instruction
stringlengths
21
21
input
stringlengths
40
40
output
stringlengths
62
37.3k
Explain CVE-2023-1566
Explain the vulnerability: CVE-2023-1566
A vulnerability was found in SourceCodester Medical Certificate Generator App 1.0. It has been declared as critical. This vulnerability affects unknown code of the file action.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-223558 is the identifier assigned to this vulnerability. Affected Products: Medical Certificate Generator App References: [{'url': 'https://vuldb.com/?id.223558', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223558', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Medical%20Certificate%20Generator%20App/Medical%20Certificate%20Generator%20App%20-%20vlun(2).pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1567
Explain the vulnerability: CVE-2023-1567
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/assign/assign.php. The manipulation of the argument sid leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223559. Affected Products: Student Study Center Desk Management System References: [{'url': 'https://vuldb.com/?id.223559', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223559', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Student%20Study%20Center%20Desk%20Management%20System/Student%20Study%20Center%20Desk%20Management%20System%20-%20vlun1.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1568
Explain the vulnerability: CVE-2023-1568
A vulnerability classified as problematic has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file /admin/reports/index.php of the component GET Parameter Handler. The manipulation of the argument date_to leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223560. Affected Products: Student Study Center Desk Management System References: [{'url': 'https://vuldb.com/?id.223560', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223560', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Student%20Study%20Center%20Desk%20Management%20System/Student%20Study%20Center%20Desk%20Management%20System%20-%20vlun2.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1569
Explain the vulnerability: CVE-2023-1569
A vulnerability classified as problematic was found in SourceCodester E-Commerce System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/user/controller.php?action=edit. The manipulation of the argument U_NAME with the input <script>alert('1')</script> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223561 was assigned to this vulnerability. Affected Products: E-Commerce System References: [{'url': 'https://vuldb.com/?id.223561', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223561', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1570
Explain the vulnerability: CVE-2023-1570
A vulnerability, which was classified as problematic, has been found in syoyo tinydng. Affected by this issue is the function __interceptor_memcpy of the file tiny_dng_loader.h. The manipulation leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. It is recommended to apply a patch to fix this issue. VDB-223562 is the identifier assigned to this vulnerability. Affected Products: tinydng References: [{'url': 'https://vuldb.com/?id.223562', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223562', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/syoyo/tinydng/issues/28', 'tags': ['issue-tracking']}, {'url': 'https://github.com/syoyo/tinydng/issues/29', 'tags': ['issue-tracking']}, {'url': 'https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1571
Explain the vulnerability: CVE-2023-1571
A vulnerability, which was classified as critical, was found in DataGear up to 4.5.0. This affects an unknown part of the file /analysisProject/pagingQueryData. The manipulation of the argument queryOrder leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.5.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-223563. Affected Products: DataGear References: [{'url': 'https://vuldb.com/?id.223563', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223563', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/yangyanglo/ForCVE/blob/main/2023-0x01.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1572
Explain the vulnerability: CVE-2023-1572
A vulnerability has been found in DataGear up to 1.11.1 and classified as problematic. This vulnerability affects unknown code of the component Plugin Handler. The manipulation leads to cross site scripting. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.12.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-223564. Affected Products: DataGear References: [{'url': 'https://vuldb.com/?id.223564', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.223564', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/yangyanglo/ForCVE/edit/main/2023-0x03.md', 'tags': ['related']}, {'url': 'https://github.com/yangyanglo/ForCVE/blob/main/2023-0x03.md', 'tags': ['exploit']}, {'url': 'https://github.com/datageartech/datagear/releases/tag/v1.12.0', 'tags': ['patch']}] CVE State: PUBLISHED
Explain CVE-2023-1573
Explain the vulnerability: CVE-2023-1573
A vulnerability was found in DataGear up to 1.11.1 and classified as problematic. This issue affects some unknown processing of the component Graph Dataset Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.12.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-223565 was assigned to this vulnerability. Affected Products: DataGear References: [{'url': 'https://vuldb.com/?id.223565', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.223565', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/yangyanglo/ForCVE/blob/main/2023-0x04.md', 'tags': ['exploit']}, {'url': 'https://github.com/datageartech/datagear/releases/tag/v1.12.0', 'tags': ['patch']}] CVE State: PUBLISHED
Explain CVE-2023-1574
Explain the vulnerability: CVE-2023-1574
Information disclosure in the user creation feature of a MSSQL data source in Devolutions Remote Desktop Manager 2023.1.9 and below on Windows allows an attacker with access to the user interface to obtain sensitive information via the error message dialog that displays the password in clear text. Affected Products: Remote Desktop Manager References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0006'}] CVE State: PUBLISHED
Explain CVE-2023-1575
Explain the vulnerability: CVE-2023-1575
The Mega Main Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via some of its settings parameters in versions up to, and including, 2.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Affected Products: Mega Main Menu References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/a44ce6a3-0a9d-4bce-9251-f3a38b000645?source=cve'}, {'url': 'https://codecanyon.net/item/mega-main-menu-wordpress-menu-plugin/6135125'}] CVE State: PUBLISHED
Explain CVE-2023-1578
Explain the vulnerability: CVE-2023-1578
