instruction
stringlengths 21
21
| input
stringlengths 40
40
| output
stringlengths 62
37.3k
|
---|---|---|
Explain CVE-2023-0567 | Explain the vulnerability: CVE-2023-0567 | In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, password_verify() function may accept some invalid Blowfish hashes as valid. If such invalid hash ever ends up in the password database, it may lead to an application allowing any password for this entry as valid.
Affected Products: PHP
References: [{'url': 'https://bugs.php.net/bug.php?id=81744'}, {'url': 'https://github.com/php/php-src/security/advisories/GHSA-7fj2-8x79-rjf4'}]
CVE State: PUBLISHED |
Explain CVE-2023-0568 | Explain the vulnerability: CVE-2023-0568 | In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.
Affected Products: PHP
References: [{'url': 'https://bugs.php.net/bug.php?id=81746'}, {'url': 'https://security.netapp.com/advisory/ntap-20230517-0001/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0569 | Explain the vulnerability: CVE-2023-0569 | Weak Password Requirements in GitHub repository publify/publify prior to 9.2.10.
Affected Products: publify/publify
References: [{'url': 'https://huntr.dev/bounties/81b1e1da-10dd-435e-94ae-4bdd41df6df9'}, {'url': 'https://github.com/publify/publify/commit/8905e4e639cf03b758da558568a86c9816253b2d'}]
CVE State: PUBLISHED |
Explain CVE-2023-0570 | Explain the vulnerability: CVE-2023-0570 | A vulnerability, which was classified as critical, was found in SourceCodester Online Tours & Travels Management System 1.0. This affects an unknown part of the file user\operations\payment_operation.php. The manipulation of the argument booking_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219729 was assigned to this vulnerability.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.219729', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219729', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/user_operations_payment_operation_booking_id.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0571 | Explain the vulnerability: CVE-2023-0571 | A vulnerability has been found in SourceCodester Canteen Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file createcustomer.php of the component Add Customer. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-219730 is the identifier assigned to this vulnerability.
Affected Products: Canteen Management System
References: [{'url': 'https://vuldb.com/?id.219730', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219730', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ctflearner/Vulnerability/blob/main/Canteen%20Management%20System/Canteen_Management_System_XSS_IN_Add_Customer.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0572 | Explain the vulnerability: CVE-2023-0572 | Unchecked Error Condition in GitHub repository froxlor/froxlor prior to 2.0.10.
Affected Products: froxlor/froxlor
References: [{'url': 'https://huntr.dev/bounties/4ab24ee2-3ff6-4248-9555-0af3e5f754ec'}, {'url': 'https://github.com/froxlor/froxlor/commit/7b08a71c59430d06c1efb012a6c6448262aacdb1'}]
CVE State: PUBLISHED |
Explain CVE-2023-0574 | Explain the vulnerability: CVE-2023-0574 | Server-Side Request Forgery (SSRF), Improperly Controlled Modification of Dynamically-Determined Object Attributes, Improper Restriction of Excessive Authentication Attempts vulnerability in YugaByte, Inc. Yugabyte Managed allows Accessing Functionality Not Properly Constrained by ACLs, Communication Channel Manipulation, Authentication Abuse.This issue affects Yugabyte Managed: from 2.0 through 2.13.
Affected Products: Yugabyte Managed
References: [{'url': 'https://www.yugabyte.com/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0575 | Explain the vulnerability: CVE-2023-0575 | External Control of Critical State Data, Improper Control of Generation of Code ('Code Injection') vulnerability in YugaByte, Inc. Yugabyte DB on Windows, Linux, MacOS, iOS (DevopsBase.Java:execCommand, TableManager.Java:runCommand modules) allows API Manipulation, Privilege Abuse. This vulnerability is associated with program files backup.Py.
This issue affects Yugabyte DB: Lesser then 2.2.
Affected Products: Yugabyte DB
References: [{'url': 'https://www.yugabyte.com/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0576 | Explain the vulnerability: CVE-2023-0576 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-2023-0577 | Explain the vulnerability: CVE-2023-0577 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ASOS Information Technologies SOBIAD allows Cross-Site Scripting (XSS).This issue affects SOBIAD: before 23.02.01.
Affected Products: SOBIAD
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0125'}]
CVE State: PUBLISHED |
Explain CVE-2023-0578 | Explain the vulnerability: CVE-2023-0578 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ASOS Information Technologies Book Cites allows Cross-Site Scripting (XSS).This issue affects Book Cites: before 23.01.05.
Affected Products: Book Cites
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0125'}]
CVE State: PUBLISHED |
Explain CVE-2023-0580 | Explain the vulnerability: CVE-2023-0580 | Insecure Storage of Sensitive Information vulnerability in ABB My Control System (on-premise) allows an attacker who successfully exploited this vulnerability to gain access to the secure application data or take control of the application.
Of the services that make up the My Control System (on-premise) application, the following ones are affected by this vulnerability:
User Interface
System Monitoring1
Asset Inventory
This issue affects My Control System (on-premise): from 5.0;0 through 5.13.
Affected Products: My Control System (on-premise)
References: [{'url': 'https://search.abb.com/library/Download.aspx?DocumentID=7PAA007893&LanguageCode=en&DocumentPartId=&Action=Launch'}]
CVE State: PUBLISHED |
Explain CVE-2023-0581 | Explain the vulnerability: CVE-2023-0581 | The PrivateContent plugin for WordPress is vulnerable to protection mechanism bypass due to the use of client side validation in versions up to, and including, 8.4.3. This is due to the plugin checking if an IP had been blocklist via client-side scripts rather than server-side. This makes it possible for unauthenticated attackers to bypass any login restrictions that may prevent a brute force attack.
Affected Products: PrivateContent
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/de73304e-7a28-4304-b1ed-2f6dd7738236'}, {'url': 'https://lcweb.it/privatecontent/changelog'}]
CVE State: PUBLISHED |
Explain CVE-2023-0583 | Explain the vulnerability: CVE-2023-0583 | The VK Blocks plugin for WordPress is vulnerable to improper authorization via the REST 'update_vk_blocks_options' function in versions up to, and including, 1.57.0.5. This allows authenticated attackers, with contributor-level permissions or above, to change plugin settings including default icons.
