instruction
stringlengths 21
21
| input
stringlengths 40
40
| output
stringlengths 62
37.3k
|
---|---|---|
Explain CVE-2023-0903 | Explain the vulnerability: CVE-2023-0903 | A vulnerability was found in SourceCodester Employee Task Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file edit-task.php. The manipulation of the argument task_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221452.
Affected Products: Employee Task Management System
References: [{'url': 'https://vuldb.com/?id.221452', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221452', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0904 | Explain the vulnerability: CVE-2023-0904 | A vulnerability was found in SourceCodester Employee Task Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file task-details.php. The manipulation of the argument task_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221453 was assigned to this vulnerability.
Affected Products: Employee Task Management System
References: [{'url': 'https://vuldb.com/?id.221453', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221453', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20SQL%20Injection%20-%202.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0905 | Explain the vulnerability: CVE-2023-0905 | A vulnerability classified as critical has been found in SourceCodester Employee Task Management System 1.0. Affected is an unknown function of the file changePasswordForEmployee.php. The manipulation leads to improper authentication. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221454 is the identifier assigned to this vulnerability.
Affected Products: Employee Task Management System
References: [{'url': 'https://vuldb.com/?id.221454', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221454', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Employee%20Task%20Management%20System%20-%20Broken%20Authentication.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0906 | Explain the vulnerability: CVE-2023-0906 | A vulnerability classified as critical was found in SourceCodester Online Pizza Ordering System 1.0. Affected by this vulnerability is the function delete_category of the file ajax.php of the component POST Parameter Handler. The manipulation leads to missing authentication. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-221455.
Affected Products: Online Pizza Ordering System
References: [{'url': 'https://vuldb.com/?id.221455', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221455', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0907 | Explain the vulnerability: CVE-2023-0907 | A vulnerability, which was classified as problematic, has been found in Filseclab Twister Antivirus 8.17. Affected by this issue is the function 0x220017 in the library ffsmon.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221456.
Affected Products: Twister Antivirus
References: [{'url': 'https://vuldb.com/?id.221456', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221456', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-0907', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0908 | Explain the vulnerability: CVE-2023-0908 | A vulnerability, which was classified as problematic, was found in Xoslab Easy File Locker 2.2.0.184. This affects the function MessageNotifyCallback in the library xlkfs.sys. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-221457 was assigned to this vulnerability.
Affected Products: Easy File Locker
References: [{'url': 'https://vuldb.com/?id.221457', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221457', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-0908', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0909 | Explain the vulnerability: CVE-2023-0909 | A vulnerability, which was classified as problematic, was found in cxasm notepad-- 1.22. This affects an unknown part of the component Directory Comparison Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The associated identifier of this vulnerability is VDB-221475.
Affected Products: notepad--
References: [{'url': 'https://vuldb.com/?id.221475', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221475', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/cxasm/notepad--/issues/I6C80Z', 'tags': ['issue-tracking']}]
CVE State: PUBLISHED |
Explain CVE-2023-0910 | Explain the vulnerability: CVE-2023-0910 | A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. This vulnerability affects unknown code of the file view_prod.php of the component GET Parameter Handler. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-221476.
Affected Products: Online Pizza Ordering System
References: [{'url': 'https://vuldb.com/?id.221476', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221476', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0911 | Explain the vulnerability: CVE-2023-0911 | The WordPress Shortcodes Plugin — Shortcodes Ultimate WordPress plugin before 5.12.8 does not validate the user meta to be retrieved via the user shortcode, allowing any authenticated users such as subscriber to retrieve arbitrary user meta (except the user_pass), such as the user email and activation key by default.
Affected Products: WordPress Shortcodes Plugin — Shortcodes Ultimate
References: [{'url': 'https://wpscan.com/vulnerability/35404d16-7213-4293-ac0d-926bd6c17444', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0912 | Explain the vulnerability: CVE-2023-0912 | A vulnerability classified as critical has been found in SourceCodester Auto Dealer Management System 1.0. This affects an unknown part of the file /adms/admin/?page=vehicles/view_transaction. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221481 was assigned to this vulnerability.
Affected Products: Auto Dealer Management System
References: [{'url': 'https://vuldb.com/?id.221481', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221481', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%201.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0913 | Explain the vulnerability: CVE-2023-0913 | A vulnerability classified as critical was found in SourceCodester Auto Dealer Management System 1.0. This vulnerability affects unknown code of the file /adms/admin/?page=vehicles/sell_vehicle. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221482 is the identifier assigned to this vulnerability.
Affected Products: Auto Dealer Management System
References: [{'url': 'https://vuldb.com/?id.221482', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221482', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%202.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0914 | Explain the vulnerability: CVE-2023-0914 | Improper Authorization in GitHub repository pixelfed/pixelfed prior to 0.11.4.
Affected Products: pixelfed/pixelfed
References: [{'url': 'https://huntr.dev/bounties/54d5fd76-e038-4eda-9e03-d5e95e09c0ec'}, {'url': 'https://github.com/pixelfed/pixelfed/commit/ef56f92c3d77e9bafaa70c08b7c04d5a61b8d454'}]
CVE State: PUBLISHED |
Explain CVE-2023-0915 | Explain the vulnerability: CVE-2023-0915 | A vulnerability classified as critical has been found in SourceCodester Auto Dealer Management System 1.0. Affected is an unknown function of the file /adms/admin/?page=user/manage_user. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221490 is the identifier assigned to this vulnerability.
Affected Products: Auto Dealer Management System
References: [{'url': 'https://vuldb.com/?id.221490', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221490', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20SQL%20Injection%20-%203.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0916 | Explain the vulnerability: CVE-2023-0916 | A vulnerability classified as critical was found in SourceCodester Auto Dealer Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /adms/classes/Users.php. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221491.