SQL Injection in GitHub repository pimcore/pimcore prior to 10.5.19. Affected Products: pimcore/pimcore References: [{'url': 'https://huntr.dev/bounties/7e441a14-8e55-4ab4-932c-4dc56bb1bc2e'}, {'url': 'https://github.com/pimcore/pimcore/commit/367b74488808d71ec3f66f4ca9e8df5217c2c8d2'}] CVE State: PUBLISHED
Explain CVE-2023-1579
Explain the vulnerability: CVE-2023-1579
Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64. Affected Products: binutils References: [{'url': 'https://sourceware.org/bugzilla/show_bug.cgi?id=29988'}, {'url': 'https://security.netapp.com/advisory/ntap-20230511-0009/'}, {'url': 'https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11d171f1910b508a81d21faa087ad1af573407d8'}] CVE State: PUBLISHED
Explain CVE-2023-1580
Explain the vulnerability: CVE-2023-1580
Uncontrolled resource consumption in the logging feature in Devolutions Gateway 2023.1.1 and earlier allows an attacker to cause a denial of service by filling up the disk and render the system unusable. Affected Products: Gateway References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0007'}] CVE State: PUBLISHED
Explain CVE-2023-1582
Explain the vulnerability: CVE-2023-1582
A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service. Affected Products: Linux References: [{'url': 'https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0%40kroah.com/'}] CVE State: PUBLISHED
Explain CVE-2023-1583
Explain the vulnerability: CVE-2023-1583
A NULL pointer dereference was found in io_file_bitmap_get in io_uring/filetable.c in the io_uring sub-component in the Linux Kernel. When fixed files are unregistered, some context information (file_alloc_{start,end} and alloc_hint) is not cleared. A subsequent request that has auto index selection enabled via IORING_FILE_INDEX_ALLOC can cause a NULL pointer dereference. An unprivileged user can use the flaw to cause a system crash. Affected Products: Linux kernel References: [{'url': 'https://git.kernel.org/pub/scm/linux/kernel/git/axboe/linux-block.git/commit/?h=io_uring-6.3&id=761efd55a0227aca3a69deacdaa112fffd44fe37'}, {'url': 'https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=02a4d923e4400a36d340ea12d8058f69ebf3a383'}] CVE State: PUBLISHED
Explain CVE-2023-1585
Explain the vulnerability: CVE-2023-1585
Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU) vulnerability in the Quarantine process, leading to arbitrary file/directory deletion. The issue was fixed with Avast and AVG Antivirus version 22.11 and virus definitions from 14 February 2023 or later. Affected Products: Avast Antivirus References: [{'url': 'https://support.norton.com/sp/static/external/tools/security-advisories.html'}] CVE State: PUBLISHED
Explain CVE-2023-1586
Explain the vulnerability: CVE-2023-1586
Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU) vulnerability in the restore process leading to arbitrary file creation. The issue was fixed with Avast and AVG Antivirus version 22.11 Affected Products: Avast Antivirus References: [{'url': 'https://support.norton.com/sp/static/external/tools/security-advisories.html'}] CVE State: PUBLISHED
Explain CVE-2023-1587
Explain the vulnerability: CVE-2023-1587
Avast and AVG Antivirus for Windows were susceptible to a NULL pointer dereference issue via RPC-interface. The issue was fixed with Avast and AVG Antivirus version 22.11 Affected Products: Avast Antivirus References: [{'url': 'https://support.norton.com/sp/static/external/tools/security-advisories.html'}] CVE State: PUBLISHED
Explain CVE-2023-1588
Explain the vulnerability: CVE-2023-1588
N\A Affected Products: N\A References: N\A CVE State: REJECTED
Explain CVE-2023-1589
Explain the vulnerability: CVE-2023-1589
A vulnerability has been found in SourceCodester Online Tours & Travels Management System 1.0 and classified as critical. This vulnerability affects the function exec of the file admin/operations/approve_delete.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-223654 is the identifier assigned to this vulnerability. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.223654', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223654', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/weixin_43864034/article/details/129729911', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1590
Explain the vulnerability: CVE-2023-1590
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0 and classified as critical. This issue affects the function exec of the file admin/operations/currency.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223655. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.223655', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223655', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/weixin_43864034/article/details/129730106', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1591
Explain the vulnerability: CVE-2023-1591
A vulnerability classified as critical has been found in SourceCodester Automatic Question Paper Generator System 1.0. This affects an unknown part of the file classes/Users.php?f=save_ruser. The manipulation of the argument id/email leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-223659. Affected Products: Automatic Question Paper Generator System References: [{'url': 'https://vuldb.com/?id.223659', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223659', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1592
Explain the vulnerability: CVE-2023-1592
A vulnerability classified as critical was found in SourceCodester Automatic Question Paper Generator System 1.0. This vulnerability affects unknown code of the file admin/courses/view_class.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-223660. Affected Products: Automatic Question Paper Generator System References: [{'url': 'https://vuldb.com/?id.223660', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223660', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1593
Explain the vulnerability: CVE-2023-1593
A vulnerability, which was classified as problematic, has been found in SourceCodester Automatic Question Paper Generator System 1.0. This issue affects some unknown processing of the file classes/Master.php?f=save_class. The manipulation of the argument description leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-223661 was assigned to this vulnerability. Affected Products: Automatic Question Paper Generator System References: [{'url': 'https://vuldb.com/?id.223661', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223661', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1594
Explain the vulnerability: CVE-2023-1594
A vulnerability, which was classified as critical, was found in novel-plus 3.6.2. Affected is the function MenuService of the file sys/menu/list. The manipulation of the argument sort leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-223662 is the identifier assigned to this vulnerability. Affected Products: novel-plus References: [{'url': 'https://vuldb.com/?id.223662', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223662', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/OYyunshen/Poc/blob/main/Novel-PlusV3.6.2Sqli.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1595