Affected Products: VK Blocks
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/12a94f5b-bc30-4a65-b397-54488c836ec3?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/vk-blocks/trunk/inc/vk-blocks/App/RestAPI/BlockMeta/class-vk-blocks-entrypoint.php'}]
CVE State: PUBLISHED |
Explain CVE-2023-0584 | Explain the vulnerability: CVE-2023-0584 | The VK Blocks plugin for WordPress is vulnerable to improper authorization via the REST 'update_options' function in versions up to, and including, 1.57.0.5. This allows authenticated attackers, with contributor-level permissions or above, to change the 'vk_font_awesome_version' option to an arbitrary value.
Affected Products: VK Blocks
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/b90b7f6c-df7f-48a5-b283-cf5facbd71e5?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/vk-blocks/trunk/inc/vk-blocks/font-awesome/class-vk-blocks-font-awesome-api.php'}]
CVE State: PUBLISHED |
Explain CVE-2023-0585 | Explain the vulnerability: CVE-2023-0585 | The All in One SEO Pack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 4.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Administrator role or above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected Products: All in One SEO – Best WordPress SEO Plugin – Easily Improve SEO Rankings & Increase Traffic
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/3db97180-9308-4891-9de9-acefe31d088f'}, {'url': 'https://plugins.trac.wordpress.org/browser/all-in-one-seo-pack/tags/4.2.9/app/Common/Main/Updates.php?v=2829340#L624'}, {'url': 'https://plugins.trac.wordpress.org/browser/all-in-one-seo-pack/tags/4.2.9/app/Common/Main/Updates.php?v=2829340#L625'}, {'url': 'https://plugins.trac.wordpress.org/browser/all-in-one-seo-pack/tags/4.2.9/app/Common/Main/Updates.php?v=2829340#L665'}, {'url': 'https://plugins.trac.wordpress.org/browser/all-in-one-seo-pack/tags/4.2.9/app/Common/Main/Updates.php?v=2829340#L666'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2859011%40all-in-one-seo-pack%2Ftrunk&old=2847431%40all-in-one-seo-pack%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0586 | Explain the vulnerability: CVE-2023-0586 | The All in One SEO Pack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 4.2.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Contributor+ role to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected Products: All in One SEO – Best WordPress SEO Plugin – Easily Improve SEO Rankings & Increase Traffic
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/1c13f00e-3048-44cf-8979-2b0b0c508f3a'}, {'url': 'https://plugins.trac.wordpress.org/browser/all-in-one-seo-pack/tags/4.2.9/app/Common/Admin/PostSettings.php?v=2829340#L202'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2859011%40all-in-one-seo-pack%2Ftrunk&old=2847431%40all-in-one-seo-pack%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0587 | Explain the vulnerability: CVE-2023-0587 | A file upload vulnerability in exists in Trend Micro Apex One server build 11110. Using a malformed Content-Length header in an HTTP PUT message sent to URL /officescan/console/html/cgi/fcgiOfcDDA.exe, an unauthenticated remote attacker can upload arbitrary files to the SampleSubmission directory (i.e., \PCCSRV\TEMP\SampleSubmission) on the server. The attacker can upload a large number of large files to fill up the file system on which the Apex One server is installed.
Affected Products: Trend Micro Apex One
References: [{'url': 'https://www.tenable.com/security/research/tra-2023-5'}]
CVE State: PUBLISHED |
Explain CVE-2023-0588 | Explain the vulnerability: CVE-2023-0588 | The Catalyst Connect Zoho CRM Client Portal WordPress plugin before 2.1.0 does not sanitize and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high-privilege users such as admin.
Affected Products: Catalyst Connect Zoho CRM Client Portal
References: [{'url': 'https://wpscan.com/vulnerability/84be272e-0891-461c-91ad-496b64f92f8f', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0589 | Explain the vulnerability: CVE-2023-0589 | The WP Image Carousel WordPress plugin through 1.0.2 does not sanitise and escape some parameters, which could allow users with a role as low as contributor to perform Cross-Site Scripting attacks.
Affected Products: WP Image Carousel
References: [{'url': 'https://wpscan.com/vulnerability/58649228-69a6-4028-8487-166b0a07fcf7', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0590 | Explain the vulnerability: CVE-2023-0590 | A use-after-free flaw was found in qdisc_graft in net/sched/sch_api.c in the Linux Kernel due to a race problem. This flaw leads to a denial of service issue. If patch ebda44da44f6 ("net: sched: fix race condition in qdisc_graft()") not applied yet, then kernel could be affected.
Affected Products: Kernel
References: [{'url': 'https://lore.kernel.org/all/20221018203258.2793282-1-edumazet%40google.com/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0591 | Explain the vulnerability: CVE-2023-0591 |
ubireader_extract_files is vulnerable to path traversal when run against specifically crafted UBIFS files, allowing the attacker to overwrite files outside of the extraction directory (provided the process has write access to that file or directory).
This is due to the fact that a node name (dent_node.name) is considered trusted and joined to the extraction directory path during processing, then the node content is written to that joined path. By crafting a malicious UBIFS file with node names holding path traversal payloads (e.g. ../../tmp/outside.txt), it's possible to force ubi_reader to write outside of the extraction directory.
This issue affects ubi-reader before 0.8.5.
Affected Products: ubi_reader
References: [{'url': 'https://github.com/jrspruitt/ubi_reader/pull/57'}, {'url': 'https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0592 | Explain the vulnerability: CVE-2023-0592 | A path traversal vulnerability affects jefferson's JFFS2 filesystem extractor. By crafting malicious JFFS2 files, attackers could force jefferson to write outside of the extraction directory.This issue affects jefferson: before 0.4.1.
Affected Products: jefferson
References: [{'url': 'https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/'}, {'url': 'https://github.com/sviehb/jefferson/commit/971aca1a8b3b9f4fcb4674fa9621d3349195cdc6'}]
CVE State: PUBLISHED |
Explain CVE-2023-0593 | Explain the vulnerability: CVE-2023-0593 | A path traversal vulnerability affects yaffshiv YAFFS filesystem extractor. By crafting a malicious YAFFS file, an attacker could force yaffshiv to write outside of the extraction directory.
This issue affects yaffshiv up to version 0.1 included, which is the most recent at time of publication.
Affected Products: yaffshiv
References: [{'url': 'https://onekey.com/blog/security-advisory-remote-command-execution-in-binwalk/'}, {'url': 'https://github.com/devttys0/yaffshiv/pull/3/files'}]
CVE State: PUBLISHED |
Explain CVE-2023-0594 | Explain the vulnerability: CVE-2023-0594 | Grafana is an open-source platform for monitoring and observability.
