instruction
stringlengths 21
21
| input
stringlengths 40
40
| output
stringlengths 62
37.3k
|
---|---|---|
Explain CVE-2023-0459 | Explain the vulnerability: CVE-2023-0459 | Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47
Affected Products: Linux Kernel
References: [{'url': 'https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c'}, {'url': 'https://github.com/torvalds/linux/commit/74e19ef0ff8061ef55957c3abd71614ef0f42f47'}]
CVE State: PUBLISHED |
Explain CVE-2023-0460 | Explain the vulnerability: CVE-2023-0460 | The YouTube Embedded 1.2 SDK binds to a service within the YouTube Main App. After binding, a remote context is created with the flags Context.CONTEXT_INCLUDE_CODE | Context.CONTEXT_IGNORE_SECURITY. This allows the client app to remotely load code from YouTube Main App by retrieving the Main App’s ClassLoader. A potential vulnerability in the binding logic used by the client SDK where the SDK ends up calling bindService() on a malicious app rather than YT Main App. This creates a vulnerability where the SDK can load the malicious app’s ClassLoader instead, allowing the malicious app to load arbitrary code into the calling app whenever the embedded SDK is invoked.
In order to trigger this vulnerability, an attacker must masquerade the Youtube app and install it on a device, have a second app that uses the Embedded player and typically distribute both to the victim outside of the Play Store.
Affected Products: YouTube Android Player API SDK
References: [{'url': 'https://developers.google.com/youtube/android/player/downloads'}]
CVE State: PUBLISHED |
Explain CVE-2023-0461 | Explain the vulnerability: CVE-2023-0461 | There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege.
There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock.
When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable.
The setsockopt TCP_ULP operation does not require any privilege.
We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c
Affected Products: Linux Kernel
References: [{'url': 'https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c'}, {'url': 'https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-0463 | Explain the vulnerability: CVE-2023-0463 | The force offline MFA prompt setting is not respected when switching to offline mode in Devolutions Remote Desktop Manager 2022.3.29 to 2022.3.30 allows a user to save sensitive data on disk.
Affected Products: Remote Desktop Manager
References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0001'}]
CVE State: PUBLISHED |
Explain CVE-2023-0464 | Explain the vulnerability: CVE-2023-0464 | A security vulnerability has been identified in all supported versions
of OpenSSL related to the verification of X.509 certificate chains
that include policy constraints. Attackers may be able to exploit this
vulnerability by creating a malicious certificate chain that triggers
exponential use of computational resources, leading to a denial-of-service
(DoS) attack on affected systems.
Policy processing is disabled by default but can be enabled by passing
the `-policy' argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.
Affected Products: OpenSSL
References: [{'name': 'OpenSSL Advisory', 'tags': ['vendor-advisory'], 'url': 'https://www.openssl.org/news/secadv/20230322.txt'}, {'name': '3.1.1 git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2017771e2db3e2b96f89bbe8766c3209f6a99545'}, {'name': '3.0.9 git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=959c59c7a0164117e7f8366466a32bb1f8d77ff1'}, {'name': '1.1.1u git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=879f7080d7e141f415c79eaa3a8ac4a3dad0348b'}, {'name': '1.0.2zh patch (premium)', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2dcd4f1e3115f38cefa43e3efbe9b801c27e642e'}, {'url': 'https://www.debian.org/security/2023/dsa-5417'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-0465 | Explain the vulnerability: CVE-2023-0465 | Applications that use a non-default option when verifying certificates may be
vulnerable to an attack from a malicious CA to circumvent certain checks.
Invalid certificate policies in leaf certificates are silently ignored by
OpenSSL and other certificate policy checks are skipped for that certificate.
A malicious CA could use this to deliberately assert invalid certificate policies
in order to circumvent policy checking on the certificate altogether.
Policy processing is disabled by default but can be enabled by passing
the `-policy' argument to the command line utilities or by calling the
`X509_VERIFY_PARAM_set1_policies()' function.
Affected Products: OpenSSL
References: [{'name': 'OpenSSL Advisory', 'tags': ['vendor-advisory'], 'url': 'https://www.openssl.org/news/secadv/20230328.txt'}, {'name': '3.1.1 git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=facfb1ab745646e97a1920977ae4a9965ea61d5c'}, {'name': '3.0.9 git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb'}, {'name': '1.1.1u git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b013765abfa80036dc779dd0e50602c57bb3bf95'}, {'name': '1.0.2zh patch (premium)', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a'}, {'url': 'https://security.netapp.com/advisory/ntap-20230414-0001/'}, {'url': 'https://www.debian.org/security/2023/dsa-5417'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-0466 | Explain the vulnerability: CVE-2023-0466 | The function X509_VERIFY_PARAM_add0_policy() is documented to
implicitly enable the certificate policy check when doing certificate
verification. However the implementation of the function does not
enable the check which allows certificates with invalid or incorrect
policies to pass the certificate verification.
As suddenly enabling the policy check could break existing deployments it was
decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy()
function.
Instead the applications that require OpenSSL to perform certificate
policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly
enable the policy check by calling X509_VERIFY_PARAM_set_flags() with
the X509_V_FLAG_POLICY_CHECK flag argument.
Certificate policy checks are disabled by default in OpenSSL and are not
commonly used by applications.
