instruction
stringlengths 21
21
| input
stringlengths 40
40
| output
stringlengths 62
37.3k
|
---|---|---|
Explain CVE-2023-1342 | Explain the vulnerability: CVE-2023-1342 | The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the ucss_connect function. This makes it possible for unauthenticated attackers to connect the site to a new license key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected Products: RapidLoad Power-Up for Autoptimize
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/7c66894a-8d0f-4946-ae4d-bffd35f3ffb7'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/modules/unused-css/UnusedCSS_Admin.php?contextall=1&old=2847136&old_path=%2Funusedcss%2Ftrunk%2Fincludes%2Fmodules%2Funused-css%2FUnusedCSS_Admin.php'}]
CVE State: PUBLISHED |
Explain CVE-2023-1343 | Explain the vulnerability: CVE-2023-1343 | The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the attach_rule function. This makes it possible for unauthenticated attackers to modify the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected Products: RapidLoad Power-Up for Autoptimize
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/11f74b86-a050-4247-b310-045bf48fd4bd'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/modules/unused-css/UnusedCSS_Admin.php?contextall=1&old=2847136&old_path=%2Funusedcss%2Ftrunk%2Fincludes%2Fmodules%2Funused-css%2FUnusedCSS_Admin.php'}]
CVE State: PUBLISHED |
Explain CVE-2023-1344 | Explain the vulnerability: CVE-2023-1344 | The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the uucss_update_rule function. This makes it possible for unauthenticated attackers to modify the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected Products: RapidLoad Power-Up for Autoptimize
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/263153c9-61c5-4df4-803b-8d274e2a5e35'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/modules/unused-css/UnusedCSS_Admin.php?contextall=1&old=2847136&old_path=%2Funusedcss%2Ftrunk%2Fincludes%2Fmodules%2Funused-css%2FUnusedCSS_Admin.php'}]
CVE State: PUBLISHED |
Explain CVE-2023-1345 | Explain the vulnerability: CVE-2023-1345 | The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the queue_posts function. This makes it possible for unauthenticated attackers to modify the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected Products: RapidLoad Power-Up for Autoptimize
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/d16fa590-1409-4f04-b8b7-0cce17412a5f'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/modules/unused-css/UnusedCSS_Admin.php?contextall=1&old=2847136&old_path=%2Funusedcss%2Ftrunk%2Fincludes%2Fmodules%2Funused-css%2FUnusedCSS_Admin.php'}]
CVE State: PUBLISHED |
Explain CVE-2023-1346 | Explain the vulnerability: CVE-2023-1346 | The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the clear_page_cache function. This makes it possible for unauthenticated attackers to clear the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected Products: RapidLoad Power-Up for Autoptimize
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/b228f8b1-dd68-41ee-bc49-6a62e5267233'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/modules/unused-css/UnusedCSS_Admin.php?contextall=1&old=2847136&old_path=%2Funusedcss%2Ftrunk%2Fincludes%2Fmodules%2Funused-css%2FUnusedCSS_Admin.php'}]
CVE State: PUBLISHED |
Explain CVE-2023-1347 | Explain the vulnerability: CVE-2023-1347 | The Customizer Export/Import WordPress plugin before 0.9.6 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present
Affected Products: Customizer Export/Import
References: [{'url': 'https://wpscan.com/vulnerability/356a5977-c90c-4fc6-98ed-032d5b27f272', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1349 | Explain the vulnerability: CVE-2023-1349 | A vulnerability, which was classified as problematic, has been found in Hsycms 3.1. Affected by this issue is some unknown functionality of the file controller\cate.php of the component Add Category Module. The manipulation of the argument title leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-222842 is the identifier assigned to this vulnerability.
Affected Products: Hsycms
References: [{'url': 'https://vuldb.com/?id.222842', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222842', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/yztale/hsycms/blob/main/README.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1350 | Explain the vulnerability: CVE-2023-1350 | A vulnerability was found in liferea. It has been rated as critical. Affected by this issue is the function update_job_run of the file src/update.c of the component Feed Enrichment. The manipulation of the argument source with the input |date >/tmp/bad-item-link.txt leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-222848.
Affected Products: liferea
References: [{'url': 'https://vuldb.com/?id.222848', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222848', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/lwindolf/liferea/commit/8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59', 'tags': ['patch']}]
CVE State: PUBLISHED |
Explain CVE-2023-1351 | Explain the vulnerability: CVE-2023-1351 | A vulnerability classified as critical has been found in SourceCodester Computer Parts Sales and Inventory System 1.0. This affects an unknown part of the file cust_transac.php. The manipulation of the argument phonenumber leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222849 was assigned to this vulnerability.
Affected Products: Computer Parts Sales and Inventory System
References: [{'url': 'https://vuldb.com/?id.222849', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222849', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/chenxing0903/CveHub/blob/main/Computer-Parts-Sales-And-Inventory-System-Sql-Vulnerability.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1352 | Explain the vulnerability: CVE-2023-1352 | A vulnerability, which was classified as critical, has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. This issue affects some unknown processing of the file /admin/login.php. The manipulation of the argument txtusername/txtpassword leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222851.
Affected Products: Design and Implementation of Covid-19 Directory on Vaccination System
References: [{'url': 'https://vuldb.com/?id.222851', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222851', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/covid-19-vaccination%20vlun%20pdf/covid-19-vaccination%20sql(6).pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1353 | Explain the vulnerability: CVE-2023-1353 | A vulnerability, which was classified as problematic, was found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. Affected is an unknown function of the file verification.php. The manipulation of the argument txtvaccinationID leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222852.
Affected Products: Design and Implementation of Covid-19 Directory on Vaccination System
References: [{'url': 'https://vuldb.com/?id.222852', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222852', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/covid-19-vaccination%20vlun%20pdf/covid-19-vaccination%20xss(1).pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1354 | Explain the vulnerability: CVE-2023-1354 | A vulnerability has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file register.php. The manipulation of the argument txtfullname/txtage/txtaddress/txtphone leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222853 was assigned to this vulnerability.
