 1.6.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with cont... | https://www.wordfence.com/threat-intel/vulnerabilities/id/d831fa81-4714-4757-b75d-0a8f5edda910?source=cve | 2023-04-20T21:51:44.131Z | 2023-06-02T03:36:06.353Z | 2023-06-02T03:36:06.353Z | {'Vendor': 'mihail-chepovskiy', 'Product': 'Web Directory Free', 'Versions': '*'} |
CVE-2023-2981 | A vulnerability, which was classified as problematic, has been found in Abstrium Pydio Cells 4.2.0. This issue affects some unknown processing of the component Chat. The manipulation leads to basic cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. ... | https://vuldb.com/?id.230213 | 2023-05-30T13:30:45.564Z | 2023-05-30T15:00:04.651Z | 2023-10-23T07:29:14.246Z | {'Vendor': 'Abstrium', 'Product': 'Pydio Cells', 'Versions': '4.2.0'} |
CVE-2023-2578 | The Buy Me a Coffee WordPress plugin before 3.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/4dad1c0d-bcf9-4486-bd8e-387ac8e6c892 | 2023-05-08T12:29:01.605Z | 2023-07-10T12:40:13.155Z | 2023-07-10T13:05:41.607Z | {'Vendor': 'Unknown', 'Product': 'Buy Me a Coffee', 'Versions': '0'} |
CVE-2023-2082 | The "Buy Me a Coffee – Button and Widget Plugin" plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 3.6 due to insufficient sanitization and escaping on the 'text value set via the bmc_post_reception action. This makes it possible for authenticated attackers, with subscriber-le... | https://www.wordfence.com/threat-intel/vulnerabilities/id/ed9f8948-085b-4ac5-befd-c70085aa23cd?source=cve | 2023-04-14T19:26:48.435Z | 2023-07-14T04:38:53.836Z | 2023-07-14T04:38:53.836Z | {'Vendor': 'buymeacoffee', 'Product': 'Buy Me a Coffee – Button and Widget Plugin', 'Versions': '*'} |
CVE-2023-2597 | In Eclipse Openj9 before version 0.38.0, in the implementation of the shared cache (which is enabled by default in OpenJ9 builds) the size of a string is not properly checked against the size of the buffer. | https://github.com/eclipse-openj9/openj9/pull/17259 | 2023-05-09T00:00:00 | 2023-05-22T00:00:00 | 2023-05-24T00:00:00 | {'Vendor': 'Eclipse Foundation', 'Product': 'Eclipse OpenJ9', 'Versions': 'unspecified'} |
CVE-2023-2743 | The ERP WordPress plugin before 1.12.4 does not sanitise and escape the employee_name parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | https://wpscan.com/vulnerability/517c6aa4-a56d-4f13-b370-7c864dd9c7db | 2023-05-16T19:09:56.865Z | 2023-06-27T13:17:05.869Z | 2023-06-27T13:17:05.869Z | {'Vendor': 'Unknown', 'Product': 'WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting', 'Versions': '0'} |
CVE-2023-2313 | Inappropriate implementation in Sandbox in Google Chrome on Windows prior to 112.0.5615.49 allowed a remote attacker who had compromised the renderer process to perform arbitrary read/write via a malicious file. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html | 2023-04-26T18:49:35.527Z | 2023-07-28T23:26:54.882Z | 2023-07-28T23:26:54.882Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '112.0.5615.49'} |
CVE-2023-2606 | The WP Brutal AI WordPress plugin before 2.06 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/62deb3ed-a7e4-4cdc-a615-cad2ec2e1e8f | 2023-05-09T15:44:27.706Z | 2023-08-14T19:10:23.250Z | 2024-01-16T15:54:00.443Z | {'Vendor': 'Unknown', 'Product': 'WP Brutal AI', 'Versions': '0'} |