Affected Products: Auto Dealer Management System
References: [{'url': 'https://vuldb.com/?id.221491', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221491', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Auto%20Dealer%20Management%20System%20-%20Broken%20Access%20Control.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0917 | Explain the vulnerability: CVE-2023-0917 | A vulnerability, which was classified as critical, was found in SourceCodester Simple Customer Relationship Management System 1.0. This affects an unknown part of the file /php-scrm/login.php. The manipulation of the argument Password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221493 was assigned to this vulnerability.
Affected Products: Simple Customer Relationship Management System
References: [{'url': 'https://vuldb.com/?id.221493', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221493', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/awans2023/CVE/blob/main/README1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0918 | Explain the vulnerability: CVE-2023-0918 | A vulnerability has been found in codeprojects Pharmacy Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file add.php of the component Avatar Image Handler. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221494 is the identifier assigned to this vulnerability.
Affected Products: Pharmacy Management System
References: [{'url': 'https://vuldb.com/?id.221494', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221494', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.0xgabe.com/?p=71', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0919 | Explain the vulnerability: CVE-2023-0919 | Missing Authentication for Critical Function in GitHub repository kareadita/kavita prior to 0.7.0.
Affected Products: kareadita/kavita
References: [{'url': 'https://huntr.dev/bounties/3c514923-473f-4c50-ae0d-d002a41fe70f'}, {'url': 'https://github.com/kareadita/kavita/commit/6648b79e1b2f92449d5816d0722b7a3d72f259d5'}]
CVE State: PUBLISHED |
Explain CVE-2023-0921 | Explain the vulnerability: CVE-2023-0921 | A lack of length validation in GitLab CE/EE affecting all versions from 8.3 before 15.10.8, 15.11 before 15.11.7, and 16.0 before 16.0.2 allows an authenticated attacker to create a large Issue description via GraphQL which, when repeatedly requested, saturates CPU usage.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/392433'}, {'url': 'https://hackerone.com/reports/1869839'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0921.json'}]
CVE State: PUBLISHED |
Explain CVE-2023-0922 | Explain the vulnerability: CVE-2023-0922 | The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection.
Affected Products: Samba
References: [{'url': 'https://www.samba.org/samba/security/CVE-2023-0922.html'}, {'url': 'https://security.netapp.com/advisory/ntap-20230406-0007/'}, {'name': 'FEDORA-2023-1c172e3264', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0924 | Explain the vulnerability: CVE-2023-0924 | The ZYREX POPUP WordPress plugin through 1.0 does not validate the type of files uploaded when creating a popup, allowing a high privileged user (such as an Administrator) to upload arbitrary files, even when modifying the file system is disallowed, such as in a multisite install.
Affected Products: ZYREX POPUP
References: [{'url': 'https://wpscan.com/vulnerability/0fd0d7a5-9263-43b6-9244-7880c3d3e6f4', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0927 | Explain the vulnerability: CVE-2023-0927 | Use after free in Web Payments API in Google Chrome on Android prior to 110.0.5481.177 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1414738'}]
CVE State: PUBLISHED |
Explain CVE-2023-0928 | Explain the vulnerability: CVE-2023-0928 | Use after free in SwiftShader in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1309035'}]
CVE State: PUBLISHED |
Explain CVE-2023-0929 | Explain the vulnerability: CVE-2023-0929 | Use after free in Vulkan in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1399742'}]
CVE State: PUBLISHED |
Explain CVE-2023-0930 | Explain the vulnerability: CVE-2023-0930 | Heap buffer overflow in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1410766'}]
CVE State: PUBLISHED |
Explain CVE-2023-0931 | Explain the vulnerability: CVE-2023-0931 | Use after free in Video in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1407701'}]
CVE State: PUBLISHED |
Explain CVE-2023-0932 | Explain the vulnerability: CVE-2023-0932 | Use after free in WebRTC in Google Chrome on Windows prior to 110.0.5481.177 allowed a remote attacker who convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1413005'}]
CVE State: PUBLISHED |
Explain CVE-2023-0933 | Explain the vulnerability: CVE-2023-0933 | Integer overflow in PDF in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1404864'}]
CVE State: PUBLISHED |
Explain CVE-2023-0934 | Explain the vulnerability: CVE-2023-0934 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.5.
Affected Products: answerdev/answer
References: [{'url': 'https://huntr.dev/bounties/cd213098-5bab-487f-82c7-13698ad43b51'}, {'url': 'https://github.com/answerdev/answer/commit/edc06942d51fa8e56a134c5c7e5c8826d9260da0'}]
CVE State: PUBLISHED |
Explain CVE-2023-0935 | Explain the vulnerability: CVE-2023-0935 | A vulnerability was found in DolphinPHP up to 1.5.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file common.php of the component Incomplete Fix CVE-2021-46097. The manipulation of the argument id leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221551.
Affected Products: DolphinPHP
References: [{'url': 'https://vuldb.com/?id.221551', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221551', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ssteveez/dolphin/blob/main/README.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0936 | Explain the vulnerability: CVE-2023-0936 | A vulnerability was found in TP-Link Archer C50 V2_160801. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation leads to denial of service. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221552.
Affected Products: Archer C50
References: [{'url': 'https://vuldb.com/?id.221552', 'tags': ['vdb-entry', 'technical-description', 'exploit']}, {'url': 'https://vuldb.com/?ctiid.221552', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0937 | Explain the vulnerability: CVE-2023-0937 | The VK All in One Expansion Unit WordPress plugin before 9.87.1.0 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
Affected Products: VK All in One Expansion Unit
References: [{'url': 'https://wpscan.com/vulnerability/5110ff02-c721-43eb-b13e-50aca25e1162', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0938 | Explain the vulnerability: CVE-2023-0938 | A vulnerability classified as critical has been found in SourceCodester Music Gallery Site 1.0. This affects an unknown part of the file music_list.php of the component GET Request Handler. The manipulation of the argument cid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221553 was assigned to this vulnerability.
