instruction
stringlengths
21
21
input
stringlengths
40
40
output
stringlengths
62
37.3k
Explain CVE-2023-0567
Explain the vulnerability: CVE-2023-0567
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid.  Affected Products: PHP References: [{'url': 'https://bugs.php.net/bug.php?id=81744'}, {'url': 'https://github.com/php/php-src/security/advisories/GHSA-7fj2-8x79-rjf4'}] CVE State: PUBLISHED
Explain CVE-2023-0568
Explain the vulnerability: CVE-2023-0568
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.  Affected Products: PHP References: [{'url': 'https://bugs.php.net/bug.php?id=81746'}, {'url': 'https://security.netapp.com/advisory/ntap-20230517-0001/'}] CVE State: PUBLISHED
Explain CVE-2023-0569
Explain the vulnerability: CVE-2023-0569
Weak Password Requirements in GitHub repository publify/publify prior to 9.2.10. Affected Products: publify/publify References: [{'url': 'https://huntr.dev/bounties/81b1e1da-10dd-435e-94ae-4bdd41df6df9'}, {'url': 'https://github.com/publify/publify/commit/8905e4e639cf03b758da558568a86c9816253b2d'}] CVE State: PUBLISHED
Explain CVE-2023-0570
Explain the vulnerability: CVE-2023-0570
A vulnerability, which was classified as critical, was found in SourceCodester Online Tours & Travels Management System 1.0. This affects an unknown part of the file user\operations\payment_operation.php. The manipulation of the argument booking_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219729 was assigned to this vulnerability. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.219729', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219729', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/user_operations_payment_operation_booking_id.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0571
Explain the vulnerability: CVE-2023-0571
A vulnerability has been found in SourceCodester Canteen Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file createcustomer.php of the component Add Customer. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-219730 is the identifier assigned to this vulnerability. Affected Products: Canteen Management System References: [{'url': 'https://vuldb.com/?id.219730', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219730', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ctflearner/Vulnerability/blob/main/Canteen%20Management%20System/Canteen_Management_System_XSS_IN_Add_Customer.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0572
Explain the vulnerability: CVE-2023-0572
Unchecked Error Condition in GitHub repository froxlor/froxlor prior to 2.0.10. Affected Products: froxlor/froxlor References: [{'url': 'https://huntr.dev/bounties/4ab24ee2-3ff6-4248-9555-0af3e5f754ec'}, {'url': 'https://github.com/froxlor/froxlor/commit/7b08a71c59430d06c1efb012a6c6448262aacdb1'}] CVE State: PUBLISHED
Explain CVE-2023-0574
Explain the vulnerability: CVE-2023-0574
Server-Side Request Forgery (SSRF), Improperly Controlled Modification of Dynamically-Determined Object Attributes, Improper Restriction of Excessive Authentication Attempts vulnerability in YugaByte, Inc. Yugabyte Managed allows Accessing Functionality Not Properly Constrained by ACLs, Communication Channel Manipulation, Authentication Abuse.This issue affects Yugabyte Managed: from 2.0 through 2.13. Affected Products: Yugabyte Managed References: [{'url': 'https://www.yugabyte.com/'}] CVE State: PUBLISHED
Explain CVE-2023-0575
Explain the vulnerability: CVE-2023-0575
External Control of Critical State Data, Improper Control of Generation of Code ('Code Injection') vulnerability in YugaByte, Inc. Yugabyte DB on Windows, Linux, MacOS, iOS (DevopsBase.Java:execCommand, TableManager.Java:runCommand modules) allows API Manipulation, Privilege Abuse. This vulnerability is associated with program files backup.Py. This issue affects Yugabyte DB: Lesser then 2.2. Affected Products: Yugabyte DB References: [{'url': 'https://www.yugabyte.com/'}] CVE State: PUBLISHED
Explain CVE-2023-0576
Explain the vulnerability: CVE-2023-0576
N\A Affected Products: N\A References: N\A CVE State: REJECTED
Explain CVE-2023-0577
Explain the vulnerability: CVE-2023-0577
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ASOS Information Technologies SOBIAD allows Cross-Site Scripting (XSS).This issue affects SOBIAD: before 23.02.01. Affected Products: SOBIAD References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0125'}] CVE State: PUBLISHED
Explain CVE-2023-0578
Explain the vulnerability: CVE-2023-0578
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ASOS Information Technologies Book Cites allows Cross-Site Scripting (XSS).This issue affects Book Cites: before 23.01.05. Affected Products: Book Cites References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0125'}] CVE State: PUBLISHED
Explain CVE-2023-0580
Explain the vulnerability: CVE-2023-0580
Insecure Storage of Sensitive Information vulnerability in ABB My Control System (on-premise) allows an attacker who successfully exploited this vulnerability to gain access to the secure application data or take control of the application. Of the services that make up the My Control System (on-premise) application, the following ones are affected by this vulnerability: User Interface System Monitoring1 Asset Inventory This issue affects My Control System (on-premise): from 5.0;0 through 5.13. Affected Products: My Control System (on-premise) References: [{'url': 'https://search.abb.com/library/Download.aspx?DocumentID=7PAA007893&LanguageCode=en&DocumentPartId=&Action=Launch'}] CVE State: PUBLISHED
Explain CVE-2023-0581
Explain the vulnerability: CVE-2023-0581
The PrivateContent plugin for WordPress is vulnerable to protection mechanism bypass due to the use of client side validation in versions up to, and including, 8.4.3. This is due to the plugin checking if an IP had been blocklist via client-side scripts rather than server-side. This makes it possible for unauthenticated attackers to bypass any login restrictions that may prevent a brute force attack. Affected Products: PrivateContent References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/de73304e-7a28-4304-b1ed-2f6dd7738236'}, {'url': 'https://lcweb.it/privatecontent/changelog'}] CVE State: PUBLISHED
Explain CVE-2023-0583
Explain the vulnerability: CVE-2023-0583
The VK Blocks plugin for WordPress is vulnerable to improper authorization via the REST 'update_vk_blocks_options' function in versions up to, and including, 1.57.0.5. This allows authenticated attackers, with contributor-level permissions or above, to change plugin settings including default icons. Affected Products: VK Blocks References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/12a94f5b-bc30-4a65-b397-54488c836ec3?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/vk-blocks/trunk/inc/vk-blocks/App/RestAPI/BlockMeta/class-vk-blocks-entrypoint.php'}] CVE State: PUBLISHED
