instruction
stringlengths
21
21
input
stringlengths
40
40
output
stringlengths
62
37.3k
Explain CVE-2023-0903
Explain the vulnerability: CVE-2023-0903
A vulnerability was found in SourceCodester Employee Task Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file edit-task.php. The manipulation of the argument task_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221452. Affected Products: Employee Task Management System References: [{'url': 'https://vuldb.com/?id.221452', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221452', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0904
Explain the vulnerability: CVE-2023-0904
A vulnerability was found in SourceCodester Employee Task Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file task-details.php. The manipulation of the argument task_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221453 was assigned to this vulnerability. Affected Products: Employee Task Management System References: [{'url': 'https://vuldb.com/?id.221453', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221453', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection%20-%202.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0905
Explain the vulnerability: CVE-2023-0905
A vulnerability classified as critical has been found in SourceCodester Employee Task Management System 1.0. Affected is an unknown function of the file changePasswordForEmployee.php. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221454 is the identifier assigned to this vulnerability. Affected Products: Employee Task Management System References: [{'url': 'https://vuldb.com/?id.221454', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221454', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20Broken%20Authentication.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0906
Explain the vulnerability: CVE-2023-0906
A vulnerability classified as critical was found in SourceCodester Online Pizza Ordering System 1.0. Affected by this vulnerability is the function delete_category of the file ajax.php of the component POST Parameter Handler. The manipulation leads to missing authentication. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-221455. Affected Products: Online Pizza Ordering System References: [{'url': 'https://vuldb.com/?id.221455', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221455', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0907
Explain the vulnerability: CVE-2023-0907
A vulnerability, which was classified as problematic, has been found in Filseclab Twister Antivirus 8.17. Affected by this issue is the function 0x220017 in the library ffsmon.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221456. Affected Products: Twister Antivirus References: [{'url': 'https://vuldb.com/?id.221456', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221456', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-0907', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0908
Explain the vulnerability: CVE-2023-0908
A vulnerability, which was classified as problematic, was found in Xoslab Easy File Locker 2.2.0.184. This affects the function MessageNotifyCallback in the library xlkfs.sys. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-221457 was assigned to this vulnerability. Affected Products: Easy File Locker References: [{'url': 'https://vuldb.com/?id.221457', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221457', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-0908', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0909
Explain the vulnerability: CVE-2023-0909
A vulnerability, which was classified as problematic, was found in cxasm notepad-- 1.22. This affects an unknown part of the component Directory Comparison Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The associated identifier of this vulnerability is VDB-221475. Affected Products: notepad-- References: [{'url': 'https://vuldb.com/?id.221475', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221475', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/cxasm/notepad--/issues/I6C80Z', 'tags': ['issue-tracking']}] CVE State: PUBLISHED
Explain CVE-2023-0910
Explain the vulnerability: CVE-2023-0910
A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. This vulnerability affects unknown code of the file view_prod.php of the component GET Parameter Handler. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-221476. Affected Products: Online Pizza Ordering System References: [{'url': 'https://vuldb.com/?id.221476', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221476', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0911
Explain the vulnerability: CVE-2023-0911
The WordPress Shortcodes Plugin — Shortcodes Ultimate WordPress plugin before 5.12.8 does not validate the user meta to be retrieved via the user shortcode, allowing any authenticated users such as subscriber to retrieve arbitrary user meta (except the user_pass), such as the user email and activation key by default. Affected Products: WordPress Shortcodes Plugin — Shortcodes Ultimate References: [{'url': 'https://wpscan.com/vulnerability/35404d16-7213-4293-ac0d-926bd6c17444', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0912
Explain the vulnerability: CVE-2023-0912
A vulnerability classified as critical has been found in SourceCodester Auto Dealer Management System 1.0. This affects an unknown part of the file /adms/admin/?page=vehicles/view_transaction. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221481 was assigned to this vulnerability. Affected Products: Auto Dealer Management System References: [{'url': 'https://vuldb.com/?id.221481', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221481', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%201.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0913
Explain the vulnerability: CVE-2023-0913
A vulnerability classified as critical was found in SourceCodester Auto Dealer Management System 1.0. This vulnerability affects unknown code of the file /adms/admin/?page=vehicles/sell_vehicle. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221482 is the identifier assigned to this vulnerability. Affected Products: Auto Dealer Management System References: [{'url': 'https://vuldb.com/?id.221482', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221482', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%202.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0914
Explain the vulnerability: CVE-2023-0914
Improper Authorization in GitHub repository pixelfed/pixelfed prior to 0.11.4. Affected Products: pixelfed/pixelfed References: [{'url': 'https://huntr.dev/bounties/54d5fd76-e038-4eda-9e03-d5e95e09c0ec'}, {'url': 'https://github.com/pixelfed/pixelfed/commit/ef56f92c3d77e9bafaa70c08b7c04d5a61b8d454'}] CVE State: PUBLISHED