Affected Products: OpenSSL
References: [{'name': 'OpenSSL Advisory', 'tags': ['vendor-advisory'], 'url': 'https://www.openssl.org/news/secadv/20230328.txt'}, {'name': '3.1.1 git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc814a30fc4f0bc54fcea7d9a7462f5457aab061'}, {'name': '3.0.9 git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908'}, {'name': '1.1.1u git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0d16b7e99aafc0b4a6d729eec65a411a7e025f0a'}, {'name': '1.0.2zh patch (premium)', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=73398dea26de9899fb4baa94098ad0a61f435c72'}, {'url': 'https://security.netapp.com/advisory/ntap-20230414-0001/'}, {'url': 'https://www.debian.org/security/2023/dsa-5417'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-0467 | Explain the vulnerability: CVE-2023-0467 | The WP Dark Mode WordPress plugin before 4.0.8 does not properly sanitize the style parameter in shortcodes before using it to load a PHP template. This leads to Local File Inclusion on servers where non-existent directories may be traversed, or when chained with another vulnerability allowing arbitrary directory creation.
Affected Products: WP Dark Mode
References: [{'url': 'https://wpscan.com/vulnerability/8eb431a6-59a5-4cee-84e0-156c0b31cfc4', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0468 | Explain the vulnerability: CVE-2023-0468 | A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition of poll_refs. This flaw may cause a NULL pointer dereference.
Affected Products: Kernel
References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2164024'}]
CVE State: PUBLISHED |
Explain CVE-2023-0469 | Explain the vulnerability: CVE-2023-0469 | A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup. This flaw may lead to a denial of service.
Affected Products: Kernel
References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2163723'}]
CVE State: PUBLISHED |
Explain CVE-2023-0470 | Explain the vulnerability: CVE-2023-0470 | Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4.
Affected Products: modoboa/modoboa
References: [{'url': 'https://huntr.dev/bounties/baae3180-b63b-4880-b2af-1a3f30056c2b'}, {'url': 'https://github.com/modoboa/modoboa/commit/354ab6884019009249097a7f3a1881d81ecd2fd2'}]
CVE State: PUBLISHED |
Explain CVE-2023-0471 | Explain the vulnerability: CVE-2023-0471 | Use after free in WebTransport in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html'}, {'url': 'https://crbug.com/1376354'}]
CVE State: PUBLISHED |
Explain CVE-2023-0472 | Explain the vulnerability: CVE-2023-0472 | Use after free in WebRTC in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html'}, {'url': 'https://crbug.com/1405256'}]
CVE State: PUBLISHED |
Explain CVE-2023-0473 | Explain the vulnerability: CVE-2023-0473 | Type Confusion in ServiceWorker API in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html'}, {'url': 'https://crbug.com/1404639'}]
CVE State: PUBLISHED |
Explain CVE-2023-0474 | Explain the vulnerability: CVE-2023-0474 | Use after free in GuestView in Google Chrome prior to 109.0.5414.119 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a Chrome web app. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html'}, {'url': 'https://crbug.com/1400841'}]
CVE State: PUBLISHED |
Explain CVE-2023-0475 | Explain the vulnerability: CVE-2023-0475 | HashiCorp go-getter up to 1.6.2 and 2.1.1 is vulnerable to decompression bombs. Fixed in 1.7.0 and 2.2.0.
Affected Products: go-getter
References: [{'url': 'https://discuss.hashicorp.com/t/hcsec-2023-4-go-getter-vulnerable-to-denial-of-service-via-malicious-compressed-archive/50125'}]
CVE State: PUBLISHED |
Explain CVE-2023-0476 | Explain the vulnerability: CVE-2023-0476 | A LDAP injection vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. An authenticated attacker could generate data in Active Directory using the application account through blind LDAP injection.
Affected Products: Tenable.sc
References: [{'url': 'https://www.tenable.com/security/tns-2023-03'}]
CVE State: PUBLISHED |
Explain CVE-2023-0477 | Explain the vulnerability: CVE-2023-0477 | The Auto Featured Image (Auto Post Thumbnail) WordPress plugin before 3.9.16 includes an AJAX endpoint that allows any user with at least Author privileges to upload arbitrary files, such as PHP files. This is caused by incorrect file extension validation.
Affected Products: Auto Featured Image (Auto Post Thumbnail)
References: [{'url': 'https://wpscan.com/vulnerability/e5ef74a2-e04a-4a14-bd0e-d6910cd1c4b4', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0480 | Explain the vulnerability: CVE-2023-0480 | VitalPBX version 3.2.3-8 allows an unauthenticated external attacker to obtain the instance administrator's account. This is possible because the application is vulnerable to CSRF.
Affected Products: VitalPBX
References: [{'url': 'https://fluidattacks.com/advisories/sharp/'}, {'url': 'https://vitalpbx.com/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0481 | Explain the vulnerability: CVE-2023-0481 | In RestEasy Reactive implementation of Quarkus the insecure File.createTempFile() is used in the FileBodyHandler class which creates temp files with insecure permissions that could be read by a local user.
Affected Products: Quarkus
References: [{'url': 'https://github.com/quarkusio/quarkus/pull/30694'}]
CVE State: PUBLISHED |
Explain CVE-2023-0482 | Explain the vulnerability: CVE-2023-0482 | In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.