Explain CVE-2023-0584
Explain the vulnerability: CVE-2023-0584
The VK Blocks plugin for WordPress is vulnerable to improper authorization via the REST 'update_options' function in versions up to, and including, 1.57.0.5. This allows authenticated attackers, with contributor-level permissions or above, to change the 'vk_font_awesome_version' option to an arbitrary value. Affected Products: VK Blocks References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/b90b7f6c-df7f-48a5-b283-cf5facbd71e5?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/vk-blocks/trunk/inc/vk-blocks/font-awesome/class-vk-blocks-font-awesome-api.php'}] CVE State: PUBLISHED
Explain CVE-2023-0585
Explain the vulnerability: CVE-2023-0585
The All in One SEO Pack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 4.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Administrator role or above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Affected Products: All in One SEO – Best WordPress SEO Plugin – Easily Improve SEO Rankings & Increase Traffic References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/3db97180-9308-4891-9de9-acefe31d088f'}, {'url': 'https://plugins.trac.wordpress.org/browser/all-in-one-seo-pack/tags/4.2.9/app/Common/Main/Updates.php?v=2829340#L624'}, {'url': 'https://plugins.trac.wordpress.org/browser/all-in-one-seo-pack/tags/4.2.9/app/Common/Main/Updates.php?v=2829340#L625'}, {'url': 'https://plugins.trac.wordpress.org/browser/all-in-one-seo-pack/tags/4.2.9/app/Common/Main/Updates.php?v=2829340#L665'}, {'url': 'https://plugins.trac.wordpress.org/browser/all-in-one-seo-pack/tags/4.2.9/app/Common/Main/Updates.php?v=2829340#L666'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2859011%40all-in-one-seo-pack%2Ftrunk&old=2847431%40all-in-one-seo-pack%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0586
Explain the vulnerability: CVE-2023-0586
The All in One SEO Pack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 4.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Contributor+ role to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Affected Products: All in One SEO – Best WordPress SEO Plugin – Easily Improve SEO Rankings & Increase Traffic References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/1c13f00e-3048-44cf-8979-2b0b0c508f3a'}, {'url': 'https://plugins.trac.wordpress.org/browser/all-in-one-seo-pack/tags/4.2.9/app/Common/Admin/PostSettings.php?v=2829340#L202'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2859011%40all-in-one-seo-pack%2Ftrunk&old=2847431%40all-in-one-seo-pack%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0587
Explain the vulnerability: CVE-2023-0587
A file upload vulnerability in exists in Trend Micro Apex One server build 11110. Using a malformed Content-Length header in an HTTP PUT message sent to URL /officescan/console/html/cgi/fcgiOfcDDA.exe, an unauthenticated remote attacker can upload arbitrary files to the SampleSubmission directory (i.e., \PCCSRV\TEMP\SampleSubmission) on the server. The attacker can upload a large number of large files to fill up the file system on which the Apex One server is installed. Affected Products: Trend Micro Apex One References: [{'url': 'https://www.tenable.com/security/research/tra-2023-5'}] CVE State: PUBLISHED
Explain CVE-2023-0588
Explain the vulnerability: CVE-2023-0588
The Catalyst Connect Zoho CRM Client Portal WordPress plugin before 2.1.0 does not sanitize and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high-privilege users such as admin. Affected Products: Catalyst Connect Zoho CRM Client Portal References: [{'url': 'https://wpscan.com/vulnerability/84be272e-0891-461c-91ad-496b64f92f8f', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0589
Explain the vulnerability: CVE-2023-0589
The WP Image Carousel WordPress plugin through 1.0.2 does not sanitise and escape some parameters, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks. Affected Products: WP Image Carousel References: [{'url': 'https://wpscan.com/vulnerability/58649228-69a6-4028-8487-166b0a07fcf7', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0590
Explain the vulnerability: CVE-2023-0590
A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected. Affected Products: Kernel References: [{'url': 'https://lore.kernel.org/all/20221018203258.2793282-1-edumazet%40google.com/'}] CVE State: PUBLISHED
Explain CVE-2023-0591
Explain the vulnerability: CVE-2023-0591
ubireader_extract_files is vulnerable to path traversal when run against specifically crafted UBIFS files, allowing the attacker to overwrite files outside of the extraction directory (provided the process has write access to that file or directory). This is due to the fact that a node name (dent_node.name) is considered trusted and joined to the extraction directory path during processing, then the node content is written to that joined path. By crafting a malicious UBIFS file with node names holding path traversal payloads (e.g. ../../tmp/outside.txt), it's possible to force ubi_reader to write outside of the extraction directory. This issue affects ubi-reader before 0.8.5. Affected Products: ubi_reader References: [{'url': 'https://github.com/jrspruitt/ubi_reader/pull/57'}, {'url': 'https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/'}] CVE State: PUBLISHED
Explain CVE-2023-0592
Explain the vulnerability: CVE-2023-0592
A path traversal vulnerability affects jefferson's JFFS2 filesystem extractor. By crafting malicious JFFS2 files, attackers could force jefferson to write outside of the extraction directory.This issue affects jefferson: before 0.4.1. Affected Products: jefferson References: [{'url': 'https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/'}, {'url': 'https://github.com/sviehb/jefferson/commit/971aca1a8b3b9f4fcb4674fa9621d3349195cdc6'}] CVE State: PUBLISHED
Explain CVE-2023-0593
Explain the vulnerability: CVE-2023-0593
A path traversal vulnerability affects yaffshiv YAFFS filesystem extractor. By crafting a malicious YAFFS file, an attacker could force yaffshiv to write outside of the extraction directory. This issue affects yaffshiv up to version 0.1 included, which is the most recent at time of publication. Affected Products: yaffshiv References: [{'url': 'https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/'}, {'url': 'https://github.com/devttys0/yaffshiv/pull/3/files'}] CVE State: PUBLISHED