Explain CVE-2023-0915
Explain the vulnerability: CVE-2023-0915
A vulnerability classified as critical has been found in SourceCodester Auto Dealer Management System 1.0. Affected is an unknown function of the file /adms/admin/?page=user/manage_user. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221490 is the identifier assigned to this vulnerability. Affected Products: Auto Dealer Management System References: [{'url': 'https://vuldb.com/?id.221490', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221490', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%203.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0916
Explain the vulnerability: CVE-2023-0916
A vulnerability classified as critical was found in SourceCodester Auto Dealer Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /adms/classes/Users.php. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221491. Affected Products: Auto Dealer Management System References: [{'url': 'https://vuldb.com/?id.221491', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221491', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20Broken%20Access%20Control.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0917
Explain the vulnerability: CVE-2023-0917
A vulnerability, which was classified as critical, was found in SourceCodester Simple Customer Relationship Management System 1.0. This affects an unknown part of the file /php-scrm/login.php. The manipulation of the argument Password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221493 was assigned to this vulnerability. Affected Products: Simple Customer Relationship Management System References: [{'url': 'https://vuldb.com/?id.221493', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221493', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/awans2023/CVE/blob/main/README1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0918
Explain the vulnerability: CVE-2023-0918
A vulnerability has been found in codeprojects Pharmacy Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file add.php of the component Avatar Image Handler. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221494 is the identifier assigned to this vulnerability. Affected Products: Pharmacy Management System References: [{'url': 'https://vuldb.com/?id.221494', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221494', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.0xgabe.com/?p=71', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0919
Explain the vulnerability: CVE-2023-0919
Missing Authentication for Critical Function in GitHub repository kareadita/kavita prior to 0.7.0. Affected Products: kareadita/kavita References: [{'url': 'https://huntr.dev/bounties/3c514923-473f-4c50-ae0d-d002a41fe70f'}, {'url': 'https://github.com/kareadita/kavita/commit/6648b79e1b2f92449d5816d0722b7a3d72f259d5'}] CVE State: PUBLISHED
Explain CVE-2023-0921
Explain the vulnerability: CVE-2023-0921
A lack of length validation in GitLab CE/EE affecting all versions from 8.3 before 15.10.8, 15.11 before 15.11.7, and 16.0 before 16.0.2 allows an authenticated attacker to create a large Issue description via GraphQL which, when repeatedly requested, saturates CPU usage. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/392433'}, {'url': 'https://hackerone.com/reports/1869839'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0921.json'}] CVE State: PUBLISHED
Explain CVE-2023-0922
Explain the vulnerability: CVE-2023-0922
The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection. Affected Products: Samba References: [{'url': 'https://www.samba.org/samba/security/CVE-2023-0922.html'}, {'url': 'https://security.netapp.com/advisory/ntap-20230406-0007/'}, {'name': 'FEDORA-2023-1c172e3264', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/'}] CVE State: PUBLISHED
Explain CVE-2023-0924
Explain the vulnerability: CVE-2023-0924
The ZYREX POPUP WordPress plugin through 1.0 does not validate the type of files uploaded when creating a popup, allowing a high privileged user (such as an Administrator) to upload arbitrary files, even when modifying the file system is disallowed, such as in a multisite install. Affected Products: ZYREX POPUP References: [{'url': 'https://wpscan.com/vulnerability/0fd0d7a5-9263-43b6-9244-7880c3d3e6f4', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0927
Explain the vulnerability: CVE-2023-0927
Use after free in Web Payments API in Google Chrome on Android prior to 110.0.5481.177 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1414738'}] CVE State: PUBLISHED
Explain CVE-2023-0928
Explain the vulnerability: CVE-2023-0928
Use after free in SwiftShader in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1309035'}] CVE State: PUBLISHED
Explain CVE-2023-0929
Explain the vulnerability: CVE-2023-0929
Use after free in Vulkan in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1399742'}] CVE State: PUBLISHED
Explain CVE-2023-0930
Explain the vulnerability: CVE-2023-0930
Heap buffer overflow in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1410766'}] CVE State: PUBLISHED
Explain CVE-2023-0931
Explain the vulnerability: CVE-2023-0931
Use after free in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1407701'}] CVE State: PUBLISHED
Explain CVE-2023-0932
Explain the vulnerability: CVE-2023-0932
Use after free in WebRTC in Google Chrome on Windows prior to 110.0.5481.177 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1413005'}] CVE State: PUBLISHED
Explain CVE-2023-0933
Explain the vulnerability: CVE-2023-0933
Integer overflow in PDF in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1404864'}] CVE State: PUBLISHED
Explain CVE-2023-0934
Explain the vulnerability: CVE-2023-0934
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.5. Affected Products: answerdev/answer References: [{'url': 'https://huntr.dev/bounties/cd213098-5bab-487f-82c7-13698ad43b51'}, {'url': 'https://github.com/answerdev/answer/commit/edc06942d51fa8e56a134c5c7e5c8826d9260da0'}] CVE State: PUBLISHED
Explain CVE-2023-0935
Explain the vulnerability: CVE-2023-0935
A vulnerability was found in DolphinPHP up to 1.5.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file common.php of the component Incomplete Fix CVE-2021-46097. The manipulation of the argument id leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221551. Affected Products: DolphinPHP References: [{'url': 'https://vuldb.com/?id.221551', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221551', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ssteveez/dolphin/blob/main/README.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0936