CVE-2023-2256 | The Product Addons & Fields for WooCommerce WordPress plugin before 32.0.7 does not sanitize and escape some URL parameters, leading to Reflected Cross-Site Scripting. | https://wpscan.com/vulnerability/1187e041-3be2-4613-8d56-c2394fcc75fb | 2023-04-24T16:39:13.446Z | 2023-05-30T07:49:09.041Z | 2023-05-30T07:49:09.041Z | {'Vendor': 'Unknown', 'Product': 'Product Addons & Fields for WooCommerce', 'Versions': '0'} |
CVE-2023-2485 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.1 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A malicious maintainer in a project can escalate other users to Owners in that project if they import members from anothe... | https://gitlab.com/gitlab-org/gitlab/-/issues/407830 | 2023-05-02T00:00:00 | 2023-06-07T00:00:00 | 2023-06-07T00:00:00 | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=14.1, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'} |
CVE-2023-2939 | Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html | 2023-05-27T19:39:15.074Z | 2023-05-30T21:31:41.044Z | 2023-05-30T21:31:41.044Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '114.0.5735.90'} |
CVE-2023-2893 | The WP EasyCart plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.4.8. This is due to missing or incorrect nonce validation on the process_deactivate_product function. This makes it possible for unauthenticated attackers to deactivate products via a forged request gran... | https://www.wordfence.com/threat-intel/vulnerabilities/id/1268604c-08eb-4d86-8e97-9cdaa3e19c1f?source=cve | 2023-05-25T16:08:00.877Z | 2023-06-09T06:48:40.891Z | 2023-06-09T06:48:40.891Z | {'Vendor': 'levelfourstorefront', 'Product': 'Shopping Cart & eCommerce Store', 'Versions': '*'} |
CVE-2023-2190 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.10 before 15.11.10, all versions starting from 16.0 before 16.0.6, all versions starting from 16.1 before 16.1.1. It may be possible for users to view new commits to private projects in a fork created while the project was public. | https://gitlab.com/gitlab-org/gitlab/-/issues/408137 | 2023-04-19T22:23:17.062Z | 2023-07-13T02:00:02.797Z | 2023-07-13T02:00:02.797Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '13.10, 16.0, 16.1'} |
CVE-2023-2558 | The WPCS – WordPress Currency Switcher Professional plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpcs_current_currency shortcode in versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible fo... | https://www.wordfence.com/threat-intel/vulnerabilities/id/be054481-89b4-47d8-ad06-8622edea367f?source=cve | 2023-05-05T19:52:19.525Z | 2023-06-09T05:33:31.519Z | 2023-06-09T05:33:31.519Z | {'Vendor': 'realmag777', 'Product': 'WPCS – WordPress Currency Switcher Professional', 'Versions': '*'} |
CVE-2023-2108 | A vulnerability has been found in SourceCodester Judging Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file edit_contestant.php. The manipulation of the argument contestant_id leads to sql injection. The attack can be launched remotely. The exploit h... | https://vuldb.com/?id.226147 | 2023-04-16T07:10:23.703Z | 2023-04-16T07:31:03.904Z | 2023-10-22T14:17:09.794Z | {'Vendor': 'SourceCodester', 'Product': 'Judging Management System', 'Versions': '1.0'} |
CVE-2023-2221 | The WP Custom Cursors WordPress plugin before 3.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Admin. | https://wpscan.com/vulnerability/6666688e-7239-4d40-a348-307cf8f3b657 | 2023-04-21T08:04:23.888Z | 2023-06-19T10:52:42.024Z | 2023-06-19T10:52:42.024Z | {'Vendor': 'Unknown', 'Product': 'WP Custom Cursors | WordPress Cursor Plugin', 'Versions': '0'} |
