instruction
stringlengths
21
21
input
stringlengths
40
40
output
stringlengths
62
37.3k
Explain CVE-2023-1342
Explain the vulnerability: CVE-2023-1342
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the ucss_connect function. This makes it possible for unauthenticated attackers to connect the site to a new license key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Affected Products: RapidLoad Power-Up for Autoptimize References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/7c66894a-8d0f-4946-ae4d-bffd35f3ffb7'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/modules/unused-css/UnusedCSS_Admin.php?contextall=1&old=2847136&old_path=%2Funusedcss%2Ftrunk%2Fincludes%2Fmodules%2Funused-css%2FUnusedCSS_Admin.php'}] CVE State: PUBLISHED
Explain CVE-2023-1343
Explain the vulnerability: CVE-2023-1343
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the attach_rule function. This makes it possible for unauthenticated attackers to modify the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Affected Products: RapidLoad Power-Up for Autoptimize References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/11f74b86-a050-4247-b310-045bf48fd4bd'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/modules/unused-css/UnusedCSS_Admin.php?contextall=1&old=2847136&old_path=%2Funusedcss%2Ftrunk%2Fincludes%2Fmodules%2Funused-css%2FUnusedCSS_Admin.php'}] CVE State: PUBLISHED
Explain CVE-2023-1344
Explain the vulnerability: CVE-2023-1344
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the uucss_update_rule function. This makes it possible for unauthenticated attackers to modify the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Affected Products: RapidLoad Power-Up for Autoptimize References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/263153c9-61c5-4df4-803b-8d274e2a5e35'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/modules/unused-css/UnusedCSS_Admin.php?contextall=1&old=2847136&old_path=%2Funusedcss%2Ftrunk%2Fincludes%2Fmodules%2Funused-css%2FUnusedCSS_Admin.php'}] CVE State: PUBLISHED
Explain CVE-2023-1345
Explain the vulnerability: CVE-2023-1345
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the queue_posts function. This makes it possible for unauthenticated attackers to modify the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Affected Products: RapidLoad Power-Up for Autoptimize References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/d16fa590-1409-4f04-b8b7-0cce17412a5f'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/modules/unused-css/UnusedCSS_Admin.php?contextall=1&old=2847136&old_path=%2Funusedcss%2Ftrunk%2Fincludes%2Fmodules%2Funused-css%2FUnusedCSS_Admin.php'}] CVE State: PUBLISHED
Explain CVE-2023-1346
Explain the vulnerability: CVE-2023-1346
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the clear_page_cache function. This makes it possible for unauthenticated attackers to clear the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Affected Products: RapidLoad Power-Up for Autoptimize References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/b228f8b1-dd68-41ee-bc49-6a62e5267233'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/modules/unused-css/UnusedCSS_Admin.php?contextall=1&old=2847136&old_path=%2Funusedcss%2Ftrunk%2Fincludes%2Fmodules%2Funused-css%2FUnusedCSS_Admin.php'}] CVE State: PUBLISHED
Explain CVE-2023-1347
Explain the vulnerability: CVE-2023-1347
The Customizer Export/Import WordPress plugin before 0.9.6 unserializes user input provided via the settings, which could allow high privilege users such as admin to perform PHP Object Injection when a suitable gadget is present Affected Products: Customizer Export/Import References: [{'url': 'https://wpscan.com/vulnerability/356a5977-c90c-4fc6-98ed-032d5b27f272', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1349
Explain the vulnerability: CVE-2023-1349
A vulnerability, which was classified as problematic, has been found in Hsycms 3.1. Affected by this issue is some unknown functionality of the file controller\cate.php of the component Add Category Module. The manipulation of the argument title leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-222842 is the identifier assigned to this vulnerability. Affected Products: Hsycms References: [{'url': 'https://vuldb.com/?id.222842', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222842', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/yztale/hsycms/blob/main/README.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1350
Explain the vulnerability: CVE-2023-1350
A vulnerability was found in liferea. It has been rated as critical. Affected by this issue is the function update_job_run of the file src/update.c of the component Feed Enrichment. The manipulation of the argument source with the input |date >/tmp/bad-item-link.txt leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-222848. Affected Products: liferea References: [{'url': 'https://vuldb.com/?id.222848', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222848', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/lwindolf/liferea/commit/8d8b5b963fa64c7a2122d1bbfbb0bed46e813e59', 'tags': ['patch']}] CVE State: PUBLISHED
Explain CVE-2023-1351
Explain the vulnerability: CVE-2023-1351
A vulnerability classified as critical has been found in SourceCodester Computer Parts Sales and Inventory System 1.0. This affects an unknown part of the file cust_transac.php. The manipulation of the argument phonenumber leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222849 was assigned to this vulnerability. Affected Products: Computer Parts Sales and Inventory System References: [{'url': 'https://vuldb.com/?id.222849', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222849', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/chenxing0903/CveHub/blob/main/Computer-Parts-Sales-And-Inventory-System-Sql-Vulnerability.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1352
Explain the vulnerability: CVE-2023-1352
A vulnerability, which was classified as critical, has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. This issue affects some unknown processing of the file /admin/login.php. The manipulation of the argument txtusername/txtpassword leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222851. Affected Products: Design and Implementation of Covid-19 Directory on Vaccination System References: [{'url': 'https://vuldb.com/?id.222851', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222851', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/covid-19-vaccination%20vlun%20pdf/covid-19-vaccination%20sql(6).pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1353
Explain the vulnerability: CVE-2023-1353
A vulnerability, which was classified as problematic, was found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0. Affected is an unknown function of the file verification.php. The manipulation of the argument txtvaccinationID leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222852. Affected Products: Design and Implementation of Covid-19 Directory on Vaccination System References: [{'url': 'https://vuldb.com/?id.222852', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222852', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/covid-19-vaccination%20vlun%20pdf/covid-19-vaccination%20xss(1).pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1354
Explain the vulnerability: CVE-2023-1354
A vulnerability has been found in SourceCodester Design and Implementation of Covid-19 Directory on Vaccination System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file register.php. The manipulation of the argument txtfullname/txtage/txtaddress/txtphone leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222853 was assigned to this vulnerability. Affected Products: Design and Implementation of Covid-19 Directory on Vaccination System References: [{'url': 'https://vuldb.com/?id.222853', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222853', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/covid-19-vaccination%20vlun%20pdf/covid-19-vaccination%20xss(2).pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1355