Explain the vulnerability: CVE-2023-1595
A vulnerability has been found in novel-plus 3.6.2 and classified as critical. Affected by this vulnerability is an unknown functionality of the file common/log/list. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223663. Affected Products: novel-plus References: [{'url': 'https://vuldb.com/?id.223663', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223663', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/1610349395/novel-plus-v3.6.2----Background-SQL-Injection-Vulnerability-/blob/main/novel-plus%20v3.6.2%20--%20Background%20SQL%20Injection%20Vulnerability.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1596
Explain the vulnerability: CVE-2023-1596
The tagDiv Composer WordPress plugin before 4.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin Affected Products: tagDiv Composer References: [{'url': 'https://wpscan.com/vulnerability/cada9be9-522a-4ce8-847d-c8fff2ddcc07', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1597
Explain the vulnerability: CVE-2023-1597
The tagDiv Cloud Library WordPress plugin before 2.7 does not have authorisation and CSRF in an AJAX action accessible to both unauthenticated and authenticated users, allowing unauthenticated users to change arbitrary user metadata, which could lead to privilege escalation by setting themselves as an admin of the blog. Affected Products: tagDiv Cloud Library References: [{'url': 'https://wpscan.com/vulnerability/4eafe111-8874-4560-83ff-394abe7a803b', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1598
Explain the vulnerability: CVE-2023-1598
N\A Affected Products: N\A References: N\A CVE State: REJECTED
Explain CVE-2023-1601
Explain the vulnerability: CVE-2023-1601
N\A Affected Products: N\A References: N\A CVE State: REJECTED
Explain CVE-2023-1602
Explain the vulnerability: CVE-2023-1602
The Short URL plugin for WordPress is vulnerable to stored Cross-Site Scripting via the 'comment' parameter due to insufficient input sanitization and output escaping in versions up to, and including, 1.6.4. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Affected Products: Short URL References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/a5f29f35-da79-4389-a0a5-a1be0b0b8996?source=cve'}, {'url': 'https://wordpress.org/plugins/shorten-url/#developers'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2931815/shorten-url/trunk/shorten-url.php'}] CVE State: PUBLISHED
Explain CVE-2023-1603
Explain the vulnerability: CVE-2023-1603
Permission bypass when importing or synchronizing entries in User vault in Devolutions Server 2022.3.13 and prior versions allows users with restricted rights to bypass entry permission via id collision. Affected Products: Server References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0008'}] CVE State: PUBLISHED
Explain CVE-2023-1605
Explain the vulnerability: CVE-2023-1605
Denial of Service in GitHub repository radareorg/radare2 prior to 5.8.6. Affected Products: radareorg/radare2 References: [{'url': 'https://huntr.dev/bounties/9dddcf5b-7dd4-46cc-abf9-172dce20bab2'}, {'url': 'https://github.com/radareorg/radare2/commit/508a6307045441defd1bef0999a1f7052097613f'}] CVE State: PUBLISHED
Explain CVE-2023-1606
Explain the vulnerability: CVE-2023-1606
A vulnerability was found in novel-plus 3.6.2 and classified as critical. Affected by this issue is some unknown functionality of the file DictController.java. The manipulation of the argument orderby leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223736. Affected Products: novel-plus References: [{'url': 'https://vuldb.com/?id.223736', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223736', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/OYyunshen/Poc/blob/main/Novel-PlusSqli1.pdf', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1607
Explain the vulnerability: CVE-2023-1607
A vulnerability was found in novel-plus 3.6.2. It has been classified as critical. This affects an unknown part of the file /common/sysFile/list. The manipulation of the argument sort leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223737 was assigned to this vulnerability. Affected Products: novel-plus References: [{'url': 'https://vuldb.com/?id.223737', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223737', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/1610349395/novel-plus-v3.6.2----SQL-Injection-Vulnerability-/blob/main/novel-plus%20v3.6.2%20--%20%20SQL%20Injection%20Vulnerability%20.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1608
Explain the vulnerability: CVE-2023-1608
A vulnerability was found in Zhong Bang CRMEB Java up to 1.3.4. It has been declared as critical. This vulnerability affects the function getAdminList of the file /api/admin/store/product/list. The manipulation of the argument cateId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-223738 is the identifier assigned to this vulnerability. Affected Products: CRMEB Java References: [{'url': 'https://vuldb.com/?id.223738', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223738', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/crmeb/crmeb_java/issues/11', 'tags': ['exploit', 'issue-tracking']}] CVE State: PUBLISHED
Explain CVE-2023-1609
Explain the vulnerability: CVE-2023-1609
A vulnerability was found in Zhong Bang CRMEB Java up to 1.3.4. It has been rated as problematic. This issue affects the function save of the file /api/admin/store/product/save. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223739. Affected Products: CRMEB Java References: [{'url': 'https://vuldb.com/?id.223739', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223739', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/crmeb/crmeb_java/issues/12', 'tags': ['exploit', 'issue-tracking']}] CVE State: PUBLISHED
Explain CVE-2023-1610
Explain the vulnerability: CVE-2023-1610
A vulnerability, which was classified as critical, has been found in Rebuild up to 3.2.3. Affected by this issue is some unknown functionality of the file /project/tasks/list. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223742 is the identifier assigned to this vulnerability. Affected Products: Rebuild References: [{'url': 'https://vuldb.com/?id.223742', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.223742', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/getrebuild/rebuild/issues/597', 'tags': ['exploit', 'issue-tracking']}] CVE State: PUBLISHED
Explain CVE-2023-1611
Explain the vulnerability: CVE-2023-1611
