instruction
stringlengths
21
21
input
stringlengths
40
40
output
stringlengths
62
37.3k
Explain CVE-2023-0459
Explain the vulnerability: CVE-2023-0459
Copy_from_user on 64-bit versions of the Linux kernel does not implement the __uaccess_begin_nospec allowing a user to bypass the "access_ok" check and pass a kernel pointer to copy_from_user(). This would allow an attacker to leak information. We recommend upgrading beyond commit 74e19ef0ff8061ef55957c3abd71614ef0f42f47 Affected Products: Linux Kernel References: [{'url': 'https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c'}, {'url': 'https://github.com/torvalds/linux/commit/74e19ef0ff8061ef55957c3abd71614ef0f42f47'}] CVE State: PUBLISHED
Explain CVE-2023-0460
Explain the vulnerability: CVE-2023-0460
The YouTube Embedded 1.2 SDK binds to a service within the YouTube Main App. After binding, a remote context is created with the flags Context.CONTEXT_INCLUDE_CODE | Context.CONTEXT_IGNORE_SECURITY. This allows the client app to remotely load code from YouTube Main App by retrieving the Main App’s ClassLoader. A potential vulnerability in the binding logic used by the client SDK where the SDK ends up calling bindService() on a malicious app rather than YT Main App. This creates a vulnerability where the SDK can load the malicious app’s ClassLoader instead, allowing the malicious app to load arbitrary code into the calling app whenever the embedded SDK is invoked. In order to trigger this vulnerability, an attacker must masquerade the Youtube app and install it on a device, have a second app that uses the Embedded player and typically distribute both to the victim outside of the Play Store. Affected Products: YouTube Android Player API SDK References: [{'url': 'https://developers.google.com/youtube/android/player/downloads'}] CVE State: PUBLISHED
Explain CVE-2023-0461
Explain the vulnerability: CVE-2023-0461
There is a use-after-free vulnerability in the Linux Kernel which can be exploited to achieve local privilege escalation. To reach the vulnerability kernel configuration flag CONFIG_TLS or CONFIG_XFRM_ESPINTCP has to be configured, but the operation does not require any privilege. There is a use-after-free bug of icsk_ulp_data of a struct inet_connection_sock. When CONFIG_TLS is enabled, user can install a tls context (struct tls_context) on a connected tcp socket. The context is not cleared if this socket is disconnected and reused as a listener. If a new socket is created from the listener, the context is inherited and vulnerable. The setsockopt TCP_ULP operation does not require any privilege. We recommend upgrading past commit 2c02d41d71f90a5168391b6a5f2954112ba2307c Affected Products: Linux Kernel References: [{'url': 'https://kernel.dance/#2c02d41d71f90a5168391b6a5f2954112ba2307c'}, {'url': 'https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html'}] CVE State: PUBLISHED
Explain CVE-2023-0463
Explain the vulnerability: CVE-2023-0463
The force offline MFA prompt setting is not respected when switching to offline mode in Devolutions Remote Desktop Manager 2022.3.29 to 2022.3.30 allows a user to save sensitive data on disk. Affected Products: Remote Desktop Manager References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0001'}] CVE State: PUBLISHED
Explain CVE-2023-0464
Explain the vulnerability: CVE-2023-0464
A security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function. Affected Products: OpenSSL References: [{'name': 'OpenSSL Advisory', 'tags': ['vendor-advisory'], 'url': 'https://www.openssl.org/news/secadv/20230322.txt'}, {'name': '3.1.1 git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2017771e2db3e2b96f89bbe8766c3209f6a99545'}, {'name': '3.0.9 git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=959c59c7a0164117e7f8366466a32bb1f8d77ff1'}, {'name': '1.1.1u git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=879f7080d7e141f415c79eaa3a8ac4a3dad0348b'}, {'name': '1.0.2zh patch (premium)', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2dcd4f1e3115f38cefa43e3efbe9b801c27e642e'}, {'url': 'https://www.debian.org/security/2023/dsa-5417'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html'}] CVE State: PUBLISHED