Explain the vulnerability: CVE-2023-1355
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.1402. Affected Products: vim/vim References: [{'url': 'https://huntr.dev/bounties/4d0a9615-d438-4f5c-8dd6-aa22f4b716d9'}, {'url': 'https://github.com/vim/vim/commit/d13dd30240e32071210f55b587182ff48757ea46'}, {'name': 'FEDORA-2023-030318ca00', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/'}] CVE State: PUBLISHED
Explain CVE-2023-1357
Explain the vulnerability: CVE-2023-1357
A vulnerability, which was classified as critical, has been found in SourceCodester Simple Bakery Shop Management System 1.0. Affected by this issue is some unknown functionality of the component Admin Login. The manipulation of the argument username/password with the input admin' or 1=1 -- leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222860. Affected Products: Simple Bakery Shop Management System References: [{'url': 'https://vuldb.com/?id.222860', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222860', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1358
Explain the vulnerability: CVE-2023-1358
A vulnerability, which was classified as critical, was found in SourceCodester Gadget Works Online Ordering System 1.0. This affects an unknown part of the file /philosophy/admin/login.php of the component POST Parameter Handler. The manipulation of the argument user_email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222861 was assigned to this vulnerability. Affected Products: Gadget Works Online Ordering System References: [{'url': 'https://vuldb.com/?id.222861', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222861', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/heitaoa999/bug_report/blob/main/vendors/janobe/Gadget%20Works%20Online%20Ordering%20System/SQLi-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1359
Explain the vulnerability: CVE-2023-1359
A vulnerability has been found in SourceCodester Gadget Works Online Ordering System 1.0 and classified as problematic. This vulnerability affects unknown code of the file /philosophy/admin/user/controller.php?action=add of the component Add New User. The manipulation of the argument U_NAME leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-222862 is the identifier assigned to this vulnerability. Affected Products: Gadget Works Online Ordering System References: [{'url': 'https://vuldb.com/?id.222862', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222862', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/heitaoa999/bug_report/blob/main/vendors/janobe/Gadget%20Works%20Online%20Ordering%20System/XSS-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1360
Explain the vulnerability: CVE-2023-1360
A vulnerability was found in SourceCodester Employee Payslip Generator with Sending Mail 1.2.0 and classified as critical. This issue affects some unknown processing of the file classes/Users.php?f=save of the component New User Creation. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222863. Affected Products: Employee Payslip Generator with Sending Mail References: [{'url': 'https://vuldb.com/?id.222863', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222863', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.0xgabe.com/?p=90', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1361
Explain the vulnerability: CVE-2023-1361
SQL Injection in GitHub repository unilogies/bumsys prior to v2.0.2. Affected Products: unilogies/bumsys References: [{'url': 'https://huntr.dev/bounties/1b1dbc5a-df16-421f-9a0d-de83e43146c4'}, {'url': 'https://github.com/unilogies/bumsys/commit/6a328eb5bf9dbb44329a3df82e95683b77c4730d'}] CVE State: PUBLISHED
Explain CVE-2023-1362
Explain the vulnerability: CVE-2023-1362
Improper Restriction of Rendered UI Layers or Frames in GitHub repository unilogies/bumsys prior to v2.0.2. Affected Products: unilogies/bumsys References: [{'url': 'https://huntr.dev/bounties/e5959166-c8ef-4ada-9bb1-0ff5a9693bac'}, {'url': 'https://github.com/unilogies/bumsys/commit/8c5b27d54707f9805b27ef26ad741f2801e30e1f'}] CVE State: PUBLISHED
Explain CVE-2023-1363
Explain the vulnerability: CVE-2023-1363
A vulnerability, which was classified as problematic, was found in SourceCodester Computer Parts Sales and Inventory System 1.0. Affected is an unknown function of the component Add User Account. The manipulation of the argument username leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222870 is the identifier assigned to this vulnerability. Affected Products: Computer Parts Sales and Inventory System References: [{'url': 'https://vuldb.com/?id.222870', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222870', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Songs-YZS/CveList/blob/main/Computer-Parts-Sales-and-Inventory-System-has-Cross-Site-Scriptin-vulnerability.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1364
Explain the vulnerability: CVE-2023-1364
A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file category.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222871. Affected Products: Online Pizza Ordering System References: [{'url': 'https://vuldb.com/?id.222871', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222871', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Pizza%20Ordering%20System/Online%20Pizza%20Ordering%20System%20sql%20vlun(1).pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1365
Explain the vulnerability: CVE-2023-1365
A vulnerability was found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/ajax.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222872. Affected Products: Online Pizza Ordering System References: [{'url': 'https://vuldb.com/?id.222872', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222872', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20Pizza%20Ordering%20System/Online%20Pizza%20Ordering%20System%20sql%20vlun(3).pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1366
Explain the vulnerability: CVE-2023-1366
A vulnerability was found in SourceCodester Yoga Class Registration System 1.0. It has been classified as critical. This affects the function query of the file admin/categories/manage_category.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222873 was assigned to this vulnerability. Affected Products: Yoga Class Registration System References: [{'url': 'https://vuldb.com/?id.222873', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222873', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/Dwayne_Wade/article/details/129493110', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1367
Explain the vulnerability: CVE-2023-1367
Code Injection in GitHub repository alextselegidis/easyappointments prior to 1.5.0. Affected Products: alextselegidis/easyappointments References: [{'url': 'https://huntr.dev/bounties/16bc74e2-1825-451f-bff7-bfdc1ea75cc2'}, {'url': 'https://github.com/alextselegidis/easyappointments/commit/453c6e130229718680c91bef450db643a0f263e4'}] CVE State: PUBLISHED
Explain CVE-2023-1368
Explain the vulnerability: CVE-2023-1368
A vulnerability was found in XHCMS 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login.php of the component POST Parameter Handler. The manipulation of the argument user leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-222874 is the identifier assigned to this vulnerability. Affected Products: XHCMS References: [{'url': 'https://vuldb.com/?id.222874', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222874', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/wswokao/wswoako.github.io/blob/main/README.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1369