Affected Products: Music Gallery Site
References: [{'url': 'https://vuldb.com/?id.221553', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221553', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%201.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0939 | Explain the vulnerability: CVE-2023-0939 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NTN Information Technologies Online Services Software allows SQL Injection.This issue affects Online Services Software: before 1.17.
Affected Products: Online Services Software
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0103'}]
CVE State: PUBLISHED |
Explain CVE-2023-0940 | Explain the vulnerability: CVE-2023-0940 | The ProfileGrid WordPress plugin before 5.3.1 provides an AJAX endpoint for resetting a user password but does not implement proper authorization. This allows a user with low privileges, such as subscriber, to change the password of any account, including Administrator ones.
Affected Products: ProfileGrid
References: [{'url': 'https://wpscan.com/vulnerability/56744f72-2d48-4f42-8195-24b4dd951bb5', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0941 | Explain the vulnerability: CVE-2023-0941 | Use after free in Prompts in Google Chrome prior to 110.0.5481.177 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-desktop-update_22.html'}, {'url': 'https://crbug.com/1415366'}]
CVE State: PUBLISHED |
Explain CVE-2023-0942 | Explain the vulnerability: CVE-2023-0942 | The Japanized For WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘tab’ parameter in versions up to, and including, 2.5.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected Products: Japanized For WooCommerce
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/bb606a30-2f7c-41e9-9ebc-9f1b0b84fff8'}, {'url': 'https://plugins.trac.wordpress.org/browser/woocommerce-for-japan/trunk/includes/admin/views/html-admin-setting-screen.php#L63'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2868545%40woocommerce-for-japan%2Ftrunk&old=2863064%40woocommerce-for-japan%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0943 | Explain the vulnerability: CVE-2023-0943 | A vulnerability, which was classified as problematic, has been found in SourceCodester Best POS Management System 1.0. This issue affects some unknown processing of the file index.php?page=site_settings of the component Image Handler. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-221591.
Affected Products: Best POS Management System
References: [{'url': 'https://vuldb.com/?id.221591', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221591', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0944 | Explain the vulnerability: CVE-2023-0944 | Bhima version 1.27.0 allows an authenticated attacker with regular user permissions to update arbitrary user session data such as username, email and password. This is possible because the application is vulnerable to IDOR, it does not correctly validate user permissions with respect to certain actions that can be performed by the user.
Affected Products: Bhima
References: [{'url': 'https://fluidattacks.com/advisories/stewart/'}, {'url': 'https://github.com/IMA-WorldHealth/bhima/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0945 | Explain the vulnerability: CVE-2023-0945 | A vulnerability, which was classified as problematic, was found in SourceCodester Best POS Management System 1.0. Affected is an unknown function of the file index.php?page=add-category. The manipulation of the argument Name with the input "><img src=x onerror=prompt(document.domain);> leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-221592.
Affected Products: Best POS Management System
References: [{'url': 'https://vuldb.com/?id.221592', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221592', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0946 | Explain the vulnerability: CVE-2023-0946 | A vulnerability has been found in SourceCodester Best POS Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file billing/index.php?id=9. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The identifier VDB-221593 was assigned to this vulnerability.
Affected Products: Best POS Management System
References: [{'url': 'https://vuldb.com/?id.221593', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221593', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0947 | Explain the vulnerability: CVE-2023-0947 | Path Traversal in GitHub repository flatpressblog/flatpress prior to 1.3.
Affected Products: flatpressblog/flatpress
References: [{'url': 'https://huntr.dev/bounties/7379d702-72ff-4a5d-bc68-007290015496'}, {'url': 'https://github.com/flatpressblog/flatpress/commit/9c4e5d6567e446c472f3adae3b2fe612f66871c7'}]
CVE State: PUBLISHED |
Explain CVE-2023-0948 | Explain the vulnerability: CVE-2023-0948 | The Japanized For WooCommerce WordPress plugin before 2.5.8 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting
Affected Products: Japanized For WooCommerce
References: [{'url': 'https://wpscan.com/vulnerability/a78d75b2-85a0-41eb-9720-c726ca2e8718', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0949 | Explain the vulnerability: CVE-2023-0949 | Cross-site Scripting (XSS) - Reflected in GitHub repository modoboa/modoboa prior to 2.0.5.
Affected Products: modoboa/modoboa
References: [{'url': 'https://huntr.dev/bounties/ef87be4e-493b-4ee9-9738-44c55b8acc19'}, {'url': 'https://github.com/modoboa/modoboa/commit/aa74e9a4a870162eea169e0a6a2eab841f8811b7'}]
CVE State: PUBLISHED |
Explain CVE-2023-0950 | Explain the vulnerability: CVE-2023-0950 | Improper Validation of Array Index vulnerability in the spreadsheet component of The Document Foundation LibreOffice allows an attacker to craft a spreadsheet document that will cause an array index underflow when loaded. In the affected versions of LibreOffice certain malformed spreadsheet formulas, such as AGGREGATE, could be created with less parameters passed to the formula interpreter than it expected, leading to an array index underflow, in which case there is a risk that arbitrary code could be executed. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.6; 7.5 versions prior to 7.5.1.
Affected Products: LibreOffice
References: [{'url': 'https://www.libreoffice.org/about-us/security/advisories/CVE-2023-0950'}, {'name': 'DSA-5415', 'tags': ['vendor-advisory'], 'url': 'https://www.debian.org/security/2023/dsa-5415'}, {'name': '[debian-lts-announce] 20230813 [SECURITY] [DLA 3526-1] libreoffice security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/08/msg00014.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-0951 | Explain the vulnerability: CVE-2023-0951 | Improper access controls on some API endpoints in Devolutions Server 2022.3.12
and earlier could allow a standard privileged user to perform privileged
actions.