Affected Products: RESTEasy
References: [{'url': 'https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56'}, {'url': 'https://security.netapp.com/advisory/ntap-20230427-0001/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0483 | Explain the vulnerability: CVE-2023-0483 | An issue has been discovered in GitLab affecting all versions starting from 12.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. It was possible for a project maintainer to extract a Datadog integration API key by modifying the site.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/389188'}, {'url': 'https://hackerone.com/reports/1836466'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0483.json'}]
CVE State: PUBLISHED |
Explain CVE-2023-0484 | Explain the vulnerability: CVE-2023-0484 | The Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks WordPress plugin before 1.1.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
Affected Products: Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks
References: [{'url': 'https://wpscan.com/vulnerability/e61fb245-0d7f-42b0-9b96-c17ade8c04c5', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0485 | Explain the vulnerability: CVE-2023-0485 | An issue has been discovered in GitLab affecting all versions starting from 13.11 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. It was possible that a project member demoted to a user role to read project updates by doing a diff with a pre-existing fork.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/389191'}, {'url': 'https://hackerone.com/reports/1837937'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0485.json'}]
CVE State: PUBLISHED |
Explain CVE-2023-0486 | Explain the vulnerability: CVE-2023-0486 | VitalPBX version 3.2.3-8 allows an unauthenticated external attacker to obtain the instance's administrator account via a malicious link. This is possible because the application is vulnerable to XSS.
Affected Products: VitalPBX
References: [{'url': 'https://vitalpbx.com/'}, {'url': 'https://fluidattacks.com/advisories/smith/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0487 | Explain the vulnerability: CVE-2023-0487 | The My Sticky Elements WordPress plugin before 2.0.9 does not properly sanitise and escape a parameter before using it in a SQL statement when deleting messages, leading to a SQL injection exploitable by high privilege users such as admin
Affected Products: All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs
References: [{'url': 'https://wpscan.com/vulnerability/0e874a1d-c866-45fa-b456-c8012dca32af', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0488 | Explain the vulnerability: CVE-2023-0488 | Cross-site Scripting (XSS) - Stored in GitHub repository pyload/pyload prior to 0.5.0b3.dev42.
Affected Products: pyload/pyload
References: [{'url': 'https://huntr.dev/bounties/4311d8d7-682c-4f2a-b92c-3f9f1a36255a'}, {'url': 'https://github.com/pyload/pyload/commit/46d75a3087f3237d06530d55998938e2e2bda6bd'}]
CVE State: PUBLISHED |
Explain CVE-2023-0489 | Explain the vulnerability: CVE-2023-0489 | The SlideOnline WordPress plugin through 1.2.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
Affected Products: SlideOnline
References: [{'url': 'https://wpscan.com/vulnerability/238842ee-6392-4eb2-96cb-08e4ece6fca1', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0490 | Explain the vulnerability: CVE-2023-0490 | The f(x) TOC WordPress plugin through 1.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Affected Products: f(x) TOC
References: [{'url': 'https://wpscan.com/vulnerability/9b497d21-f075-41a9-afec-3e24034c8c63', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0491 | Explain the vulnerability: CVE-2023-0491 | The Schedulicity WordPress plugin through 2.21 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Affected Products: Schedulicity
References: [{'url': 'https://wpscan.com/vulnerability/b1a7e8fc-ffcf-493b-9f2d-ffa5d2348b60', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0492 | Explain the vulnerability: CVE-2023-0492 | The GS Products Slider for WooCommerce WordPress plugin before 1.5.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
Affected Products: GS Products Slider for WooCommerce
References: [{'url': 'https://wpscan.com/vulnerability/ea3b129d-32d8-40e3-b1af-8b92a760db23', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0493 | Explain the vulnerability: CVE-2023-0493 | Improper Neutralization of Equivalent Special Elements in GitHub repository btcpayserver/btcpayserver prior to 1.7.5.
Affected Products: btcpayserver/btcpayserver
References: [{'url': 'https://huntr.dev/bounties/3a73b45c-6f3e-4536-a327-cdfdbc59896f'}, {'url': 'https://github.com/btcpayserver/btcpayserver/commit/02070d65836cd24627929b3403efbae8de56039a'}, {'url': 'http://packetstormsecurity.com/files/171732/BTCPay-Server-1.7.4-HTML-Injection.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-0494 | Explain the vulnerability: CVE-2023-0494 | A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.
Affected Products: xorg-x11-server
References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2165995'}, {'url': 'https://lists.x.org/archives/xorg-announce/2023-February/003320.html'}, {'url': 'https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec'}, {'name': 'GLSA-202305-30', 'tags': ['vendor-advisory'], 'url': 'https://security.gentoo.org/glsa/202305-30'}]
CVE State: PUBLISHED |
Explain CVE-2023-0495 | Explain the vulnerability: CVE-2023-0495 | The HT Slider For Elementor WordPress plugin before 1.4.0 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
Affected Products: HT Slider For Elementor
References: [{'url': 'https://wpscan.com/vulnerability/2e3af480-b1a4-404c-b0fc-2b7b6a6b9c27', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0496 | Explain the vulnerability: CVE-2023-0496 | The HT Event WordPress plugin before 1.4.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
Affected Products: HT Event
References: [{'url': 'https://wpscan.com/vulnerability/451b47d5-7bd2-4a82-9c8e-fe6601bcd2ab', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0497 | Explain the vulnerability: CVE-2023-0497 | The HT Portfolio WordPress plugin before 1.1.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
Affected Products: HT Portfolio