Explain the vulnerability: CVE-2023-1369
A vulnerability was found in TG Soft Vir.IT eXplorer 9.4.86.0. It has been rated as problematic. This issue affects the function 0x82730088 in the library VIRAGTLT.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 9.5 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222875. Affected Products: Vir.IT eXplorer References: [{'url': 'https://vuldb.com/?id.222875', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222875', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1369', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1xqJUMsAWnXx4JmlbT0D0yMBJiMy484QS/view?usp=sharing', 'tags': ['exploit']}, {'url': 'https://www.tgsoft.it/scripts/getfile.asp?lang=ITA', 'tags': ['patch']}] CVE State: PUBLISHED
Explain CVE-2023-1370
Explain the vulnerability: CVE-2023-1370
[Json-smart](https://netplex.github.io/json-smart/) is a performance focused, JSON processor lib. When reaching a ‘[‘ or ‘{‘ character in the JSON input, the code parses an array or an object respectively. It was discovered that the code does not have any limit to the nesting of such arrays or objects. Since the parsing of nested arrays and objects is done recursively, nesting too many of them can cause a stack exhaustion (stack overflow) and crash the software. Affected Products: json-smart References: [{'url': 'https://research.jfrog.com/vulnerabilities/stack-exhaustion-in-json-smart-leads-to-denial-of-service-when-parsing-malformed-json-xray-427633/'}] CVE State: PUBLISHED
Explain CVE-2023-1371
Explain the vulnerability: CVE-2023-1371
The W4 Post List WordPress plugin before 2.4.6 does not ensure that password protected posts can be accessed before displaying their content, which could allow any authenticated users to access them Affected Products: W4 Post List References: [{'url': 'https://wpscan.com/vulnerability/ad5c167e-77f7-453c-9443-df6e07705d89', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1372
Explain the vulnerability: CVE-2023-1372
The WH Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters such as wh_homepage, wh_text_short, wh_text_full and in versions up to, and including, 3.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Affected Products: WH Testimonials References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/b6fe5f1a-787e-4662-915f-c6f04961e194'}, {'url': 'https://danielkelley.me/wh-testimonials-reflected-xss-vulnerability-via-wh-homepage-parameter-in-version-3-0-0-and-below/'}, {'url': 'https://plugins.trac.wordpress.org/browser/wh-testimonials/trunk/wh-testimonials.php#L177'}] CVE State: PUBLISHED
Explain CVE-2023-1373
Explain the vulnerability: CVE-2023-1373
The W4 Post List WordPress plugin before 2.4.6 does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting Affected Products: W4 Post List References: [{'url': 'https://wpscan.com/vulnerability/fa38f3e6-e04c-467c-969b-0f6736087589', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1374
Explain the vulnerability: CVE-2023-1374
The Solidres plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'currency_name' parameter in versions up to, and including, 0.9.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrator privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Affected Products: Solidres – Hotel booking plugin for WordPress References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/b13ee51b-9f23-428f-9cef-4a9b9b06b0c4'}, {'url': 'https://danielkelley.me/solidres-hotel-booking-plugin-for-wordpress-post-based-xss-vulnerability-in-add-new-currency-feature/'}, {'url': 'https://plugins.trac.wordpress.org/browser/solidres/trunk/admin/currencies/edit.php#L15'}] CVE State: PUBLISHED
Explain CVE-2023-1375
Explain the vulnerability: CVE-2023-1375
The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized cache deletion in versions up to, and including, 1.1.2 due to a missing capability check in the deleteCacheToolbar function . This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete the site's cache. Affected Products: WP Fastest Cache References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/ae643666-70cb-4eb4-a183-e1649264ded4?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/wp-fastest-cache/trunk/wpFastestCache.php#L866'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2893158%40wp-fastest-cache&new=2893158%40wp-fastest-cache&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-1377
Explain the vulnerability: CVE-2023-1377
The Solidres WordPress plugin through 0.9.4 does not sanitise and escape numerous parameter before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin Affected Products: Solidres References: [{'url': 'https://wpscan.com/vulnerability/c346ff80-c16b-4219-8983-708c64fa4a61', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1378
Explain the vulnerability: CVE-2023-1378
A vulnerability classified as critical was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. This vulnerability affects unknown code of the file paypalsuccess.php of the component POST Parameter Handler. The manipulation of the argument cusid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222904. Affected Products: Friendly Island Pizza Website and Ordering System References: [{'url': 'https://vuldb.com/?id.222904', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222904', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ATW-BlockN/bug_report/blob/main/vendors/Skynidnine/Friendly%20Island%20Pizza%20Website%20and%20Ordering%20System/SQLi-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1379
Explain the vulnerability: CVE-2023-1379
A vulnerability was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. It has been rated as critical. This issue affects some unknown processing of the file addmem.php of the component POST Parameter Handler. The manipulation of the argument firstname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223127. Affected Products: Friendly Island Pizza Website and Ordering System References: [{'url': 'https://vuldb.com/?id.223127', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223127', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/AureliusLia/bug_report/blob/main/vendors/Skynidnine/Friendly%20Island%20Pizza%20Website%20and%20Ordering%20System/SQLi-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1380
Explain the vulnerability: CVE-2023-1380
A slab-out-of-bound read problem was found in brcmf_get_assoc_ies in drivers/net/wireless/broadcom/brcm80211/brcmfmac/cfg80211.c in the Linux Kernel. This issue could occur when assoc_info->req_len data is bigger than the size of the buffer, defined as WL_EXTRA_BUF_MAX, leading to a denial of service. Affected Products: Kernel References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2177883'}, {'url': 'https://lore.kernel.org/linux-wireless/20230309104457.22628-1-jisoo.jang%40yonsei.ac.kr/T/#u'}, {'url': 'https://www.openwall.com/lists/oss-security/2023/03/14/1'}, {'url': 'https://security.netapp.com/advisory/ntap-20230511-0001/'}, {'url': 'http://packetstormsecurity.com/files/173087/Kernel-Live-Patch-Security-Notice-LSN-0095-1.html'}, {'url': 'http://packetstormsecurity.com/files/173757/Kernel-Live-Patch-Security-Notice-LSN-0096-1.html'}, {'name': '[debian-lts-announce] 20230727 [SECURITY] [DLA 3508-1] linux security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html'}] CVE State: PUBLISHED
Explain CVE-2023-1381
Explain the vulnerability: CVE-2023-1381
The WP Meta SEO WordPress plugin before 4.5.5 does not validate image file paths before attempting to manipulate the image files, leading to a PHAR deserialization vulnerability. Furthermore, the plugin contains a gadget chain which may be used in certain configurations to achieve remote code execution. Affected Products: WP Meta SEO References: [{'url': 'https://wpscan.com/vulnerability/f140a928-d297-4bd1-8552-bfebcedba536', 'tags': ['exploit', 'vdb-entry', 'technical-description']}, {'url': 'https://blog.wpscan.com/uncovering-a-phar-deserialization-vulnerability-in-wp-meta-seo-and-escalating-to-rce/'}] CVE State: PUBLISHED