Explain the vulnerability: CVE-2023-0936
A vulnerability was found in TP-Link Archer C50 V2_160801. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation leads to denial of service. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221552. Affected Products: Archer C50 References: [{'url': 'https://vuldb.com/?id.221552', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.221552', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0937
Explain the vulnerability: CVE-2023-0937
The VK All in One Expansion Unit WordPress plugin before 9.87.1.0 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers Affected Products: VK All in One Expansion Unit References: [{'url': 'https://wpscan.com/vulnerability/5110ff02-c721-43eb-b13e-50aca25e1162', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0938
Explain the vulnerability: CVE-2023-0938
A vulnerability classified as critical has been found in SourceCodester Music Gallery Site 1.0. This affects an unknown part of the file music_list.php of the component GET Request Handler. The manipulation of the argument cid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221553 was assigned to this vulnerability. Affected Products: Music Gallery Site References: [{'url': 'https://vuldb.com/?id.221553', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221553', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%201.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0939
Explain the vulnerability: CVE-2023-0939
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NTN Information Technologies Online Services Software allows SQL Injection.This issue affects Online Services Software: before 1.17. Affected Products: Online Services Software References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0103'}] CVE State: PUBLISHED
Explain CVE-2023-0940
Explain the vulnerability: CVE-2023-0940
The ProfileGrid WordPress plugin before 5.3.1 provides an AJAX endpoint for resetting a user password but does not implement proper authorization. This allows a user with low privileges, such as subscriber, to change the password of any account, including Administrator ones. Affected Products: ProfileGrid References: [{'url': 'https://wpscan.com/vulnerability/56744f72-2d48-4f42-8195-24b4dd951bb5', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0941
Explain the vulnerability: CVE-2023-0941
Use after free in Prompts in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1415366'}] CVE State: PUBLISHED
Explain CVE-2023-0942
Explain the vulnerability: CVE-2023-0942
The Japanized For WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘tab’ parameter in versions up to, and including, 2.5.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Affected Products: Japanized For WooCommerce References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/bb606a30-2f7c-41e9-9ebc-9f1b0b84fff8'}, {'url': 'https://plugins.trac.wordpress.org/browser/woocommerce-for-japan/trunk/includes/admin/views/html-admin-setting-screen.php#L63'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2868545%40woocommerce-for-japan%2Ftrunk&old=2863064%40woocommerce-for-japan%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0943
Explain the vulnerability: CVE-2023-0943
A vulnerability, which was classified as problematic, has been found in SourceCodester Best POS Management System 1.0. This issue affects some unknown processing of the file index.php?page=site_settings of the component Image Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-221591. Affected Products: Best POS Management System References: [{'url': 'https://vuldb.com/?id.221591', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221591', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0944
Explain the vulnerability: CVE-2023-0944
Bhima version 1.27.0 allows an authenticated attacker with regular user permissions to update arbitrary user session data such as username, email and password. This is possible because the application is vulnerable to IDOR, it does not correctly validate user permissions with respect to certain actions that can be performed by the user. Affected Products: Bhima References: [{'url': 'https://fluidattacks.com/advisories/stewart/'}, {'url': 'https://github.com/IMA-WorldHealth/bhima/'}] CVE State: PUBLISHED
Explain CVE-2023-0945
Explain the vulnerability: CVE-2023-0945
A vulnerability, which was classified as problematic, was found in SourceCodester Best POS Management System 1.0. Affected is an unknown function of the file index.php?page=add-category. The manipulation of the argument Name with the input "><img src=x onerror=prompt(document.domain);> leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-221592. Affected Products: Best POS Management System References: [{'url': 'https://vuldb.com/?id.221592', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221592', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0946
Explain the vulnerability: CVE-2023-0946
A vulnerability has been found in SourceCodester Best POS Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file billing/index.php?id=9. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The identifier VDB-221593 was assigned to this vulnerability. Affected Products: Best POS Management System References: [{'url': 'https://vuldb.com/?id.221593', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221593', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0947
Explain the vulnerability: CVE-2023-0947
Path Traversal in GitHub repository flatpressblog/flatpress prior to 1.3. Affected Products: flatpressblog/flatpress References: [{'url': 'https://huntr.dev/bounties/7379d702-72ff-4a5d-bc68-007290015496'}, {'url': 'https://github.com/flatpressblog/flatpress/commit/9c4e5d6567e446c472f3adae3b2fe612f66871c7'}] CVE State: PUBLISHED
Explain CVE-2023-0948
Explain the vulnerability: CVE-2023-0948
The Japanized For WooCommerce WordPress plugin before 2.5.8 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting Affected Products: Japanized For WooCommerce References: [{'url': 'https://wpscan.com/vulnerability/a78d75b2-85a0-41eb-9720-c726ca2e8718', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0949
Explain the vulnerability: CVE-2023-0949
Cross-site Scripting (XSS) - Reflected in GitHub repository modoboa/modoboa prior to 2.0.5. Affected Products: modoboa/modoboa References: [{'url': 'https://huntr.dev/bounties/ef87be4e-493b-4ee9-9738-44c55b8acc19'}, {'url': 'https://github.com/modoboa/modoboa/commit/aa74e9a4a870162eea169e0a6a2eab841f8811b7'}] CVE State: PUBLISHED
Explain CVE-2023-0950
Explain the vulnerability: CVE-2023-0950