A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea Affected Products: Kernel References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2181342'}, {'url': 'https://lore.kernel.org/linux-btrfs/35b9a70650ea947387cf352914a8774b4f7e8a6f.1679481128.git.fdmanana%40suse.com/'}, {'name': 'FEDORA-2023-98251cef79', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZWECAZ7V7EPSXMINO6Q6KWNKDY2CO6ZW/'}, {'name': 'FEDORA-2023-d525cf5272', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5QCM6XO4HSPLGR3DFYWFRIA3GCBIHZR4/'}, {'name': '[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html'}, {'url': 'https://github.com/torvalds/linux/commit/2f1a6be12ab6c8470d5776e68644726c94257c54'}] CVE State: PUBLISHED
Explain CVE-2023-1612
Explain the vulnerability: CVE-2023-1612
A vulnerability, which was classified as critical, was found in Rebuild up to 3.2.3. This affects an unknown part of the file /files/list-file. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-223743. Affected Products: Rebuild References: [{'url': 'https://vuldb.com/?id.223743', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.223743', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/getrebuild/rebuild/issues/598', 'tags': ['exploit', 'issue-tracking']}] CVE State: PUBLISHED
Explain CVE-2023-1613
Explain the vulnerability: CVE-2023-1613
A vulnerability has been found in Rebuild up to 3.2.3 and classified as problematic. This vulnerability affects unknown code of the file /feeds/post/publish. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-223744. Affected Products: Rebuild References: [{'url': 'https://vuldb.com/?id.223744', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.223744', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/getrebuild/rebuild/issues/596', 'tags': ['exploit', 'issue-tracking']}] CVE State: PUBLISHED
Explain CVE-2023-1614
Explain the vulnerability: CVE-2023-1614
The WP Custom Author URL WordPress plugin before 1.0.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). Affected Products: WP Custom Author URL References: [{'url': 'https://wpscan.com/vulnerability/56abd1e2-0ea9-47f7-9a1b-2093ac15d39c', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1615
Explain the vulnerability: CVE-2023-1615
The Ultimate Addons for Contact Form 7 plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in versions up to, and including, 3.1.23. This makes it possible for authenticated attackers of any authorization level to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Affected Products: Ultimate Addons for Contact Form 7 References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/817ca119-ddaf-4525-beee-68c4e0aac544?source=cve'}, {'url': 'https://wordpress.org/plugins/ultimate-addons-for-contact-form-7/#developers'}, {'url': 'https://plugins.trac.wordpress.org/browser/ultimate-addons-for-contact-form-7/trunk/addons/database/database.php?rev=2897709#L255'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2901676/'}] CVE State: PUBLISHED
Explain CVE-2023-1616
Explain the vulnerability: CVE-2023-1616
A vulnerability was found in XiaoBingBy TeaCMS up to 2.0.2. It has been classified as problematic. Affected is an unknown function of the component Article Title Handler. The manipulation with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223800. Affected Products: TeaCMS References: [{'url': 'https://vuldb.com/?id.223800', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223800', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/xiaobingby/TeaCMS/issues/I6L9Z2', 'tags': ['exploit', 'issue-tracking']}] CVE State: PUBLISHED
Explain CVE-2023-1617
Explain the vulnerability: CVE-2023-1617
Improper Authentication vulnerability in B&R Industrial Automation B&R VC4 (VNC-Server modules).  This vulnerability may allow an unauthenticated network-based attacker to bypass the authentication mechanism of the VC4 visualization on affected devices. The impact of this vulnerability depends on the functionality provided in the visualization. This issue affects B&R VC4: from 3.* through 3.96.7, from 4.0* through 4.06.7, from 4.1* through 4.16.3, from 4.2* through 4.26.8, from 4.3* through 4.34.6, from 4.4* through 4.45.1, from 4.5* through 4.45.3, from 4.7* through 4.72.9. Affected Products: B&R VC4 References: [{'url': 'https://www.br-automation.com/downloads_br_productcatalogue/assets/1681046878970-en-original-1.0.pdf'}] CVE State: PUBLISHED
Explain CVE-2023-1618
Explain the vulnerability: CVE-2023-1618
Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 all versions allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware. Affected Products: MELSEC WS Series WS0-GETH00200 References: [{'url': 'https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-002_en.pdf'}, {'url': 'https://jvn.jp/vu/JVNVU96063959'}, {'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-138-02'}] CVE State: PUBLISHED
Explain CVE-2023-1619
Explain the vulnerability: CVE-2023-1619
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet. Affected Products: 750-8202/xxx-xxx References: [{'tags': ['vendor-advisory'], 'url': 'https://cert.vde.com/en/advisories/VDE-2023-006/'}] CVE State: PUBLISHED
Explain CVE-2023-1620
Explain the vulnerability: CVE-2023-1620
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime. Affected Products: 750-8202/xxx-xxx References: [{'tags': ['vendor-advisory'], 'url': 'https://cert.vde.com/en/advisories/VDE-2023-006/'}] CVE State: PUBLISHED
Explain CVE-2023-1621
Explain the vulnerability: CVE-2023-1621
An issue has been discovered in GitLab EE affecting all versions starting from 12.0 before 15.10.5, all versions starting from 15.11 before 15.11.1. A malicious group member may continue to commit to projects even from a restricted IP address. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/399774'}, {'url': 'https://hackerone.com/reports/1914049'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1621.json'}] CVE State: PUBLISHED
Explain CVE-2023-1622
Explain the vulnerability: CVE-2023-1622
N\A Affected Products: N\A References: N\A CVE State: REJECTED
Explain CVE-2023-1623
Explain the vulnerability: CVE-2023-1623
The Custom Post Type UI WordPress plugin before 1.13.5 does not properly check for CSRF when sending the debug information to a user supplied email, which could allow attackers to make a logged in admin send such information to an arbitrary email address via a CSRF attack. Affected Products: Custom Post Type UI References: [{'url': 'https://wpscan.com/vulnerability/a04d3808-f4fc-4d77-a1bd-be623cd7053e', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1624
Explain the vulnerability: CVE-2023-1624
The WPCode WordPress plugin before 2.0.9 has a flawed CSRF when deleting log, and does not ensure that the file to be deleted is inside the expected folder. This could allow attackers to make users with the wpcode_activate_snippets capability delete arbitrary log files on the server, including outside of the blog folders Affected Products: WPCode References: [{'url': 'https://wpscan.com/vulnerability/132b70e5-4368-43b4-81f6-2d01bc09dc8f', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1626
Explain the vulnerability: CVE-2023-1626