Starting with the 7.0 branch, Grafana had a stored XSS vulnerability in the trace view visualization.
The stored XSS vulnerability was possible due the value of a span's attributes/resources were not properly sanitized and this will be rendered when the span's attributes/resources are expanded.
An attacker needs to have the Editor role in order to change the value of a trace view visualization to contain JavaScript.
This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard.
Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.
Affected Products: Grafana
References: [{'url': 'https://grafana.com/security/security-advisories/cve-2023-0594/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0595 | Explain the vulnerability: CVE-2023-0595 | A CWE-117: Improper Output Neutralization for Logs vulnerability exists that could cause the misinterpretation of log files when malicious packets are sent to the Geo SCADA server's database web port (default 443). Affected products: EcoStruxure Geo SCADA Expert 2019, EcoStruxure Geo SCADA Expert 2020, EcoStruxure Geo SCADA Expert 2021(All Versions prior to October 2022), ClearSCADA (All Versions)
Affected Products: EcoStruxure Geo SCADA Expert 2019
References: [{'url': 'https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-045-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-045-01.pdf'}]
CVE State: PUBLISHED |
Explain CVE-2023-0597 | Explain the vulnerability: CVE-2023-0597 | A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.
Affected Products: Kernel
References: [{'url': 'https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80'}, {'name': '[oss-security] 20230728 Re: StackRot (CVE-2023-3269): Linux kernel privilege escalation vulnerability', 'tags': ['mailing-list'], 'url': 'http://www.openwall.com/lists/oss-security/2023/07/28/1'}]
CVE State: PUBLISHED |
Explain CVE-2023-0598 | Explain the vulnerability: CVE-2023-0598 |
GE Digital Proficy iFIX 2022, GE Digital Proficy iFIX v6.1, and GE Digital Proficy iFIX v6.5 are vulnerable to code injection, which may allow an attacker to insert malicious configuration files in the expected web server execution path and gain full control of the HMI software.
Affected Products: Proficy iFIX
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-073-03'}, {'url': 'https://digitalsupport.ge.com/s/article/iFIX-Secure-Deployment-Guide?language=en_US'}]
CVE State: PUBLISHED |
Explain CVE-2023-0599 | Explain the vulnerability: CVE-2023-0599 | Rapid7 Metasploit Pro versions 4.21.2 and lower suffer from a stored cross site scripting vulnerability, due to a lack of JavaScript request string sanitization. Using this vulnerability, an authenticated attacker can execute arbitrary HTML and script code in the target browser against another Metasploit Pro user using a specially crafted request. Note that in most deployments, all Metasploit Pro users tend to enjoy privileges equivalent to local administrator.
Affected Products: Metasploit Pro
References: [{'tags': ['release-notes'], 'url': 'https://docs.rapid7.com/release-notes/metasploit/20230130/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0600 | Explain the vulnerability: CVE-2023-0600 | The WP Visitor Statistics (Real Time Traffic) WordPress plugin before 6.9 does not escape user input which is concatenated to an SQL query, allowing unauthenticated visitors to conduct SQL Injection attacks.
Affected Products: WP Visitor Statistics (Real Time Traffic)
References: [{'url': 'https://wpscan.com/vulnerability/8f46df4d-cb80-4d66-846f-85faf2ea0ec4', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0602 | Explain the vulnerability: CVE-2023-0602 | The Twittee Text Tweet WordPress plugin through 1.0.8 does not properly escape POST values which are printed back to the user inside one of the plugin's administrative page, which allows reflected XSS attacks targeting administrators to happen.
Affected Products: Twittee Text Tweet
References: [{'url': 'https://wpscan.com/vulnerability/c357f93d-4f21-4cd9-9378-d97756c75255', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0603 | Explain the vulnerability: CVE-2023-0603 | The Sloth Logo Customizer WordPress plugin through 2.0.2 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack
Affected Products: Sloth Logo Customizer
References: [{'url': 'https://wpscan.com/vulnerability/1c93ea8f-4e68-4da1-994e-35a5873278ba', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0604 | Explain the vulnerability: CVE-2023-0604 | The WP Food Manager WordPress plugin before 1.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Affected Products: WP Food Manager
References: [{'url': 'https://wpscan.com/vulnerability/4492b5ad-c339-47f5-9003-a9c5f23efdd9', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0605 | Explain the vulnerability: CVE-2023-0605 | The Auto Rename Media On Upload WordPress plugin before 1.1.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Affected Products: Auto Rename Media On Upload
References: [{'url': 'https://wpscan.com/vulnerability/57267c3c-d55e-4b37-a6d0-c5cd8569625c', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0606 | Explain the vulnerability: CVE-2023-0606 | Cross-site Scripting (XSS) - Reflected in GitHub repository ampache/ampache prior to 5.5.7.
Affected Products: ampache/ampache
References: [{'url': 'https://huntr.dev/bounties/0bfed46d-ac96-43c4-93fb-13f68b4e711b'}, {'url': 'https://github.com/ampache/ampache/commit/d3191503ca856dfe0b33d7cb17717ffd480046cb'}]
CVE State: PUBLISHED |
Explain CVE-2023-0607 | Explain the vulnerability: CVE-2023-0607 | Cross-site Scripting (XSS) - Stored in GitHub repository projectsend/projectsend prior to r1606.
Affected Products: projectsend/projectsend
References: [{'url': 'https://huntr.dev/bounties/9294743d-7818-4264-b973-59de027d549b'}, {'url': 'https://github.com/projectsend/projectsend/commit/698be4ade1db6ae0eaf27c843a03ffc9683cca0a'}]
CVE State: PUBLISHED |
Explain CVE-2023-0608 | Explain the vulnerability: CVE-2023-0608 | Cross-site Scripting (XSS) - DOM in GitHub repository microweber/microweber prior to 1.3.2.
Affected Products: microweber/microweber
References: [{'url': 'https://github.com/microweber/microweber/commit/20df56615e61624f5fff149849753869e4b3b936'}, {'url': 'https://huntr.dev/bounties/02a86e0d-dff7-4e27-89d5-2f7dcd4b580c'}]
CVE State: PUBLISHED |
Explain CVE-2023-0609 | Explain the vulnerability: CVE-2023-0609 | Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.