Improper Validation of Array Index vulnerability in the spreadsheet component of The Document Foundation LibreOffice allows an attacker to craft a spreadsheet document that will cause an array index underflow when loaded. In the affected versions of LibreOffice certain malformed spreadsheet formulas, such as AGGREGATE, could be created with less parameters passed to the formula interpreter than it expected, leading to an array index underflow, in which case there is a risk that arbitrary code could be executed. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.6; 7.5 versions prior to 7.5.1. Affected Products: LibreOffice References: [{'url': 'https://www.libreoffice.org/about-us/security/advisories/CVE-2023-0950'}, {'name': 'DSA-5415', 'tags': ['vendor-advisory'], 'url': 'https://www.debian.org/security/2023/dsa-5415'}, {'name': '[debian-lts-announce] 20230813 [SECURITY] [DLA 3526-1] libreoffice security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00014.html'}] CVE State: PUBLISHED
Explain CVE-2023-0951
Explain the vulnerability: CVE-2023-0951
Improper access controls on some API endpoints in Devolutions Server 2022.3.12 and earlier could allow a standard privileged user to perform privileged actions. Affected Products: Devolutions Server References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0003'}] CVE State: PUBLISHED
Explain CVE-2023-0952
Explain the vulnerability: CVE-2023-0952
Improper access controls on entries in Devolutions Server 2022.3.12 and earlier could allow an authenticated user to access sensitive data without proper authorization. Affected Products: Devolutions Server References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0003'}] CVE State: PUBLISHED
Explain CVE-2023-0953
Explain the vulnerability: CVE-2023-0953
Insufficient input sanitization in the documentation feature of Devolutions Server 2022.3.12 and earlier allows an authenticated attacker to perform an SQL Injection, potentially resulting in unauthorized access to system resources. Affected Products: Devolutions Server References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0003'}] CVE State: PUBLISHED
Explain CVE-2023-0954
Explain the vulnerability: CVE-2023-0954
A debug feature in Sensormatic Electronics Illustra Pro Gen 4 Dome and PTZ cameras allows a user to compromise credentials after a long period of sustained attack. Affected Products: Illustra Pro Gen 4 Dome References: [{'url': 'https://www.johnsoncontrols.com/cyber-solutions/security-advisories'}, {'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-159-02'}] CVE State: PUBLISHED
Explain CVE-2023-0955
Explain the vulnerability: CVE-2023-0955
The WP Statistics WordPress plugin before 14.0 does not escape a parameter, which could allow authenticated users to perform SQL Injection attacks. By default, the affected feature is available to users with the manage_options capability (admin+), however the plugin has a settings to allow low privilege users to access it as well. Affected Products: WP Statistics References: [{'url': 'https://wpscan.com/vulnerability/18b7e93f-b038-4f28-918b-4015d62f0eb8', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0956
Explain the vulnerability: CVE-2023-0956
External input could be used on TEL-STER TelWin SCADA WebInterface to construct paths to files and directories without properly neutralizing special elements within the pathname, which could allow an unauthenticated attacker to read files on the system. Affected Products: TelWin SCADA WebInterface References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-03'}, {'url': 'https://www.tel-ster.pl/index.php/telwin-scada/nowosci/372-telwin-scada-podatnosc-cve-2023-0956'}, {'url': 'https://cert.pl/posts/2023/07/CVE-2023-0956/'}] CVE State: PUBLISHED
Explain CVE-2023-0957
Explain the vulnerability: CVE-2023-0957
An issue was discovered in Gitpod versions prior to release-2022.11.2.16. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to the Gitpod JSONRPC server using a victim’s credentials, because the Origin header is not restricted. This can lead to the extraction of data from workspaces, to a full takeover of the workspace. Affected Products: Gitpod References: [{'url': 'https://app.safebase.io/portal/71ccd717-aa2d-4a1e-942e-c768d37e9e0c/preview?product=default&orgId=71ccd717-aa2d-4a1e-942e-c768d37e9e0c&tcuUid=1d505bda-9a38-4ca5-8724-052e6337f34d'}, {'url': 'https://github.com/gitpod-io/gitpod/releases/tag/release-2022.11.2'}, {'url': 'https://github.com/gitpod-io/gitpod/pull/16378'}, {'url': 'https://github.com/gitpod-io/gitpod/pull/16405'}, {'url': 'https://github.com/gitpod-io/gitpod/commit/12956988eec0031f42ffdfa3bdc3359f65628f9f'}, {'url': 'https://github.com/gitpod-io/gitpod/commit/673ab6856fa04c13b7b1f2a968e4d090f1d94e4f'}, {'url': 'https://snyk.io/blog/gitpod-remote-code-execution-vulnerability-websockets/'}] CVE State: PUBLISHED
Explain CVE-2023-0958
Explain the vulnerability: CVE-2023-0958
Several plugins for WordPress by Inisev are vulnerable to unauthorized installation of plugins due to a missing capability check on the handle_installation function that is called via the inisev_installation AJAX aciton in various versions. This makes it possible for authenticated attackers with minimal permissions, such as subscribers, to install select plugins from Inisev on vulnerable sites. CVE-2023-38514 appears to be a duplicate of this vulnerability. Affected Products: SSL Mixed Content Fix References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/feedburner-alternative-and-rss-redirect/tags/3.7/modules/banner/misc.php#L427'}, {'url': 'https://plugins.trac.wordpress.org/browser/ultimate-social-media-icons/tags/2.8.0/banner/misc.php#L424'}, {'url': 'https://plugins.trac.wordpress.org/browser/copy-delete-posts/tags/1.3.8/banner/misc.php#L426'}, {'url': 'https://plugins.trac.wordpress.org/browser/wp-clone-by-wp-academy/tags/2.3.7/modules/banner/misc.php#L438'}, {'url': 'https://plugins.trac.wordpress.org/browser/enhanced-text-widget/tags/1.5.6/banner/misc.php#L339'}, {'url': 'https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.2.7/includes/banner/misc.php#L427'}, {'url': 'https://plugins.trac.wordpress.org/browser/redirect-redirection/tags/1.1.3/includes/banner/misc.php#L427'}, {'url': 'https://plugins.trac.wordpress.org/browser/ultimate-posts-widget/tags/2.2.4/banner/misc.php#L343'}, {'url': 'https://plugins.trac.wordpress.org/browser/http-https-remover/tags/3.2.3/banner/misc.php#L427'}, {'url': 'https://plugins.trac.wordpress.org/browser/pop-up-pop-up/tags/1.1.9/modules/banner/misc.php#L427'}, {'url': 'https://plugins.trac.wordpress.org/changeset?old_path=%2Fcopy-delete-posts%2Ftags%2F1.3.8&old=2923021&new_path=%2Fcopy-delete-posts%2Ftags%2F1.3.9&new=2923021&sfp_email=&sfph_mail='}, {'url': 