A vulnerability was found in Jianming Antivirus 16.2.2022.418. It has been declared as critical. This vulnerability affects unknown code in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224008. Affected Products: Antivirus References: [{'url': 'https://vuldb.com/?id.224008', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224008', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned31', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1soMFXUAYkCttFDA_icry6q-irb2jdAxw/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1627
Explain the vulnerability: CVE-2023-1627
A vulnerability was found in Jianming Antivirus 16.2.2022.418. It has been rated as problematic. This issue affects some unknown processing in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier VDB-224009 was assigned to this vulnerability. Affected Products: Antivirus References: [{'url': 'https://vuldb.com/?id.224009', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224009', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned29', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1fQFw8ayQUFzJM2_4V-ld8CN8gvisVoiu/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1628
Explain the vulnerability: CVE-2023-1628
A vulnerability classified as problematic has been found in Jianming Antivirus 16.2.2022.418. Affected is an unknown function in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. VDB-224010 is the identifier assigned to this vulnerability. Affected Products: Antivirus References: [{'url': 'https://vuldb.com/?id.224010', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224010', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned30', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1Div9mElTdsluLrU2etziLYqmXcqQFj1j/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1629
Explain the vulnerability: CVE-2023-1629
A vulnerability classified as critical was found in JiangMin Antivirus 16.2.2022.418. Affected by this vulnerability is the function 0x222010 in the library kvcore.sys of the component IOCTL Handler. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224011. Affected Products: Antivirus References: [{'url': 'https://vuldb.com/?id.224011', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224011', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1629', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1soMFXUAYkCttFDA_icry6q-irb2jdAxw/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1630
Explain the vulnerability: CVE-2023-1630
A vulnerability, which was classified as problematic, has been found in JiangMin Antivirus 16.2.2022.418. Affected by this issue is the function 0x222000 in the library kvcore.sys of the component IOCTL Handler. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224012. Affected Products: Antivirus References: [{'url': 'https://vuldb.com/?id.224012', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224012', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1630', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1fQFw8ayQUFzJM2_4V-ld8CN8gvisVoiu/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1631
Explain the vulnerability: CVE-2023-1631
A vulnerability, which was classified as problematic, was found in JiangMin Antivirus 16.2.2022.418. This affects the function 0x222010 in the library kvcore.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-224013 was assigned to this vulnerability. Affected Products: Antivirus References: [{'url': 'https://vuldb.com/?id.224013', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224013', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1631', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1Div9mElTdsluLrU2etziLYqmXcqQFj1j/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1632
Explain the vulnerability: CVE-2023-1632
** DISPUTED ** A vulnerability has been found in Ellucian Banner Web Tailor 8.6 and classified as critical. This vulnerability affects unknown code of the file /PROD_ar/twbkwbis.P_FirstMenu of the component Login Page. The manipulation of the argument PIDM/WEBID leads to improper authorization. The attack can be initiated remotely. After submitting proper login credentials it becomes possible to generate new valid session identifiers on the OTP page. The real existence of this vulnerability is still doubted at the moment. VDB-224014 is the identifier assigned to this vulnerability. Affected Products: Banner Web Tailor References: [{'url': 'https://vuldb.com/?id.224014', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224014', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-1634
Explain the vulnerability: CVE-2023-1634
A vulnerability was found in OTCMS 6.72. It has been classified as critical. Affected is the function UseCurl of the file /admin/info_deal.php of the component URL Parameter Handler. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224016. Affected Products: OTCMS References: [{'url': 'https://vuldb.com/?id.224016', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224016', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/BigTiger2020/2023-1/blob/main/ssrf/ssrf.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1635
Explain the vulnerability: CVE-2023-1635
A vulnerability was found in OTCMS 6.72. It has been declared as problematic. Affected by this vulnerability is the function AutoRun of the file apiRun.php. The manipulation of the argument mode leads to cross site scripting. The attack can be launched remotely. The identifier VDB-224017 was assigned to this vulnerability. Affected Products: OTCMS References: [{'url': 'https://vuldb.com/?id.224017', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224017', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/BigTiger2020/2023/blob/main/XSS.md', 'tags': ['related']}] CVE State: PUBLISHED
Explain CVE-2023-1637
Explain the vulnerability: CVE-2023-1637
A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks. Affected Products: Kernel References: [{'url': 'https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463'}, {'url': 'https://sourceware.org/bugzilla/show_bug.cgi?id=27398'}] CVE State: PUBLISHED
Explain CVE-2023-1638
Explain the vulnerability: CVE-2023-1638
A vulnerability was found in IObit Malware Fighter 9.4.0.776. It has been rated as problematic. Affected by this issue is the function 0x8001E024/0x8001E040 in the library ImfRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-224018 is the identifier assigned to this vulnerability. Affected Products: Malware Fighter References: [{'url': 'https://vuldb.com/?id.224018', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224018', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1638', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1_jYlCkQMNaUwGV5QJtyz4zhdTqaGCv6Z/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1639
Explain the vulnerability: CVE-2023-1639