Affected Products: Devolutions Server
References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0003'}]
CVE State: PUBLISHED |
Explain CVE-2023-0952 | Explain the vulnerability: CVE-2023-0952 | Improper access controls on entries in Devolutions Server
2022.3.12 and earlier could allow an authenticated user to access
sensitive data without proper authorization.
Affected Products: Devolutions Server
References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0003'}]
CVE State: PUBLISHED |
Explain CVE-2023-0953 | Explain the vulnerability: CVE-2023-0953 | Insufficient input sanitization in the documentation feature of Devolutions Server 2022.3.12 and earlier allows an authenticated attacker to perform an SQL Injection, potentially resulting in unauthorized access to system resources.
Affected Products: Devolutions Server
References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0003'}]
CVE State: PUBLISHED |
Explain CVE-2023-0954 | Explain the vulnerability: CVE-2023-0954 | A debug feature in Sensormatic Electronics Illustra Pro Gen 4 Dome and PTZ cameras allows a user to compromise credentials after a long period of sustained attack.
Affected Products: Illustra Pro Gen 4 Dome
References: [{'url': 'https://www.johnsoncontrols.com/cyber-solutions/security-advisories'}, {'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-159-02'}]
CVE State: PUBLISHED |
Explain CVE-2023-0955 | Explain the vulnerability: CVE-2023-0955 | The WP Statistics WordPress plugin before 14.0 does not escape a parameter, which could allow authenticated users to perform SQL Injection attacks. By default, the affected feature is available to users with the manage_options capability (admin+), however the plugin has a settings to allow low privilege users to access it as well.
Affected Products: WP Statistics
References: [{'url': 'https://wpscan.com/vulnerability/18b7e93f-b038-4f28-918b-4015d62f0eb8', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0956 | Explain the vulnerability: CVE-2023-0956 |
External input could be used on TEL-STER TelWin SCADA WebInterface to construct paths to files and directories without properly neutralizing special elements within the pathname, which could allow an unauthenticated attacker to read files on the system.
Affected Products: TelWin SCADA WebInterface
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-03'}, {'url': 'https://www.tel-ster.pl/index.php/telwin-scada/nowosci/372-telwin-scada-podatnosc-cve-2023-0956'}, {'url': 'https://cert.pl/posts/2023/07/CVE-2023-0956/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0957 | Explain the vulnerability: CVE-2023-0957 | An issue was discovered in Gitpod versions prior to release-2022.11.2.16. There is a Cross-Site WebSocket Hijacking (CSWSH) vulnerability that allows attackers to make WebSocket connections to the Gitpod JSONRPC server using a victim’s credentials, because the Origin header is not restricted. This can lead to the extraction of data from workspaces, to a full takeover of the workspace.
Affected Products: Gitpod
References: [{'url': 'https://app.safebase.io/portal/71ccd717-aa2d-4a1e-942e-c768d37e9e0c/preview?product=default&orgId=71ccd717-aa2d-4a1e-942e-c768d37e9e0c&tcuUid=1d505bda-9a38-4ca5-8724-052e6337f34d'}, {'url': 'https://github.com/gitpod-io/gitpod/releases/tag/release-2022.11.2'}, {'url': 'https://github.com/gitpod-io/gitpod/pull/16378'}, {'url': 'https://github.com/gitpod-io/gitpod/pull/16405'}, {'url': 'https://github.com/gitpod-io/gitpod/commit/12956988eec0031f42ffdfa3bdc3359f65628f9f'}, {'url': 'https://github.com/gitpod-io/gitpod/commit/673ab6856fa04c13b7b1f2a968e4d090f1d94e4f'}, {'url': 'https://snyk.io/blog/gitpod-remote-code-execution-vulnerability-websockets/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0958 | Explain the vulnerability: CVE-2023-0958 | Several plugins for WordPress by Inisev are vulnerable to unauthorized installation of plugins due to a missing capability check on the handle_installation function that is called via the inisev_installation AJAX aciton in various versions. This makes it possible for authenticated attackers with minimal permissions, such as subscribers, to install select plugins from Inisev on vulnerable sites. CVE-2023-38514 appears to be a duplicate of this vulnerability.