References: [{'url': 'https://wpscan.com/vulnerability/ae5b7776-9d0d-4db8-81c3-237b16cd9c62', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0498 | Explain the vulnerability: CVE-2023-0498 | The WP Education WordPress plugin before 1.2.7 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
Affected Products: WP Education
References: [{'url': 'https://wpscan.com/vulnerability/8fa051ad-5b35-46d8-be95-0ac4e73d5eff', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0499 | Explain the vulnerability: CVE-2023-0499 | The QuickSwish WordPress plugin before 1.1.0 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
Affected Products: QuickSwish
References: [{'url': 'https://wpscan.com/vulnerability/9342470a-a0ad-4f0b-b95f-7daa39a6362b', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0500 | Explain the vulnerability: CVE-2023-0500 | The WP Film Studio WordPress plugin before 1.3.5 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
Affected Products: WP Film Studio
References: [{'url': 'https://wpscan.com/vulnerability/95a6a11e-da5d-4fac-aff6-a3f7624682b7', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0501 | Explain the vulnerability: CVE-2023-0501 | The WP Insurance WordPress plugin before 2.1.4 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
Affected Products: WP Insurance
References: [{'url': 'https://wpscan.com/vulnerability/36fd6c0d-3f0c-4f7d-aa17-5b2d084ab94c', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0502 | Explain the vulnerability: CVE-2023-0502 | The WP News WordPress plugin through 1.1.9 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
Affected Products: WP News
References: [{'url': 'https://wpscan.com/vulnerability/c959f4ce-b6ea-4aee-9a98-aa98d2a62138', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0503 | Explain the vulnerability: CVE-2023-0503 | The Free WooCommerce Theme 99fy Extension WordPress plugin before 1.2.8 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
Affected Products: Free WooCommerce Theme 99fy Extension
References: [{'url': 'https://wpscan.com/vulnerability/3cb148fb-1f30-4316-a421-10da51d849f3', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0504 | Explain the vulnerability: CVE-2023-0504 | The HT Politic WordPress plugin before 2.3.8 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
Affected Products: HT Politic
References: [{'url': 'https://wpscan.com/vulnerability/b427841d-a3ad-4e3a-8964-baad90a9aedb', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0505 | Explain the vulnerability: CVE-2023-0505 | The Ever Compare WordPress plugin through 1.2.3 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
Affected Products: Ever Compare
References: [{'url': 'https://wpscan.com/vulnerability/dbabff3e-b021-49ed-aaf3-b73a77d4b354', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0507 | Explain the vulnerability: CVE-2023-0507 | Grafana is an open-source platform for monitoring and observability.
Starting with the 8.1 branch, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap.
The stored XSS vulnerability was possible due to map attributions weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance.
An attacker needs to have the Editor role in order to change a panel to include a map attribution containing JavaScript.
This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard.
Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix.
Affected Products: Grafana
References: [{'url': 'https://grafana.com/security/security-advisories/cve-2023-0507/'}, {'url': 'https://security.netapp.com/advisory/ntap-20230413-0001/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0508 | Explain the vulnerability: CVE-2023-0508 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. Open redirection was possible via HTTP response splitting in the NPM package API.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/389328'}, {'url': 'https://hackerone.com/reports/1842314'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0508.json'}]
CVE State: PUBLISHED |
Explain CVE-2023-0509 | Explain the vulnerability: CVE-2023-0509 | Improper Certificate Validation in GitHub repository pyload/pyload prior to 0.5.0b3.dev44.
Affected Products: pyload/pyload
References: [{'url': 'https://huntr.dev/bounties/a370e0c2-a41c-4871-ad91-bc6f31a8e839'}, {'url': 'https://github.com/pyload/pyload/commit/a9098bdf7406e6faf9df3da6ff2d584e90c13bbb'}]
CVE State: PUBLISHED |
Explain CVE-2023-0511 | Explain the vulnerability: CVE-2023-0511 | Relative Path Traversal vulnerability in ForgeRock Access Management Java Policy Agent allows Authentication Bypass. This issue affects Access Management Java Policy Agent: all versions up to 5.10.1
Affected Products: Access Management Java Policy Agent
References: [{'url': 'https://backstage.forgerock.com/downloads/browse/am/featured/java-agents'}, {'url': 'https://backstage.forgerock.com/knowledge/kb/article/a21576868'}]
CVE State: PUBLISHED |
Explain CVE-2023-0512 | Explain the vulnerability: CVE-2023-0512 | Divide By Zero in GitHub repository vim/vim prior to 9.0.1247.
Affected Products: vim/vim
References: [{'url': 'https://huntr.dev/bounties/de83736a-1936-4872-830b-f1e9b0ad2a74'}, {'url': 'https://github.com/vim/vim/commit/870219c58c0804bdc55419b2e455c06ac715a835'}, {'url': 'https://support.apple.com/kb/HT213677'}, {'url': 'https://support.apple.com/kb/HT213675'}, {'url': 'https://support.apple.com/kb/HT213670'}, {'name': '20230327 APPLE-SA-2023-03-27-3 macOS Ventura 13.3', 'tags': ['mailing-list'], 'url': 'http://seclists.org/fulldisclosure/2023/Mar/17'}, {'name': '20230327 APPLE-SA-2023-03-27-4 macOS Monterey 12.6.4', 'tags': ['mailing-list'], 'url': 'http://seclists.org/fulldisclosure/2023/Mar/18'}, {'name': '20230327 APPLE-SA-2023-03-27-5 macOS Big Sur 11.7.5', 'tags': ['mailing-list'], 'url': 'http://seclists.org/fulldisclosure/2023/Mar/21'}, {'name': 'FEDORA-2023-030318ca00', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0513 | Explain the vulnerability: CVE-2023-0513 | A vulnerability has been found in isoftforce Dreamer CMS up to 4.0.1 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.3 is able to address this issue. It is recommended to upgrade the affected component. VDB-219334 is the identifier assigned to this vulnerability.