'https://plugins.trac.wordpress.org/browser/ultimate-social-media-icons/tags/2.8.2/banner/misc.php#L434'}, {'url': 'https://plugins.trac.wordpress.org/browser/copy-delete-posts/tags/1.4.0/banner/misc.php#L434'}, {'url': 'https://plugins.trac.wordpress.org/browser/wp-clone-by-wp-academy/tags/2.3.8/modules/banner/misc.php#L432'}, {'url': 'https://plugins.trac.wordpress.org/browser/enhanced-text-widget/tags/1.5.7/banner/misc.php#L351'}, {'url': 'https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.2.8/includes/banner/misc.php#L434'}, {'url': 'https://plugins.trac.wordpress.org/browser/ultimate-posts-widget/tags/2.2.5/banner/misc.php#L351'}, {'url': 'https://plugins.trac.wordpress.org/browser/pop-up-pop-up/tags/1.2.0/modules/banner/misc.php#L432'}, {'url': 'https://plugins.trac.wordpress.org/browser/ultimate-social-media-plus/tags/3.5.7/banner/misc.php#L424'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2823769%40http-https-remover%2Ftags%2F3.2.3&new=2944114%40http-https-remover%2Ftags%2F3.2.4'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2823770%40feedburner-alternative-and-rss-redirect%2Ftags%2F3.7&new=2944116%40feedburner-alternative-and-rss-redirect%2Ftags%2F3.8#file115'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2944041/ultimate-social-media-plus/tags/3.5.8/banner/misc.php?old=2823720&old_path=ultimate-social-media-plus%2Ftags%2F3.5.7%2Fbanner%2Fmisc.php'}] CVE State: PUBLISHED
Explain CVE-2023-0959
Explain the vulnerability: CVE-2023-0959
Bhima version 1.27.0 allows a remote attacker to update the privileges of any account registered in the application via a malicious link sent to an administrator. This is possible because the application is vulnerable to CSRF. Affected Products: Bhima References: [{'url': 'https://github.com/IMA-WorldHealth/bhima/'}, {'url': 'https://fluidattacks.com/advisories/calamaro/'}] CVE State: PUBLISHED
Explain CVE-2023-0960
Explain the vulnerability: CVE-2023-0960
A vulnerability was found in SeaCMS 11.6 and classified as problematic. Affected by this issue is some unknown functionality of the file /data/config.ftp.php of the component Picture Management. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-221630 is the identifier assigned to this vulnerability. Affected Products: SeaCMS References: [{'url': 'https://vuldb.com/?id.221630', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221630', 'tags': ['signature', 'permissions-required']}, {'url': 'https://note.youdao.com/ynoteshare/index.html?id=ef23876c8744c5c230f3874387c06b11', 'tags': ['exploit']}, {'url': 'https://github.com/jidle123/Seacms-v11.6/issues/1', 'tags': ['issue-tracking']}] CVE State: PUBLISHED
Explain CVE-2023-0961
Explain the vulnerability: CVE-2023-0961
A vulnerability was found in SourceCodester Music Gallery Site 1.0. It has been classified as critical. This affects an unknown part of the file view_music_details.php of the component GET Request Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221631. Affected Products: Music Gallery Site References: [{'url': 'https://vuldb.com/?id.221631', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221631', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%202.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0962
Explain the vulnerability: CVE-2023-0962
A vulnerability was found in SourceCodester Music Gallery Site 1.0. It has been declared as critical. This vulnerability affects unknown code of the file Master.php of the component GET Request Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221632. Affected Products: Music Gallery Site References: [{'url': 'https://vuldb.com/?id.221632', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221632', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%203.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0963
Explain the vulnerability: CVE-2023-0963
A vulnerability was found in SourceCodester Music Gallery Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file Users.php of the component POST Request Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221633 was assigned to this vulnerability. Affected Products: Music Gallery Site References: [{'url': 'https://vuldb.com/?id.221633', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221633', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20Broken%20Access%20Control.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0964
Explain the vulnerability: CVE-2023-0964
A vulnerability classified as critical has been found in SourceCodester Sales Tracker Management System 1.0. Affected is an unknown function of the file admin/products/view_product.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. VDB-221634 is the identifier assigned to this vulnerability. Affected Products: Sales Tracker Management System References: [{'url': 'https://vuldb.com/?id.221634', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221634', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0965
Explain the vulnerability: CVE-2023-0965
Compiler removal of buffer clearing in sli_cryptoacc_transparent_key_agreement in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM. Affected Products: Gecko Platform References: [{'tags': ['patch'], 'url': 'https://github.com/SiliconLabs/gecko_sdk'}, {'tags': ['vendor-advisory'], 'url': 'https://community.silabs.com/sfc/servlet.shepherd/document/download/0698Y00000U19lGQAR?operationContext=S1'}] CVE State: PUBLISHED
Explain CVE-2023-0966
Explain the vulnerability: CVE-2023-0966
A vulnerability classified as problematic was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=orders/view_order. The manipulation of the argument id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221635. Affected Products: Online Eyewear Shop References: [{'url': 'https://vuldb.com/?id.221635', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221635', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/1MurasaKi/Eyewear_Shop_XSS/blob/main/README.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0967
Explain the vulnerability: CVE-2023-0967
Bhima version 1.27.0 allows an attacker authenticated with normal user permissions to view sensitive data of other application users and data that should only be viewed by the administrator. This is possible because the application is vulnerable to IDOR, it does not properly validate user permissions with respect to certain actions the user can perform. Affected Products: Bhima References: [{'url': 'https://github.com/IMA-WorldHealth/bhima/'}, {'url': 'https://fluidattacks.com/advisories/ingrosso/'}] CVE State: PUBLISHED
Explain CVE-2023-0968
Explain the vulnerability: CVE-2023-0968