Explain CVE-2023-0594
Explain the vulnerability: CVE-2023-0594
Grafana is an open-source platform for monitoring and observability. Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization. The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded. An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix. Affected Products: Grafana References: [{'url': 'https://grafana.com/security/security-advisories/cve-2023-0594/'}] CVE State: PUBLISHED
Explain CVE-2023-0595
Explain the vulnerability: CVE-2023-0595
A CWE-117: Improper Output Neutralization for Logs vulnerability exists that could cause the misinterpretation of log files when malicious packets are sent to the Geo SCADA server's database web port (default 443). Affected products: EcoStruxure Geo SCADA Expert 2019, EcoStruxure Geo SCADA Expert 2020, EcoStruxure Geo SCADA Expert 2021(All Versions prior to October 2022), ClearSCADA (All Versions) Affected Products: EcoStruxure Geo SCADA Expert 2019 References: [{'url': 'https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-01.pdf'}] CVE State: PUBLISHED
Explain CVE-2023-0597
Explain the vulnerability: CVE-2023-0597
A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory. Affected Products: Kernel References: [{'url': 'https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80'}, {'name': '[oss-security] 20230728 Re: StackRot (CVE-2023-3269): Linux kernel privilege escalation vulnerability', 'tags': ['mailing-list'], 'url': 'http://www.openwall.com/lists/oss-security/2023/07/28/1'}] CVE State: PUBLISHED
Explain CVE-2023-0598
Explain the vulnerability: CVE-2023-0598
GE Digital Proficy iFIX 2022, GE Digital Proficy iFIX v6.1, and GE Digital Proficy iFIX v6.5 are vulnerable to code injection, which may allow an attacker to insert malicious configuration files in the expected web server execution path and gain full control of the HMI software. Affected Products: Proficy iFIX References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-03'}, {'url': 'https://digitalsupport.ge.com/s/article/iFIX-Secure-Deployment-Guide?language=en_US'}] CVE State: PUBLISHED
Explain CVE-2023-0599
Explain the vulnerability: CVE-2023-0599
Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization.  Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metasploit Pro user using a specially crafted request. Note that in most deployments, all Metasploit Pro users tend to enjoy privileges equivalent to local administrator. Affected Products: Metasploit Pro References: [{'tags': ['release-notes'], 'url': 'https://docs.rapid7.com/release-notes/metasploit/20230130/'}] CVE State: PUBLISHED
Explain CVE-2023-0600
Explain the vulnerability: CVE-2023-0600
The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 6.9 does not escape user input which is concatenated to an SQL query, allowing unauthenticated visitors to conduct SQL Injection attacks. Affected Products: WP Visitor Statistics (Real Time Traffic) References: [{'url': 'https://wpscan.com/vulnerability/8f46df4d-cb80-4d66-846f-85faf2ea0ec4', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0602
Explain the vulnerability: CVE-2023-0602
The Twittee Text Tweet WordPress plugin through 1.0.8 does not properly escape POST values which are printed back to the user inside one of the plugin's administrative page, which allows reflected XSS attacks targeting administrators to happen. Affected Products: Twittee Text Tweet References: [{'url': 'https://wpscan.com/vulnerability/c357f93d-4f21-4cd9-9378-d97756c75255', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0603
Explain the vulnerability: CVE-2023-0603
The Sloth Logo Customizer WordPress plugin through 2.0.2 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack Affected Products: Sloth Logo Customizer References: [{'url': 'https://wpscan.com/vulnerability/1c93ea8f-4e68-4da1-994e-35a5873278ba', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0604
Explain the vulnerability: CVE-2023-0604
The WP Food Manager WordPress plugin before 1.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) Affected Products: WP Food Manager References: [{'url': 'https://wpscan.com/vulnerability/4492b5ad-c339-47f5-9003-a9c5f23efdd9', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0605
Explain the vulnerability: CVE-2023-0605
The Auto Rename Media On Upload WordPress plugin before 1.1.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). Affected Products: Auto Rename Media On Upload References: [{'url': 'https://wpscan.com/vulnerability/57267c3c-d55e-4b37-a6d0-c5cd8569625c', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0606
Explain the vulnerability: CVE-2023-0606
Cross-site Scripting (XSS) - Reflected in GitHub repository ampache/ampache prior to 5.5.7. Affected Products: ampache/ampache References: [{'url': 'https://huntr.dev/bounties/0bfed46d-ac96-43c4-93fb-13f68b4e711b'}, {'url': 'https://github.com/ampache/ampache/commit/d3191503ca856dfe0b33d7cb17717ffd480046cb'}] CVE State: PUBLISHED
Explain CVE-2023-0607
Explain the vulnerability: CVE-2023-0607
Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606. Affected Products: projectsend/projectsend References: [{'url': 'https://huntr.dev/bounties/9294743d-7818-4264-b973-59de027d549b'}, {'url': 'https://github.com/projectsend/projectsend/commit/698be4ade1db6ae0eaf27c843a03ffc9683cca0a'}] CVE State: PUBLISHED
Explain CVE-2023-0608
Explain the vulnerability: CVE-2023-0608
Cross-site Scripting (XSS) - DOM in GitHub repository microweber/microweber prior to 1.3.2. Affected Products: microweber/microweber References: [{'url': 'https://github.com/microweber/microweber/commit/20df56615e61624f5fff149849753869e4b3b936'}, {'url': 'https://huntr.dev/bounties/02a86e0d-dff7-4e27-89d5-2f7dcd4b580c'}] CVE State: PUBLISHED
Explain CVE-2023-0609
Explain the vulnerability: CVE-2023-0609
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3. Affected Products: wallabag/wallabag References: [{'url': 'https://huntr.dev/bounties/3adef66f-fc86-4e6d-a540-2ffa59342ff0'}, {'url': 'https://github.com/wallabag/wallabag/commit/0f7460dbab9e29f4f7d2944aca20210f828b6abb'}] CVE State: PUBLISHED
Explain CVE-2023-0610
Explain the vulnerability: CVE-2023-0610
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3. Affected Products: wallabag/wallabag References: [{'url': 'https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926'}, {'url': 'https://github.com/wallabag/wallabag/commit/5ac6b6bff9e2e3a87fd88c2904ff3c6aac40722e'}] CVE State: PUBLISHED
Explain CVE-2023-0611
Explain the vulnerability: CVE-2023-0611