Affected Products: Design and Implementation of Covid-19 Directory on Vaccination System
References: [{'url': 'https://vuldb.com/?id.222853', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222853', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/covid-19-vaccination%20vlun%20pdf/covid-19-vaccination%20xss(2).pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1355 | Explain the vulnerability: CVE-2023-1355 | NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1402.
Affected Products: vim/vim
References: [{'url': 'https://huntr.dev/bounties/4d0a9615-d438-4f5c-8dd6-aa22f4b716d9'}, {'url': 'https://github.com/vim/vim/commit/d13dd30240e32071210f55b587182ff48757ea46'}, {'name': 'FEDORA-2023-030318ca00', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1357 | Explain the vulnerability: CVE-2023-1357 | A vulnerability, which was classified as critical, has been found in SourceCodester Simple Bakery Shop Management System 1.0. Affected by this issue is some unknown functionality of the component Admin Login. The manipulation of the argument username/password with the input admin' or 1=1 -- leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222860.
Affected Products: Simple Bakery Shop Management System
References: [{'url': 'https://vuldb.com/?id.222860', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222860', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1358 | Explain the vulnerability: CVE-2023-1358 | A vulnerability, which was classified as critical, was found in SourceCodester Gadget Works Online Ordering System 1.0. This affects an unknown part of the file /philosophy/admin/login.php of the component POST Parameter Handler. The manipulation of the argument user_email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222861 was assigned to this vulnerability.
Affected Products: Gadget Works Online Ordering System
References: [{'url': 'https://vuldb.com/?id.222861', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222861', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/heitaoa999/bug_report/blob/main/vendors/janobe/Gadget%20Works%20Online%20Ordering%20System/SQLi-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1359 | Explain the vulnerability: CVE-2023-1359 | A vulnerability has been found in SourceCodester Gadget Works Online Ordering System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /philosophy/admin/user/controller.php?action=add of the component Add New User. The manipulation of the argument U_NAME leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-222862 is the identifier assigned to this vulnerability.
Affected Products: Gadget Works Online Ordering System
References: [{'url': 'https://vuldb.com/?id.222862', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222862', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/heitaoa999/bug_report/blob/main/vendors/janobe/Gadget%20Works%20Online%20Ordering%20System/XSS-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1360 | Explain the vulnerability: CVE-2023-1360 | A vulnerability was found in SourceCodester Employee Payslip Generator with Sending Mail 1.2.0 and classified as critical. This issue affects some unknown processing of the file classes/Users.php?f=save of the component New User Creation. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222863.
Affected Products: Employee Payslip Generator with Sending Mail
References: [{'url': 'https://vuldb.com/?id.222863', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222863', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.0xgabe.com/?p=90', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1361 | Explain the vulnerability: CVE-2023-1361 | SQL Injection in GitHub repository unilogies/bumsys prior to v2.0.2.
Affected Products: unilogies/bumsys
References: [{'url': 'https://huntr.dev/bounties/1b1dbc5a-df16-421f-9a0d-de83e43146c4'}, {'url': 'https://github.com/unilogies/bumsys/commit/6a328eb5bf9dbb44329a3df82e95683b77c4730d'}]
CVE State: PUBLISHED |
Explain CVE-2023-1362 | Explain the vulnerability: CVE-2023-1362 | Improper Restriction of Rendered UI Layers or Frames in GitHub repository unilogies/bumsys prior to v2.0.2.
Affected Products: unilogies/bumsys
References: [{'url': 'https://huntr.dev/bounties/e5959166-c8ef-4ada-9bb1-0ff5a9693bac'}, {'url': 'https://github.com/unilogies/bumsys/commit/8c5b27d54707f9805b27ef26ad741f2801e30e1f'}]
CVE State: PUBLISHED |
Explain CVE-2023-1363 | Explain the vulnerability: CVE-2023-1363 | A vulnerability, which was classified as problematic, was found in SourceCodester Computer Parts Sales and Inventory System 1.0. Affected is an unknown function of the component Add User Account. The manipulation of the argument username leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222870 is the identifier assigned to this vulnerability.
Affected Products: Computer Parts Sales and Inventory System
References: [{'url': 'https://vuldb.com/?id.222870', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222870', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Songs-YZS/CveList/blob/main/Computer-Parts-Sales-and-Inventory-System-has-Cross-Site-Scriptin-vulnerability.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1364 | Explain the vulnerability: CVE-2023-1364 | A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file category.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222871.
Affected Products: Online Pizza Ordering System
References: [{'url': 'https://vuldb.com/?id.222871', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222871', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Pizza%20Ordering%20System/Online%20Pizza%20Ordering%20System%20sql%20vlun(1).pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1365 | Explain the vulnerability: CVE-2023-1365 | A vulnerability was found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/ajax.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222872.
Affected Products: Online Pizza Ordering System
References: [{'url': 'https://vuldb.com/?id.222872', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222872', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Pizza%20Ordering%20System/Online%20Pizza%20Ordering%20System%20sql%20vlun(3).pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1366 | Explain the vulnerability: CVE-2023-1366 | A vulnerability was found in SourceCodester Yoga Class Registration System 1.0. It has been classified as critical. This affects the function query of the file admin/categories/manage_category.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222873 was assigned to this vulnerability.
Affected Products: Yoga Class Registration System
References: [{'url': 'https://vuldb.com/?id.222873', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222873', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/Dwayne_Wade/article/details/129493110', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1367 | Explain the vulnerability: CVE-2023-1367 | Code Injection in GitHub repository alextselegidis/easyappointments prior to 1.5.0.