The Watu Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘dn’, 'email', 'points', and 'date' parameters in versions up to, and including, 3.3.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Affected Products: Watu Quiz References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/6341bdcc-c99f-40c3-81c4-ad90ff19f802'}, {'url': 'https://plugins.trac.wordpress.org/browser/watu/trunk/views/takings.php#L31'}] CVE State: PUBLISHED
Explain CVE-2023-0969
Explain the vulnerability: CVE-2023-0969
A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an authenticated attacker within Z-Wave range to manipulate an array pointer to disclose the contents of global memory. Affected Products: Z/IP Gateway References: [{'url': 'https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1'}] CVE State: PUBLISHED
Explain CVE-2023-0970
Explain the vulnerability: CVE-2023-0970
Multiple buffer overflow vulnerabilities in SiLabs Z/IP Gateway SDK version 7.18.01 and earlier allow an attacker with invasive physical access to a Z-Wave controller device to overwrite global memory and potentially execute arbitrary code. Affected Products: Z/IP Gateway References: [{'url': 'https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1'}] CVE State: PUBLISHED
Explain CVE-2023-0971
Explain the vulnerability: CVE-2023-0971
A logic error in SiLabs Z/IP Gateway SDK 7.18.02 and earlier allows authentication to be bypassed, remote administration of Z-Wave controllers, and S0/S2 encryption keys to be recovered. Affected Products: Z/IP Gateway References: [{'url': 'https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1'}] CVE State: PUBLISHED
Explain CVE-2023-0972
Explain the vulnerability: CVE-2023-0972
Description: A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution. Affected Products: Z/IP Gateway References: [{'url': 'https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1'}] CVE State: PUBLISHED
Explain CVE-2023-0973
Explain the vulnerability: CVE-2023-0973
STEPTools v18SP1 ifcmesh library (v18.1) is affected due to a null pointer dereference, which could allow an attacker to deny application usage when reading a specially constructed file, resulting in an application crash. Affected Products: v18SP1 ifcmesh library References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-04'}] CVE State: PUBLISHED
Explain CVE-2023-0975
Explain the vulnerability: CVE-2023-0975
A vulnerability exists in Trellix Agent for Windows version 5.7.8 and earlier, that allows local users, during install/upgrade workflow, to replace one of the Agent’s executables before it can be executed. This allows the user to elevate their permissions. Affected Products: Trellix Agent References: [{'url': 'https://kcm.trellix.com/corporate/index?page=content&id=SB10396'}] CVE State: PUBLISHED
Explain CVE-2023-0976
Explain the vulnerability: CVE-2023-0976
A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature located in the System Tree. Affected Products: Trellix Agent References: [{'url': 'https://kcm.trellix.com/corporate/index?page=content&id=SB10398'}] CVE State: PUBLISHED
Explain CVE-2023-0977
Explain the vulnerability: CVE-2023-0977
A heap-based overflow vulnerability in Trellix Agent (Windows and Linux) version 5.7.8 and earlier, allows a remote user to alter the page heap in the macmnsvc process memory block resulting in the service becoming unavailable. Affected Products: Trellix Agent References: [{'url': 'https://kcm.trellix.com/corporate/index?page=content&id=SB10396'}] CVE State: PUBLISHED
Explain CVE-2023-0978
Explain the vulnerability: CVE-2023-0978
A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack Affected Products: Trellix Intelligent Sandbox References: [{'url': 'https://kcm.trellix.com/corporate/index?page=content&id=SB10397'}] CVE State: PUBLISHED
Explain CVE-2023-0979
Explain the vulnerability: CVE-2023-0979
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in MedData Informatics MedDataPACS.This issue affects MedDataPACS : before 2023-03-03. Affected Products: MedDataPACS References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0129'}] CVE State: PUBLISHED
Explain CVE-2023-0980
Explain the vulnerability: CVE-2023-0980
A vulnerability was found in SourceCodester Yoga Class Registration System 1.0 and classified as critical. This issue affects some unknown processing of the file admin/registrations/update_status.php of the component Status Update Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-221675. Affected Products: Yoga Class Registration System References: [{'url': 'https://vuldb.com/?id.221675', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221675', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0981
Explain the vulnerability: CVE-2023-0981
A vulnerability was found in SourceCodester Yoga Class Registration System 1.0. It has been classified as critical. Affected is an unknown function of the component Delete User. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-221676. Affected Products: Yoga Class Registration System References: [{'url': 'https://vuldb.com/?id.221676', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221676', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0982
Explain the vulnerability: CVE-2023-0982
A vulnerability was found in SourceCodester Yoga Class Registration System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Add Class Entry. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The identifier VDB-221677 was assigned to this vulnerability. Affected Products: Yoga Class Registration System References: [{'url': 'https://vuldb.com/?id.221677', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221677', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0983
Explain the vulnerability: CVE-2023-0983
The stylish-cost-calculator-premium WordPress plugin before 7.9.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Stored Cross-Site Scripting which could be used against admins when viewing submissions submitted through the Email Quote Form. Affected Products: Stylish Cost Calculator Premium References: [{'url': 'https://wpscan.com/vulnerability/73353221-3e6d-44e8-bf41-55a0fe57d81f', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0985
Explain the vulnerability: CVE-2023-0985
An Authorization Bypass vulnerability was found in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual version <= 2.13.3. An authenticated remote user with low privileges can change the password of any user in the same account. This allows to take over the admin user and therefore fully compromise the account. Affected Products: mbCONNECT24 References: [{'url': 'https://cert.vde.com/en/advisories/VDE-2023-002/'}] CVE State: PUBLISHED
Explain CVE-2023-0986
Explain the vulnerability: CVE-2023-0986