CVE-2023-2671 | A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file classes/Master.php?f=save_inquiry of the component Contact Form. The manipulation of the argument fullname/contact/message leads to cross site scrip... | https://vuldb.com/?id.228887 | 2023-05-12T06:01:28.767Z | 2023-05-12T08:31:03.243Z | 2023-10-23T06:02:36.611Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
CVE-2023-2364 | A vulnerability, which was classified as problematic, was found in SourceCodester Resort Reservation System 1.0. Affected is an unknown function of the file registration.php. The manipulation of the argument fullname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been discl... | https://vuldb.com/?id.227640 | 2023-04-28T10:53:10.296Z | 2023-04-28T11:00:06.591Z | 2023-10-22T16:12:20.837Z | {'Vendor': 'SourceCodester', 'Product': 'Resort Reservation System', 'Versions': '1.0'} |
CVE-2023-2734 | The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.1. This is due to insufficient verification on the user being supplied during the cart sync from mobile REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as ... | https://www.wordfence.com/threat-intel/vulnerabilities/id/5881d16c-84e8-4610-8233-cfa5a94fe3f9?source=cve | 2023-05-16T12:41:36.475Z | 2023-05-25T02:05:31.657Z | 2023-05-25T02:05:31.657Z | {'Vendor': 'inspireui', 'Product': 'MStore API', 'Versions': '*'} |
CVE-2023-2626 | There exists an authentication bypass vulnerability in OpenThread border router devices and implementations. This issue allows unauthenticated nodes to craft radio frames using “Key ID Mode 2”: a special mode using a static encryption key to bypass security checks, resulting in arbitrary IP packets being allowed on the... | https://support.google.com/product-documentation/answer/13588832?hl=en&ref_topic=12974021&sjid=7833436865896465963-NA#zippy=%2Cnest-wifi | 2023-05-10T11:35:38.314Z | 2023-07-25T17:07:02.960Z | 2023-08-14T16:07:51.627Z | {'Vendor': 'Google', 'Product': 'Nest Hub Max', 'Versions': '10.20221207.2.109'} |
CVE-2023-2276 | The WCFM Membership – WooCommerce Memberships for Multivendor Marketplace plugin for WordPress is vulnerable to Insecure Direct Object References in versions up to, and including, 2.10.7. This is due to the plugin providing user-controlled access to objects, letting a user bypass authorization and access system resourc... | https://www.wordfence.com/threat-intel/vulnerabilities/id/42222c64-6492-4774-b5bc-8e62a1a328cf?source=cve | 2023-04-25T11:43:19.703Z | 2023-05-20T03:35:57.027Z | 2023-06-13T12:53:16.233Z | {'Vendor': 'wclovers', 'Product': 'WCFM Membership – WooCommerce Memberships for Multivendor Marketplace', 'Versions': '*'} |
CVE-2023-2763 | Use-After-Free, Out-of-bounds Write and Heap-based Buffer Overflow vulnerabilities exist in the DWG and DXF file reading procedure in SOLIDWORKS Desktop from Release SOLIDWORKS 2021 through Release SOLIDWORKS 2023. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted... | https://www.3ds.com/vulnerability/advisories | 2023-05-17T15:42:24.664Z | 2023-07-12T07:05:33.333Z | 2023-07-12T07:10:12.803Z | {'Vendor': 'Dassault Systèmes', 'Product': 'SOLIDWORKS Desktop', 'Versions': 'Release SOLIDWORKS 2021 Golden, Release SOLIDWORKS 2022 Golden, Release SOLIDWORKS 2023 Golden'} |