Affected Products: alextselegidis/easyappointments
References: [{'url': 'https://huntr.dev/bounties/16bc74e2-1825-451f-bff7-bfdc1ea75cc2'}, {'url': 'https://github.com/alextselegidis/easyappointments/commit/453c6e130229718680c91bef450db643a0f263e4'}]
CVE State: PUBLISHED |
Explain CVE-2023-1368 | Explain the vulnerability: CVE-2023-1368 | A vulnerability was found in XHCMS 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login.php of the component POST Parameter Handler. The manipulation of the argument user leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-222874 is the identifier assigned to this vulnerability.
Affected Products: XHCMS
References: [{'url': 'https://vuldb.com/?id.222874', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222874', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/wswokao/wswoako.github.io/blob/main/README.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1369 | Explain the vulnerability: CVE-2023-1369 | A vulnerability was found in TG Soft Vir.IT eXplorer 9.4.86.0. It has been rated as problematic. This issue affects the function 0x82730088 in the library VIRAGTLT.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 9.5 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222875.
Affected Products: Vir.IT eXplorer
References: [{'url': 'https://vuldb.com/?id.222875', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222875', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1369', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1xqJUMsAWnXx4JmlbT0D0yMBJiMy484QS/view?usp=sharing', 'tags': ['exploit']}, {'url': 'https://www.tgsoft.it/scripts/getfile.asp?lang=ITA', 'tags': ['patch']}]
CVE State: PUBLISHED |
Explain CVE-2023-1370 | Explain the vulnerability: CVE-2023-1370 | [Json-smart](https://netplex.github.io/json-smart/) is a performance focused, JSON processor lib.
When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively.
It was discovered that the code does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause a stack exhaustion (stack overflow) and crash the software.
Affected Products: json-smart
References: [{'url': 'https://research.jfrog.com/vulnerabilities/stack-exhaustion-in-json-smart-leads-to-denial-of-service-when-parsing-malformed-json-xray-427633/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1371 | Explain the vulnerability: CVE-2023-1371 | The W4 Post List WordPress plugin before 2.4.6 does not ensure that password protected posts can be accessed before displaying their content, which could allow any authenticated users to access them
Affected Products: W4 Post List
References: [{'url': 'https://wpscan.com/vulnerability/ad5c167e-77f7-453c-9443-df6e07705d89', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1372 | Explain the vulnerability: CVE-2023-1372 | The WH Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters such as wh_homepage, wh_text_short, wh_text_full and in versions up to, and including, 3.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected Products: WH Testimonials
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/b6fe5f1a-787e-4662-915f-c6f04961e194'}, {'url': 'https://danielkelley.me/wh-testimonials-reflected-xss-vulnerability-via-wh-homepage-parameter-in-version-3-0-0-and-below/'}, {'url': 'https://plugins.trac.wordpress.org/browser/wh-testimonials/trunk/wh-testimonials.php#L177'}]
CVE State: PUBLISHED |
Explain CVE-2023-1373 | Explain the vulnerability: CVE-2023-1373 | The W4 Post List WordPress plugin before 2.4.6 does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting
Affected Products: W4 Post List
References: [{'url': 'https://wpscan.com/vulnerability/fa38f3e6-e04c-467c-969b-0f6736087589', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1374 | Explain the vulnerability: CVE-2023-1374 | The Solidres plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'currency_name' parameter in versions up to, and including, 0.9.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrator privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected Products: Solidres – Hotel booking plugin for WordPress
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/b13ee51b-9f23-428f-9cef-4a9b9b06b0c4'}, {'url': 'https://danielkelley.me/solidres-hotel-booking-plugin-for-wordpress-post-based-xss-vulnerability-in-add-new-currency-feature/'}, {'url': 'https://plugins.trac.wordpress.org/browser/solidres/trunk/admin/currencies/edit.php#L15'}]
CVE State: PUBLISHED |
Explain CVE-2023-1375 | Explain the vulnerability: CVE-2023-1375 | The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized cache deletion in versions up to, and including, 1.1.2 due to a missing capability check in the deleteCacheToolbar function . This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete the site's cache.
Affected Products: WP Fastest Cache
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/ae643666-70cb-4eb4-a183-e1649264ded4?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/wp-fastest-cache/trunk/wpFastestCache.php#L866'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2893158%40wp-fastest-cache&new=2893158%40wp-fastest-cache&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-1377 | Explain the vulnerability: CVE-2023-1377 | The Solidres WordPress plugin through 0.9.4 does not sanitise and escape numerous parameter before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Affected Products: Solidres
References: [{'url': 'https://wpscan.com/vulnerability/c346ff80-c16b-4219-8983-708c64fa4a61', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1378 | Explain the vulnerability: CVE-2023-1378 | A vulnerability classified as critical was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. This vulnerability affects unknown code of the file paypalsuccess.php of the component POST Parameter Handler. The manipulation of the argument cusid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222904.
Affected Products: Friendly Island Pizza Website and Ordering System
References: [{'url': 'https://vuldb.com/?id.222904', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222904', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ATW-BlockN/bug_report/blob/main/vendors/Skynidnine/Friendly%20Island%20Pizza%20Website%20and%20Ordering%20System/SQLi-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1379 | Explain the vulnerability: CVE-2023-1379 | A vulnerability was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file addmem.php of the component POST Parameter Handler. The manipulation of the argument firstname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223127.
Affected Products: Friendly Island Pizza Website and Ordering System
References: [{'url': 'https://vuldb.com/?id.223127', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223127', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/AureliusLia/bug_report/blob/main/vendors/Skynidnine/Friendly%20Island%20Pizza%20Website%20and%20Ordering%20System/SQLi-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1380 | Explain the vulnerability: CVE-2023-1380 | A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service.