A vulnerability, which was classified as critical, has been found in TRENDnet TEW-652BRP 3.04B01. This issue affects some unknown processing of the file get_set.ccp of the component Web Management Interface. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219935. Affected Products: TEW-652BRP References: [{'url': 'https://vuldb.com/?id.219935', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.219935', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0612
Explain the vulnerability: CVE-2023-0612
A vulnerability, which was classified as critical, was found in TRENDnet TEW-811DRU 1.0.10.0. Affected is an unknown function of the file /wireless/basic.asp of the component httpd. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219936. Affected Products: TEW-811DRU References: [{'url': 'https://vuldb.com/?id.219936', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.219936', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0613
Explain the vulnerability: CVE-2023-0613
A vulnerability has been found in TRENDnet TEW-811DRU 1.0.10.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /wireless/security.asp of the component httpd. The manipulation leads to memory corruption. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219937 was assigned to this vulnerability. Affected Products: TEW-811DRU References: [{'url': 'https://vuldb.com/?id.219937', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.219937', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0614
Explain the vulnerability: CVE-2023-0614
The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure vi LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC. Affected Products: Samba References: [{'url': 'https://www.samba.org/samba/security/CVE-2023-0614.html'}, {'url': 'https://security.netapp.com/advisory/ntap-20230406-0007/'}, {'name': 'FEDORA-2023-1c172e3264', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/'}] CVE State: PUBLISHED
Explain CVE-2023-0615
Explain the vulnerability: CVE-2023-0615
A memory leak flaw and potential divide by zero and Integer overflow was found in the Linux kernel V4L2 and vivid test code functionality. This issue occurs when a user triggers ioctls, such as VIDIOC_S_DV_TIMINGS ioctl. This could allow a local user to crash the system if vivid test code enabled. Affected Products: Kernel References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2166287'}] CVE State: PUBLISHED
Explain CVE-2023-0616
Explain the vulnerability: CVE-2023-0616
If a MIME email combines OpenPGP and OpenPGP MIME data in a certain way Thunderbird repeatedly attempts to process and display the message, which could cause Thunderbird's user interface to lock up and no longer respond to the user's actions. An attacker could send a crafted message with this structure to attempt a DoS attack. This vulnerability affects Thunderbird < 102.8. Affected Products: Thunderbird References: [{'url': 'https://www.mozilla.org/security/advisories/mfsa2023-07/'}, {'url': 'https://bugzilla.mozilla.org/show_bug.cgi?id=1806507'}] CVE State: PUBLISHED
Explain CVE-2023-0617
Explain the vulnerability: CVE-2023-0617
A vulnerability was found in TRENDNet TEW-811DRU 1.0.10.0. It has been classified as critical. This affects an unknown part of the file /wireless/guestnetwork.asp of the component httpd. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219957 was assigned to this vulnerability. Affected Products: TEW-811DRU References: [{'url': 'https://vuldb.com/?id.219957', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.219957', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0618
Explain the vulnerability: CVE-2023-0618
A vulnerability was found in TRENDnet TEW-652BRP 3.04B01. It has been declared as critical. This vulnerability affects unknown code of the file cfg_op.ccp of the component Web Service. The manipulation leads to memory corruption. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-219958 is the identifier assigned to this vulnerability. Affected Products: TEW-652BRP References: [{'url': 'https://vuldb.com/?id.219958', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.219958', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0619
Explain the vulnerability: CVE-2023-0619
The Kraken.io Image Optimizer plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on its AJAX actions in versions up to, and including, 2.6.8. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to reset image optimizations. Affected Products: Kraken.io Image Optimizer References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/f94eabc5-6e3b-46df-9e36-d7d0fad833de'}, {'url': 'https://plugins.trac.wordpress.org/browser/kraken-image-optimizer/tags/2.6.6/kraken.php#L705'}] CVE State: PUBLISHED
Explain CVE-2023-0620
Explain the vulnerability: CVE-2023-0620
HashiCorp Vault and Vault Enterprise versions 0.8.0 through 1.13.1 are vulnerable to an SQL injection attack when configuring the Microsoft SQL (MSSQL) Database Storage Backend. When configuring the MSSQL plugin through the local, certain parameters are not sanitized when passed to the user-provided MSSQL database. An attacker may modify these parameters to execute a malicious SQL command. This issue is fixed in versions 1.13.1, 1.12.5, and 1.11.9. Affected Products: Vault References: [{'url': 'https://discuss.hashicorp.com/t/hcsec-2023-12-vault-s-microsoft-sql-database-storage-backend-vulnerable-to-sql-injection-via-configuration-file/52080/1'}, {'url': 'https://security.netapp.com/advisory/ntap-20230526-0008/'}] CVE State: PUBLISHED
Explain CVE-2023-0621
Explain the vulnerability: CVE-2023-0621
Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds read vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in reads past the end of allocated data structures. An attacker could leverage these vulnerabilities to execute arbitrary code in the context of the current process. Affected Products: Cscape Envision RV References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-040-04'}] CVE State: PUBLISHED
Explain CVE-2023-0622
Explain the vulnerability: CVE-2023-0622
Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds write vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in writes past the end of allocated data structures. An attacker could leverage these vulnerabilities to execute arbitrary code in the context of the current process. Affected Products: Cscape Envision RV References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-040-04'}] CVE State: PUBLISHED
Explain CVE-2023-0623
Explain the vulnerability: CVE-2023-0623
Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds write vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in writes past the end of allocated data structures. An attacker could leverage these vulnerabilities to execute arbitrary code in the context of the current process. Affected Products: Cscape Envision RV References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-040-04'}] CVE State: PUBLISHED
Explain CVE-2023-0624
Explain the vulnerability: CVE-2023-0624
OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html. Affected Products: OrangeScrum References: [{'url': 'https://github.com/Orangescrum/orangescrum/'}, {'url': 'https://fluidattacks.com/advisories/oberhofer/'}] CVE State: PUBLISHED
Explain CVE-2023-0628
Explain the vulnerability: CVE-2023-0628
Docker Desktop before 4.17.0 allows an attacker to execute an arbitrary command inside a Dev Environments container during initialization by tricking a user to open a crafted malicious docker-desktop:// URL. Affected Products: Docker Desktop References: [{'tags': ['release-notes'], 'url': 'https://docs.docker.com/desktop/release-notes/#4170'}] CVE State: PUBLISHED
Explain CVE-2023-0629
Explain the vulnerability: CVE-2023-0629
Docker Desktop before 4.17.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions by setting the Docker host to docker.raw.sock, or npipe:////.pipe/docker_engine_linux on Windows, via the -H (--host) CLI flag or the DOCKER_HOST environment variable and launch containers without the additional hardening features provided by ECI. This would not affect already running containers, nor containers launched through the usual approach (without Docker's raw socket). The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges. This issue has been fixed in Docker Desktop 4.17.0. Affected Docker Desktop versions: from 4.13.0 before 4.17.0. Affected Products: Docker Desktop References: [{'tags': ['release-notes'], 'url': 'https://docs.docker.com/desktop/release-notes/#4170'}] CVE State: PUBLISHED
Explain CVE-2023-0630
Explain the vulnerability: CVE-2023-0630
The Slimstat Analytics WordPress plugin before 4.9.3.3 does not prevent subscribers from rendering shortcodes that concatenates attributes directly into an SQL query. Affected Products: Slimstat Analytics References: [{'url': 'https://wpscan.com/vulnerability/b82bdd02-b699-4527-86cc-d60b56ab0c55', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0631
Explain the vulnerability: CVE-2023-0631
The Paid Memberships Pro WordPress plugin before 2.9.12 does not prevent subscribers from rendering shortcodes that concatenate attributes directly into an SQL query. Affected Products: Paid Memberships Pro References: [{'url': 'https://wpscan.com/vulnerability/19ef92fd-b493-4488-91f0-e6ba51362f79', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0632
Explain the vulnerability: CVE-2023-0632
An issue has been discovered in GitLab affecting all versions starting from 15.2 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible by using crafted payloads to search Harbor Registry. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/390148', 'name': 'GitLab Issue #390148', 'tags': ['issue-tracking']}, {'url': 'https://hackerone.com/reports/1852677', 'name': 'HackerOne Bug Bounty Report #1852677', 'tags': ['technical-description', 'exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0634
Explain the vulnerability: CVE-2023-0634
N\A Affected Products: N\A References: N\A CVE State: REJECTED
Explain CVE-2023-0635
Explain the vulnerability: CVE-2023-0635
Improper Privilege Management vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Privilege Escalation.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.01; NEXUS Series: from 3.0;0 before 3.07.01; MATRIX Series: from 3.0;0 before 3.07.01. Affected Products: ASPECT®-Enterprise References: [{'url': 'https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403&LanguageCode=en&DocumentPartId=&Action=Launch'}] CVE State: PUBLISHED
Explain CVE-2023-0636
Explain the vulnerability: CVE-2023-0636
Improper Input Validation vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Command Injection.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.0; NEXUS Series: from 3.0;0 before 3.07.0; MATRIX Series: from 3.0;0 before 3.07.1. Affected Products: ASPECT®-Enterprise References: [{'url': 'https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403&LanguageCode=en&DocumentPartId=&Action=Launch'}] CVE State: PUBLISHED
Explain CVE-2023-0637
Explain the vulnerability: CVE-2023-0637
A vulnerability, which was classified as critical, was found in TRENDnet TEW-811DRU 1.0.10.0. This affects an unknown part of the file wan.asp of the component Web Management Interface. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220017 was assigned to this vulnerability. Affected Products: TEW-811DRU References: [{'url': 'https://vuldb.com/?id.220017', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.220017', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0638
Explain the vulnerability: CVE-2023-0638
A vulnerability has been found in TRENDnet TEW-811DRU 1.0.10.0 and classified as critical. This vulnerability affects unknown code of the component Web Interface. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-220018 is the identifier assigned to this vulnerability. Affected Products: TEW-811DRU References: [{'url': 'https://vuldb.com/?id.220018', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.220018', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0639
Explain the vulnerability: CVE-2023-0639
A vulnerability was found in TRENDnet TEW-652BRP 3.04b01 and classified as problematic. This issue affects some unknown processing of the file get_set.ccp of the component Web Management Interface. The manipulation of the argument nextPage leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-220019. Affected Products: TEW-652BRP References: [{'url': 'https://vuldb.com/?id.220019', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220019', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0640
Explain the vulnerability: CVE-2023-0640
A vulnerability was found in TRENDnet TEW-652BRP 3.04b01. It has been classified as critical. Affected is an unknown function of the file ping.ccp of the component Web Interface. The manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220020. Affected Products: TEW-652BRP References: [{'url': 'https://vuldb.com/?id.220020', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.220020', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0641
Explain the vulnerability: CVE-2023-0641