A vulnerability classified as problematic has been found in IObit Malware Fighter 9.4.0.776. This affects the function 0x8001E04C in the library ImfRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224019. Affected Products: Malware Fighter References: [{'url': 'https://vuldb.com/?id.224019', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224019', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1639', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1hWgHhboaekq4hGIj2kNgEI54rM-u_rvV/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1640
Explain the vulnerability: CVE-2023-1640
A vulnerability classified as problematic was found in IObit Malware Fighter 9.4.0.776. This vulnerability affects the function 0x222010 in the library ObCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224020. Affected Products: Malware Fighter References: [{'url': 'https://vuldb.com/?id.224020', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224020', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1640', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1AcwSxTA0_zh7mmxU5J8WphRqg_mQsO-g/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1641
Explain the vulnerability: CVE-2023-1641
A vulnerability, which was classified as problematic, has been found in IObit Malware Fighter 9.4.0.776. This issue affects the function 0x222018 in the library ObCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier VDB-224021 was assigned to this vulnerability. Affected Products: Malware Fighter References: [{'url': 'https://vuldb.com/?id.224021', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224021', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1ncqfaxSdeu-mGVAOnYxqxYtyyFZClHBF/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1642
Explain the vulnerability: CVE-2023-1642
A vulnerability, which was classified as problematic, was found in IObit Malware Fighter 9.4.0.776. Affected is the function 0x222034/0x222038/0x22203C/0x222040 in the library ObCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-224022 is the identifier assigned to this vulnerability. Affected Products: Malware Fighter References: [{'url': 'https://vuldb.com/?id.224022', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224022', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1642', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1iWdqJ9PsBp1W5xINpUdQ28xbx_tB9xxf/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1643
Explain the vulnerability: CVE-2023-1643
A vulnerability has been found in IObit Malware Fighter 9.4.0.776 and classified as problematic. Affected by this vulnerability is the function 0x8001E000/0x8001E004/0x8001E018/0x8001E01C/0x8001E024/0x8001E040 in the library ImfHpRegFilter.sys of the component IOCTL Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224023. Affected Products: Malware Fighter References: [{'url': 'https://vuldb.com/?id.224023', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224023', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1643', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1dHdltwenfMdwAPeb3JPex0fHxfK_iLYh/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1644
Explain the vulnerability: CVE-2023-1644
A vulnerability was found in IObit Malware Fighter 9.4.0.776 and classified as problematic. Affected by this issue is the function 0x8018E010 in the library IMFCameraProtect.sys of the component IOCTL Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224024. Affected Products: Malware Fighter References: [{'url': 'https://vuldb.com/?id.224024', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224024', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1644', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1TVezyDiS9Kyw7ttNlLBCstpEUqxozha0/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1645
Explain the vulnerability: CVE-2023-1645
A vulnerability was found in IObit Malware Fighter 9.4.0.776. It has been classified as problematic. This affects the function 0x8018E008 in the library IMFCameraProtect.sys of the component IOCTL Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier VDB-224025 was assigned to this vulnerability. Affected Products: Malware Fighter References: [{'url': 'https://vuldb.com/?id.224025', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224025', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1645', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1RmFSm1sQWwQXPXjkeZtgf8q51hGD8tTf/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1646
Explain the vulnerability: CVE-2023-1646
A vulnerability was found in IObit Malware Fighter 9.4.0.776. It has been declared as critical. This vulnerability affects the function 0x8018E000/0x8018E004 in the library IMFCameraProtect.sys of the component IOCTL Handler. The manipulation leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. VDB-224026 is the identifier assigned to this vulnerability. Affected Products: Malware Fighter References: [{'url': 'https://vuldb.com/?id.224026', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224026', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1646', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1GITWzh29cRcycVqVJgMJuX6emE_f1KPV/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1647
Explain the vulnerability: CVE-2023-1647
Improper Access Control in GitHub repository calcom/cal.com prior to 2.7. Affected Products: calcom/cal.com References: [{'url': 'https://huntr.dev/bounties/d6de3d6e-9551-47d1-b28c-7e965c1b82b6'}, {'url': 'https://github.com/calcom/cal.com/commit/c76e5f46101a826b2de39123c22f50c840dddba0'}] CVE State: PUBLISHED
Explain CVE-2023-1648
Explain the vulnerability: CVE-2023-1648
N\A Affected Products: N\A References: N\A CVE State: REJECTED
Explain CVE-2023-1649
Explain the vulnerability: CVE-2023-1649
The AI ChatBot WordPress plugin before 4.5.1 does not sanitise and escape numerous of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) Affected Products: AI ChatBot References: [{'url': 'https://wpscan.com/vulnerability/ea806115-14ab-4bc4-a272-2141cb14454a', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1650
Explain the vulnerability: CVE-2023-1650
The AI ChatBot WordPress plugin before 4.4.7 unserializes user input from cookies via an AJAX action available to unauthenticated users, which could allow them to perform PHP Object Injection when a suitable gadget is present on the blog Affected Products: AI ChatBot References: [{'url': 'https://wpscan.com/vulnerability/7d7fe498-0aa3-4fa7-b560-610b42b2abed', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1651
Explain the vulnerability: CVE-2023-1651
The AI ChatBot WordPress plugin before 4.4.9 does not have authorisation and CSRF in the AJAX action responsible to update the OpenAI settings, allowing any authenticated users, such as subscriber to update them. Furthermore, due to the lack of escaping of the settings, this could also lead to Stored XSS Affected Products: AI ChatBot References: [{'url': 'https://wpscan.com/vulnerability/c88b22ba-4fc2-49ad-a457-224157521bad', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1652