Affected Products: SSL Mixed Content Fix
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/cf7bdd0e-f3b3-4be5-8a30-2c6d9cb783a3?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/feedburner-alternative-and-rss-redirect/tags/3.7/modules/banner/misc.php#L427'}, {'url': 'https://plugins.trac.wordpress.org/browser/ultimate-social-media-icons/tags/2.8.0/banner/misc.php#L424'}, {'url': 'https://plugins.trac.wordpress.org/browser/copy-delete-posts/tags/1.3.8/banner/misc.php#L426'}, {'url': 'https://plugins.trac.wordpress.org/browser/wp-clone-by-wp-academy/tags/2.3.7/modules/banner/misc.php#L438'}, {'url': 'https://plugins.trac.wordpress.org/browser/enhanced-text-widget/tags/1.5.6/banner/misc.php#L339'}, {'url': 'https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.2.7/includes/banner/misc.php#L427'}, {'url': 'https://plugins.trac.wordpress.org/browser/redirect-redirection/tags/1.1.3/includes/banner/misc.php#L427'}, {'url': 'https://plugins.trac.wordpress.org/browser/ultimate-posts-widget/tags/2.2.4/banner/misc.php#L343'}, {'url': 'https://plugins.trac.wordpress.org/browser/http-https-remover/tags/3.2.3/banner/misc.php#L427'}, {'url': 'https://plugins.trac.wordpress.org/browser/pop-up-pop-up/tags/1.1.9/modules/banner/misc.php#L427'}, {'url': 'https://plugins.trac.wordpress.org/changeset?old_path=%2Fcopy-delete-posts%2Ftags%2F1.3.8&old=2923021&new_path=%2Fcopy-delete-posts%2Ftags%2F1.3.9&new=2923021&sfp_email=&sfph_mail='}, {'url': 'https://plugins.trac.wordpress.org/browser/ultimate-social-media-icons/tags/2.8.2/banner/misc.php#L434'}, {'url': 'https://plugins.trac.wordpress.org/browser/copy-delete-posts/tags/1.4.0/banner/misc.php#L434'}, {'url': 'https://plugins.trac.wordpress.org/browser/wp-clone-by-wp-academy/tags/2.3.8/modules/banner/misc.php#L432'}, {'url': 'https://plugins.trac.wordpress.org/browser/enhanced-text-widget/tags/1.5.7/banner/misc.php#L351'}, {'url': 'https://plugins.trac.wordpress.org/browser/backup-backup/tags/1.2.8/includes/banner/misc.php#L434'}, {'url': 'https://plugins.trac.wordpress.org/browser/ultimate-posts-widget/tags/2.2.5/banner/misc.php#L351'}, {'url': 'https://plugins.trac.wordpress.org/browser/pop-up-pop-up/tags/1.2.0/modules/banner/misc.php#L432'}, {'url': 'https://plugins.trac.wordpress.org/browser/ultimate-social-media-plus/tags/3.5.7/banner/misc.php#L424'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2823769%40http-https-remover%2Ftags%2F3.2.3&new=2944114%40http-https-remover%2Ftags%2F3.2.4'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2823770%40feedburner-alternative-and-rss-redirect%2Ftags%2F3.7&new=2944116%40feedburner-alternative-and-rss-redirect%2Ftags%2F3.8#file115'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2944041/ultimate-social-media-plus/tags/3.5.8/banner/misc.php?old=2823720&old_path=ultimate-social-media-plus%2Ftags%2F3.5.7%2Fbanner%2Fmisc.php'}]
CVE State: PUBLISHED |
Explain CVE-2023-0959 | Explain the vulnerability: CVE-2023-0959 | Bhima version 1.27.0 allows a remote attacker to update the privileges of any account registered in the application via a malicious link sent to an administrator. This is possible because the application is vulnerable to CSRF.
Affected Products: Bhima
References: [{'url': 'https://github.com/IMA-WorldHealth/bhima/'}, {'url': 'https://fluidattacks.com/advisories/calamaro/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0960 | Explain the vulnerability: CVE-2023-0960 | A vulnerability was found in SeaCMS 11.6 and classified as problematic. Affected by this issue is some unknown functionality of the file /data/config.ftp.php of the component Picture Management. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-221630 is the identifier assigned to this vulnerability.
Affected Products: SeaCMS
References: [{'url': 'https://vuldb.com/?id.221630', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221630', 'tags': ['signature', 'permissions-required']}, {'url': 'https://note.youdao.com/ynoteshare/index.html?id=ef23876c8744c5c230f3874387c06b11', 'tags': ['exploit']}, {'url': 'https://github.com/jidle123/Seacms-v11.6/issues/1', 'tags': ['issue-tracking']}]
CVE State: PUBLISHED |
Explain CVE-2023-0961 | Explain the vulnerability: CVE-2023-0961 | A vulnerability was found in SourceCodester Music Gallery Site 1.0. It has been classified as critical. This affects an unknown part of the file view_music_details.php of the component GET Request Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221631.
Affected Products: Music Gallery Site
References: [{'url': 'https://vuldb.com/?id.221631', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221631', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%202.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0962 | Explain the vulnerability: CVE-2023-0962 | A vulnerability was found in SourceCodester Music Gallery Site 1.0. It has been declared as critical. This vulnerability affects unknown code of the file Master.php of the component GET Request Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221632.
Affected Products: Music Gallery Site
References: [{'url': 'https://vuldb.com/?id.221632', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221632', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20SQL%20Injection%203.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0963 | Explain the vulnerability: CVE-2023-0963 | A vulnerability was found in SourceCodester Music Gallery Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file Users.php of the component POST Request Handler. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221633 was assigned to this vulnerability.
Affected Products: Music Gallery Site
References: [{'url': 'https://vuldb.com/?id.221633', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221633', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/navaidzansari/CVE_Demo/blob/main/2023/Music%20Gallery%20Site%20-%20Broken%20Access%20Control.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0964 | Explain the vulnerability: CVE-2023-0964 | A vulnerability classified as critical has been found in SourceCodester Sales Tracker Management System 1.0. Affected is an unknown function of the file admin/products/view_product.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. VDB-221634 is the identifier assigned to this vulnerability.
Affected Products: Sales Tracker Management System
References: [{'url': 'https://vuldb.com/?id.221634', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221634', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0965 | Explain the vulnerability: CVE-2023-0965 |
Compiler removal of buffer clearing in sli_cryptoacc_transparent_key_agreement in Silicon Labs Gecko Platform SDK v4.2.1 and earlier results in key material duplication to RAM.
Affected Products: Gecko Platform
References: [{'tags': ['patch'], 'url': 'https://github.com/SiliconLabs/gecko_sdk'}, {'tags': ['vendor-advisory'], 'url': 'https://community.silabs.com/sfc/servlet.shepherd/document/download/0698Y00000U19lGQAR?operationContext=S1'}]
CVE State: PUBLISHED |
Explain CVE-2023-0966 | Explain the vulnerability: CVE-2023-0966 | A vulnerability classified as problematic was found in SourceCodester Online Eyewear Shop 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=orders/view_order. The manipulation of the argument id leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221635.
Affected Products: Online Eyewear Shop
References: [{'url': 'https://vuldb.com/?id.221635', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221635', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/1MurasaKi/Eyewear_Shop_XSS/blob/main/README.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0967 | Explain the vulnerability: CVE-2023-0967 | Bhima version 1.27.0 allows an attacker authenticated with normal user permissions to view sensitive data of other application users and data that should only be viewed by the administrator. This is possible because the application is vulnerable to IDOR, it does not properly validate user permissions with respect to certain actions the user can perform.