Explain CVE-2023-1382
Explain the vulnerability: CVE-2023-1382
A data race flaw was found in the Linux kernel, between where con is allocated and con->sock is set. This issue leads to a NULL pointer dereference when accessing con->sock->sk in net/tipc/topsrv.c in the tipc protocol in the Linux kernel. Affected Products: Kernel References: [{'url': 'https://lore.kernel.org/netdev/bc7bd3183f1c275c820690fc65b708238fe9e38e.1668807842.git.lucien.xin%40gmail.com/T/#u'}] CVE State: PUBLISHED
Explain CVE-2023-1383
Explain the vulnerability: CVE-2023-1383
An Improper Enforcement of Behavioral Workflow vulnerability in the exchangeDeviceServices function on the amzn.dmgr service allowed an attacker to register services that are only locally accessible. This issue affects: Amazon Fire TV Stick 3rd gen versions prior to 6.2.9.5. Insignia TV with FireOS versions prior to 7.6.3.3. Affected Products: Fire TV Stick 3rd gen References: [{'url': 'https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/'}] CVE State: PUBLISHED
Explain CVE-2023-1384
Explain the vulnerability: CVE-2023-1384
The setMediaSource function on the amzn.thin.pl service does not sanitize the "source" parameter allowing for arbitrary javascript code to be run This issue affects: Amazon Fire TV Stick 3rd gen versions prior to 6.2.9.5. Insignia TV with FireOS versions prior to 7.6.3.3. Affected Products: Fire TV Stick 3rd gen References: [{'url': 'https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/'}] CVE State: PUBLISHED
Explain CVE-2023-1385
Explain the vulnerability: CVE-2023-1385
Improper JPAKE implementation allows offline PIN brute-forcing due to the initialization of random values to a known value, which leads to unauthorized authentication to amzn.lightning services. This issue affects: Amazon Fire TV Stick 3rd gen versions prior to 6.2.9.5. Insignia TV with FireOS 7.6.3.3. Affected Products: Fire TV Stick 3rd gen References: [{'url': 'https://www.bitdefender.com/blog/labs/vulnerabilities-identified-amazon-fire-tv-stick-insignia-fire-os-tv-series/'}] CVE State: PUBLISHED
Explain CVE-2023-1386
Explain the vulnerability: CVE-2023-1386
A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. When a local user in the guest writes an executable file with SUID or SGID, none of these privileged bits are correctly dropped. As a result, in rare circumstances, this flaw could be used by malicious users in the guest to elevate their privileges within the guest and help a host local user to elevate privileges on the host. Affected Products: qemu References: [{'url': 'https://access.redhat.com/security/cve/CVE-2023-1386', 'tags': ['vdb-entry', 'x_refsource_REDHAT']}, {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2223985', 'name': 'RHBZ#2223985', 'tags': ['issue-tracking', 'x_refsource_REDHAT']}] CVE State: PUBLISHED
Explain CVE-2023-1387
Explain the vulnerability: CVE-2023-1387
Grafana is an open-source platform for monitoring and observability. Starting with the 9.1 branch, Grafana introduced the ability to search for a JWT in the URL query parameter auth_token and use it as the authentication token. By enabling the "url_login" configuration option (disabled by default), a JWT might be sent to data sources. If an attacker has access to the data source, the leaked token could be used to authenticate to Grafana. Affected Products: Grafana References: [{'url': 'https://grafana.com/security/security-advisories/cve-2023-1387/'}, {'url': 'https://github.com/grafana/bugbounty/security/advisories/GHSA-5585-m9r5-p86j'}, {'url': 'https://security.netapp.com/advisory/ntap-20230609-0003/'}] CVE State: PUBLISHED
Explain CVE-2023-1388
Explain the vulnerability: CVE-2023-1388
A heap-based overflow vulnerability in TA prior to version 5.7.9 allows a remote user to alter the page heap in the macmnsvc process memory block, resulting in the service becoming unavailable. Affected Products: Trellix Agent References: [{'url': 'https://kcm.trellix.com/corporate/index?page=content&id=SB10398'}] CVE State: PUBLISHED
Explain CVE-2023-1389
Explain the vulnerability: CVE-2023-1389
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request. Affected Products: TP-Link Archer AX21 (AX1800) References: [{'url': 'https://www.tenable.com/security/research/tra-2023-11'}, {'url': 'http://packetstormsecurity.com/files/174131/TP-Link-Archer-AX21-Command-Injection.html'}] CVE State: PUBLISHED
Explain CVE-2023-1390
Explain the vulnerability: CVE-2023-1390
A remote denial of service vulnerability was found in the Linux kernel’s TIPC kernel module. The while loop in tipc_link_xmit() hits an unknown state while attempting to parse SKBs, which are not in the queue. Sending two small UDP packets to a system with a UDP bearer results in the CPU utilization for the system to instantly spike to 100%, causing a denial of service condition. Affected Products: Linux kernel (TIPC kernel module) References: [{'url': 'https://gist.github.com/netspooky/bee2d07022f6350bb88eaa48e571d9b5'}, {'url': 'https://infosec.exchange/%40_mattata/109427999461122360'}, {'url': 'https://github.com/torvalds/linux/commit/b77413446408fdd256599daf00d5be72b5f3e7c6'}, {'url': 'https://security.netapp.com/advisory/ntap-20230420-0001/'}] CVE State: PUBLISHED
Explain CVE-2023-1391
Explain the vulnerability: CVE-2023-1391
A vulnerability, which was classified as problematic, was found in SourceCodester Online Tours & Travels Management System 1.0. Affected is an unknown function of the file admin/ab.php. The manipulation of the argument img leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-222978 is the identifier assigned to this vulnerability. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.222978', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222978', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/Dwayne_Wade/article/details/129526901', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1392
Explain the vulnerability: CVE-2023-1392
A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. Affected by this vulnerability is the function save_menu. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222979. Affected Products: Online Pizza Ordering System References: [{'url': 'https://vuldb.com/?id.222979', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222979', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Fchen-xcu/Vulnerability-Set/blob/main/The%20online%20pizza%20ordering%20system%20has%20a%20file%20upload%20(RCE)%20vulnerability.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1393
Explain the vulnerability: CVE-2023-1393
A flaw was found in X.Org Server Overlay Window. A Use-After-Free may lead to local privilege escalation. If a client explicitly destroys the compositor overlay window (aka COW), the Xserver would leave a dangling pointer to that window in the CompScreen structure, which will trigger a use-after-free later. Affected Products: xorg-server References: [{'url': 'https://www.openwall.com/lists/oss-security/2023/03/29/1'}, {'name': 'FEDORA-2023-eb3c27ff25', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H3EVO3OQV6T4BSABWZ2TU3PY5TJTEQZ2/'}, {'name': 'FEDORA-2023-b7835960ac', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BPNQYHUI63DB5FHK6EOI3Z4C6YQZGZKI/'}, {'name': 'FEDORA-2023-b87fd3a628', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SW2NRC3V53PIBXFPFBVWCOM2MDDILWQS/'}, {'name': 'FEDORA-2023-f754e7abfd', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QHJMSMK7G4GPLMKIGKXIOL2RTKU5VFWE/'}, {'name': 'FEDORA-2023-66d5af0278', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MEHSYYFGBN3G4RS2HJXKQ5NBMOAZ5F2F/'}, {'name': 'FEDORA-2023-239bae4b57', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PSAAGI5V77FQXIT5PP4URP6BYQVCK5U5/'}, {'name': 'FEDORA-2023-fe18ae3e85', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NOYATGGPMT3COC7ELAJW5TG2PVS3AFR2/'}, {'name': 'FEDORA-2023-6f3f9ee721', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SWFUDSBSABRHQOX6TIQ5O3SNPFTPFQQP/'}, {'name': 'GLSA-202305-30', 'tags': ['vendor-advisory'], 'url': 'https://security.gentoo.org/glsa/202305-30'}, {'url': 'https://gitlab.freedesktop.org/xorg/xserver/-/commit/26ef545b3502f61ca722a7a3373507e88ef64110'}] CVE State: PUBLISHED