A vulnerability was found in PHPGurukul Employee Leaves Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file changepassword.php. The manipulation of the argument newpassword/confirmpassword leads to weak password requirements. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220021 was assigned to this vulnerability. Affected Products: Employee Leaves Management System References: [{'url': 'https://vuldb.com/?id.220021', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220021', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ctflearner/Vulnerability/blob/main/Employee%20Leaves%20Management%20System/ELMS.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0642
Explain the vulnerability: CVE-2023-0642
Cross-Site Request Forgery (CSRF) in GitHub repository squidex/squidex prior to 7.4.0. Affected Products: squidex/squidex References: [{'url': 'https://huntr.dev/bounties/3bbdafe6-e152-47bb-88a7-fd031725323d'}, {'url': 'https://github.com/squidex/squidex/commit/2da3c41da82eb945832f22bb70dba567ac6ce969'}] CVE State: PUBLISHED
Explain CVE-2023-0643
Explain the vulnerability: CVE-2023-0643
Improper Handling of Additional Special Element in GitHub repository squidex/squidex prior to 7.4.0. Affected Products: squidex/squidex References: [{'url': 'https://huntr.dev/bounties/ea90f8b9-d8fe-4432-9a52-4d663400c52f'}, {'url': 'https://github.com/squidex/squidex/commit/cf4efc52eab17098474d73ccff6c136fc2f737db'}] CVE State: PUBLISHED
Explain CVE-2023-0644
Explain the vulnerability: CVE-2023-0644
The Push Notifications for WordPress by PushAssist WordPress plugin through 3.0.8 does not sanitise and escape various parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin. Affected Products: Push Notifications for WordPress by PushAssist References: [{'url': 'https://wpscan.com/vulnerability/08f5089c-36f3-4d12-bca5-99cd3ae78f67', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0645
Explain the vulnerability: CVE-2023-0645
An out of bounds read exists in libjxl. An attacker using a specifically crafted file could cause an out of bounds read in the exif handler. We recommend upgrading to version 0.8.1 or past commit  https://github.com/libjxl/libjxl/pull/2101/commits/d95b050c1822a5b1ede9e0dc937e43fca1b10159 https://github.com/libjxl/libjxl/pull/2101/commits/d95b050c1822a5b1ede9e0dc937e43fca1b10159 Affected Products: Libjxl References: [{'url': 'https://github.com/libjxl/libjxl/pull/2101/commits/d95b050c1822a5b1ede9e0dc937e43fca1b10159'}, {'url': 'https://github.com/libjxl/libjxl/pull/2101'}] CVE State: PUBLISHED
Explain CVE-2023-0646
Explain the vulnerability: CVE-2023-0646
A vulnerability classified as critical was found in dst-admin 1.5.0. Affected by this vulnerability is an unknown functionality of the file /home/cavesConsole. The manipulation of the argument command leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220033 was assigned to this vulnerability. Affected Products: dst-admin References: [{'url': 'https://vuldb.com/?id.220033', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220033', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Ha0Liu/cveAdd/tree/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0cavesConsole%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0647
Explain the vulnerability: CVE-2023-0647
A vulnerability, which was classified as critical, has been found in dst-admin 1.5.0. Affected by this issue is some unknown functionality of the file /home/kickPlayer. The manipulation of the argument userId leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-220034 is the identifier assigned to this vulnerability. Affected Products: dst-admin References: [{'url': 'https://vuldb.com/?id.220034', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220034', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Ha0Liu/cveAdd/blob/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0kickPlayer%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/Dst-admin%201.5.0%20background%20kickPlayer%20interface%20remote%20command%20execution.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0648
Explain the vulnerability: CVE-2023-0648
A vulnerability, which was classified as critical, was found in dst-admin 1.5.0. This affects an unknown part of the file /home/masterConsole. The manipulation of the argument command leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-220035. Affected Products: dst-admin References: [{'url': 'https://vuldb.com/?id.220035', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220035', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Ha0Liu/cveAdd/tree/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0masterConsole%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0649
Explain the vulnerability: CVE-2023-0649
A vulnerability has been found in dst-admin 1.5.0 and classified as critical. This vulnerability affects unknown code of the file /home/sendBroadcast. The manipulation of the argument message leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220036. Affected Products: dst-admin References: [{'url': 'https://vuldb.com/?id.220036', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220036', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Ha0Liu/cveAdd/tree/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0sendBroadcast%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0650
Explain the vulnerability: CVE-2023-0650
A vulnerability was found in YAFNET up to 3.1.11 and classified as problematic. This issue affects some unknown processing of the component Signature Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.12 is able to address this issue. The name of the patch is a1442a2bacc3335461b44c250e81f8d99c60735f. It is recommended to upgrade the affected component. The identifier VDB-220037 was assigned to this vulnerability. Affected Products: YAFNET References: [{'url': 'https://vuldb.com/?id.220037', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.220037', 'tags': ['signature', 'permissions-required']}, {'url': 'https://drive.google.com/drive/folders/1iJuhjLQy3QPIgKKgWUzEEfr_q0boaR00?usp=sharing', 'tags': ['exploit']}, {'url': 'https://github.com/YAFNET/YAFNET/security/advisories/GHSA-mg6p-jjff-7g5m', 'tags': ['related']}, {'url': 'https://github.com/YAFNET/YAFNET/commit/a1442a2bacc3335461b44c250e81f8d99c60735f', 'tags': ['patch']}, {'url': 'https://github.com/YAFNET/YAFNET/releases/tag/v3.1.12', 'tags': ['patch']}] CVE State: PUBLISHED
Explain CVE-2023-0651
Explain the vulnerability: CVE-2023-0651