Explain the vulnerability: CVE-2023-1652
A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem. Affected Products: Linux Kernel References: [{'url': 'https://access.redhat.com/security/cve/cve-2023-1652'}, {'url': 'https://security.netapp.com/advisory/ntap-20230511-0006/'}] CVE State: PUBLISHED
Explain CVE-2023-1654
Explain the vulnerability: CVE-2023-1654
Denial of Service in GitHub repository gpac/gpac prior to 2.4.0. Affected Products: gpac/gpac References: [{'url': 'https://huntr.dev/bounties/33652b56-128f-41a7-afcc-10641f69ff14'}, {'url': 'https://github.com/gpac/gpac/commit/2c055153d401b8c49422971e3a0159869652d3da'}, {'name': 'DSA-5411', 'tags': ['vendor-advisory'], 'url': 'https://www.debian.org/security/2023/dsa-5411'}] CVE State: PUBLISHED
Explain CVE-2023-1655
Explain the vulnerability: CVE-2023-1655
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0. Affected Products: gpac/gpac References: [{'url': 'https://huntr.dev/bounties/05f1d1de-bbfd-43fe-bdf9-7f73419ce7c9'}, {'url': 'https://github.com/gpac/gpac/commit/e7f96c2d3774e4ea25f952bcdf55af1dd6e919f4'}] CVE State: PUBLISHED
Explain CVE-2023-1656
Explain the vulnerability: CVE-2023-1656
Cleartext Transmission of Sensitive Information vulnerability in ForgeRock Inc. OpenIDM and Java Remote Connector Server (RCS) LDAP Connector on Windows, MacOS, Linux allows Remote Services with Stolen Credentials.This issue affects OpenIDM and Java Remote Connector Server (RCS): from 1.5.20.9 through 1.5.20.13. Affected Products: OpenIDM and Java Remote Connector Server (RCS) References: [{'tags': ['vendor-advisory'], 'url': 'https://backstage.forgerock.com/knowledge/kb/article/a14149722'}, {'tags': ['product'], 'url': 'https://backstage.forgerock.com/downloads/browse/idm/all/productId:idm-connectors/subProductId:ldap/minorVersion:1.5/version:1.5.20.14'}] CVE State: PUBLISHED
Explain CVE-2023-1659
Explain the vulnerability: CVE-2023-1659
N\A Affected Products: N\A References: N\A CVE State: REJECTED
Explain CVE-2023-1660
Explain the vulnerability: CVE-2023-1660
The AI ChatBot WordPress plugin before 4.4.9 does not have authorisation and CSRF in a function hooked to init, allowing unauthenticated users to update some settings, leading to Stored XSS due to the lack of escaping when outputting them in the admin dashboard Affected Products: AI ChatBot References: [{'url': 'https://wpscan.com/vulnerability/1a5cbcfc-fa55-433a-a76b-3881b6c4bea2', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1661
Explain the vulnerability: CVE-2023-1661
The Display post meta, term meta, comment meta, and user meta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via post metadata in versions up to, and including, 0.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Affected Products: Display post meta, term meta, comment meta, and user meta References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/6f90c0d8-ede6-4f24-870f-19e888238e93?source=cve'}, {'url': 'https://wordpress.org/plugins/display-metadata/#developers'}] CVE State: PUBLISHED
Explain CVE-2023-1663
Explain the vulnerability: CVE-2023-1663
Coverity versions prior to 2023.3.2 are vulnerable to forced browsing, which exposes authenticated resources to unauthorized actors. The root cause of this vulnerability is an insecurely configured servlet mapping for the underlying Apache Tomcat server. As a result, the downloads directory and its contents are accessible. 5.9 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C) Affected Products: Coverity References: [{'tags': ['vendor-advisory'], 'url': 'https://community.synopsys.com/s/article/SIG-Product-Security-Advisory-CVE-2023-1663-Affecting-Coverity-Platform'}, {'tags': ['mitigation'], 'url': 'https://community.synopsys.com/s/article/Mitigation-for-Coverity-Platforms-Exposure-to-CVE-2023-1663'}] CVE State: PUBLISHED
Explain CVE-2023-1664
Explain the vulnerability: CVE-2023-1664
A flaw was found in Keycloak. This flaw depends on a non-default configuration "Revalidate Client Certificate" to be enabled and the reverse proxy is not validating the certificate before Keycloak. Using this method an attacker may choose the certificate which will be validated by the server. If this happens and the KC_SPI_TRUSTSTORE_FILE_FILE variable is missing/misconfigured, any trustfile may be accepted with the logging information of "Cannot validate client certificate trust: Truststore not available". This may not impact availability as the attacker would have no access to the server, but consumer applications Integrity or Confidentiality may be impacted considering a possible access to them. Considering the environment is correctly set to use "Revalidate Client Certificate" this flaw is avoidable. Affected Products: Keycloak References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2182196&comment#0'}] CVE State: PUBLISHED
Explain CVE-2023-1665
Explain the vulnerability: CVE-2023-1665
Improper Restriction of Excessive Authentication Attempts in GitHub repository linagora/twake prior to 0.0.0. Affected Products: linagora/twake References: [{'url': 'https://huntr.dev/bounties/db8fcbab-6ef0-44ba-b5c6-3b0f17ca22a2'}, {'url': 'https://github.com/linagora/twake/commit/599f397561a771251dfc7cafb8cecda5ab22b8b3'}] CVE State: PUBLISHED
Explain CVE-2023-1666
Explain the vulnerability: CVE-2023-1666
A vulnerability has been found in SourceCodester Automatic Question Paper Generator System 1.0 and classified as critical. This vulnerability affects unknown code of the file users/classes/view_class.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224104. Affected Products: Automatic Question Paper Generator System References: [{'url': 'https://vuldb.com/?id.224104', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224104', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/si-xiao-kai/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1667
Explain the vulnerability: CVE-2023-1667
A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service. Affected Products: libssh References: [{'url': 'https://access.redhat.com/security/cve/CVE-2023-1667'}, {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2182199'}, {'url': 'http://www.libssh.org/security/advisories/CVE-2023-1667.txt'}, {'name': 'FEDORA-2023-5fa5ca2043', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27PD44ALQTZXX7K6JAM3BXBUHYA6DFFN/'}, {'name': '[debian-lts-announce] 20230529 [SECURITY] [DLA 3437-1] libssh security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00029.html'}] CVE State: PUBLISHED
Explain CVE-2023-1668
Explain the vulnerability: CVE-2023-1668