Affected Products: Kernel
References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2177883'}, {'url': 'https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang%40yonsei.ac.kr/T/#u'}, {'url': 'https://www.openwall.com/lists/oss-security/2023/03/14/1'}, {'url': 'https://security.netapp.com/advisory/ntap-20230511-0001/'}, {'url': 'http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html'}, {'url': 'http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html'}, {'name': '[debian-lts-announce] 20230727 [SECURITY] [DLA 3508-1] linux security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-1381 | Explain the vulnerability: CVE-2023-1381 | The WP Meta SEO WordPress plugin before 4.5.5 does not validate image file paths before attempting to manipulate the image files, leading to a PHAR deserialization vulnerability. Furthermore, the plugin contains a gadget chain which may be used in certain configurations to achieve remote code execution.
Affected Products: WP Meta SEO
References: [{'url': 'https://wpscan.com/vulnerability/f140a928-d297-4bd1-8552-bfebcedba536', 'tags': ['exploit', 'vdb-entry', 'technical-description']}, {'url': 'https://blog.wpscan.com/uncovering-a-phar-deserialization-vulnerability-in-wp-meta-seo-and-escalating-to-rce/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1382 | Explain the vulnerability: CVE-2023-1382 | A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel.
Affected Products: Kernel
References: [{'url': 'https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u'}]
CVE State: PUBLISHED |
Explain CVE-2023-1383 | Explain the vulnerability: CVE-2023-1383 | An Improper Enforcement of Behavioral Workflow vulnerability in the exchangeDeviceServices function on the amzn.dmgr service allowed an attacker to register services that are only locally accessible.
This issue affects:
Amazon Fire TV Stick 3rd gen versions prior to 6.2.9.5.
Insignia TV with FireOS versions prior to 7.6.3.3.
Affected Products: Fire TV Stick 3rd gen
References: [{'url': 'https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1384 | Explain the vulnerability: CVE-2023-1384 | The setMediaSource function on the amzn.thin.pl service does not sanitize the "source" parameter allowing for arbitrary javascript code to be run
This issue affects:
Amazon Fire TV Stick 3rd gen versions prior to 6.2.9.5.
Insignia TV with FireOS versions prior to 7.6.3.3.
Affected Products: Fire TV Stick 3rd gen
References: [{'url': 'https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1385 | Explain the vulnerability: CVE-2023-1385 | Improper JPAKE implementation allows offline PIN brute-forcing due to the initialization of random values to a known value, which leads to unauthorized authentication to amzn.lightning services.
This issue affects:
Amazon Fire TV Stick 3rd gen versions prior to 6.2.9.5.
Insignia TV with FireOS 7.6.3.3.
Affected Products: Fire TV Stick 3rd gen
References: [{'url': 'https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1386 | Explain the vulnerability: CVE-2023-1386 | A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with SUID or SGID, none of these privileged bits are correctly dropped. As a result, in rare circumstances, this flaw could be used by malicious users in the guest to elevate their privileges within the guest and help a host local user to elevate privileges on the host.
Affected Products: qemu
References: [{'url': 'https://access.redhat.com/security/cve/CVE-2023-1386', 'tags': ['vdb-entry', 'x_refsource_REDHAT']}, {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2223985', 'name': 'RHBZ#2223985', 'tags': ['issue-tracking', 'x_refsource_REDHAT']}]
CVE State: PUBLISHED |
Explain CVE-2023-1387 | Explain the vulnerability: CVE-2023-1387 | Grafana is an open-source platform for monitoring and observability.
Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token.
By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana.
Affected Products: Grafana
References: [{'url': 'https://grafana.com/security/security-advisories/cve-2023-1387/'}, {'url': 'https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j'}, {'url': 'https://security.netapp.com/advisory/ntap-20230609-0003/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1388 | Explain the vulnerability: CVE-2023-1388 |
A heap-based overflow vulnerability in TA prior to version 5.7.9 allows a remote user to alter the page heap in the macmnsvc process memory block, resulting in the service becoming unavailable.
Affected Products: Trellix Agent
References: [{'url': 'https://kcm.trellix.com/corporate/index?page=content&id=SB10398'}]
CVE State: PUBLISHED |
Explain CVE-2023-1389 | Explain the vulnerability: CVE-2023-1389 | TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
Affected Products: TP-Link Archer AX21 (AX1800)
References: [{'url': 'https://www.tenable.com/security/research/tra-2023-11'}, {'url': 'http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-1390 | Explain the vulnerability: CVE-2023-1390 | A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition.
Affected Products: Linux kernel (TIPC kernel module)
References: [{'url': 'https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5'}, {'url': 'https://infosec.exchange/%40_mattata/109427999461122360'}, {'url': 'https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6'}, {'url': 'https://security.netapp.com/advisory/ntap-20230420-0001/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1391 | Explain the vulnerability: CVE-2023-1391 | A vulnerability, which was classified as problematic, was found in SourceCodester Online Tours & Travels Management System 1.0. Affected is an unknown function of the file admin/ab.php. The manipulation of the argument img leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222978 is the identifier assigned to this vulnerability.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.222978', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222978', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/Dwayne_Wade/article/details/129526901', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1392 | Explain the vulnerability: CVE-2023-1392 | A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. Affected by this vulnerability is the function save_menu. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222979.
Affected Products: Online Pizza Ordering System
References: [{'url': 'https://vuldb.com/?id.222979', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222979', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Fchen-xcu/Vulnerability-Set/blob/main/The%20online%20pizza%20ordering%20system%20has%20a%20file%20upload%20(RCE)%20vulnerability.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1393 | Explain the vulnerability: CVE-2023-1393 | A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later.
Affected Products: xorg-server
References: [{'url': 'https://www.openwall.com/lists/oss-security/2023/03/29/1'}, {'name': 'FEDORA-2023-eb3c27ff25', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/'}, {'name': 'FEDORA-2023-b7835960ac', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/'}, {'name': 'FEDORA-2023-b87fd3a628', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/'}, {'name': 'FEDORA-2023-f754e7abfd', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/'}, {'name': 'FEDORA-2023-66d5af0278', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/'}, {'name': 'FEDORA-2023-239bae4b57', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/'}, {'name': 'FEDORA-2023-fe18ae3e85', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/'}, {'name': 'FEDORA-2023-6f3f9ee721', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/'}, {'name': 'GLSA-202305-30', 'tags': ['vendor-advisory'], 'url': 'https://security.gentoo.org/glsa/202305-30'}, {'url': 'https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110'}]
CVE State: PUBLISHED |
Explain CVE-2023-1394 | Explain the vulnerability: CVE-2023-1394 | A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0. It has been classified as critical. This affects the function mysqli_query of the file bsitemp.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222981 was assigned to this vulnerability.