Affected Products: Dreamer CMS
References: [{'url': 'https://vuldb.com/?id.219334', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.219334', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/isoftforce/dreamer_cms/issues/I68UYM', 'tags': ['exploit', 'issue-tracking']}, {'url': 'https://gitee.com/isoftforce/dreamer_cms/tree/Latest_Stable_Release_4.1.3', 'tags': ['patch']}]
CVE State: PUBLISHED |
Explain CVE-2023-0514 | Explain the vulnerability: CVE-2023-0514 | The Membership Database WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Affected Products: Membership Database
References: [{'url': 'https://wpscan.com/vulnerability/c6cc400a-9bfb-417d-9206-5582a49d0f05', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0515 | Explain the vulnerability: CVE-2023-0515 | A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0 and classified as critical. This issue affects some unknown processing of the file admin/forget_password.php of the component Parameter Handler. The manipulation of the argument email leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219335.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.219335', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219335', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/admin_forget_password_email.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0516 | Explain the vulnerability: CVE-2023-0516 | A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been classified as critical. Affected is an unknown function of the file user/forget_password.php of the component Parameter Handler. The manipulation of the argument email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219336.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.219336', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219336', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/user_forget_password_email.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0518 | Explain the vulnerability: CVE-2023-0518 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.0 before 15.6.7, all versions starting from 15.7 before 15.7.6, all versions starting from 15.8 before 15.8.1. It was possible to trigger a DoS attack by uploading a malicious Helm chart.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/383082'}, {'url': 'https://hackerone.com/reports/1766973'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0518.json'}]
CVE State: PUBLISHED |
Explain CVE-2023-0519 | Explain the vulnerability: CVE-2023-0519 | Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4.
Affected Products: modoboa/modoboa
References: [{'url': 'https://huntr.dev/bounties/891ad0cb-d12f-4c5e-aac8-d7326caf2129'}, {'url': 'https://github.com/modoboa/modoboa/commit/eef9ab72b5305578a3ad7a7463bd284aa645e98b'}]
CVE State: PUBLISHED |
Explain CVE-2023-0520 | Explain the vulnerability: CVE-2023-0520 | The RapidExpCart WordPress plugin through 1.0 does not sanitize and escape the url parameter in the rapidexpcart endpoint before storing it and outputting it back in the page, leading to a Stored Cross-Site Scripting vulnerability which could be used against high-privilege users such as admin, furthermore lack of csrf protection means an attacker can trick a logged in admin to perform the attack by submitting a hidden form.
Affected Products: RapidExpCart
References: [{'url': 'https://wpscan.com/vulnerability/be4f7ff9-af79-477b-9f47-e40e25a3558e', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0522 | Explain the vulnerability: CVE-2023-0522 | The Enable/Disable Auto Login when Register WordPress plugin through 1.1.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
Affected Products: Enable/Disable Auto Login when Register
References: [{'url': 'https://wpscan.com/vulnerability/c7984bfb-86a3-4530-90ae-17ab39af1c54', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0523 | Explain the vulnerability: CVE-2023-0523 | An issue has been discovered in GitLab affecting all versions starting from 15.6 before 15.8.5, 15.9 before 15.9.4, and 15.10 before 15.10.1. An XSS was possible via a malicious email address for certain instances.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/389487'}, {'url': 'https://hackerone.com/reports/1842867'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0523.json'}]
CVE State: PUBLISHED |
Explain CVE-2023-0524 | Explain the vulnerability: CVE-2023-0524 | As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escalate privileges. We have resolved the issue and also made several defense-in-depth fixes alongside. While the probability of successful exploitation is low, Tenable is committed to securing our customers’ environments and our products. The updates have been distributed via the Tenable plugin feed in feed serial numbers equal to or greater than #202212212055.
Affected Products: Tenable.io, Tenable.sc, Nessus
References: [{'url': 'https://www.tenable.com/security/tns-2023-04'}]
CVE State: PUBLISHED |
Explain CVE-2023-0525 | Explain the vulnerability: CVE-2023-0525 | Weak Encoding for Password vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT27 model versions 01.49.000 and prior, GT25 model versions 01.49.000 and prior, GT23 model versions 01.49.000 and prior, GT21 model versions 01.49.000 and prior, GOT SIMPLE Series GS25 model versions 01.49.000 and prior, GS21 model versions 01.49.000 and prior, GT Designer3 Version1 (GOT2000) versions 1.295H and prior and GT SoftGOT2000 versions 1.295H and prior allows a remote unauthenticated attacker to obtain plaintext passwords by sniffing packets containing encrypted passwords and decrypting the encrypted passwords, in the case of transferring data with GT Designer3 Version1(GOT2000) and GOT2000 Series or GOT SIMPLE Series with the Data Transfer Security function enabled, or in the case of transferring data by the SoftGOT-GOT link function with GT SoftGOT2000 and GOT2000 series with the Data Transfer Security function enabled.
Affected Products: GOT2000 Series GT27 model
References: [{'url': 'https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-008_en.pdf'}, {'url': 'https://jvn.jp/vu/JVNVU95285923/index.html'}, {'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-02'}]
CVE State: PUBLISHED |
Explain CVE-2023-0526 | Explain the vulnerability: CVE-2023-0526 | The Post Shortcode WordPress plugin through 2.0.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
Affected Products: Post Shortcode
References: [{'url': 'https://wpscan.com/vulnerability/0ec58310-243d-40c8-9fa6-8753947bfa89', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0527 | Explain the vulnerability: CVE-2023-0527 | A vulnerability was found in PHPGurukul Online Security Guards Hiring System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file search-request.php. The manipulation of the argument searchdata with the input "><script>alert(document.domain)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219596.