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow. Affected Products: openvswitch References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2137666'}, {'url': 'https://www.openwall.com/lists/oss-security/2023/04/06/1'}, {'name': 'DSA-5387', 'tags': ['vendor-advisory'], 'url': 'https://www.debian.org/security/2023/dsa-5387'}, {'name': 'FEDORA-2023-7da03dc2ae', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2GUNS3WSJG4TUDKZ5L7FXGJMVOD6EJZ/'}, {'name': '[debian-lts-announce] 20230501 [SECURITY] [DLA 3410-1] openvswitch security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00000.html'}] CVE State: PUBLISHED
Explain CVE-2023-1669
Explain the vulnerability: CVE-2023-1669
The SEOPress WordPress plugin before 6.5.0.3 unserializes user input provided via the settings, which could allow high-privilege users such as admin to perform PHP Object Injection when a suitable gadget is present. Affected Products: SEOPress References: [{'url': 'https://wpscan.com/vulnerability/fb8791f5-2879-431e-9afc-06d5839e4b9d', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-1670
Explain the vulnerability: CVE-2023-1670
A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system. Affected Products: Kernel References: [{'url': 'https://lore.kernel.org/all/20230316161526.1568982-1-zyytlz.wz%40163.com/'}, {'name': '[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html'}, {'name': '[debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html'}, {'url': 'https://security.netapp.com/advisory/ntap-20230526-0010/'}] CVE State: PUBLISHED
Explain CVE-2023-1671
Explain the vulnerability: CVE-2023-1671
A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code. Affected Products: Sophos Web Appliance References: [{'url': 'https://www.sophos.com/en-us/security-advisories/sophos-sa-20230404-swa-rce'}, {'url': 'http://packetstormsecurity.com/files/172016/Sophos-Web-Appliance-4.3.10.4-Command-Injection.html'}] CVE State: PUBLISHED
Explain CVE-2023-1672
Explain the vulnerability: CVE-2023-1672
A race condition exists in the Tang server functionality for key generation and key rotation. This flaw results in a small time window where Tang private keys become readable by other processes on the same host. Affected Products: tang References: [{'url': 'https://access.redhat.com/security/cve/CVE-2023-1672', 'tags': ['vdb-entry', 'x_refsource_REDHAT']}, {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2180999', 'name': 'RHBZ#2180999', 'tags': ['issue-tracking', 'x_refsource_REDHAT']}, {'url': 'https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096'}, {'url': 'https://www.openwall.com/lists/oss-security/2023/06/15/1'}] CVE State: PUBLISHED
Explain CVE-2023-1674
Explain the vulnerability: CVE-2023-1674
A vulnerability was found in SourceCodester School Registration and Fee System 1.0 and classified as critical. This issue affects some unknown processing of the file /bilal final/login.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224231. Affected Products: School Registration and Fee System References: [{'url': 'https://vuldb.com/?id.224231', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224231', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/saintone98/bug_report/blob/main/vendors/hemedy99/School%20Registration%20and%20Fee%20System/SQLi-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1675
Explain the vulnerability: CVE-2023-1675
A vulnerability was found in SourceCodester School Registration and Fee System 1.0. It has been classified as critical. Affected is an unknown function of the file /bilal final/edit_stud.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224232. Affected Products: School Registration and Fee System References: [{'url': 'https://vuldb.com/?id.224232', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224232', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/saintone98/bug_report/blob/main/vendors/hemedy99/School%20Registration%20and%20Fee%20System/SQLi-2.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1676
Explain the vulnerability: CVE-2023-1676
A vulnerability was found in DriverGenius 9.70.0.346. It has been declared as critical. Affected by this vulnerability is the function 0x9C402088 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-224233 was assigned to this vulnerability. Affected Products: DriverGenius References: [{'url': 'https://vuldb.com/?id.224233', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224233', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1676', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1kYCec3kYCzD9s2Vnclp_aW5jLneWqHC_/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1677
Explain the vulnerability: CVE-2023-1677
A vulnerability was found in DriverGenius 9.70.0.346. It has been rated as problematic. Affected by this issue is the function 0x9c40a0c8/0x9c40a0dc/0x9c40a0e0/0x9c40a0d8/0x9c4060d4/0x9c402004/0x9c402088/0x9c40208c/0x9c4060d0/0x9c4060cc/0x9c4060c4/0x9c402084 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-224234 is the identifier assigned to this vulnerability. Affected Products: DriverGenius References: [{'url': 'https://vuldb.com/?id.224234', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224234', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1677', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1C7afiLbOOLuYZVeeslPW3AdNeOIwUea9/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1678
Explain the vulnerability: CVE-2023-1678
A vulnerability classified as critical has been found in DriverGenius 9.70.0.346. This affects the function 0x9C40A0D8/0x9C40A0DC/0x9C40A0E0 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224235. Affected Products: DriverGenius References: [{'url': 'https://vuldb.com/?id.224235', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224235', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1678', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1VWI0i6Zq-Fi55kbZI6l3dHCeBq-NOlJc/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1679
Explain the vulnerability: CVE-2023-1679
A vulnerability classified as critical was found in DriverGenius 9.70.0.346. This vulnerability affects the function 0x9C406104/0x9C40A108 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224236. Affected Products: DriverGenius References: [{'url': 'https://vuldb.com/?id.224236', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224236', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1679', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1Iz4VTUUVDveZlgtxN9WkvdygHkD1BUCr/view', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-1680
Explain the vulnerability: CVE-2023-1680
A vulnerability, which was classified as problematic, has been found in Xunrui CMS 4.61. This issue affects some unknown processing of the file /dayrui/My/View/main.html. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224237 was assigned to this vulnerability. Affected Products: CMS References: [{'url': 'https://vuldb.com/?id.224237', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224237', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/2714925725/CMS-bug/blob/main/Informationdisclosure-1.md', 'tags': ['exploit']}] CVE State: PUBLISHED