Affected Products: Online Graduate Tracer System
References: [{'url': 'https://vuldb.com/?id.222981', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222981', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/Dwayne_Wade/article/details/129522869', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1395 | Explain the vulnerability: CVE-2023-1395 | A vulnerability was found in SourceCodester Yoga Class Registration System 1.0. It has been declared as problematic. This vulnerability affects the function query of the file admin/user/list.php. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-222982 is the identifier assigned to this vulnerability.
Affected Products: Yoga Class Registration System
References: [{'url': 'https://vuldb.com/?id.222982', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222982', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/Dwayne_Wade/article/details/129496689', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1396 | Explain the vulnerability: CVE-2023-1396 | A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file admin/traveller_details.php. The manipulation of the argument address leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222983.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.222983', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222983', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/Dwayne_Wade/article/details/129524104', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1397 | Explain the vulnerability: CVE-2023-1397 | A vulnerability classified as problematic has been found in SourceCodester Online Student Management System 1.0. Affected is an unknown function of the file profile.php. The manipulation of the argument adminname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222984.
Affected Products: Online Student Management System
References: [{'url': 'https://vuldb.com/?id.222984', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222984', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20student%20management%20system%20pdf/Online%20student%20management%20system%20xss%20vlun%203.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1398 | Explain the vulnerability: CVE-2023-1398 | A vulnerability classified as critical was found in XiaoBingBy TeaCMS 2.0. Affected by this vulnerability is an unknown functionality of the file /admin/upload. The manipulation leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222985 was assigned to this vulnerability.
Affected Products: TeaCMS
References: [{'url': 'https://vuldb.com/?id.222985', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.222985', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/xiaobingby/TeaCMS/issues/I6IIYV', 'tags': ['exploit', 'issue-tracking']}]
CVE State: PUBLISHED |
Explain CVE-2023-1399 | Explain the vulnerability: CVE-2023-1399 |
N6854A Geolocation Server versions 2.4.2 are vulnerable to untrusted data deserialization, which may allow a malicious actor to escalate privileges in the affected device’s default configuration and achieve remote code execution.
Affected Products: N6854A Geolocation Server
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-01'}]
CVE State: PUBLISHED |
Explain CVE-2023-1400 | Explain the vulnerability: CVE-2023-1400 | The Modern Events Calendar Lite WordPress plugin through 5.16.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Affected Products: Modern Events Calendar Lite
References: [{'url': 'https://wpscan.com/vulnerability/c7feceef-28f1-4cac-b124-4b95e3f17b07', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1401 | Explain the vulnerability: CVE-2023-1401 | An issue has been discovered in GitLab DAST scanner affecting all versions starting from 3.0.29 before 4.0.5, in which the DAST scanner leak cross site cookies on redirect during authorization.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/396533', 'name': 'GitLab Issue #396533', 'tags': ['issue-tracking']}, {'url': 'https://hackerone.com/reports/1889255', 'name': 'HackerOne Bug Bounty Report #1889255', 'tags': ['technical-description', 'exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1402 | Explain the vulnerability: CVE-2023-1402 | The course participation report required additional checks to prevent roles being displayed which the user did not have access to view.
Affected Products: moodle
References: [{'url': 'https://moodle.org/mod/forum/discuss.php?d=445069'}, {'name': 'FEDORA-2023-d9c13996b2', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1403 | Explain the vulnerability: CVE-2023-1403 | The Weaver Xtreme Theme for WordPress is vulnerable to stored Cross-Site Scripting due to insufficient escaping of the profile display name in versions up to, and including, 5.0.7. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected Products: Weaver Xtreme
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/5b2bef63-c871-45e4-bb05-12bbba20ca5e?source=cve'}, {'url': 'https://themes.trac.wordpress.org/browser/weaver-xtreme/5.0.7/includes/lib-content.php#L1081'}]
CVE State: PUBLISHED |
Explain CVE-2023-1404 | Explain the vulnerability: CVE-2023-1404 | The Weaver Show Posts Plugin for WordPress is vulnerable to stored Cross-Site Scripting due to insufficient escaping of the profile display name in versions up to, and including, 1.6. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected Products: Weaver Show Posts
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/c8647c44-4879-4895-bd07-19f7d62a7326?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/show-posts/tags/1.6/includes/atw-showposts-sc.php#L368'}]
CVE State: PUBLISHED |
Explain CVE-2023-1406 | Explain the vulnerability: CVE-2023-1406 | The JetEngine WordPress plugin before 3.1.3.1 includes uploaded files without adequately ensuring that they are not executable, leading to a remote code execution vulnerability.
Affected Products: JetEngine
References: [{'url': 'https://wpscan.com/vulnerability/2a81b6b1-2339-4889-9c28-1af133df8b65', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1407 | Explain the vulnerability: CVE-2023-1407 | A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223111.
Affected Products: Student Study Center Desk Management System
References: [{'url': 'https://vuldb.com/?id.223111', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223111', 'tags': ['signature', 'permissions-required']}, {'url': 'https://s1.ax1x.com/2023/03/15/pp1gd8x.png', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1408 | Explain the vulnerability: CVE-2023-1408 | The Video List Manager WordPress plugin through 1.7 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
Affected Products: Video List Manager
References: [{'url': 'https://wpscan.com/vulnerability/baf7ef4d-b2ba-48e0-9c17-74fa27e0c15b', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1410 | Explain the vulnerability: CVE-2023-1410 | Grafana is an open-source platform for monitoring and observability.
Grafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip.
The stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized.
An attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description.
Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix.
Affected Products: Grafana
References: [{'url': 'https://grafana.com/security/security-advisories/cve-2023-1410/'}, {'url': 'https://github.com/grafana/bugbounty/security/advisories/GHSA-qrrg-gw7w-vp76'}, {'url': 'https://security.netapp.com/advisory/ntap-20230420-0003/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1412 | Explain the vulnerability: CVE-2023-1412 | An unprivileged (non-admin) user can exploit an Improper Access Control vulnerability in the Cloudflare WARP Client for Windows (<= 2022.12.582.0) to perform privileged operations with SYSTEM context by working with a combination of opportunistic locks (oplock) and symbolic links (which can both be created by an unprivileged user).
After installing the Cloudflare WARP Client (admin privileges required), an MSI-Installer is placed under C:\Windows\Installer. The vulnerability lies in the repair function of this MSI.
ImpactAn unprivileged (non-admin) user can exploit this vulnerability to perform privileged operations with SYSTEM context, including deleting arbitrary files and reading arbitrary file content. This can lead to a variety of attacks, including the manipulation of system files and privilege escalation.
PatchesA new installer with a fix that addresses this vulnerability was released in version 2023.3.381.0. While the WARP Client itself is not vulnerable (only the installer), users are encouraged to upgrade to the latest version and delete any older installers present in their systems.
Affected Products: WARP
References: [{'url': 'https://github.com/cloudflare/advisories/security/advisories/GHSA-hgxh-48m3-3gq7'}, {'url': 'https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release'}, {'url': 'https://developers.cloudflare.com/warp-client/get-started/windows/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1413 | Explain the vulnerability: CVE-2023-1413 | The WP VR WordPress plugin before 8.2.9 does not sanitise and escape some parameters before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Affected Products: WP VR
References: [{'url': 'https://wpscan.com/vulnerability/6938fee5-3510-45e6-8112-c9e2b30f6881', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1414 | Explain the vulnerability: CVE-2023-1414 | The WP VR WordPress plugin before 8.3.0 does not have authorisation and CSRF checks in various AJAX actions, one in particular could allow any authenticated users, such as subscriber to update arbitrary tours
Affected Products: WP VR
References: [{'url': 'https://wpscan.com/vulnerability/d61d4be7-9251-4c62-8fb7-8a456aa6969e', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1415 | Explain the vulnerability: CVE-2023-1415 | A vulnerability was found in Simple Art Gallery 1.0. It has been declared as critical. This vulnerability affects the function sliderPicSubmit of the file adminHome.php. The manipulation leads to unrestricted upload. The attack can be initiated remotely. VDB-223126 is the identifier assigned to this vulnerability.
Affected Products: Simple Art Gallery
References: [{'url': 'https://vuldb.com/?id.223126', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223126', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/0xxtoby/Vuldb/blob/main/SIMPLE%20ART%20GALLERY%20system%20has%20a%20file%20upload%20(RCE)%20vulnerability.pdf', 'tags': ['related']}]
CVE State: PUBLISHED |
Explain CVE-2023-1416 | Explain the vulnerability: CVE-2023-1416 | A vulnerability classified as critical has been found in Simple Art Gallery 1.0. Affected is an unknown function of the file adminHome.php. The manipulation of the argument social_facebook leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223128.
Affected Products: Simple Art Gallery
References: [{'url': 'https://vuldb.com/?id.223128', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223128', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Songs-YZS/CveList/blob/main/SIMPLE%20ART%20GALLERY%20system%20has%20Sql%20injection%20vulnerabilities.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1417 | Explain the vulnerability: CVE-2023-1417 | An issue has been discovered in GitLab affecting all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. It was possible for an unauthorised user to add child epics linked to victim's epic in an unrelated group.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/396720'}, {'url': 'https://hackerone.com/reports/1892200'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1417.json'}]
CVE State: PUBLISHED |
Explain CVE-2023-1418 | Explain the vulnerability: CVE-2023-1418 | A vulnerability classified as problematic was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file cashconfirm.php of the component POST Parameter Handler. The manipulation of the argument transactioncode leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223129 was assigned to this vulnerability.
Affected Products: Friendly Island Pizza Website and Ordering System
References: [{'url': 'https://vuldb.com/?id.223129', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223129', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/2889436547/bug_report/blob/main/vendors/Skynidnine/Friendly%20Island%20Pizza%20Website%20and%20Ordering%20System/XSS-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1420 | Explain the vulnerability: CVE-2023-1420 | The Ajax Search Lite WordPress plugin before 4.11.1, Ajax Search Pro WordPress plugin before 4.26.2 does not sanitise and escape a parameter before outputting it back in a response of an AJAX action, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Affected Products: Ajax Search Lite
References: [{'url': 'https://wpscan.com/vulnerability/a9a54ee5-2b80-4f55-894c-1047030eea7f', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1421 | Explain the vulnerability: CVE-2023-1421 | A reflected cross-site scripting vulnerability in the OAuth flow completion endpoints in Mattermost allows an attacker to send AJAX requests on behalf of the victim via sharing a crafted link with a malicious state parameter.
Affected Products: Mattermost
References: [{'url': 'https://mattermost.com/security-updates/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1424 | Explain the vulnerability: CVE-2023-1424 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules and MELSEC iQ-R Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution.
Affected Products: MELSEC iQ-F Series FX5U-32MT/ES
References: [{'url': 'https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-003_en.pdf'}, {'url': 'https://jvn.jp/vu/JVNVU94650413'}, {'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-03'}]
CVE State: PUBLISHED |
Explain CVE-2023-1425 | Explain the vulnerability: CVE-2023-1425 | The WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg WordPress plugin before 2.7.9.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admins
Affected Products: WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg
References: [{'url': 'https://wpscan.com/vulnerability/578f4179-e7be-4963-9379-5e694911b451', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1426 | Explain the vulnerability: CVE-2023-1426 | The WP Tiles WordPress plugin through 1.1.2 does not ensure that posts to be displayed are not draft/private, allowing any authenticated users, such as subscriber to retrieve the titles of draft and privates posts for example. AN attacker could also retrieve the title of any other type of post.