Affected Products: Online Security Guards Hiring System
References: [{'url': 'https://vuldb.com/?id.219596', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219596', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ctflearner/Vulnerability/blob/main/Online-Security-guard-POC.md', 'tags': ['exploit']}, {'url': 'http://packetstormsecurity.com/files/172667/Online-Security-Guards-Hiring-System-1.0-Cross-Site-Scripting.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-0528 | Explain the vulnerability: CVE-2023-0528 | A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been classified as critical. This affects an unknown part of the file admin/abc.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219597 was assigned to this vulnerability.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.219597', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219597', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/admin_abc_id.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0529 | Explain the vulnerability: CVE-2023-0529 | A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file admin/add_payment.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-219598 is the identifier assigned to this vulnerability.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.219598', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219598', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/_admin_add_payment_id.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0530 | Explain the vulnerability: CVE-2023-0530 | A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin/approve_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219599.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.219599', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219599', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/admin_approve_user_id.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0531 | Explain the vulnerability: CVE-2023-0531 | A vulnerability classified as critical has been found in SourceCodester Online Tours & Travels Management System 1.0. Affected is an unknown function of the file admin/booking_report.php. The manipulation of the argument to_date leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219600.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.219600', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219600', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/tototo_date.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0532 | Explain the vulnerability: CVE-2023-0532 | A vulnerability classified as critical was found in SourceCodester Online Tours & Travels Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/disapprove_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219601 was assigned to this vulnerability.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.219601', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219601', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/admin_disapprove_user_id.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0533 | Explain the vulnerability: CVE-2023-0533 | A vulnerability, which was classified as critical, has been found in SourceCodester Online Tours & Travels Management System 1.0. Affected by this issue is some unknown functionality of the file admin/expense_report.php. The manipulation of the argument from_date leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-219602 is the identifier assigned to this vulnerability.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.219602', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219602', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/admin_expense_report_from_date.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0534 | Explain the vulnerability: CVE-2023-0534 | A vulnerability, which was classified as critical, was found in SourceCodester Online Tours & Travels Management System 1.0. This affects an unknown part of the file admin/expense_report.php. The manipulation of the argument to_date leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219603.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.219603', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219603', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/admin_expense_report_to_date.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0535 | Explain the vulnerability: CVE-2023-0535 | The Donation Block For PayPal WordPress plugin before 2.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Affected Products: Donation Block For PayPal
References: [{'url': 'https://wpscan.com/vulnerability/8c50321a-dba8-4379-9b9c-4c349e44b2ed', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0536 | Explain the vulnerability: CVE-2023-0536 | The Wp-D3 WordPress plugin through 2.4.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Affected Products: Wp-D3
References: [{'url': 'https://wpscan.com/vulnerability/7b19d792-8083-4c0c-a45e-a99c1f5f0df0', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0537 | Explain the vulnerability: CVE-2023-0537 | The Product Slider For WooCommerce Lite WordPress plugin through 1.1.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
Affected Products: Product Slider For WooCommerce Lite
References: [{'url': 'https://wpscan.com/vulnerability/d7369f1d-d1a0-4576-a676-c70525a6c743', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0538 | Explain the vulnerability: CVE-2023-0538 | The Campaign URL Builder WordPress plugin before 1.8.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
Affected Products: Campaign URL Builder
References: [{'url': 'https://wpscan.com/vulnerability/4869fdc7-4fc7-4917-bc00-b6ced9ccc871', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0539 | Explain the vulnerability: CVE-2023-0539 | The GS Insever Portfolio WordPress plugin before 1.4.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Affected Products: GS Insever Portfolio
References: [{'url': 'https://wpscan.com/vulnerability/a4b6a83a-6394-4dfc-8bb3-4982867dab7d', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0540 | Explain the vulnerability: CVE-2023-0540 | The GS Filterable Portfolio WordPress plugin before 1.6.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Affected Products: GS Filterable Portfolio
References: [{'url': 'https://wpscan.com/vulnerability/b35b3da2-468d-4fe5-bff6-812432197a38', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0541 | Explain the vulnerability: CVE-2023-0541 | The GS Books Showcase WordPress plugin before 1.3.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Affected Products: GS Books Showcase
References: [{'url': 'https://wpscan.com/vulnerability/8453e587-cc8c-491a-af09-fc4ab215134b', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0542 | Explain the vulnerability: CVE-2023-0542 | The Custom Post Type List Shortcode WordPress plugin through 1.4.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
Affected Products: Custom Post Type List Shortcode
References: [{'url': 'https://wpscan.com/vulnerability/17de2f77-3e6c-4c22-9196-6e5577ee7fcf', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0543 | Explain the vulnerability: CVE-2023-0543 | The Arigato Autoresponder and Newsletter WordPress plugin before 2.1.7.2 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Affected Products: Arigato Autoresponder and Newsletter
References: [{'url': 'https://wpscan.com/vulnerability/e3771938-40b5-4e8b-bb5a-847131a2b4a7', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0544 | Explain the vulnerability: CVE-2023-0544 | The WP Login Box WordPress plugin through 2.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Affected Products: WP Login Box
References: [{'url': 'https://wpscan.com/vulnerability/8ef9585f-67d7-4651-977a-fcad113882bd', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0545 | Explain the vulnerability: CVE-2023-0545 | The Hostel WordPress plugin before 1.1.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Affected Products: Hostel
References: [{'url': 'https://wpscan.com/vulnerability/b604afc8-61d0-4e98-8950-f3d29f9e9ee1', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0546 | Explain the vulnerability: CVE-2023-0546 | The Contact Form Plugin WordPress plugin before 4.3.25 does not properly sanitize and escape the srcdoc attribute in iframes in it's custom HTML field type, allowing a logged in user with roles as low as contributor to inject arbitrary javascript into a form which will trigger for any visitor to the form or admins previewing or editing the form.