Affected Products: Bhima
References: [{'url': 'https://github.com/IMA-WorldHealth/bhima/'}, {'url': 'https://fluidattacks.com/advisories/ingrosso/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0968 | Explain the vulnerability: CVE-2023-0968 | The Watu Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘dn’, 'email', 'points', and 'date' parameters in versions up to, and including, 3.3.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Affected Products: Watu Quiz
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/6341bdcc-c99f-40c3-81c4-ad90ff19f802'}, {'url': 'https://plugins.trac.wordpress.org/browser/watu/trunk/views/takings.php#L31'}]
CVE State: PUBLISHED |
Explain CVE-2023-0969 | Explain the vulnerability: CVE-2023-0969 | A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an authenticated attacker within Z-Wave range to manipulate an array pointer to disclose the contents of global memory.
Affected Products: Z/IP Gateway
References: [{'url': 'https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1'}]
CVE State: PUBLISHED |
Explain CVE-2023-0970 | Explain the vulnerability: CVE-2023-0970 | Multiple buffer overflow vulnerabilities in SiLabs Z/IP Gateway SDK version 7.18.01 and earlier allow an attacker with invasive physical access to a Z-Wave controller device to overwrite global memory and potentially execute arbitrary code.
Affected Products: Z/IP Gateway
References: [{'url': 'https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1'}]
CVE State: PUBLISHED |
Explain CVE-2023-0971 | Explain the vulnerability: CVE-2023-0971 | A logic error in SiLabs Z/IP Gateway SDK 7.18.02 and earlier allows authentication to be bypassed, remote administration of Z-Wave controllers, and S0/S2 encryption keys to be recovered.
Affected Products: Z/IP Gateway
References: [{'url': 'https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1'}]
CVE State: PUBLISHED |
Explain CVE-2023-0972 | Explain the vulnerability: CVE-2023-0972 | Description: A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.
Affected Products: Z/IP Gateway
References: [{'url': 'https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000V6HZzQAN?operationContext=S1'}]
CVE State: PUBLISHED |
Explain CVE-2023-0973 | Explain the vulnerability: CVE-2023-0973 |
STEPTools v18SP1 ifcmesh library (v18.1) is affected due to a null pointer dereference, which could allow an attacker to deny application usage when reading a specially constructed file, resulting in an application crash.
Affected Products: v18SP1 ifcmesh library
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-068-04'}]
CVE State: PUBLISHED |
Explain CVE-2023-0975 | Explain the vulnerability: CVE-2023-0975 |
A vulnerability exists in Trellix Agent for Windows version 5.7.8 and earlier, that allows local users, during install/upgrade workflow, to replace one of the Agent’s executables before it can be executed. This allows the user to elevate their permissions.
Affected Products: Trellix Agent
References: [{'url': 'https://kcm.trellix.com/corporate/index?page=content&id=SB10396'}]
CVE State: PUBLISHED |
Explain CVE-2023-0976 | Explain the vulnerability: CVE-2023-0976 |
A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature located in the System Tree.
Affected Products: Trellix Agent
References: [{'url': 'https://kcm.trellix.com/corporate/index?page=content&id=SB10398'}]
CVE State: PUBLISHED |
Explain CVE-2023-0977 | Explain the vulnerability: CVE-2023-0977 |
A heap-based overflow vulnerability in Trellix Agent (Windows and Linux) version 5.7.8 and earlier, allows a remote user to alter the page heap in the macmnsvc process memory block resulting in the service becoming unavailable.
Affected Products: Trellix Agent
References: [{'url': 'https://kcm.trellix.com/corporate/index?page=content&id=SB10396'}]
CVE State: PUBLISHED |
Explain CVE-2023-0978 | Explain the vulnerability: CVE-2023-0978 |
A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack
Affected Products: Trellix Intelligent Sandbox
References: [{'url': 'https://kcm.trellix.com/corporate/index?page=content&id=SB10397'}]
CVE State: PUBLISHED |
Explain CVE-2023-0979 | Explain the vulnerability: CVE-2023-0979 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in MedData Informatics MedDataPACS.This issue affects MedDataPACS : before 2023-03-03.
Affected Products: MedDataPACS
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0129'}]
CVE State: PUBLISHED |
Explain CVE-2023-0980 | Explain the vulnerability: CVE-2023-0980 | A vulnerability was found in SourceCodester Yoga Class Registration System 1.0 and classified as critical. This issue affects some unknown processing of the file admin/registrations/update_status.php of the component Status Update Handler. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-221675.
Affected Products: Yoga Class Registration System
References: [{'url': 'https://vuldb.com/?id.221675', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221675', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0981 | Explain the vulnerability: CVE-2023-0981 | A vulnerability was found in SourceCodester Yoga Class Registration System 1.0. It has been classified as critical. Affected is an unknown function of the component Delete User. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-221676.
Affected Products: Yoga Class Registration System
References: [{'url': 'https://vuldb.com/?id.221676', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221676', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0982 | Explain the vulnerability: CVE-2023-0982 | A vulnerability was found in SourceCodester Yoga Class Registration System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Add Class Entry. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The identifier VDB-221677 was assigned to this vulnerability.
Affected Products: Yoga Class Registration System
References: [{'url': 'https://vuldb.com/?id.221677', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221677', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0983 | Explain the vulnerability: CVE-2023-0983 | The stylish-cost-calculator-premium WordPress plugin before 7.9.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Stored Cross-Site Scripting which could be used against admins when viewing submissions submitted through the Email Quote Form.