Affected Products: WP Tiles
References: [{'url': 'https://wpscan.com/vulnerability/fdd79bb4-d434-4635-bb2b-84d079ecc746', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1427 | Explain the vulnerability: CVE-2023-1427 | - The Photo Gallery by 10Web WordPress plugin before 1.8.15 did not ensure that uploaded files are kept inside its uploads folder, allowing high privilege users to put images anywhere in the filesystem via a path traversal vector.
Affected Products: Photo Gallery by 10Web
References: [{'url': 'https://wpscan.com/vulnerability/c8917ba2-4cb3-4b09-8a49-b7c612254946', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1428 | Explain the vulnerability: CVE-2023-1428 | There exists an vulnerability causing an abort() to be called in gRPC.
The following headers cause gRPC's C++ implementation to abort() when called via http2:
te: x (x != trailers)
:scheme: x (x != http, https)
grpclb_client_stats: x (x == anything)
On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above.
Affected Products: gRPC
References: [{'url': 'https://github.com/grpc/grpc/commit/2485fa94bd8a723e5c977d55a3ce10b301b437f8'}]
CVE State: PUBLISHED |
Explain CVE-2023-1429 | Explain the vulnerability: CVE-2023-1429 | Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.19.
Affected Products: pimcore/pimcore
References: [{'url': 'https://huntr.dev/bounties/e0829fea-e458-47b8-84a3-a74476d9638f'}, {'url': 'https://github.com/pimcore/pimcore/commit/7588c336edb24050656111b89d69e69cc9feb5f5'}]
CVE State: PUBLISHED |
Explain CVE-2023-1430 | Explain the vulnerability: CVE-2023-1430 | The FluentCRM - Marketing Automation For WordPress plugin for WordPress is vulnerable to unauthorized modification of data in versions up to, and including, 2.7.40 due to the use of an MD5 hash without a salt to control subscriptions. This makes it possible for unauthenticated attackers to unsubscribe users from lists and manage subscriptions, granted they gain access to any targeted subscribers email address.
Affected Products: Email Marketing, Newsletter, Email Automation and CRM Plugin for WordPress by FluentCRM
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/de6da87e-8f7d-4120-8a1b-390ef7733d84?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2899218/fluent-crm/tags/2.8.0/app/Hooks/Handlers/ExternalPages.php?old=2873074&old_path=fluent-crm%2Ftags%2F2.7.40%2Fapp%2FHooks%2FHandlers%2FExternalPages.php'}]
CVE State: PUBLISHED |
Explain CVE-2023-1431 | Explain the vulnerability: CVE-2023-1431 | The WP Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.6.3 due to the plugin saving shopping cart data exports in a publicly accessible location (/wp-content/plugins/wordpress-simple-paypal-shopping-cart/includes/admin/). This makes it possible for unauthenticated attackers to view information that should be limited to administrators only and can include data like first name, last name, email, address, IP Address, and more.
Affected Products: WordPress Simple Shopping Cart
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/ea4453bc-557b-4abf-85c6-4aecfd8f4012?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2878855%40wordpress-simple-paypal-shopping-cart&new=2878855%40wordpress-simple-paypal-shopping-cart&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-1432 | Explain the vulnerability: CVE-2023-1432 | A vulnerability was found in SourceCodester Online Food Ordering System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /fos/admin/ajax.php?action=save_settings of the component POST Request Handler. The manipulation leads to improper access controls. The attack may be launched remotely. VDB-223214 is the identifier assigned to this vulnerability.
Affected Products: Online Food Ordering System
References: [{'url': 'https://vuldb.com/?id.223214', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.223214', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1433 | Explain the vulnerability: CVE-2023-1433 | A vulnerability was found in SourceCodester Gadget Works Online Ordering System 1.0. It has been classified as problematic. This affects an unknown part of the file admin/products/controller.php?action=add of the component Products Handler. The manipulation of the argument filename leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223215.
Affected Products: Gadget Works Online Ordering System
References: [{'url': 'https://vuldb.com/?id.223215', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223215', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zhengjiashengbaba/bug_report/blob/main/UPLOAD.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1435 | Explain the vulnerability: CVE-2023-1435 | The Ajax Search Pro WordPress plugin before 4.26.2 does not sanitise and escape various parameters before outputting them back in pages, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Affected Products: Ajax Search Pro
References: [{'url': 'https://wpscan.com/vulnerability/0ca62908-4ef5-41e0-9223-f77ad2c333d7', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1436 | Explain the vulnerability: CVE-2023-1436 | An infinite recursion is triggered in Jettison when constructing a JSONArray from a Collection that contains a self-reference in one of its elements. This leads to a StackOverflowError exception being thrown.
Affected Products: jettison
References: [{'url': 'https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1437 | Explain the vulnerability: CVE-2023-1437 | All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent client could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files.
Affected Products: WebAccess/SCADA
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-02'}]
CVE State: PUBLISHED |
Explain CVE-2023-1439 | Explain the vulnerability: CVE-2023-1439 | A vulnerability, which was classified as critical, has been found in SourceCodester Medicine Tracker System 1.0. This issue affects some unknown processing of the file medicines/view_details.php of the component GET Parameter Handler. The manipulation of the argument GET leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223283.
Affected Products: Medicine Tracker System
References: [{'url': 'https://vuldb.com/?id.223283', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223283', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/GodGua/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1440 | Explain the vulnerability: CVE-2023-1440 | A vulnerability, which was classified as critical, was found in SourceCodester Automatic Question Paper Generator System 1.0. Affected is an unknown function of the file users/user/manage_user.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223284.