Explain CVE-2023-1394
Explain the vulnerability: CVE-2023-1394
A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0. It has been classified as critical. This affects the function mysqli_query of the file bsitemp.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222981 was assigned to this vulnerability. Affected Products: Online Graduate Tracer System References: [{'url': 'https://vuldb.com/?id.222981', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222981', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/Dwayne_Wade/article/details/129522869', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1395
Explain the vulnerability: CVE-2023-1395
A vulnerability was found in SourceCodester Yoga Class Registration System 1.0. It has been declared as problematic. This vulnerability affects the function query of the file admin/user/list.php. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-222982 is the identifier assigned to this vulnerability. Affected Products: Yoga Class Registration System References: [{'url': 'https://vuldb.com/?id.222982', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222982', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/Dwayne_Wade/article/details/129496689', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1396
Explain the vulnerability: CVE-2023-1396
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file admin/traveller_details.php. The manipulation of the argument address leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222983. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.222983', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222983', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/Dwayne_Wade/article/details/129524104', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1397
Explain the vulnerability: CVE-2023-1397
A vulnerability classified as problematic has been found in SourceCodester Online Student Management System 1.0. Affected is an unknown function of the file profile.php. The manipulation of the argument adminname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-222984. Affected Products: Online Student Management System References: [{'url': 'https://vuldb.com/?id.222984', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.222984', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Online%20student%20management%20system%20pdf/Online%20student%20management%20system%20xss%20vlun%203.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1398
Explain the vulnerability: CVE-2023-1398
A vulnerability classified as critical was found in XiaoBingBy TeaCMS 2.0. Affected by this vulnerability is an unknown functionality of the file /admin/upload. The manipulation leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222985 was assigned to this vulnerability. Affected Products: TeaCMS References: [{'url': 'https://vuldb.com/?id.222985', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.222985', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/xiaobingby/TeaCMS/issues/I6IIYV', 'tags': ['exploit', 'issue-tracking']}] CVE State: PUBLISHED
Explain CVE-2023-1399
Explain the vulnerability: CVE-2023-1399
N6854A Geolocation Server versions 2.4.2 are vulnerable to untrusted data deserialization, which may allow a malicious actor to escalate privileges in the affected device’s default configuration and achieve remote code execution. Affected Products: N6854A Geolocation Server References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-01'}] CVE State: PUBLISHED
Explain CVE-2023-1400
Explain the vulnerability: CVE-2023-1400
The Modern Events Calendar Lite WordPress plugin through 5.16.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). Affected Products: Modern Events Calendar Lite References: [{'url': 'https://wpscan.com/vulnerability/c7feceef-28f1-4cac-b124-4b95e3f17b07', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1401
Explain the vulnerability: CVE-2023-1401
An issue has been discovered in GitLab DAST scanner affecting all versions starting from 3.0.29 before 4.0.5, in which the DAST scanner leak cross site cookies on redirect during authorization. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/396533', 'name': 'GitLab Issue #396533', 'tags': ['issue-tracking']}, {'url': 'https://hackerone.com/reports/1889255', 'name': 'HackerOne Bug Bounty Report #1889255', 'tags': ['technical-description', 'exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1402
Explain the vulnerability: CVE-2023-1402
The course participation report required additional checks to prevent roles being displayed which the user did not have access to view. Affected Products: moodle References: [{'url': 'https://moodle.org/mod/forum/discuss.php?d=445069'}, {'name': 'FEDORA-2023-d9c13996b2', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3QZN34VSF4HTCW3C3ZP2OZYSLYUKADPF/'}] CVE State: PUBLISHED
Explain CVE-2023-1403
Explain the vulnerability: CVE-2023-1403
The Weaver Xtreme Theme for WordPress is vulnerable to stored Cross-Site Scripting due to insufficient escaping of the profile display name in versions up to, and including, 5.0.7. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Affected Products: Weaver Xtreme References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/5b2bef63-c871-45e4-bb05-12bbba20ca5e?source=cve'}, {'url': 'https://themes.trac.wordpress.org/browser/weaver-xtreme/5.0.7/includes/lib-content.php#L1081'}] CVE State: PUBLISHED
Explain CVE-2023-1404
Explain the vulnerability: CVE-2023-1404
The Weaver Show Posts Plugin for WordPress is vulnerable to stored Cross-Site Scripting due to insufficient escaping of the profile display name in versions up to, and including, 1.6. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Affected Products: Weaver Show Posts References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/c8647c44-4879-4895-bd07-19f7d62a7326?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/show-posts/tags/1.6/includes/atw-showposts-sc.php#L368'}] CVE State: PUBLISHED
Explain CVE-2023-1406
Explain the vulnerability: CVE-2023-1406
The JetEngine WordPress plugin before 3.1.3.1 includes uploaded files without adequately ensuring that they are not executable, leading to a remote code execution vulnerability. Affected Products: JetEngine References: [{'url': 'https://wpscan.com/vulnerability/2a81b6b1-2339-4889-9c28-1af133df8b65', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1407
Explain the vulnerability: CVE-2023-1407
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/user/manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223111. Affected Products: Student Study Center Desk Management System References: [{'url': 'https://vuldb.com/?id.223111', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223111', 'tags': ['signature', 'permissions-required']}, {'url': 'https://s1.ax1x.com/2023/03/15/pp1gd8x.png', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1408
Explain the vulnerability: CVE-2023-1408
The Video List Manager WordPress plugin through 1.7 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin Affected Products: Video List Manager References: [{'url': 'https://wpscan.com/vulnerability/baf7ef4d-b2ba-48e0-9c17-74fa27e0c15b', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1410