Affected Products: wallabag/wallabag
References: [{'url': 'https://huntr.dev/bounties/3adef66f-fc86-4e6d-a540-2ffa59342ff0'}, {'url': 'https://github.com/wallabag/wallabag/commit/0f7460dbab9e29f4f7d2944aca20210f828b6abb'}]
CVE State: PUBLISHED |
Explain CVE-2023-0610 | Explain the vulnerability: CVE-2023-0610 | Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.3.
Affected Products: wallabag/wallabag
References: [{'url': 'https://huntr.dev/bounties/8fdd9b31-d89b-4bbe-9557-20b960faf926'}, {'url': 'https://github.com/wallabag/wallabag/commit/5ac6b6bff9e2e3a87fd88c2904ff3c6aac40722e'}]
CVE State: PUBLISHED |
Explain CVE-2023-0611 | Explain the vulnerability: CVE-2023-0611 | A vulnerability, which was classified as critical, has been found in TRENDnet TEW-652BRP 3.04B01. This issue affects some unknown processing of the file get_set.ccp of the component Web Management Interface. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219935.
Affected Products: TEW-652BRP
References: [{'url': 'https://vuldb.com/?id.219935', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.219935', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0612 | Explain the vulnerability: CVE-2023-0612 | A vulnerability, which was classified as critical, was found in TRENDnet TEW-811DRU 1.0.10.0. Affected is an unknown function of the file /wireless/basic.asp of the component httpd. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219936.
Affected Products: TEW-811DRU
References: [{'url': 'https://vuldb.com/?id.219936', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.219936', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0613 | Explain the vulnerability: CVE-2023-0613 | A vulnerability has been found in TRENDnet TEW-811DRU 1.0.10.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /wireless/security.asp of the component httpd. The manipulation leads to memory corruption. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219937 was assigned to this vulnerability.
Affected Products: TEW-811DRU
References: [{'url': 'https://vuldb.com/?id.219937', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.219937', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0614 | Explain the vulnerability: CVE-2023-0614 | The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure vi LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC.
Affected Products: Samba
References: [{'url': 'https://www.samba.org/samba/security/CVE-2023-0614.html'}, {'url': 'https://security.netapp.com/advisory/ntap-20230406-0007/'}, {'name': 'FEDORA-2023-1c172e3264', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0615 | Explain the vulnerability: CVE-2023-0615 | A memory leak flaw and potential divide by zero and Integer overflow was found in the Linux kernel V4L2 and vivid test code functionality. This issue occurs when a user triggers ioctls, such as VIDIOC_S_DV_TIMINGS ioctl. This could allow a local user to crash the system if vivid test code enabled.
Affected Products: Kernel
References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2166287'}]
CVE State: PUBLISHED |
Explain CVE-2023-0616 | Explain the vulnerability: CVE-2023-0616 | If a MIME email combines OpenPGP and OpenPGP MIME data in a certain way Thunderbird repeatedly attempts to process and display the message, which could cause Thunderbird's user interface to lock up and no longer respond to the user's actions. An attacker could send a crafted message with this structure to attempt a DoS attack. This vulnerability affects Thunderbird < 102.8.
Affected Products: Thunderbird
References: [{'url': 'https://www.mozilla.org/security/advisories/mfsa2023-07/'}, {'url': 'https://bugzilla.mozilla.org/show_bug.cgi?id=1806507'}]
CVE State: PUBLISHED |
Explain CVE-2023-0617 | Explain the vulnerability: CVE-2023-0617 | A vulnerability was found in TRENDNet TEW-811DRU 1.0.10.0. It has been classified as critical. This affects an unknown part of the file /wireless/guestnetwork.asp of the component httpd. The manipulation leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219957 was assigned to this vulnerability.
Affected Products: TEW-811DRU
References: [{'url': 'https://vuldb.com/?id.219957', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.219957', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0618 | Explain the vulnerability: CVE-2023-0618 | A vulnerability was found in TRENDnet TEW-652BRP 3.04B01. It has been declared as critical. This vulnerability affects unknown code of the file cfg_op.ccp of the component Web Service. The manipulation leads to memory corruption. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-219958 is the identifier assigned to this vulnerability.
Affected Products: TEW-652BRP
References: [{'url': 'https://vuldb.com/?id.219958', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.219958', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0619 | Explain the vulnerability: CVE-2023-0619 | The Kraken.io Image Optimizer plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on its AJAX actions in versions up to, and including, 2.6.8. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to reset image optimizations.
Affected Products: Kraken.io Image Optimizer
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/f94eabc5-6e3b-46df-9e36-d7d0fad833de'}, {'url': 'https://plugins.trac.wordpress.org/browser/kraken-image-optimizer/tags/2.6.6/kraken.php#L705'}]
CVE State: PUBLISHED |
Explain CVE-2023-0620 | Explain the vulnerability: CVE-2023-0620 | HashiCorp Vault and Vault Enterprise versions 0.8.0 through 1.13.1 are vulnerable to an SQL injection attack when configuring the Microsoft SQL (MSSQL) Database Storage Backend. When configuring the MSSQL plugin through the local, certain parameters are not sanitized when passed to the user-provided MSSQL database. An attacker may modify these parameters to execute a malicious SQL command.
This issue is fixed in versions 1.13.1, 1.12.5, and 1.11.9.
Affected Products: Vault
References: [{'url': 'https://discuss.hashicorp.com/t/hcsec-2023-12-vault-s-microsoft-sql-database-storage-backend-vulnerable-to-sql-injection-via-configuration-file/52080/1'}, {'url': 'https://security.netapp.com/advisory/ntap-20230526-0008/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0621 | Explain the vulnerability: CVE-2023-0621 | Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds read vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in reads past the end of allocated data structures. An attacker could leverage these vulnerabilities to execute arbitrary code in the context of the current process.
Affected Products: Cscape Envision RV
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-040-04'}]
CVE State: PUBLISHED |
Explain CVE-2023-0622 | Explain the vulnerability: CVE-2023-0622 | Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds write vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in writes past the end of allocated data structures. An attacker could leverage these vulnerabilities to execute arbitrary code in the context of the current process.
Affected Products: Cscape Envision RV
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-040-04'}]
CVE State: PUBLISHED |
Explain CVE-2023-0623 | Explain the vulnerability: CVE-2023-0623 | Cscape Envision RV version 4.60 is vulnerable to an out-of-bounds write vulnerability when parsing project (i.e. HMI) files. The product lacks proper validation of user-supplied data, which could result in writes past the end of allocated data structures. An attacker could leverage these vulnerabilities to execute arbitrary code in the context of the current process.