Affected Products: Stylish Cost Calculator Premium
References: [{'url': 'https://wpscan.com/vulnerability/73353221-3e6d-44e8-bf41-55a0fe57d81f', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0985 | Explain the vulnerability: CVE-2023-0985 | An Authorization Bypass vulnerability was found in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual version <= 2.13.3. An authenticated remote user with low privileges can change the password of any user in the same account. This allows to take over the admin user and therefore fully compromise the account.
Affected Products: mbCONNECT24
References: [{'url': 'https://cert.vde.com/en/advisories/VDE-2023-002/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0986 | Explain the vulnerability: CVE-2023-0986 | A vulnerability classified as critical has been found in SourceCodester Sales Tracker Management System 1.0. This affects an unknown part of the file admin/?page=user/manage_user of the component Edit User. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-221679.
Affected Products: Sales Tracker Management System
References: [{'url': 'https://vuldb.com/?id.221679', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221679', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0987 | Explain the vulnerability: CVE-2023-0987 | A vulnerability classified as problematic was found in SourceCodester Online Pizza Ordering System 1.0. This vulnerability affects unknown code of the file index.php?page=checkout. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221680.
Affected Products: Online Pizza Ordering System
References: [{'url': 'https://vuldb.com/?id.221680', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221680', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/1MurasaKi/PizzeXSS_Report/blob/main/Online%20Pizza%20Ordering%20System/README.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0988 | Explain the vulnerability: CVE-2023-0988 | A vulnerability, which was classified as problematic, has been found in SourceCodester Online Pizza Ordering System 1.0. This issue affects some unknown processing of the file admin/ajax.php?action=save_user. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221681 was assigned to this vulnerability.
Affected Products: Online Pizza Ordering System
References: [{'url': 'https://vuldb.com/?id.221681', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221681', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/1MurasaKi/PizzaCSRF_report/tree/main/vender/Online%20Pizza%20Ordering%20System', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0992 | Explain the vulnerability: CVE-2023-0992 | The Shield Security plugin for WordPress is vulnerable to stored Cross-Site Scripting in versions up to, and including, 17.0.17 via the 'User-Agent' header. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected Products: Shield Security – Smart Bot Blocking & Intrusion Prevention
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/162dff28-94ea-4a47-a6cb-a13317cf1a04?source=cve'}, {'url': 'https://wordpress.org/plugins/wp-simple-firewall/#developers'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2883864%40wp-simple-firewall%2Ftrunk&old=2883536%40wp-simple-firewall%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0993 | Explain the vulnerability: CVE-2023-0993 | The Shield Security plugin for WordPress is vulnerable to Missing Authorization on the 'theme-plugin-file' AJAX action in versions up to, and including, 17.0.17. This allows authenticated attackers to add arbitrary audit log entries indicating that a theme or plugin has been edited, and is also a vector for Cross-Site Scripting via CVE-2023-0992.
Affected Products: Shield Security – Smart Bot Blocking & Intrusion Prevention
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/674461ad-9b61-48c4-af2a-5dfcaeb38215?source=cve'}, {'url': 'https://wordpress.org/plugins/wp-simple-firewall/'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2883864%40wp-simple-firewall%2Ftrunk&old=2883536%40wp-simple-firewall%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0994 | Explain the vulnerability: CVE-2023-0994 | Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository francoisjacquet/rosariosis prior to 10.8.2.
Affected Products: francoisjacquet/rosariosis
References: [{'url': 'https://huntr.dev/bounties/a281c586-9b97-4d17-88ff-ca91bb4c45ad'}, {'url': 'https://github.com/francoisjacquet/rosariosis/commit/630d3e3d78270db8dbcbfe87db265bc3e70c5a76'}]
CVE State: PUBLISHED |
Explain CVE-2023-0995 | Explain the vulnerability: CVE-2023-0995 | Cross-site Scripting (XSS) - Stored in GitHub repository unilogies/bumsys prior to v2.0.1.
Affected Products: unilogies/bumsys
References: [{'url': 'https://huntr.dev/bounties/2847b92b-22c2-4dbc-a9d9-56a7cd12fe5f'}, {'url': 'https://github.com/unilogies/bumsys/commit/927214bd7c475b31062c56294ff7b23d523a7219'}]
CVE State: PUBLISHED |
Explain CVE-2023-0996 | Explain the vulnerability: CVE-2023-0996 |
There is a vulnerability in the strided image data parsing code in the emscripten wrapper for libheif. An attacker could exploit this through a crafted image file to cause a buffer overflow in linear memory during a memcpy call.
Affected Products: libheif
References: [{'url': 'https://github.com/strukturag/libheif/pull/759'}, {'url': 'https://govtech-csg.github.io/security-advisories/2023/02/24/CVE-2023-0996.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-0997 | Explain the vulnerability: CVE-2023-0997 | A vulnerability was found in SourceCodester Moosikay E-Commerce System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Moosikay/order.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221732.
Affected Products: Moosikay E-Commerce System
References: [{'url': 'https://vuldb.com/?id.221732', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221732', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/jidle123/bug_report/blob/main/vendors/razormist/Moosikay%20-%20E-Commerce%20System/SQLi-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0998 | Explain the vulnerability: CVE-2023-0998 | A vulnerability classified as critical has been found in SourceCodester Alphaware Simple E-Commerce System 1.0. This affects an unknown part of the file /alphaware/summary.php of the component Payment Handler. The manipulation of the argument amount leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221733 was assigned to this vulnerability.
Affected Products: Alphaware Simple E-Commerce System
References: [{'url': 'https://vuldb.com/?id.221733', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221733', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/1MurasaKi/PaymentVul_report/blob/main/razormist/Alphaware%20-%20Simple%20E-Commerce%20System/payment_vulnerability.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0999 | Explain the vulnerability: CVE-2023-0999 | A vulnerability classified as problematic was found in SourceCodester Sales Tracker Management System 1.0. This vulnerability affects unknown code of the file admin/?page=user/list. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221734 is the identifier assigned to this vulnerability.