Explain the vulnerability: CVE-2023-1410
Grafana is an open-source platform for monitoring and observability.  Grafana had a stored XSS vulnerability in the Graphite FunctionDescription tooltip. The stored XSS vulnerability was possible due the value of the Function Description was not properly sanitized. An attacker needs to have control over the Graphite data source in order to manipulate a function description and a Grafana admin needs to configure the data source, later a Grafana user needs to select a tampered function and hover over the description.  Users may upgrade to version 8.5.22, 9.2.15 and 9.3.11 to receive a fix. Affected Products: Grafana References: [{'url': 'https://grafana.com/security/security-advisories/cve-2023-1410/'}, {'url': 'https://github.com/grafana/bugbounty/security/advisories/GHSA-qrrg-gw7w-vp76'}, {'url': 'https://security.netapp.com/advisory/ntap-20230420-0003/'}] CVE State: PUBLISHED
Explain CVE-2023-1412
Explain the vulnerability: CVE-2023-1412
An unprivileged (non-admin) user can exploit an Improper Access Control vulnerability in the Cloudflare WARP Client for Windows (<= 2022.12.582.0) to perform privileged operations with SYSTEM context by working with a combination of opportunistic locks (oplock) and symbolic links (which can both be created by an unprivileged user). After installing the Cloudflare WARP Client (admin privileges required), an MSI-Installer is placed under C:\Windows\Installer. The vulnerability lies in the repair function of this MSI. ImpactAn unprivileged (non-admin) user can exploit this vulnerability to perform privileged operations with SYSTEM context, including deleting arbitrary files and reading arbitrary file content. This can lead to a variety of attacks, including the manipulation of system files and privilege escalation. PatchesA new installer with a fix that addresses this vulnerability was released in version 2023.3.381.0. While the WARP Client itself is not vulnerable (only the installer), users are encouraged to upgrade to the latest version and delete any older installers present in their systems. Affected Products: WARP References: [{'url': 'https://github.com/cloudflare/advisories/security/advisories/GHSA-hgxh-48m3-3gq7'}, {'url': 'https://install.appcenter.ms/orgs/cloudflare/apps/1.1.1.1-windows-1/distribution_groups/release'}, {'url': 'https://developers.cloudflare.com/warp-client/get-started/windows/'}] CVE State: PUBLISHED
Explain CVE-2023-1413
Explain the vulnerability: CVE-2023-1413
The WP VR WordPress plugin before 8.2.9 does not sanitise and escape some parameters before outputting them back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin Affected Products: WP VR References: [{'url': 'https://wpscan.com/vulnerability/6938fee5-3510-45e6-8112-c9e2b30f6881', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1414
Explain the vulnerability: CVE-2023-1414
The WP VR WordPress plugin before 8.3.0 does not have authorisation and CSRF checks in various AJAX actions, one in particular could allow any authenticated users, such as subscriber to update arbitrary tours Affected Products: WP VR References: [{'url': 'https://wpscan.com/vulnerability/d61d4be7-9251-4c62-8fb7-8a456aa6969e', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1415
Explain the vulnerability: CVE-2023-1415
A vulnerability was found in Simple Art Gallery 1.0. It has been declared as critical. This vulnerability affects the function sliderPicSubmit of the file adminHome.php. The manipulation leads to unrestricted upload. The attack can be initiated remotely. VDB-223126 is the identifier assigned to this vulnerability. Affected Products: Simple Art Gallery References: [{'url': 'https://vuldb.com/?id.223126', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223126', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/0xxtoby/Vuldb/blob/main/SIMPLE%20ART%20GALLERY%20system%20has%20a%20file%20upload%20(RCE)%20vulnerability.pdf', 'tags': ['related']}] CVE State: PUBLISHED
Explain CVE-2023-1416
Explain the vulnerability: CVE-2023-1416
A vulnerability classified as critical has been found in Simple Art Gallery 1.0. Affected is an unknown function of the file adminHome.php. The manipulation of the argument social_facebook leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223128. Affected Products: Simple Art Gallery References: [{'url': 'https://vuldb.com/?id.223128', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223128', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Songs-YZS/CveList/blob/main/SIMPLE%20ART%20GALLERY%20system%20has%20Sql%20injection%20vulnerabilities.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1417
Explain the vulnerability: CVE-2023-1417
An issue has been discovered in GitLab affecting all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. It was possible for an unauthorised user to add child epics linked to victim's epic in an unrelated group. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/396720'}, {'url': 'https://hackerone.com/reports/1892200'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1417.json'}] CVE State: PUBLISHED
Explain CVE-2023-1418
Explain the vulnerability: CVE-2023-1418
A vulnerability classified as problematic was found in SourceCodester Friendly Island Pizza Website and Ordering System 1.0. Affected by this vulnerability is an unknown functionality of the file cashconfirm.php of the component POST Parameter Handler. The manipulation of the argument transactioncode leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223129 was assigned to this vulnerability. Affected Products: Friendly Island Pizza Website and Ordering System References: [{'url': 'https://vuldb.com/?id.223129', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223129', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/2889436547/bug_report/blob/main/vendors/Skynidnine/Friendly%20Island%20Pizza%20Website%20and%20Ordering%20System/XSS-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1420
Explain the vulnerability: CVE-2023-1420
The Ajax Search Lite WordPress plugin before 4.11.1, Ajax Search Pro WordPress plugin before 4.26.2 does not sanitise and escape a parameter before outputting it back in a response of an AJAX action, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin Affected Products: Ajax Search Lite References: [{'url': 'https://wpscan.com/vulnerability/a9a54ee5-2b80-4f55-894c-1047030eea7f', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1421
Explain the vulnerability: CVE-2023-1421
A reflected cross-site scripting vulnerability in the OAuth flow completion endpoints in Mattermost allows an attacker to send AJAX requests on behalf of the victim via sharing a crafted link with a malicious state parameter. Affected Products: Mattermost References: [{'url': 'https://mattermost.com/security-updates/'}] CVE State: PUBLISHED
Explain CVE-2023-1424
Explain the vulnerability: CVE-2023-1424
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in Mitsubishi Electric Corporation MELSEC iQ-F Series CPU modules and MELSEC iQ-R Series CPU modules allows a remote unauthenticated attacker to cause a denial of service (DoS) condition or execute malicious code on a target product by sending specially crafted packets. A system reset of the product is required for recovery from a denial of service (DoS) condition and malicious code execution. Affected Products: MELSEC iQ-F Series FX5U-32MT/ES References: [{'url': 'https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-003_en.pdf'}, {'url': 'https://jvn.jp/vu/JVNVU94650413'}, {'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-03'}] CVE State: PUBLISHED
Explain CVE-2023-1425
Explain the vulnerability: CVE-2023-1425
The WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg WordPress plugin before 2.7.9.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admins Affected Products: WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg References: [{'url': 'https://wpscan.com/vulnerability/578f4179-e7be-4963-9379-5e694911b451', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1426
Explain the vulnerability: CVE-2023-1426
The WP Tiles WordPress plugin through 1.1.2 does not ensure that posts to be displayed are not draft/private, allowing any authenticated users, such as subscriber to retrieve the titles of draft and privates posts for example. AN attacker could also retrieve the title of any other type of post. Affected Products: WP Tiles References: [{'url': 'https://wpscan.com/vulnerability/fdd79bb4-d434-4635-bb2b-84d079ecc746', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1427
Explain the vulnerability: CVE-2023-1427
- The Photo Gallery by 10Web WordPress plugin before 1.8.15 did not ensure that uploaded files are kept inside its uploads folder, allowing high privilege users to put images anywhere in the filesystem via a path traversal vector. Affected Products: Photo Gallery by 10Web References: [{'url': 'https://wpscan.com/vulnerability/c8917ba2-4cb3-4b09-8a49-b7c612254946', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1428
Explain the vulnerability: CVE-2023-1428
There exists an vulnerability causing an abort() to be called in gRPC.  The following headers cause gRPC's C++ implementation to abort() when called via http2: te: x (x != trailers) :scheme: x (x != http, https) grpclb_client_stats: x (x == anything) On top of sending one of those headers, a later header must be sent that gets the total header size past 8KB. We recommend upgrading past git commit 2485fa94bd8a723e5c977d55a3ce10b301b437f8 or v1.53 and above. Affected Products: gRPC References: [{'url': 'https://github.com/grpc/grpc/commit/2485fa94bd8a723e5c977d55a3ce10b301b437f8'}] CVE State: PUBLISHED
Explain CVE-2023-1429
Explain the vulnerability: CVE-2023-1429
Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.19. Affected Products: pimcore/pimcore References: [{'url': 'https://huntr.dev/bounties/e0829fea-e458-47b8-84a3-a74476d9638f'}, {'url': 'https://github.com/pimcore/pimcore/commit/7588c336edb24050656111b89d69e69cc9feb5f5'}] CVE State: PUBLISHED
Explain CVE-2023-1430
Explain the vulnerability: CVE-2023-1430
The FluentCRM - Marketing Automation For WordPress plugin for WordPress is vulnerable to unauthorized modification of data in versions up to, and including, 2.7.40 due to the use of an MD5 hash without a salt to control subscriptions. This makes it possible for unauthenticated attackers to unsubscribe users from lists and manage subscriptions, granted they gain access to any targeted subscribers email address. Affected Products: Email Marketing, Newsletter, Email Automation and CRM Plugin for WordPress by FluentCRM References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/de6da87e-8f7d-4120-8a1b-390ef7733d84?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2899218/fluent-crm/tags/2.8.0/app/Hooks/Handlers/ExternalPages.php?old=2873074&old_path=fluent-crm%2Ftags%2F2.7.40%2Fapp%2FHooks%2FHandlers%2FExternalPages.php'}] CVE State: PUBLISHED
Explain CVE-2023-1431
Explain the vulnerability: CVE-2023-1431
The WP Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.6.3 due to the plugin saving shopping cart data exports in a publicly accessible location (/wp-content/plugins/wordpress-simple-paypal-shopping-cart/includes/admin/). This makes it possible for unauthenticated attackers to view information that should be limited to administrators only and can include data like first name, last name, email, address, IP Address, and more. Affected Products: WordPress Simple Shopping Cart References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/ea4453bc-557b-4abf-85c6-4aecfd8f4012?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2878855%40wordpress-simple-paypal-shopping-cart&new=2878855%40wordpress-simple-paypal-shopping-cart&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-1432
Explain the vulnerability: CVE-2023-1432
A vulnerability was found in SourceCodester Online Food Ordering System 2.0 and classified as critical. Affected by this issue is some unknown functionality of the file /fos/admin/ajax.php?action=save_settings of the component POST Request Handler. The manipulation leads to improper access controls. The attack may be launched remotely. VDB-223214 is the identifier assigned to this vulnerability. Affected Products: Online Food Ordering System References: [{'url': 'https://vuldb.com/?id.223214', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.223214', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1433
Explain the vulnerability: CVE-2023-1433
A vulnerability was found in SourceCodester Gadget Works Online Ordering System 1.0. It has been classified as problematic. This affects an unknown part of the file admin/products/controller.php?action=add of the component Products Handler. The manipulation of the argument filename leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223215. Affected Products: Gadget Works Online Ordering System References: [{'url': 'https://vuldb.com/?id.223215', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223215', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zhengjiashengbaba/bug_report/blob/main/UPLOAD.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1435
Explain the vulnerability: CVE-2023-1435
The Ajax Search Pro WordPress plugin before 4.26.2 does not sanitise and escape various parameters before outputting them back in pages, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin Affected Products: Ajax Search Pro References: [{'url': 'https://wpscan.com/vulnerability/0ca62908-4ef5-41e0-9223-f77ad2c333d7', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1436
Explain the vulnerability: CVE-2023-1436
An infinite recursion is triggered in Jettison when constructing a JSONArray from a Collection that contains a self-reference in one of its elements. This leads to a StackOverflowError exception being thrown. Affected Products: jettison References: [{'url': 'https://research.jfrog.com/vulnerabilities/jettison-json-array-dos-xray-427911/'}] CVE State: PUBLISHED
Explain CVE-2023-1437
Explain the vulnerability: CVE-2023-1437
All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent client could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files. Affected Products: WebAccess/SCADA References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-02'}] CVE State: PUBLISHED
Explain CVE-2023-1439
Explain the vulnerability: CVE-2023-1439
A vulnerability, which was classified as critical, has been found in SourceCodester Medicine Tracker System 1.0. This issue affects some unknown processing of the file medicines/view_details.php of the component GET Parameter Handler. The manipulation of the argument GET leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223283. Affected Products: Medicine Tracker System References: [{'url': 'https://vuldb.com/?id.223283', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223283', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/GodGua/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1440
Explain the vulnerability: CVE-2023-1440
A vulnerability, which was classified as critical, was found in SourceCodester Automatic Question Paper Generator System 1.0. Affected is an unknown function of the file users/user/manage_user.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223284. Affected Products: Automatic Question Paper Generator System References: [{'url': 'https://vuldb.com/?id.223284', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223284', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/gxu-yuan/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1441
Explain the vulnerability: CVE-2023-1441