Affected Products: Cscape Envision RV
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-040-04'}]
CVE State: PUBLISHED |
Explain CVE-2023-0624 | Explain the vulnerability: CVE-2023-0624 | OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.
Affected Products: OrangeScrum
References: [{'url': 'https://github.com/Orangescrum/orangescrum/'}, {'url': 'https://fluidattacks.com/advisories/oberhofer/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0628 | Explain the vulnerability: CVE-2023-0628 | Docker Desktop before 4.17.0 allows an attacker to execute an arbitrary command inside a Dev Environments container during initialization by tricking a user to open a crafted malicious docker-desktop:// URL.
Affected Products: Docker Desktop
References: [{'tags': ['release-notes'], 'url': 'https://docs.docker.com/desktop/release-notes/#4170'}]
CVE State: PUBLISHED |
Explain CVE-2023-0629 | Explain the vulnerability: CVE-2023-0629 | Docker Desktop before 4.17.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions by setting the Docker host to docker.raw.sock, or npipe:////.pipe/docker_engine_linux on Windows, via the -H (--host) CLI flag or the DOCKER_HOST environment variable and launch containers without the additional hardening features provided by ECI. This would not affect already running containers, nor containers launched through the usual approach (without Docker's raw socket).
The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges.
This issue has been fixed in Docker Desktop 4.17.0.
Affected Docker Desktop versions: from 4.13.0 before 4.17.0.
Affected Products: Docker Desktop
References: [{'tags': ['release-notes'], 'url': 'https://docs.docker.com/desktop/release-notes/#4170'}]
CVE State: PUBLISHED |
Explain CVE-2023-0630 | Explain the vulnerability: CVE-2023-0630 | The Slimstat Analytics WordPress plugin before 4.9.3.3 does not prevent subscribers from rendering shortcodes that concatenates attributes directly into an SQL query.
Affected Products: Slimstat Analytics
References: [{'url': 'https://wpscan.com/vulnerability/b82bdd02-b699-4527-86cc-d60b56ab0c55', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0631 | Explain the vulnerability: CVE-2023-0631 | The Paid Memberships Pro WordPress plugin before 2.9.12 does not prevent subscribers from rendering shortcodes that concatenate attributes directly into an SQL query.
Affected Products: Paid Memberships Pro
References: [{'url': 'https://wpscan.com/vulnerability/19ef92fd-b493-4488-91f0-e6ba51362f79', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0632 | Explain the vulnerability: CVE-2023-0632 | An issue has been discovered in GitLab affecting all versions starting from 15.2 before 16.0.8, all versions starting from 16.1 before 16.1.3, all versions starting from 16.2 before 16.2.2. A Regular Expression Denial of Service was possible by using crafted payloads to search Harbor Registry.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/390148', 'name': 'GitLab Issue #390148', 'tags': ['issue-tracking']}, {'url': 'https://hackerone.com/reports/1852677', 'name': 'HackerOne Bug Bounty Report #1852677', 'tags': ['technical-description', 'exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0634 | Explain the vulnerability: CVE-2023-0634 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-2023-0635 | Explain the vulnerability: CVE-2023-0635 | Improper Privilege Management vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Privilege Escalation.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.01; NEXUS Series: from 3.0;0 before 3.07.01; MATRIX Series: from 3.0;0 before 3.07.01.
Affected Products: ASPECT®-Enterprise
References: [{'url': 'https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403&LanguageCode=en&DocumentPartId=&Action=Launch'}]
CVE State: PUBLISHED |
Explain CVE-2023-0636 | Explain the vulnerability: CVE-2023-0636 | Improper Input Validation vulnerability in ABB Ltd. ASPECT®-Enterprise on ASPECT®-Enterprise, Linux (2CQG103201S3021, 2CQG103202S3021, 2CQG103203S3021, 2CQG103204S3021 modules), ABB Ltd. NEXUS Series on NEXUS Series, Linux (2CQG100102R2021, 2CQG100104R2021, 2CQG100105R2021, 2CQG100106R2021, 2CQG100110R2021, 2CQG100112R2021, 2CQG100103R2021, 2CQG100107R2021, 2CQG100108R2021, 2CQG100109R2021, 2CQG100111R2021, 2CQG100113R2021 modules), ABB Ltd. MATRIX Series on MATRIX Series, Linux (2CQG100102R1021, 2CQG100103R1021, 2CQG100104R1021, 2CQG100105R1021, 2CQG100106R1021 modules) allows Command Injection.This issue affects ASPECT®-Enterprise: from 3.0;0 before 3.07.0; NEXUS Series: from 3.0;0 before 3.07.0; MATRIX Series: from 3.0;0 before 3.07.1.
Affected Products: ASPECT®-Enterprise
References: [{'url': 'https://search.abb.com/library/Download.aspx?DocumentID=2CKA000073B5403&LanguageCode=en&DocumentPartId=&Action=Launch'}]
CVE State: PUBLISHED |
Explain CVE-2023-0637 | Explain the vulnerability: CVE-2023-0637 | A vulnerability, which was classified as critical, was found in TRENDnet TEW-811DRU 1.0.10.0. This affects an unknown part of the file wan.asp of the component Web Management Interface. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220017 was assigned to this vulnerability.
Affected Products: TEW-811DRU
References: [{'url': 'https://vuldb.com/?id.220017', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.220017', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0638 | Explain the vulnerability: CVE-2023-0638 | A vulnerability has been found in TRENDnet TEW-811DRU 1.0.10.0 and classified as critical. This vulnerability affects unknown code of the component Web Interface. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-220018 is the identifier assigned to this vulnerability.
Affected Products: TEW-811DRU
References: [{'url': 'https://vuldb.com/?id.220018', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.220018', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0639 | Explain the vulnerability: CVE-2023-0639 | A vulnerability was found in TRENDnet TEW-652BRP 3.04b01 and classified as problematic. This issue affects some unknown processing of the file get_set.ccp of the component Web Management Interface. The manipulation of the argument nextPage leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-220019.
Affected Products: TEW-652BRP
References: [{'url': 'https://vuldb.com/?id.220019', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220019', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0640 | Explain the vulnerability: CVE-2023-0640 | A vulnerability was found in TRENDnet TEW-652BRP 3.04b01. It has been classified as critical. Affected is an unknown function of the file ping.ccp of the component Web Interface. The manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220020.