Affected Products: Sales Tracker Management System
References: [{'url': 'https://vuldb.com/?id.221734', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221734', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/1MurasaKi/STMS_CSRF/blob/main/README.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1002 | Explain the vulnerability: CVE-2023-1002 | A vulnerability, which was classified as problematic, has been found in MuYuCMS 2.2. This issue affects some unknown processing of the file index.php. The manipulation of the argument file_path leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221735.
Affected Products: MuYuCMS
References: [{'url': 'https://vuldb.com/?id.221735', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221735', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/MuYuCMS/MuYuCMS/issues/3', 'tags': ['exploit', 'issue-tracking']}]
CVE State: PUBLISHED |
Explain CVE-2023-1003 | Explain the vulnerability: CVE-2023-1003 | A vulnerability, which was classified as critical, was found in Typora up to 1.5.5. Affected is an unknown function of the component WSH JScript Handler. The manipulation leads to code injection. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.5.8 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221736.
Affected Products: Typora
References: [{'url': 'https://vuldb.com/?id.221736', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221736', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/typora/typora-issues/issues/5623', 'tags': ['exploit', 'issue-tracking']}]
CVE State: PUBLISHED |
Explain CVE-2023-1004 | Explain the vulnerability: CVE-2023-1004 | A vulnerability has been found in MarkText up to 0.17.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the component WSH JScript Handler. The manipulation leads to code injection. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-221737 was assigned to this vulnerability.
Affected Products: MarkText
References: [{'url': 'https://vuldb.com/?id.221737', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221737', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/marktext/marktext/issues/3575', 'tags': ['exploit', 'issue-tracking']}]
CVE State: PUBLISHED |
Explain CVE-2023-1005 | Explain the vulnerability: CVE-2023-1005 | A vulnerability was found in JP1016 Markdown-Electron and classified as critical. Affected by this issue is some unknown functionality. The manipulation leads to code injection. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. VDB-221738 is the identifier assigned to this vulnerability.
Affected Products: Markdown-Electron
References: [{'url': 'https://vuldb.com/?id.221738', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221738', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/JP1016/Markdown-Electron/issues/3', 'tags': ['exploit', 'issue-tracking']}]
CVE State: PUBLISHED |
Explain CVE-2023-1006 | Explain the vulnerability: CVE-2023-1006 | A vulnerability was found in SourceCodester Medical Certificate Generator App 1.0. It has been classified as problematic. This affects an unknown part of the component New Record Handler. The manipulation of the argument Firstname/Middlename/Lastname/Suffix/Nationality/Doctor Fullname/Doctor Suffix with the input "><script>prompt(1)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-221739.
Affected Products: Medical Certificate Generator App
References: [{'url': 'https://vuldb.com/?id.221739', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221739', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1007 | Explain the vulnerability: CVE-2023-1007 | A vulnerability was found in Twister Antivirus 8.17. It has been declared as critical. This vulnerability affects the function 0x801120E4 in the library filmfd.sys of the component IoControlCode Handler. The manipulation leads to improper access controls. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221740.
Affected Products: Antivirus
References: [{'url': 'https://vuldb.com/?id.221740', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221740', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1007', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1wh20g2Ze4gwCtripe7QeHNXd3bS4aZNG/view?usp=sharing', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1008 | Explain the vulnerability: CVE-2023-1008 | A vulnerability was found in Twister Antivirus 8.17. It has been rated as problematic. This issue affects the function 0x801120E4 in the library filmfd.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier VDB-221741 was assigned to this vulnerability.
Affected Products: Antivirus
References: [{'url': 'https://vuldb.com/?id.221741', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221741', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1008', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1fdQWJ1uvXELnXnDm2Jk81bA0fwwqQCpY/view?usp=sharing', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1009 | Explain the vulnerability: CVE-2023-1009 | A vulnerability classified as problematic has been found in DrayTek Vigor 2960 1.5.1.4. Affected is the function sub_1DF14 of the file /cgi-bin/mainfunction.cgi. The manipulation of the argument option with the input /../etc/password leads to path traversal. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. VDB-221742 is the identifier assigned to this vulnerability.
Affected Products: Vigor 2960
References: [{'url': 'https://vuldb.com/?id.221742', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.221742', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/xxy1126/Vuln/blob/main/Draytek/1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1010 | Explain the vulnerability: CVE-2023-1010 | A vulnerability classified as critical was found in vox2png 1.0. Affected by this vulnerability is an unknown functionality of the file vox2png.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221743.
Affected Products: vox2png
References: [{'url': 'https://vuldb.com/?id.221743', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.221743', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/10cksYiqiyinHangzhouTechnology/vox2png/blob/main/README.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1011 | Explain the vulnerability: CVE-2023-1011 | The AI ChatBot WordPress plugin before 4.4.5 does not escape most of its settings before outputting them back in the dashboard, and does not have a proper CSRF check, allowing attackers to make a logged in admin set XSS payloads in them.
Affected Products: AI ChatBot
References: [{'url': 'https://wpscan.com/vulnerability/d1784446-b3da-4175-9dac-20b030f19984', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1013 | Explain the vulnerability: CVE-2023-1013 | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Virames Vira-Investing allows Cross-Site Scripting (XSS).This issue affects Vira-Investing: before 1.0.84.86.
Affected Products: Vira-Investing
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0183'}]
CVE State: PUBLISHED |
Explain CVE-2023-1014 | Explain the vulnerability: CVE-2023-1014 | Improper Protection for Outbound Error Messages and Alert Signals vulnerability in Virames Vira-Investing allows Account Footprinting.This issue affects Vira-Investing: before 1.0.84.86.
Affected Products: Vira-Investing
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0183'}]
CVE State: PUBLISHED |