CVE-2023-2299 | The Online Booking & Scheduling Calendar for WordPress by vcita plugin for WordPress is vulnerable to unauthorized medication of data via the /wp-json/vcita-wordpress/v1/actions/auth REST-API endpoint in versions up to, and including, 4.2.10 due to a missing capability check on the processAction function. This makes it... | https://www.wordfence.com/threat-intel/vulnerabilities/id/4855627a-de56-49ee-b0b0-01b9735d8557?source=cve | 2023-04-26T12:12:34.510Z | 2023-06-03T04:35:14.168Z | 2023-06-03T04:35:14.168Z | {'Vendor': 'vcita', 'Product': 'Online Booking & Scheduling Calendar for WordPress by vcita', 'Versions': '*'} |
CVE-2023-2333 | The Ninja Forms Google Sheet Connector WordPress plugin before 1.2.7, gsheetconnector-ninja-forms-pro WordPress plugin through 1.2.7 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/13c4e065-fde6-41a4-a22b-bca1b10e0d30 | 2023-04-27T09:33:10.594Z | 2023-07-04T07:23:24.093Z | 2023-07-05T10:47:58.134Z | {'Vendor': 'Unknown', 'Product': 'Ninja Forms Google Sheet Connector', 'Versions': '0'} |
CVE-2023-2519 | A vulnerability has been found in Caton CTP Relay Server 1.2.9 and classified as critical. This vulnerability affects unknown code of the file /server/api/v1/login of the component API. The manipulation of the argument username/password leads to sql injection. The attack can be initiated remotely. VDB-228010 is the ide... | https://vuldb.com/?id.228010 | 2023-05-04T15:56:24.118Z | 2023-05-04T16:31:03.917Z | 2023-10-23T05:19:54.230Z | {'Vendor': 'Caton', 'Product': 'CTP Relay Server', 'Versions': '1.2.9'} |
CVE-2023-2149 | A vulnerability classified as critical was found in Campcodes Online Thesis Archiving System 1.0. This vulnerability affects unknown code of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the publi... | https://vuldb.com/?id.226270 | 2023-04-18T10:47:20.454Z | 2023-04-18T12:31:03.850Z | 2023-10-22T14:25:42.339Z | {'Vendor': 'Campcodes', 'Product': 'Online Thesis Archiving System', 'Versions': '1.0'} |
CVE-2023-2260 | Authorization Bypass Through User-Controlled Key in GitHub repository alfio-event/alf.io prior to 2.0-M4-2304. | https://huntr.dev/bounties/649badc8-c935-4a84-8aa8-d3269ac54377 | 2023-04-24T00:00:00 | 2023-04-24T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'alfio-event', 'Product': 'alfio-event/alf.io', 'Versions': 'unspecified'} |
CVE-2023-2630 | Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21. | https://huntr.dev/bounties/e1001870-b8d8-4921-8b9c-bbdfb1a1491e | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | 2023-05-10T00:00:00 | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-2325 | Stored XSS Vulnerability in M-Files Classic Web versions before 23.10 and LTS Service Release Versions before 23.2 LTS SR4 and 23.8 LTS SR1allows attacker to execute script on users browser via stored HTML document.
| https://www.m-files.com/about/trust-center/security-advisories/cve-2023-2325/ | 2023-04-27T08:15:36.501Z | 2023-10-20T06:39:44.747Z | 2023-10-20T06:39:44.747Z | {'Vendor': 'M-Files', 'Product': 'M-Files Web', 'Versions': '0, 23.2 LTS SR4, 23.8 LTS SR1'} |
CVE-2023-2775 | A vulnerability was found in code-projects Bus Dispatch and Information System 1.0. It has been classified as critical. This affects an unknown part of the file adminHome.php. The manipulation of the argument reach_city leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclos... | https://vuldb.com/?id.229281 | 2023-05-17T16:58:20.946Z | 2023-05-17T20:00:04.432Z | 2023-10-23T06:38:01.022Z | {'Vendor': 'code-projects', 'Product': 'Bus Dispatch and Information System', 'Versions': '1.0'} |
CVE-2023-2958 | Authorization Bypass Through User-Controlled Key vulnerability in Origin Software ATS Pro allows Authentication Abuse, Authentication Bypass.This issue affects ATS Pro: before 20230714.