Affected Products: TEW-652BRP
References: [{'url': 'https://vuldb.com/?id.220020', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.220020', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0641 | Explain the vulnerability: CVE-2023-0641 | A vulnerability was found in PHPGurukul Employee Leaves Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file changepassword.php. The manipulation of the argument newpassword/confirmpassword leads to weak password requirements. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220021 was assigned to this vulnerability.
Affected Products: Employee Leaves Management System
References: [{'url': 'https://vuldb.com/?id.220021', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220021', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ctflearner/Vulnerability/blob/main/Employee%20Leaves%20Management%20System/ELMS.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0642 | Explain the vulnerability: CVE-2023-0642 | Cross-Site Request Forgery (CSRF) in GitHub repository squidex/squidex prior to 7.4.0.
Affected Products: squidex/squidex
References: [{'url': 'https://huntr.dev/bounties/3bbdafe6-e152-47bb-88a7-fd031725323d'}, {'url': 'https://github.com/squidex/squidex/commit/2da3c41da82eb945832f22bb70dba567ac6ce969'}]
CVE State: PUBLISHED |
Explain CVE-2023-0643 | Explain the vulnerability: CVE-2023-0643 | Improper Handling of Additional Special Element in GitHub repository squidex/squidex prior to 7.4.0.
Affected Products: squidex/squidex
References: [{'url': 'https://huntr.dev/bounties/ea90f8b9-d8fe-4432-9a52-4d663400c52f'}, {'url': 'https://github.com/squidex/squidex/commit/cf4efc52eab17098474d73ccff6c136fc2f737db'}]
CVE State: PUBLISHED |
Explain CVE-2023-0644 | Explain the vulnerability: CVE-2023-0644 | The Push Notifications for WordPress by PushAssist WordPress plugin through 3.0.8 does not sanitise and escape various parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Affected Products: Push Notifications for WordPress by PushAssist
References: [{'url': 'https://wpscan.com/vulnerability/08f5089c-36f3-4d12-bca5-99cd3ae78f67', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0645 | Explain the vulnerability: CVE-2023-0645 | An out of bounds read exists in libjxl. An attacker using a specifically crafted file could cause an out of bounds read in the exif handler. We recommend upgrading to version 0.8.1 or past commit https://github.com/libjxl/libjxl/pull/2101/commits/d95b050c1822a5b1ede9e0dc937e43fca1b10159 https://github.com/libjxl/libjxl/pull/2101/commits/d95b050c1822a5b1ede9e0dc937e43fca1b10159
Affected Products: Libjxl
References: [{'url': 'https://github.com/libjxl/libjxl/pull/2101/commits/d95b050c1822a5b1ede9e0dc937e43fca1b10159'}, {'url': 'https://github.com/libjxl/libjxl/pull/2101'}]
CVE State: PUBLISHED |
Explain CVE-2023-0646 | Explain the vulnerability: CVE-2023-0646 | A vulnerability classified as critical was found in dst-admin 1.5.0. Affected by this vulnerability is an unknown functionality of the file /home/cavesConsole. The manipulation of the argument command leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220033 was assigned to this vulnerability.
Affected Products: dst-admin
References: [{'url': 'https://vuldb.com/?id.220033', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220033', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Ha0Liu/cveAdd/tree/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0cavesConsole%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0647 | Explain the vulnerability: CVE-2023-0647 | A vulnerability, which was classified as critical, has been found in dst-admin 1.5.0. Affected by this issue is some unknown functionality of the file /home/kickPlayer. The manipulation of the argument userId leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-220034 is the identifier assigned to this vulnerability.
Affected Products: dst-admin
References: [{'url': 'https://vuldb.com/?id.220034', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220034', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Ha0Liu/cveAdd/blob/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0kickPlayer%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C/Dst-admin%201.5.0%20background%20kickPlayer%20interface%20remote%20command%20execution.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0648 | Explain the vulnerability: CVE-2023-0648 | A vulnerability, which was classified as critical, was found in dst-admin 1.5.0. This affects an unknown part of the file /home/masterConsole. The manipulation of the argument command leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-220035.
Affected Products: dst-admin
References: [{'url': 'https://vuldb.com/?id.220035', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220035', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Ha0Liu/cveAdd/tree/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0masterConsole%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0649 | Explain the vulnerability: CVE-2023-0649 | A vulnerability has been found in dst-admin 1.5.0 and classified as critical. This vulnerability affects unknown code of the file /home/sendBroadcast. The manipulation of the argument message leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220036.
Affected Products: dst-admin
References: [{'url': 'https://vuldb.com/?id.220036', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220036', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Ha0Liu/cveAdd/tree/developer/dst-admin%201.5.0%E5%90%8E%E5%8F%B0sendBroadcast%E6%8E%A5%E5%8F%A3%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0650 | Explain the vulnerability: CVE-2023-0650 | A vulnerability was found in YAFNET up to 3.1.11 and classified as problematic. This issue affects some unknown processing of the component Signature Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.12 is able to address this issue. The name of the patch is a1442a2bacc3335461b44c250e81f8d99c60735f. It is recommended to upgrade the affected component. The identifier VDB-220037 was assigned to this vulnerability.
Affected Products: YAFNET
References: [{'url': 'https://vuldb.com/?id.220037', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.220037', 'tags': ['signature', 'permissions-required']}, {'url': 'https://drive.google.com/drive/folders/1iJuhjLQy3QPIgKKgWUzEEfr_q0boaR00?usp=sharing', 'tags': ['exploit']}, {'url': 'https://github.com/YAFNET/YAFNET/security/advisories/GHSA-mg6p-jjff-7g5m', 'tags': ['related']}, {'url': 'https://github.com/YAFNET/YAFNET/commit/a1442a2bacc3335461b44c250e81f8d99c60735f', 'tags': ['patch']}, {'url': 'https://github.com/YAFNET/YAFNET/releases/tag/v3.1.12', 'tags': ['patch']}]
CVE State: PUBLISHED |
Explain CVE-2023-0651 | Explain the vulnerability: CVE-2023-0651 | A vulnerability was found in FastCMS 0.1.0. It has been classified as critical. Affected is an unknown function of the component Template Management. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-220038 is the identifier assigned to this vulnerability.