Affected Products: Contact Form Plugin
References: [{'url': 'https://wpscan.com/vulnerability/078f33cd-0f5c-46fe-b858-2107a09c6b69', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0547 | Explain the vulnerability: CVE-2023-0547 | OCSP revocation status of recipient certificates was not checked when sending S/Mime encrypted email, and revoked certificates would be accepted. Thunderbird versions from 68 to 102.9.1 were affected by this bug. This vulnerability affects Thunderbird < 102.10.
Affected Products: Thunderbird
References: [{'url': 'https://www.mozilla.org/security/advisories/mfsa2023-15/'}, {'url': 'https://bugzilla.mozilla.org/show_bug.cgi?id=1811298'}]
CVE State: PUBLISHED |
Explain CVE-2023-0548 | Explain the vulnerability: CVE-2023-0548 | The Namaste! LMS WordPress plugin before 2.5.9.4 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Affected Products: Namaste! LMS
References: [{'url': 'https://wpscan.com/vulnerability/b6c1ed7a-5b2d-4985-847d-56586b1aae9b', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0549 | Explain the vulnerability: CVE-2023-0549 | A vulnerability, which was classified as problematic, has been found in YAFNET up to 3.1.10. This issue affects some unknown processing of the file /forum/PostPrivateMessage of the component Private Message Handler. The manipulation of the argument subject/message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.11 is able to address this issue. The name of the patch is 2237a9d552e258a43570bb478a92a5505e7c8797. It is recommended to upgrade the affected component. The identifier VDB-219665 was assigned to this vulnerability.
Affected Products: YAFNET
References: [{'url': 'https://vuldb.com/?id.219665', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219665', 'tags': ['signature', 'permissions-required']}, {'url': 'https://drive.google.com/drive/folders/1ct6Tp_cnsYO8L_JSvlBCf_Ae7KW3JAcD?usp=sharing', 'tags': ['exploit']}, {'url': 'https://github.com/YAFNET/YAFNET/security/advisories/GHSA-4hwx-678w-9cp5', 'tags': ['related']}, {'url': 'https://github.com/YAFNET/YAFNET/commit/2237a9d552e258a43570bb478a92a5505e7c8797', 'tags': ['patch']}, {'url': 'https://github.com/YAFNET/YAFNET/releases/tag/v3.1.11', 'tags': ['patch']}]
CVE State: PUBLISHED |
Explain CVE-2023-0550 | Explain the vulnerability: CVE-2023-0550 | The Quick Restaurant Menu plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 2.0.2. This is due to the fact that during menu item deletion/modification, the plugin does not verify that the post ID provided to the AJAX action is indeed a menu item. This makes it possible for authenticated attackers, with subscriber-level access or higher, to modify or delete arbitrary posts.
Affected Products: Quick Restaurant Menu
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/faa4fba5-cd19-4b96-aa09-07ed6d52a107'}, {'url': 'https://plugins.trac.wordpress.org/browser/quick-restaurant-menu/tags/2.0.2/includes/admin/ajax-functions.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2851871/quick-restaurant-menu/trunk?contextall=1&old=2788636&old_path=%2Fquick-restaurant-menu%2Ftrunk'}]
CVE State: PUBLISHED |
Explain CVE-2023-0552 | Explain the vulnerability: CVE-2023-0552 | The Registration Forms WordPress plugin before 3.8.2.3 does not properly validate the redirection URL when logging in and login out, leading to an Open Redirect vulnerability
Affected Products: Registration Forms
References: [{'url': 'https://wpscan.com/vulnerability/832c6155-a413-4641-849c-b98ba55e8551', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0553 | Explain the vulnerability: CVE-2023-0553 | The Quick Restaurant Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters in versions up to, and including, 2.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected Products: Quick Restaurant Menu
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/cfd8a6a4-9159-480f-abe2-71972585217b'}, {'url': 'https://plugins.trac.wordpress.org/browser/quick-restaurant-menu/tags/2.0.2/includes/admin/settings/settings.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2851871/quick-restaurant-menu/trunk?contextall=1&old=2788636&old_path=%2Fquick-restaurant-menu%2Ftrunk'}]
CVE State: PUBLISHED |
Explain CVE-2023-0554 | Explain the vulnerability: CVE-2023-0554 | The Quick Restaurant Menu plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.2. This is due to missing or incorrect nonce validation on its AJAX actions. This makes it possible for unauthenticated attackers to update menu items, via forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected Products: Quick Restaurant Menu
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/bfc7c214-8d76-453c-a05d-682aa425b06e'}, {'url': 'https://plugins.trac.wordpress.org/browser/quick-restaurant-menu/tags/2.0.2/includes/admin/ajax-functions.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2851871/quick-restaurant-menu/trunk?contextall=1&old=2788636&old_path=%2Fquick-restaurant-menu%2Ftrunk'}]
CVE State: PUBLISHED |
Explain CVE-2023-0555 | Explain the vulnerability: CVE-2023-0555 | The Quick Restaurant Menu plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on its AJAX actions in versions up to, and including, 2.0.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke those actions intended for administrator use. Actions include menu item creation, update and deletion and other menu management functions. Since the plugin does not verify that a post ID passed to one of its AJAX actions belongs to a menu item, this can lead to arbitrary post deletion/alteration.