A vulnerability was found in FastCMS 0.1.0. It has been classified as critical. Affected is an unknown function of the component Template Management. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-220038 is the identifier assigned to this vulnerability. Affected Products: FastCMS References: [{'url': 'https://vuldb.com/?id.220038', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.220038', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/fastcms_bug/blob/main/template_files_upload.md', 'tags': ['related']}, {'url': 'https://github.com/linmoren/fastcms_bug/blob/main/password.zip', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0652
Explain the vulnerability: CVE-2023-0652
Due to a hardlink created in the ProgramData folder during the repair process of the software, the installer (MSI) of WARP Client for Windows (<= 2022.12.582.0) allowed a malicious attacker to forge the destination of the hardlink and escalate privileges, overwriting SYSTEM protected files. As Cloudflare WARP client for Windows (up to version 2022.5.309.0) allowed creation of mount points from its ProgramData folder, during installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files. Affected Products: WARP References: [{'url': 'https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release'}, {'url': 'https://developers.cloudflare.com/warp-client/get-started/windows/'}, {'url': 'https://github.com/cloudflare/advisories/security/advisories/GHSA-xmhj-9p83-xvw9'}] CVE State: PUBLISHED
Explain CVE-2023-0655
Explain the vulnerability: CVE-2023-0655
SonicWall Email Security contains a vulnerability that could permit a remote unauthenticated attacker access to an error page that includes sensitive information about users email addresses. Affected Products: SonicWall Email Security References: [{'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0002'}] CVE State: PUBLISHED
Explain CVE-2023-0656
Explain the vulnerability: CVE-2023-0656
A Stack-based buffer overflow vulnerability in the SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS), which could cause an impacted firewall to crash. Affected Products: SonicOS References: [{'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0004'}] CVE State: PUBLISHED
Explain CVE-2023-0658
Explain the vulnerability: CVE-2023-0658
A vulnerability, which was classified as critical, was found in Multilaser RE057 and RE170 2.1/2.2. This affects an unknown part of the file /param.file.tgz of the component Backup File Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The identifier VDB-220053 was assigned to this vulnerability. Affected Products: RE057 References: [{'url': 'https://vuldb.com/?id.220053', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.220053', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0659
Explain the vulnerability: CVE-2023-0659
A vulnerability was found in BDCOM 1704-WGL 2.0.6314. It has been classified as critical. This affects an unknown part of the file /param.file.tgz of the component Backup File Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The identifier VDB-220101 was assigned to this vulnerability. Affected Products: 1704-WGL References: [{'url': 'https://vuldb.com/?id.220101', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.220101', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0660
Explain the vulnerability: CVE-2023-0660
The Smart Slider 3 WordPress plugin before 3.5.1.14 does not properly validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks Affected Products: Smart Slider 3 References: [{'url': 'https://wpscan.com/vulnerability/3fe712bc-ce7f-4b30-9fc7-1ff15aa5b6ce', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0661
Explain the vulnerability: CVE-2023-0661
Improper access control in Devolutions Server allows an authenticated user to access unauthorized sensitive data. Affected Products: Devolutions Server References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0002'}] CVE State: PUBLISHED
Explain CVE-2023-0662
Explain the vulnerability: CVE-2023-0662
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space.  Affected Products: PHP References: [{'url': 'https://github.com/php/php-src/security/advisories/GHSA-54hq-v5wp-fqgv'}, {'url': 'https://security.netapp.com/advisory/ntap-20230517-0001/'}] CVE State: PUBLISHED
Explain CVE-2023-0663
Explain the vulnerability: CVE-2023-0663
A vulnerability was found in Calendar Event Management System 2.3.0. It has been rated as critical. This issue affects some unknown processing of the component Login Page. The manipulation of the argument name/pwd leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-220175. Affected Products: Calendar Event Management System References: [{'url': 'https://vuldb.com/?id.220175', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220175', 'tags': ['signature', 'permissions-required']}, {'url': 'https://www.youtube.com/watch?v=UsSZU6EWB1E', 'tags': ['media-coverage']}] CVE State: PUBLISHED
Explain CVE-2023-0664
Explain the vulnerability: CVE-2023-0664
A flaw was found in the QEMU Guest Agent service for Windows. A local unprivileged user may be able to manipulate the QEMU Guest Agent's Windows installer via repair custom actions to elevate their privileges on the system. Affected Products: QEMU References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2167423'}, {'url': 'https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg01445.html'}, {'url': 'https://gitlab.com/qemu-project/qemu/-/commit/88288c2a51faa7c795f053fc8b31b1c16ff804c5'}, {'url': 'https://gitlab.com/qemu-project/qemu/-/commit/07ce178a2b0768eb9e712bb5ad0cf6dc7fcf0158'}, {'name': 'FEDORA-2023-e5a35f7197', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SEOC7SRJWLZSXCND2ADFW6C76ZMTZLE4/'}, {'url': 'https://security.netapp.com/advisory/ntap-20230517-0005/'}] CVE State: PUBLISHED
Explain CVE-2023-0665
Explain the vulnerability: CVE-2023-0665
HashiCorp Vault's PKI mount issuer endpoints did not correctly authorize access to remove an issuer or modify issuer metadata, potentially resulting in denial of service of the PKI mount. This bug did not affect public or private key material, trust chains or certificate issuance. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9. Affected Products: Vault References: [{'url': 'https://discuss.hashicorp.com/t/hcsec-2023-11-vault-s-pki-issuer-endpoint-did-not-correctly-authorize-access-to-issuer-metadata/52079/1'}, {'url': 'https://security.netapp.com/advisory/ntap-20230526-0008/'}] CVE State: PUBLISHED
Explain CVE-2023-0666
Explain the vulnerability: CVE-2023-0666