Affected Products: FastCMS
References: [{'url': 'https://vuldb.com/?id.220038', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.220038', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/fastcms_bug/blob/main/template_files_upload.md', 'tags': ['related']}, {'url': 'https://github.com/linmoren/fastcms_bug/blob/main/password.zip', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0652 | Explain the vulnerability: CVE-2023-0652 | Due to a hardlink created in the ProgramData folder during the repair process of the software, the installer (MSI) of WARP Client for Windows (<= 2022.12.582.0) allowed a malicious attacker to forge the destination of the hardlink and escalate privileges, overwriting SYSTEM protected files.
As Cloudflare WARP client for Windows (up to version 2022.5.309.0) allowed creation of mount points from its ProgramData folder, during installation of the WARP client, it was possible to escalate privileges and overwrite SYSTEM protected files.
Affected Products: WARP
References: [{'url': 'https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release'}, {'url': 'https://developers.cloudflare.com/warp-client/get-started/windows/'}, {'url': 'https://github.com/cloudflare/advisories/security/advisories/GHSA-xmhj-9p83-xvw9'}]
CVE State: PUBLISHED |
Explain CVE-2023-0655 | Explain the vulnerability: CVE-2023-0655 | SonicWall Email Security contains a vulnerability that could permit a remote unauthenticated attacker access to an error page that includes sensitive information about users email addresses.
Affected Products: SonicWall Email Security
References: [{'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0002'}]
CVE State: PUBLISHED |
Explain CVE-2023-0656 | Explain the vulnerability: CVE-2023-0656 | A Stack-based buffer overflow vulnerability in the SonicOS allows a remote unauthenticated attacker to cause Denial of Service (DoS), which could cause an impacted firewall to crash.
Affected Products: SonicOS
References: [{'url': 'https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0004'}]
CVE State: PUBLISHED |
Explain CVE-2023-0658 | Explain the vulnerability: CVE-2023-0658 | A vulnerability, which was classified as critical, was found in Multilaser RE057 and RE170 2.1/2.2. This affects an unknown part of the file /param.file.tgz of the component Backup File Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The identifier VDB-220053 was assigned to this vulnerability.
Affected Products: RE057
References: [{'url': 'https://vuldb.com/?id.220053', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.220053', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0659 | Explain the vulnerability: CVE-2023-0659 | A vulnerability was found in BDCOM 1704-WGL 2.0.6314. It has been classified as critical. This affects an unknown part of the file /param.file.tgz of the component Backup File Handler. The manipulation leads to information disclosure. It is possible to initiate the attack remotely. The identifier VDB-220101 was assigned to this vulnerability.
Affected Products: 1704-WGL
References: [{'url': 'https://vuldb.com/?id.220101', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.220101', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0660 | Explain the vulnerability: CVE-2023-0660 | The Smart Slider 3 WordPress plugin before 3.5.1.14 does not properly validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
Affected Products: Smart Slider 3
References: [{'url': 'https://wpscan.com/vulnerability/3fe712bc-ce7f-4b30-9fc7-1ff15aa5b6ce', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0661 | Explain the vulnerability: CVE-2023-0661 | Improper access control in Devolutions Server allows an authenticated user to access unauthorized sensitive data.
Affected Products: Devolutions Server
References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0002'}]
CVE State: PUBLISHED |
Explain CVE-2023-0662 | Explain the vulnerability: CVE-2023-0662 | In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, excessive number of parts in HTTP form upload can cause high resource consumption and excessive number of log entries. This can cause denial of service on the affected server by exhausting CPU resources or disk space.
Affected Products: PHP
References: [{'url': 'https://github.com/php/php-src/security/advisories/GHSA-54hq-v5wp-fqgv'}, {'url': 'https://security.netapp.com/advisory/ntap-20230517-0001/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0663 | Explain the vulnerability: CVE-2023-0663 | A vulnerability was found in Calendar Event Management System 2.3.0. It has been rated as critical. This issue affects some unknown processing of the component Login Page. The manipulation of the argument name/pwd leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-220175.
Affected Products: Calendar Event Management System
References: [{'url': 'https://vuldb.com/?id.220175', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220175', 'tags': ['signature', 'permissions-required']}, {'url': 'https://www.youtube.com/watch?v=UsSZU6EWB1E', 'tags': ['media-coverage']}]
CVE State: PUBLISHED |
Explain CVE-2023-0664 | Explain the vulnerability: CVE-2023-0664 | A flaw was found in the QEMU Guest Agent service for Windows. A local unprivileged user may be able to manipulate the QEMU Guest Agent's Windows installer via repair custom actions to elevate their privileges on the system.
Affected Products: QEMU
References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2167423'}, {'url': 'https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg01445.html'}, {'url': 'https://gitlab.com/qemu-project/qemu/-/commit/88288c2a51faa7c795f053fc8b31b1c16ff804c5'}, {'url': 'https://gitlab.com/qemu-project/qemu/-/commit/07ce178a2b0768eb9e712bb5ad0cf6dc7fcf0158'}, {'name': 'FEDORA-2023-e5a35f7197', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SEOC7SRJWLZSXCND2ADFW6C76ZMTZLE4/'}, {'url': 'https://security.netapp.com/advisory/ntap-20230517-0005/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0665 | Explain the vulnerability: CVE-2023-0665 | HashiCorp Vault's PKI mount issuer endpoints did not correctly authorize access to remove an issuer or modify issuer metadata, potentially resulting in denial of service of the PKI mount. This bug did not affect public or private key material, trust chains or certificate issuance. Fixed in Vault 1.13.1, 1.12.5, and 1.11.9.