A vulnerability has been found in SourceCodester Automatic Question Paper Generator System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file admin/courses/view_course.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223285 was assigned to this vulnerability. Affected Products: Automatic Question Paper Generator System References: [{'url': 'https://vuldb.com/?id.223285', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223285', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/SecurityYH/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1442
Explain the vulnerability: CVE-2023-1442
A vulnerability was found in Meizhou Qingyunke QYKCMS 4.3.0. It has been classified as problematic. This affects an unknown part of the file /admin_system/api.php of the component Update Handler. The manipulation of the argument downurl leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223287. Affected Products: QYKCMS References: [{'url': 'https://vuldb.com/?id.223287', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223287', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/VG00000/-/blob/main/README.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1443
Explain the vulnerability: CVE-2023-1443
A vulnerability was found in Filseclab Twister Antivirus 8. It has been declared as problematic. This vulnerability affects the function 0x80112053 in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223288. Affected Products: Twister Antivirus References: [{'url': 'https://vuldb.com/?id.223288', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223288', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1443', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1xwIyZ8RRdwsHshxhtFMELPv2DdbQ8hBD/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1444
Explain the vulnerability: CVE-2023-1444
A vulnerability was found in Filseclab Twister Antivirus 8. It has been rated as critical. This issue affects the function 0x8011206B in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223289 was assigned to this vulnerability. Affected Products: Twister Antivirus References: [{'url': 'https://vuldb.com/?id.223289', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223289', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1444', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1KrkezTwgmt5CnhzlyyWVNLIAeiMvuDEr/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1445
Explain the vulnerability: CVE-2023-1445
A vulnerability classified as problematic has been found in Filseclab Twister Antivirus 8. Affected is the function 0x80112053 in the library fildds.sys of the component IoControlCode Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. VDB-223290 is the identifier assigned to this vulnerability. Affected Products: Twister Antivirus References: [{'url': 'https://vuldb.com/?id.223290', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223290', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1445', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1VYsdzogyxAsGH-rhUU1Bo_EbgpSEEN_Q/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1446
Explain the vulnerability: CVE-2023-1446
A vulnerability classified as problematic was found in Watchdog Anti-Virus 1.4.214.0. Affected by this vulnerability is the function 0x80002004/0x80002008 in the library wsdk-driver.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223291. Affected Products: Anti-Virus References: [{'url': 'https://vuldb.com/?id.223291', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223291', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1446', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1zjK_DMjHz41RMpfa0iLQ4GXKQwEr4z2T/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1447
Explain the vulnerability: CVE-2023-1447
A vulnerability, which was classified as problematic, has been found in SourceCodester Medicine Tracker System 1.0. Affected by this issue is some unknown functionality of the file app/?page=medicines/manage_medicine. The manipulation of the argument name/description with the input <script>alert('2')</script> leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-223292. Affected Products: Medicine Tracker System References: [{'url': 'https://vuldb.com/?id.223292', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223292', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1448
Explain the vulnerability: CVE-2023-1448
A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability. Affected Products: GPAC References: [{'url': 'https://vuldb.com/?id.223293', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223293', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/gpac/gpac/issues/2388', 'tags': ['issue-tracking']}, {'url': 'https://github.com/xxy1126/Vuln/blob/main/gpac/3', 'tags': ['exploit']}, {'url': 'https://www.debian.org/security/2023/dsa-5411'}] CVE State: PUBLISHED
Explain CVE-2023-1449
Explain the vulnerability: CVE-2023-1449
A vulnerability has been found in GPAC 2.3-DEV-rev35-gbbca86917-master and classified as problematic. This vulnerability affects the function gf_av1_reset_state of the file media_tools/av_parsers.c. The manipulation leads to double free. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223294 is the identifier assigned to this vulnerability. Affected Products: GPAC References: [{'url': 'https://vuldb.com/?id.223294', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223294', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/gpac/gpac/issues/2387', 'tags': ['issue-tracking']}, {'url': 'https://github.com/xxy1126/Vuln/blob/main/gpac/2', 'tags': ['exploit']}, {'url': 'https://www.debian.org/security/2023/dsa-5411'}] CVE State: PUBLISHED
Explain CVE-2023-1450
Explain the vulnerability: CVE-2023-1450
A vulnerability was found in MP4v2 2.1.2 and classified as problematic. This issue affects the function DumpTrack of the file mp4trackdump.cpp. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223295. Affected Products: MP4v2 References: [{'url': 'https://vuldb.com/?id.223295', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223295', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc', 'tags': ['exploit']}, {'url': 'https://github.com/10cksYiqiyinHangzhouTechnology/mp4v2_trackdump_poc/blob/main/id_000005%2Csig_08%2Csrc_000166%2B000357%2Ctime_3137250%2Cexecs_3545598%2Cop_splice%2Crep_16', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1451
Explain the vulnerability: CVE-2023-1451
A vulnerability was found in MP4v2 2.1.2. It has been classified as problematic. Affected is the function mp4v2::impl::MP4Track::GetSampleFileOffset of the file mp4track.cpp. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223296. Affected Products: MP4v2 References: [{'url': 'https://vuldb.com/?id.223296', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223296', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/RichTrouble/mp4v2_mp4track_poc', 'tags': ['exploit']}, {'url': 'https://github.com/RichTrouble/mp4v2_mp4track_poc/blob/main/id_000000%2Csig_08%2Csrc_001076%2Ctime_147809374%2Cexecs_155756872%2Cop_havoc%2Crep_8', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1452
Explain the vulnerability: CVE-2023-1452
A vulnerability was found in GPAC 2.3-DEV-rev35-gbbca86917-master. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file filters/load_text.c. The manipulation leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223297 was assigned to this vulnerability. Affected Products: GPAC References: [{'url': 'https://vuldb.com/?id.223297', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.223297', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/gpac/gpac/issues/2386', 'tags': ['issue-tracking']}, {'url': 'https://github.com/xxy1126/Vuln/blob/main/gpac/1.mp4', 'tags': ['exploit']}, {'url': 'https://www.debian.org/security/2023/dsa-5411'}] CVE State: PUBLISHED