Affected Products: Automatic Question Paper Generator System
References: [{'url': 'https://vuldb.com/?id.223284', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223284', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/gxu-yuan/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1441 | Explain the vulnerability: CVE-2023-1441 | A vulnerability has been found in SourceCodester Automatic Question Paper Generator System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file admin/courses/view_course.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223285 was assigned to this vulnerability.
Affected Products: Automatic Question Paper Generator System
References: [{'url': 'https://vuldb.com/?id.223285', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223285', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/SecurityYH/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1442 | Explain the vulnerability: CVE-2023-1442 | A vulnerability was found in Meizhou Qingyunke QYKCMS 4.3.0. It has been classified as problematic. This affects an unknown part of the file /admin_system/api.php of the component Update Handler. The manipulation of the argument downurl leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223287.
Affected Products: QYKCMS
References: [{'url': 'https://vuldb.com/?id.223287', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223287', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/VG00000/-/blob/main/README.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1443 | Explain the vulnerability: CVE-2023-1443 | A vulnerability was found in Filseclab Twister Antivirus 8. It has been declared as problematic. This vulnerability affects the function 0x80112053 in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223288.
Affected Products: Twister Antivirus
References: [{'url': 'https://vuldb.com/?id.223288', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223288', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1443', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1xwIyZ8RRdwsHshxhtFMELPv2DdbQ8hBD/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1444 | Explain the vulnerability: CVE-2023-1444 | A vulnerability was found in Filseclab Twister Antivirus 8. It has been rated as critical. This issue affects the function 0x8011206B in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223289 was assigned to this vulnerability.
Affected Products: Twister Antivirus
References: [{'url': 'https://vuldb.com/?id.223289', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223289', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1444', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1KrkezTwgmt5CnhzlyyWVNLIAeiMvuDEr/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1445 | Explain the vulnerability: CVE-2023-1445 | A vulnerability classified as problematic has been found in Filseclab Twister Antivirus 8. Affected is the function 0x80112053 in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. VDB-223290 is the identifier assigned to this vulnerability.
Affected Products: Twister Antivirus
References: [{'url': 'https://vuldb.com/?id.223290', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223290', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1445', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1VYsdzogyxAsGH-rhUU1Bo_EbgpSEEN_Q/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1446 | Explain the vulnerability: CVE-2023-1446 | A vulnerability classified as problematic was found in Watchdog Anti-Virus 1.4.214.0. Affected by this vulnerability is the function 0x80002004/0x80002008 in the library wsdk-driver.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223291.
Affected Products: Anti-Virus
References: [{'url': 'https://vuldb.com/?id.223291', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223291', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1446', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1zjK_DMjHz41RMpfa0iLQ4GXKQwEr4z2T/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1447 | Explain the vulnerability: CVE-2023-1447 | A vulnerability, which was classified as problematic, has been found in SourceCodester Medicine Tracker System 1.0. Affected by this issue is some unknown functionality of the file app/?page=medicines/manage_medicine. The manipulation of the argument name/description with the input <script>alert('2')</script> leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-223292.
Affected Products: Medicine Tracker System
References: [{'url': 'https://vuldb.com/?id.223292', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223292', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1448 | Explain the vulnerability: CVE-2023-1448 | A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability.
Affected Products: GPAC
References: [{'url': 'https://vuldb.com/?id.223293', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223293', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/gpac/gpac/issues/2388', 'tags': ['issue-tracking']}, {'url': 'https://github.com/xxy1126/Vuln/blob/main/gpac/3', 'tags': ['exploit']}, {'url': 'https://www.debian.org/security/2023/dsa-5411'}]
CVE State: PUBLISHED |
Explain CVE-2023-1449 | Explain the vulnerability: CVE-2023-1449 | A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223294 is the identifier assigned to this vulnerability.
Affected Products: GPAC
References: [{'url': 'https://vuldb.com/?id.223294', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223294', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/gpac/gpac/issues/2387', 'tags': ['issue-tracking']}, {'url': 'https://github.com/xxy1126/Vuln/blob/main/gpac/2', 'tags': ['exploit']}, {'url': 'https://www.debian.org/security/2023/dsa-5411'}]
CVE State: PUBLISHED |
Explain CVE-2023-1450 | Explain the vulnerability: CVE-2023-1450 | A vulnerability was found in MP4v2 2.1.2 and classified as problematic. This issue affects the function DumpTrack of the file mp4trackdump.cpp. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223295.
Affected Products: MP4v2
References: [{'url': 'https://vuldb.com/?id.223295', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223295', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc', 'tags': ['exploit']}, {'url': 'https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc/blob/main/id_000005%2Csig_08%2Csrc_000166%2B000357%2Ctime_3137250%2Cexecs_3545598%2Cop_splice%2Crep_16', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1451 | Explain the vulnerability: CVE-2023-1451 | A vulnerability was found in MP4v2 2.1.2. It has been classified as problematic. Affected is the function mp4v2::impl::MP4Track::GetSampleFileOffset of the file mp4track.cpp. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223296.
Affected Products: MP4v2
References: [{'url': 'https://vuldb.com/?id.223296', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223296', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/RichTrouble/mp4v2_mp4track_poc', 'tags': ['exploit']}, {'url': 'https://github.com/RichTrouble/mp4v2_mp4track_poc/blob/main/id_000000%2Csig_08%2Csrc_001076%2Ctime_147809374%2Cexecs_155756872%2Cop_havoc%2Crep_8', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1452 | Explain the vulnerability: CVE-2023-1452 | A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability.
Affected Products: GPAC
References: [{'url': 'https://vuldb.com/?id.223297', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.223297', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/gpac/gpac/issues/2386', 'tags': ['issue-tracking']}, {'url': 'https://github.com/xxy1126/Vuln/blob/main/gpac/1.mp4', 'tags': ['exploit']}, {'url': 'https://www.debian.org/security/2023/dsa-5411'}]
CVE State: PUBLISHED |