Affected Products: Quick Restaurant Menu
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/97984c7d-d6ff-480c-acfe-20ab0eb04141'}, {'url': 'https://plugins.trac.wordpress.org/browser/quick-restaurant-menu/tags/2.0.2/includes/admin/ajax-functions.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2851871/quick-restaurant-menu/trunk?contextall=1&old=2788636&old_path=%2Fquick-restaurant-menu%2Ftrunk'}]
CVE State: PUBLISHED |
Explain CVE-2023-0556 | Explain the vulnerability: CVE-2023-0556 | The ContentStudio plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several functions in versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to obtain the blog metadata (via the function cstu_get_metadata) that includes the plugin's contentstudio_token. Knowing this token allows for other interactions with the plugin such as creating posts in versions prior to 1.2.5, which added other requirements to posting and updating.
Affected Products: ContentStudio
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/52db8d41-859a-4d68-8b83-3d3af8f1bf64'}, {'url': 'https://plugins.trac.wordpress.org/browser/contentstudio/tags/1.2.1/contentstudio-plugin.php#L517'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2851006%40contentstudio%2Ftrunk&old=2844028%40contentstudio%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0557 | Explain the vulnerability: CVE-2023-0557 | The ContentStudio plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 1.2.5. This could allow unauthenticated attackers to obtain a nonce needed for the creation of posts.
Affected Products: ContentStudio
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/62eb136f-3cb0-40dc-a154-015a7fa1077b'}, {'url': 'https://plugins.trac.wordpress.org/browser/contentstudio/trunk/contentstudio-plugin.php#L709'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2851006%40contentstudio%2Ftrunk&old=2844028%40contentstudio%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0558 | Explain the vulnerability: CVE-2023-0558 | The ContentStudio plugin for WordPress is vulnerable to authorization bypass due to an unsecure token check that is susceptible to type juggling in versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to execute functions intended for use by users with proper API keys.
Affected Products: ContentStudio
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/c31828dc-ef94-4895-8395-a5d52a0a82bd'}, {'url': 'https://plugins.trac.wordpress.org/browser/contentstudio/trunk/contentstudio-plugin.php#L416'}, {'url': 'https://ti.wordfence.io/vulnerabilities/52db8d41-859a-4d68-8b83-3d3af8f1bf64'}]
CVE State: PUBLISHED |
Explain CVE-2023-0559 | Explain the vulnerability: CVE-2023-0559 | The GS Portfolio for Envato WordPress plugin before 1.4.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embedded, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
Affected Products: GS Portfolio for Envato
References: [{'url': 'https://wpscan.com/vulnerability/e5549261-66e2-4a5e-8781-bc555b629ccc', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0560 | Explain the vulnerability: CVE-2023-0560 | A vulnerability, which was classified as critical, has been found in SourceCodester Online Tours & Travels Management System 1.0. This issue affects some unknown processing of the file admin/practice_pdf.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219701 was assigned to this vulnerability.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.219701', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219701', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/admin_practice_pdf_id.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0561 | Explain the vulnerability: CVE-2023-0561 | A vulnerability, which was classified as critical, was found in SourceCodester Online Tours & Travels Management System 1.0. Affected is an unknown function of the file /user/s.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-219702 is the identifier assigned to this vulnerability.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.219702', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219702', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/_user_s_id.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0562 | Explain the vulnerability: CVE-2023-0562 | A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219716.
Affected Products: Bank Locker Management System
References: [{'url': 'https://vuldb.com/?id.219716', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219716', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/Bank%20Locker%20Management%20System-SQL%20.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0563 | Explain the vulnerability: CVE-2023-0563 | A vulnerability classified as problematic has been found in PHPGurukul Bank Locker Management System 1.0. This affects an unknown part of the file add-locker-form.php of the component Assign Locker. The manipulation of the argument ahname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219717 was assigned to this vulnerability.
Affected Products: Bank Locker Management System
References: [{'url': 'https://vuldb.com/?id.219717', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219717', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/BLMS_XSS_IN_ADMIN_BROWSER.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0564 | Explain the vulnerability: CVE-2023-0564 | Weak Password Requirements in GitHub repository froxlor/froxlor prior to 2.0.10.
Affected Products: froxlor/froxlor
References: [{'url': 'https://huntr.dev/bounties/a4f86d6f-0d5d-428d-a4b3-551b20a21ce6'}, {'url': 'https://github.com/froxlor/froxlor/commit/2a84e9c1207fd3d792b7fb198fd0c66fe1a66a7a'}]
CVE State: PUBLISHED |
Explain CVE-2023-0565 | Explain the vulnerability: CVE-2023-0565 | Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.10.
Affected Products: froxlor/froxlor
References: [{'url': 'https://huntr.dev/bounties/12d78294-1723-4450-a239-023952666102'}, {'url': 'https://github.com/froxlor/froxlor/commit/2feb8020941a82bfb4ac68890f6ced0e5b3c4a15'}]
CVE State: PUBLISHED |
Explain CVE-2023-0566 | Explain the vulnerability: CVE-2023-0566 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in froxlor/froxlor prior to 2.0.10.
Affected Products: froxlor/froxlor
References: [{'url': 'https://huntr.dev/bounties/8339e4f1-d430-4845-81b5-36dd9fcdac49'}, {'url': 'https://github.com/froxlor/froxlor/commit/bd5b99dc1c06f594b9563d459a50bf3b32504876'}]
CVE State: PUBLISHED |