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark. Affected Products: Wireshark References: [{'tags': ['third-party-advisory'], 'url': 'https://takeonme.org/cves/CVE-2023-0666.html'}, {'tags': ['issue-tracking'], 'url': 'https://gitlab.com/wireshark/wireshark/-/issues/19085'}, {'tags': ['release-notes'], 'url': 'https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html'}, {'tags': ['vendor-advisory'], 'url': 'https://www.wireshark.org/security/wnpa-sec-2023-18.html'}, {'url': 'https://www.debian.org/security/2023/dsa-5429'}] CVE State: PUBLISHED
Explain CVE-2023-0667
Explain the vulnerability: CVE-2023-0667
Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark Affected Products: Wireshark References: [{'tags': ['third-party-advisory'], 'url': 'https://takeonme.org/cves/CVE-2023-0667.html'}, {'tags': ['issue-tracking'], 'url': 'https://gitlab.com/wireshark/wireshark/-/issues/19086'}] CVE State: PUBLISHED
Explain CVE-2023-0668
Explain the vulnerability: CVE-2023-0668
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark. Affected Products: Wireshark References: [{'tags': ['third-party-advisory'], 'url': 'https://takeonme.org/cves/CVE-2023-0668.html'}, {'tags': ['issue-tracking'], 'url': 'https://gitlab.com/wireshark/wireshark/-/issues/19087'}, {'tags': ['release-notes'], 'url': 'https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html'}, {'tags': ['vendor-advisory'], 'url': 'https://www.wireshark.org/security/wnpa-sec-2023-19.html'}, {'url': 'https://www.debian.org/security/2023/dsa-5429'}] CVE State: PUBLISHED
Explain CVE-2023-0669
Explain the vulnerability: CVE-2023-0669
Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2. Affected Products: Goanywhere MFT References: [{'tags': ['vendor-advisory'], 'url': 'https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1'}, {'tags': ['media-coverage'], 'url': 'https://infosec.exchange/@briankrebs/109795710941843934'}, {'tags': ['third-party-advisory'], 'url': 'https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/'}, {'tags': ['third-party-advisory'], 'url': 'https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis'}, {'tags': ['exploit'], 'url': 'https://github.com/rapid7/metasploit-framework/pull/17607'}, {'tags': ['media-coverage'], 'url': 'https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft'}, {'tags': ['third-party-advisory'], 'url': 'https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html'}, {'url': 'http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html'}] CVE State: PUBLISHED
Explain CVE-2023-0670
Explain the vulnerability: CVE-2023-0670
Ulearn version a5a7ca20de859051ea0470542844980a66dfc05d allows an attacker with administrator permissions to obtain remote code execution on the server through the image upload functionality. This occurs because the application does not validate that the uploaded image is actually an image. Affected Products: Ulearn References: [{'url': 'https://fluidattacks.com/advisories/scott/'}] CVE State: PUBLISHED
Explain CVE-2023-0671
Explain the vulnerability: CVE-2023-0671
Code Injection in GitHub repository froxlor/froxlor prior to 2.0.10. Affected Products: froxlor/froxlor References: [{'url': 'https://huntr.dev/bounties/c2a84917-7ac0-4169-81c1-b61e617023de'}, {'url': 'https://github.com/froxlor/froxlor/commit/0034681412057fef2dfe9cce9f8a6e3321f52edc'}] CVE State: PUBLISHED
Explain CVE-2023-0673
Explain the vulnerability: CVE-2023-0673
A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability is an unknown functionality of the file oews/?p=products/view_product.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-220195. Affected Products: Online Eyewear Shop References: [{'url': 'https://vuldb.com/?id.220195', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220195', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0674
Explain the vulnerability: CVE-2023-0674
A vulnerability, which was classified as problematic, has been found in XXL-JOB 2.3.1. Affected by this issue is some unknown functionality of the file /user/updatePwd of the component New Password Handler. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220196. Affected Products: XXL-JOB References: [{'url': 'https://vuldb.com/?id.220196', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.220196', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/boyi0508/xxl-job-explain/blob/main/README.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0675
Explain the vulnerability: CVE-2023-0675
A vulnerability, which was classified as critical, was found in Calendar Event Management System 2.3.0. This affects an unknown part. The manipulation of the argument start/end leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220197 was assigned to this vulnerability. Affected Products: Calendar Event Management System References: [{'url': 'https://vuldb.com/?id.220197', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220197', 'tags': ['signature', 'permissions-required']}, {'url': 'https://www.youtube.com/watch?v=eoPuINHWjHo', 'tags': ['exploit', 'media-coverage']}] CVE State: PUBLISHED
Explain CVE-2023-0676
Explain the vulnerability: CVE-2023-0676
Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to 1.5.1. Affected Products: phpipam/phpipam References: [{'url': 'https://huntr.dev/bounties/b72d4f0c-8a96-4b40-a031-7d469c6ab93b'}, {'url': 'https://github.com/phpipam/phpipam/commit/94ec73ff1d33926b75b811ded6f0b4a46088a7ec'}] CVE State: PUBLISHED
Explain CVE-2023-0677
Explain the vulnerability: CVE-2023-0677
Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to v1.5.1. Affected Products: phpipam/phpipam References: [{'url': 'https://huntr.dev/bounties/d280ae81-a1c9-4a50-9aa4-f98f1f9fd2c0'}, {'url': 'https://github.com/phpipam/phpipam/commit/8fbf87e19a6098972abc7521554db5757c3edd89'}] CVE State: PUBLISHED
Explain CVE-2023-0678
Explain the vulnerability: CVE-2023-0678
Missing Authorization in GitHub repository phpipam/phpipam prior to v1.5.1. Affected Products: phpipam/phpipam References: [{'url': 'https://huntr.dev/bounties/8d299377-be00-46dc-bebe-3d439127982f'}, {'url': 'https://github.com/phpipam/phpipam/commit/1960bd24e8a55796da066237cf11272c44bb1cc4'}] CVE State: PUBLISHED
Explain CVE-2023-0679
Explain the vulnerability: CVE-2023-0679
A vulnerability was found in SourceCodester Canteen Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file removeUser.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220220. Affected Products: Canteen Management System References: [{'url': 'https://vuldb.com/?id.220220', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220220', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/weixin_43864034/article/details/128904906', 'tags': ['exploit']}] CVE State: PUBLISHED