A vulnerability classified as critical has been found in SourceCodester Sales Tracker Management System 1.0. This affects an unknown part of the file admin/?page=user/manage_user of the component Edit User. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-221679. Affected Products: Sales Tracker Management System References: [{'url': 'https://vuldb.com/?id.221679', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221679', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0987
Explain the vulnerability: CVE-2023-0987
A vulnerability classified as problematic was found in SourceCodester Online Pizza Ordering System 1.0. This vulnerability affects unknown code of the file index.php?page=checkout. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221680. Affected Products: Online Pizza Ordering System References: [{'url': 'https://vuldb.com/?id.221680', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221680', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/1MurasaKi/PizzeXSS_Report/blob/main/Online%20Pizza%20Ordering%20System/README.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0988
Explain the vulnerability: CVE-2023-0988
A vulnerability, which was classified as problematic, has been found in SourceCodester Online Pizza Ordering System 1.0. This issue affects some unknown processing of the file admin/ajax.php?action=save_user. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221681 was assigned to this vulnerability. Affected Products: Online Pizza Ordering System References: [{'url': 'https://vuldb.com/?id.221681', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221681', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/1MurasaKi/PizzaCSRF_report/tree/main/vender/Online%20Pizza%20Ordering%20System', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0992
Explain the vulnerability: CVE-2023-0992
The Shield Security plugin for WordPress is vulnerable to stored Cross-Site Scripting in versions up to, and including, 17.0.17 via the 'User-Agent' header. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Affected Products: Shield Security – Smart Bot Blocking & Intrusion Prevention References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/162dff28-94ea-4a47-a6cb-a13317cf1a04?source=cve'}, {'url': 'https://wordpress.org/plugins/wp-simple-firewall/#developers'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2883864%40wp-simple-firewall%2Ftrunk&old=2883536%40wp-simple-firewall%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0993
Explain the vulnerability: CVE-2023-0993
The Shield Security plugin for WordPress is vulnerable to Missing Authorization on the 'theme-plugin-file' AJAX action in versions up to, and including, 17.0.17. This allows authenticated attackers to add arbitrary audit log entries indicating that a theme or plugin has been edited, and is also a vector for Cross-Site Scripting via CVE-2023-0992. Affected Products: Shield Security – Smart Bot Blocking & Intrusion Prevention References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/674461ad-9b61-48c4-af2a-5dfcaeb38215?source=cve'}, {'url': 'https://wordpress.org/plugins/wp-simple-firewall/'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2883864%40wp-simple-firewall%2Ftrunk&old=2883536%40wp-simple-firewall%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0994
Explain the vulnerability: CVE-2023-0994
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository francoisjacquet/rosariosis prior to 10.8.2. Affected Products: francoisjacquet/rosariosis References: [{'url': 'https://huntr.dev/bounties/a281c586-9b97-4d17-88ff-ca91bb4c45ad'}, {'url': 'https://github.com/francoisjacquet/rosariosis/commit/630d3e3d78270db8dbcbfe87db265bc3e70c5a76'}] CVE State: PUBLISHED
Explain CVE-2023-0995
Explain the vulnerability: CVE-2023-0995
Cross-site Scripting (XSS) - Stored in GitHub repository unilogies/bumsys prior to v2.0.1. Affected Products: unilogies/bumsys References: [{'url': 'https://huntr.dev/bounties/2847b92b-22c2-4dbc-a9d9-56a7cd12fe5f'}, {'url': 'https://github.com/unilogies/bumsys/commit/927214bd7c475b31062c56294ff7b23d523a7219'}] CVE State: PUBLISHED
Explain CVE-2023-0996
Explain the vulnerability: CVE-2023-0996
There is a vulnerability in the strided image data parsing code in the emscripten wrapper for libheif. An attacker could exploit this through a crafted image file to cause a buffer overflow in linear memory during a memcpy call. Affected Products: libheif References: [{'url': 'https://github.com/strukturag/libheif/pull/759'}, {'url': 'https://govtech-csg.github.io/security-advisories/2023/02/24/CVE-2023-0996.html'}] CVE State: PUBLISHED
Explain CVE-2023-0997
Explain the vulnerability: CVE-2023-0997
A vulnerability was found in SourceCodester Moosikay E-Commerce System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Moosikay/order.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221732. Affected Products: Moosikay E-Commerce System References: [{'url': 'https://vuldb.com/?id.221732', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221732', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/jidle123/bug_report/blob/main/vendors/razormist/Moosikay%20-%20E-Commerce%20System/SQLi-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0998
Explain the vulnerability: CVE-2023-0998
A vulnerability classified as critical has been found in SourceCodester Alphaware Simple E-Commerce System 1.0. This affects an unknown part of the file /alphaware/summary.php of the component Payment Handler. The manipulation of the argument amount leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221733 was assigned to this vulnerability. Affected Products: Alphaware Simple E-Commerce System References: [{'url': 'https://vuldb.com/?id.221733', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221733', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/1MurasaKi/PaymentVul_report/blob/main/razormist/Alphaware%20-%20Simple%20E-Commerce%20System/payment_vulnerability.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0999
Explain the vulnerability: CVE-2023-0999
A vulnerability classified as problematic was found in SourceCodester Sales Tracker Management System 1.0. This vulnerability affects unknown code of the file admin/?page=user/list. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221734 is the identifier assigned to this vulnerability. Affected Products: Sales Tracker Management System References: [{'url': 'https://vuldb.com/?id.221734', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221734', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/1MurasaKi/STMS_CSRF/blob/main/README.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1002
Explain the vulnerability: CVE-2023-1002