Affected Products: Vault
References: [{'url': 'https://discuss.hashicorp.com/t/hcsec-2023-11-vault-s-pki-issuer-endpoint-did-not-correctly-authorize-access-to-issuer-metadata/52079/1'}, {'url': 'https://security.netapp.com/advisory/ntap-20230526-0008/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0666 | Explain the vulnerability: CVE-2023-0666 | Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
Affected Products: Wireshark
References: [{'tags': ['third-party-advisory'], 'url': 'https://takeonme.org/cves/CVE-2023-0666.html'}, {'tags': ['issue-tracking'], 'url': 'https://gitlab.com/wireshark/wireshark/-/issues/19085'}, {'tags': ['release-notes'], 'url': 'https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html'}, {'tags': ['vendor-advisory'], 'url': 'https://www.wireshark.org/security/wnpa-sec-2023-18.html'}, {'url': 'https://www.debian.org/security/2023/dsa-5429'}]
CVE State: PUBLISHED |
Explain CVE-2023-0667 | Explain the vulnerability: CVE-2023-0667 | Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark
Affected Products: Wireshark
References: [{'tags': ['third-party-advisory'], 'url': 'https://takeonme.org/cves/CVE-2023-0667.html'}, {'tags': ['issue-tracking'], 'url': 'https://gitlab.com/wireshark/wireshark/-/issues/19086'}]
CVE State: PUBLISHED |
Explain CVE-2023-0668 | Explain the vulnerability: CVE-2023-0668 | Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
Affected Products: Wireshark
References: [{'tags': ['third-party-advisory'], 'url': 'https://takeonme.org/cves/CVE-2023-0668.html'}, {'tags': ['issue-tracking'], 'url': 'https://gitlab.com/wireshark/wireshark/-/issues/19087'}, {'tags': ['release-notes'], 'url': 'https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html'}, {'tags': ['vendor-advisory'], 'url': 'https://www.wireshark.org/security/wnpa-sec-2023-19.html'}, {'url': 'https://www.debian.org/security/2023/dsa-5429'}]
CVE State: PUBLISHED |
Explain CVE-2023-0669 | Explain the vulnerability: CVE-2023-0669 | Fortra (formerly, HelpSystems) GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object. This issue was patched in version 7.1.2.
Affected Products: Goanywhere MFT
References: [{'tags': ['vendor-advisory'], 'url': 'https://my.goanywhere.com/webclient/ViewSecurityAdvisories.xhtml#zerodayfeb1'}, {'tags': ['media-coverage'], 'url': 'https://infosec.exchange/@briankrebs/109795710941843934'}, {'tags': ['third-party-advisory'], 'url': 'https://www.rapid7.com/blog/post/2023/02/03/exploitation-of-goanywhere-mft-zero-day-vulnerability/'}, {'tags': ['third-party-advisory'], 'url': 'https://attackerkb.com/topics/mg883Nbeva/cve-2023-0669/rapid7-analysis'}, {'tags': ['exploit'], 'url': 'https://github.com/rapid7/metasploit-framework/pull/17607'}, {'tags': ['media-coverage'], 'url': 'https://duo.com/decipher/fortra-patches-actively-exploited-zero-day-in-goanywhere-mft'}, {'tags': ['third-party-advisory'], 'url': 'https://frycos.github.io/vulns4free/2023/02/06/goanywhere-forgotten.html'}, {'url': 'http://packetstormsecurity.com/files/171789/Goanywhere-Encryption-Helper-7.1.1-Remote-Code-Execution.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-0670 | Explain the vulnerability: CVE-2023-0670 | Ulearn version a5a7ca20de859051ea0470542844980a66dfc05d allows an attacker with administrator permissions to obtain remote code execution on the server through the image upload functionality. This occurs because the application does not validate that the uploaded image is actually an image.
Affected Products: Ulearn
References: [{'url': 'https://fluidattacks.com/advisories/scott/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0671 | Explain the vulnerability: CVE-2023-0671 | Code Injection in GitHub repository froxlor/froxlor prior to 2.0.10.
Affected Products: froxlor/froxlor
References: [{'url': 'https://huntr.dev/bounties/c2a84917-7ac0-4169-81c1-b61e617023de'}, {'url': 'https://github.com/froxlor/froxlor/commit/0034681412057fef2dfe9cce9f8a6e3321f52edc'}]
CVE State: PUBLISHED |
Explain CVE-2023-0673 | Explain the vulnerability: CVE-2023-0673 | A vulnerability classified as critical was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability is an unknown functionality of the file oews/?p=products/view_product.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-220195.
Affected Products: Online Eyewear Shop
References: [{'url': 'https://vuldb.com/?id.220195', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220195', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0674 | Explain the vulnerability: CVE-2023-0674 | A vulnerability, which was classified as problematic, has been found in XXL-JOB 2.3.1. Affected by this issue is some unknown functionality of the file /user/updatePwd of the component New Password Handler. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220196.
Affected Products: XXL-JOB
References: [{'url': 'https://vuldb.com/?id.220196', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.220196', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/boyi0508/xxl-job-explain/blob/main/README.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0675 | Explain the vulnerability: CVE-2023-0675 | A vulnerability, which was classified as critical, was found in Calendar Event Management System 2.3.0. This affects an unknown part. The manipulation of the argument start/end leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220197 was assigned to this vulnerability.
Affected Products: Calendar Event Management System
References: [{'url': 'https://vuldb.com/?id.220197', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220197', 'tags': ['signature', 'permissions-required']}, {'url': 'https://www.youtube.com/watch?v=eoPuINHWjHo', 'tags': ['exploit', 'media-coverage']}]
CVE State: PUBLISHED |
Explain CVE-2023-0676 | Explain the vulnerability: CVE-2023-0676 | Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to 1.5.1.
Affected Products: phpipam/phpipam
References: [{'url': 'https://huntr.dev/bounties/b72d4f0c-8a96-4b40-a031-7d469c6ab93b'}, {'url': 'https://github.com/phpipam/phpipam/commit/94ec73ff1d33926b75b811ded6f0b4a46088a7ec'}]
CVE State: PUBLISHED |
Explain CVE-2023-0677 | Explain the vulnerability: CVE-2023-0677 | Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to v1.5.1.
Affected Products: phpipam/phpipam
References: [{'url': 'https://huntr.dev/bounties/d280ae81-a1c9-4a50-9aa4-f98f1f9fd2c0'}, {'url': 'https://github.com/phpipam/phpipam/commit/8fbf87e19a6098972abc7521554db5757c3edd89'}]
CVE State: PUBLISHED |
Explain CVE-2023-0678 | Explain the vulnerability: CVE-2023-0678 | Missing Authorization in GitHub repository phpipam/phpipam prior to v1.5.1.
Affected Products: phpipam/phpipam
References: [{'url': 'https://huntr.dev/bounties/8d299377-be00-46dc-bebe-3d439127982f'}, {'url': 'https://github.com/phpipam/phpipam/commit/1960bd24e8a55796da066237cf11272c44bb1cc4'}]
CVE State: PUBLISHED |
Explain CVE-2023-0679 | Explain the vulnerability: CVE-2023-0679 | A vulnerability was found in SourceCodester Canteen Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file removeUser.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220220.
Affected Products: Canteen Management System
References: [{'url': 'https://vuldb.com/?id.220220', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220220', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/weixin_43864034/article/details/128904906', 'tags': ['exploit']}]
CVE State: PUBLISHED |