| https://www.usom.gov.tr/bildirim/tr-23-0410 | 2023-05-29T11:48:11.080Z | 2023-07-17T14:16:26.447Z | 2023-07-26T09:07:14.271Z | {'Vendor': 'Origin Software', 'Product': 'ATS Pro', 'Versions': '0'} |
CVE-2023-2667 | A vulnerability has been found in SourceCodester Lost and Found Information System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file admin/. The manipulation of the argument page leads to cross site scripting. The attack can be launched remotely. The exploit has b... | https://vuldb.com/?id.228883 | 2023-05-12T06:01:10.919Z | 2023-05-12T06:31:04.065Z | 2023-10-23T05:57:43.076Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
CVE-2023-2237 | The WP Replicate Post plugin for WordPress is vulnerable to SQL Injection via the post_id parameter in versions up to, and including, 4.0.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for contributor-level attackers or... | https://www.wordfence.com/threat-intel/vulnerabilities/id/916e6f8b-cb29-4062-9a05-0337cfdb382a?source=cve | 2023-04-21T18:31:19.134Z | 2023-06-09T05:33:24.370Z | 2023-06-09T05:33:24.370Z | {'Vendor': 'yudiz', 'Product': 'WP Replicate Post', 'Versions': '*'} |
CVE-2023-2722 | Use after free in Autofill UI in Google Chrome on Android prior to 113.0.5672.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_16.html | 2023-05-15T21:16:58.051Z | 2023-05-16T18:45:33.967Z | 2023-05-16T18:45:33.967Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '113.0.5672.126'} |
CVE-2023-2372 | A vulnerability, which was classified as problematic, has been found in SourceCodester Online DJ Management System 1.0. Affected by this issue is some unknown functionality of the file classes/Master.php?f=save_event. The manipulation of the argument name leads to cross site scripting. The attack may be launched remote... | https://vuldb.com/?id.227648 | 2023-04-28T11:19:23.462Z | 2023-04-28T14:00:06.010Z | 2023-10-22T18:29:25.106Z | {'Vendor': 'SourceCodester', 'Product': 'Online DJ Management System', 'Versions': '1.0'} |
CVE-2023-2688 | The WordPress File Upload and WordPress File Upload Pro plugins for WordPress are vulnerable to Path Traversal in versions up to, and including, 4.19.1 via the vulnerable parameter wfu_newpath. This allows administrator-level attackers to move files uploaded with the plugin (located in wp-content/uploads by default) ou... | https://www.wordfence.com/threat-intel/vulnerabilities/id/abd6eeac-0a7e-4762-809f-593cd85f303d?source=cve | 2023-05-12T20:07:48.332Z | 2023-06-09T05:33:26.513Z | 2023-06-09T05:33:26.513Z | {'Vendor': 'nickboss', 'Product': 'WordPress File Upload', 'Versions': '*'} |
CVE-2023-2535 | null | null | 2023-05-05T06:51:51.620Z | 2023-05-05T07:22:47.045Z | 2023-05-05T08:21:05.943Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-2866 |
If an attacker can trick an authenticated user into loading a maliciously crafted .zip file onto Advantech WebAccess version 8.4.5, a web shell could be used to give the attacker full control of the SCADA server.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-150-01 | 2023-05-24T14:09:39.667Z | 2023-06-07T20:12:46.824Z | 2023-06-07T20:12:46.824Z | {'Vendor': 'Advantech', 'Product': 'WebAccess/SCADA', 'Versions': '8.4.5'} |
CVE-2023-2923 | A vulnerability classified as critical was found in Tenda AC6 US_AC6V1.0BR_V15.03.05.19. Affected by this vulnerability is the function fromDhcpListClient. The manipulation leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identi... | https://vuldb.com/?id.230077 | 2023-05-27T07:05:26.469Z | 2023-05-27T07:31:04.328Z | 2023-10-23T07:12:09.723Z | {'Vendor': 'Tenda', 'Product': 'AC6', 'Versions': 'US_AC6V1.0BR_V15.03.05.19'} |
CVE-2023-2889 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Veon Computer Service Tracking Software allows SQL Injection.This issue affects Service Tracking Software: through 20231122.
NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
... | https://www.usom.gov.tr/bildirim/tr-23-0653 | 2023-05-25T13:56:00.519Z | 2023-11-22T13:30:44.973Z | 2023-11-22T13:30:44.973Z | {'Vendor': 'Veon Computer', 'Product': 'Service Tracking Software', 'Versions': '0'} |
CVE-2023-2020 | Insufficient permission checks in the REST API in Tribe29 Checkmk <= 2.1.0p27 and <= 2.2.0b4 (beta) allow unauthorized users to schedule downtimes for any host. | https://checkmk.com/werk/13981 | 2023-04-13T08:38:39.338Z | 2023-04-18T11:09:09.107Z | 2023-04-18T11:09:09.107Z | {'Vendor': 'Tribe29', 'Product': 'Checkmk', 'Versions': '2.2.0, 2.1.0'} |
CVE-2023-2470 | The Add to Feedly WordPress plugin through 1.2.11 does not sanitize and escape its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. | https://wpscan.com/vulnerability/de0adf26-8a0b-4b90-96d5-4bec6e770e04 | 2023-05-02T09:06:56.565Z | 2023-05-30T07:49:09.868Z | 2023-05-30T07:49:09.868Z | {'Vendor': 'Unknown', 'Product': 'Add to Feedly', 'Versions': '0'} |
CVE-2023-2759 | A hidden API exists in TapHome's core platform before version 2023.2 that allows an authenticated, low privileged user to change passwords of other users without any prior knowledge. The attacker may gain full access to the device by using this vulnerability. | https://claroty.com/team82/disclosure-dashboard/cve-2023-2759 | 2023-05-17T14:21:49.140Z | 2023-07-17T06:14:15.872Z | 2023-07-17T06:14:15.872Z | {'Vendor': 'TAPHOME', 'Product': 'Core Platform', 'Versions': '0.0'} |
CVE-2023-2309 | The wpForo Forum WordPress plugin before 2.1.9 does not escape some request parameters while in debug mode, leading to a Reflected Cross-Site Scripting vulnerability. | https://wpscan.com/vulnerability/1b3f4558-ea41-4749-9aa2-d3971fc9ca0d | 2023-04-26T18:21:16.754Z | 2023-07-24T10:20:23.546Z | 2023-07-24T10:20:23.546Z | {'Vendor': 'Unknown', 'Product': 'wpForo Forum', 'Versions': '0'} |
CVE-2023-2831 | Mattermost fails to unescape Markdown strings in a memory-efficient way, allowing an attacker to cause a Denial of Service by sending a message containing a large number of escaped characters.
| https://mattermost.com/security-updates/ | 2023-05-22T09:30:20.884Z | 2023-06-16T09:06:15.292Z | 2023-06-16T09:06:15.292Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.10.0, 7.1.10 , 7.8.5, 7.9.4, 7.10.1'} |
CVE-2023-2562 | The Gallery Metabox for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the refresh_metabox function in versions up to, and including, 1.5. This makes it possible for subscriber-level attackers to obtain a list of images attached to a post. | https://www.wordfence.com/threat-intel/vulnerabilities/id/951e4651-56d6-474d-84b3-5a7cfc357b9f?source=cve | 2023-05-06T14:33:02.501Z | 2023-07-12T04:38:47.479Z | 2023-07-12T04:38:47.479Z | {'Vendor': 'billerickson', 'Product': 'Gallery Metabox', 'Versions': '*'} |
CVE-2023-2098 | A vulnerability was found in SourceCodester Vehicle Service Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /inc/topBarNav.php. The manipulation of the argument search leads to cross site scripting. The attack may be launched remotely. The exploi... | https://vuldb.com/?id.226106 | 2023-04-15T09:11:59.138Z | 2023-04-15T11:31:03.247Z | 2023-10-22T14:11:03.940Z | {'Vendor': 'SourceCodester', 'Product': 'Vehicle Service Management System', 'Versions': '1.0'} |
CVE-2023-2132 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. A DollarMathPostFilter Regular Expression Denial of Service in was possible by sending crafted payloads to the preview_ma... | https://gitlab.com/gitlab-org/gitlab/-/issues/407586 | 2023-04-17T00:00:00 | 2023-06-06T00:00:00 | 2023-06-06T00:00:00 | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '>=15.4.0, <15.10.8, >=15.11, <15.11.7, >=16.0, <16.0.2'} |
CVE-2023-2427 | Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.1.13. | https://huntr.dev/bounties/89005a6d-d019-4cb7-ae88-486d2d44190d | 2023-04-30T00:00:00 | 2023-05-05T00:00:00 | 2023-05-05T00:00:00 | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-2077 | A vulnerability, which was classified as problematic, has been found in Campcodes Online Traffic Offense Management System 1.0. This issue affects some unknown processing of the file /admin/offenses/view_details.php. The manipulation of the argument id leads to cross site scripting. The attack may be initiated remotely... | https://vuldb.com/?id.226055 | 2023-04-14T18:33:22.634Z | 2023-04-14T20:00:04.601Z | 2023-10-22T13:58:50.285Z | {'Vendor': 'Campcodes', 'Product': 'Online Traffic Offense Management System', 'Versions': '1.0'} |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 6