A vulnerability, which was classified as problematic, has been found in MuYuCMS 2.2. This issue affects some unknown processing of the file index.php. The manipulation of the argument file_path leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221735. Affected Products: MuYuCMS References: [{'url': 'https://vuldb.com/?id.221735', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221735', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/MuYuCMS/MuYuCMS/issues/3', 'tags': ['exploit', 'issue-tracking']}] CVE State: PUBLISHED
Explain CVE-2023-1003
Explain the vulnerability: CVE-2023-1003
A vulnerability, which was classified as critical, was found in Typora up to 1.5.5. Affected is an unknown function of the component WSH JScript Handler. The manipulation leads to code injection. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.8 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221736. Affected Products: Typora References: [{'url': 'https://vuldb.com/?id.221736', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221736', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/typora/typora-issues/issues/5623', 'tags': ['exploit', 'issue-tracking']}] CVE State: PUBLISHED
Explain CVE-2023-1004
Explain the vulnerability: CVE-2023-1004
A vulnerability has been found in MarkText up to 0.17.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the component WSH JScript Handler. The manipulation leads to code injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-221737 was assigned to this vulnerability. Affected Products: MarkText References: [{'url': 'https://vuldb.com/?id.221737', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221737', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/marktext/marktext/issues/3575', 'tags': ['exploit', 'issue-tracking']}] CVE State: PUBLISHED
Explain CVE-2023-1005
Explain the vulnerability: CVE-2023-1005
A vulnerability was found in JP1016 Markdown-Electron and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to code injection. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. VDB-221738 is the identifier assigned to this vulnerability. Affected Products: Markdown-Electron References: [{'url': 'https://vuldb.com/?id.221738', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221738', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/JP1016/Markdown-Electron/issues/3', 'tags': ['exploit', 'issue-tracking']}] CVE State: PUBLISHED
Explain CVE-2023-1006
Explain the vulnerability: CVE-2023-1006
A vulnerability was found in SourceCodester Medical Certificate Generator App 1.0. It has been classified as problematic. This affects an unknown part of the component New Record Handler. The manipulation of the argument Firstname/Middlename/Lastname/Suffix/Nationality/Doctor Fullname/Doctor Suffix with the input "><script>prompt(1)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-221739. Affected Products: Medical Certificate Generator App References: [{'url': 'https://vuldb.com/?id.221739', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221739', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1007
Explain the vulnerability: CVE-2023-1007
A vulnerability was found in Twister Antivirus 8.17. It has been declared as critical. This vulnerability affects the function 0x801120E4 in the library filmfd.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221740. Affected Products: Antivirus References: [{'url': 'https://vuldb.com/?id.221740', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221740', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1007', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1wh20g2Ze4gwCtripe7QeHNXd3bS4aZNG/view?usp=sharing', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1008
Explain the vulnerability: CVE-2023-1008
A vulnerability was found in Twister Antivirus 8.17. It has been rated as problematic. This issue affects the function 0x801120E4 in the library filmfd.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier VDB-221741 was assigned to this vulnerability. Affected Products: Antivirus References: [{'url': 'https://vuldb.com/?id.221741', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221741', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1008', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1fdQWJ1uvXELnXnDm2Jk81bA0fwwqQCpY/view?usp=sharing', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1009
Explain the vulnerability: CVE-2023-1009
A vulnerability classified as problematic has been found in DrayTek Vigor 2960 1.5.1.4. Affected is the function sub_1DF14 of the file /cgi-bin/mainfunction.cgi. The manipulation of the argument option with the input /../etc/password leads to path traversal. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. VDB-221742 is the identifier assigned to this vulnerability. Affected Products: Vigor 2960 References: [{'url': 'https://vuldb.com/?id.221742', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221742', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/xxy1126/Vuln/blob/main/Draytek/1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1010
Explain the vulnerability: CVE-2023-1010
A vulnerability classified as critical was found in vox2png 1.0. Affected by this vulnerability is an unknown functionality of the file vox2png.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221743. Affected Products: vox2png References: [{'url': 'https://vuldb.com/?id.221743', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221743', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/10cksYiqiyinHangzhouTechnology/vox2png/blob/main/README.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1011
Explain the vulnerability: CVE-2023-1011
The AI ChatBot WordPress plugin before 4.4.5 does not escape most of its settings before outputting them back in the dashboard, and does not have a proper CSRF check, allowing attackers to make a logged in admin set XSS payloads in them. Affected Products: AI ChatBot References: [{'url': 'https://wpscan.com/vulnerability/d1784446-b3da-4175-9dac-20b030f19984', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1013
Explain the vulnerability: CVE-2023-1013
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Virames Vira-Investing allows Cross-Site Scripting (XSS).This issue affects Vira-Investing: before 1.0.84.86. Affected Products: Vira-Investing References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0183'}] CVE State: PUBLISHED
Explain CVE-2023-1014
Explain the vulnerability: CVE-2023-1014
Improper Protection for Outbound Error Messages and Alert Signals vulnerability in Virames Vira-Investing allows Account Footprinting.This issue affects Vira-Investing: before 1.0.84.86. Affected Products: Vira-Investing References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0183'}] CVE State: PUBLISHED