Explain CVE-2023-0465
Explain the vulnerability: CVE-2023-0465
Applications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function. Affected Products: OpenSSL References: [{'name': 'OpenSSL Advisory', 'tags': ['vendor-advisory'], 'url': 'https://www.openssl.org/news/secadv/20230328.txt'}, {'name': '3.1.1 git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=facfb1ab745646e97a1920977ae4a9965ea61d5c'}, {'name': '3.0.9 git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb'}, {'name': '1.1.1u git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b013765abfa80036dc779dd0e50602c57bb3bf95'}, {'name': '1.0.2zh patch (premium)', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a'}, {'url': 'https://security.netapp.com/advisory/ntap-20230414-0001/'}, {'url': 'https://www.debian.org/security/2023/dsa-5417'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html'}] CVE State: PUBLISHED
Explain CVE-2023-0466
Explain the vulnerability: CVE-2023-0466
The function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications. Affected Products: OpenSSL References: [{'name': 'OpenSSL Advisory', 'tags': ['vendor-advisory'], 'url': 'https://www.openssl.org/news/secadv/20230328.txt'}, {'name': '3.1.1 git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc814a30fc4f0bc54fcea7d9a7462f5457aab061'}, {'name': '3.0.9 git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908'}, {'name': '1.1.1u git commit', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0d16b7e99aafc0b4a6d729eec65a411a7e025f0a'}, {'name': '1.0.2zh patch (premium)', 'tags': ['patch'], 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=73398dea26de9899fb4baa94098ad0a61f435c72'}, {'url': 'https://security.netapp.com/advisory/ntap-20230414-0001/'}, {'url': 'https://www.debian.org/security/2023/dsa-5417'}, {'url': 'https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html'}] CVE State: PUBLISHED
Explain CVE-2023-0467
Explain the vulnerability: CVE-2023-0467
The WP Dark Mode WordPress plugin before 4.0.8 does not properly sanitize the style parameter in shortcodes before using it to load a PHP template. This leads to Local File Inclusion on servers where non-existent directories may be traversed, or when chained with another vulnerability allowing arbitrary directory creation. Affected Products: WP Dark Mode References: [{'url': 'https://wpscan.com/vulnerability/8eb431a6-59a5-4cee-84e0-156c0b31cfc4', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0468
Explain the vulnerability: CVE-2023-0468
A use-after-free flaw was found in io_uring/poll.c in io_poll_check_events in the io_uring subcomponent in the Linux Kernel due to a race condition of poll_refs. This flaw may cause a NULL pointer dereference. Affected Products: Kernel References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2164024'}] CVE State: PUBLISHED
Explain CVE-2023-0469
Explain the vulnerability: CVE-2023-0469
A use-after-free flaw was found in io_uring/filetable.c in io_install_fixed_file in the io_uring subcomponent in the Linux Kernel during call cleanup. This flaw may lead to a denial of service. Affected Products: Kernel References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2163723'}] CVE State: PUBLISHED
Explain CVE-2023-0470
Explain the vulnerability: CVE-2023-0470
Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4. Affected Products: modoboa/modoboa References: [{'url': 'https://huntr.dev/bounties/baae3180-b63b-4880-b2af-1a3f30056c2b'}, {'url': 'https://github.com/modoboa/modoboa/commit/354ab6884019009249097a7f3a1881d81ecd2fd2'}] CVE State: PUBLISHED
Explain CVE-2023-0471
Explain the vulnerability: CVE-2023-0471
Use after free in WebTransport in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html'}, {'url': 'https://crbug.com/1376354'}] CVE State: PUBLISHED
Explain CVE-2023-0472
Explain the vulnerability: CVE-2023-0472
Use after free in WebRTC in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html'}, {'url': 'https://crbug.com/1405256'}] CVE State: PUBLISHED
Explain CVE-2023-0473
Explain the vulnerability: CVE-2023-0473
Type Confusion in ServiceWorker API in Google Chrome prior to 109.0.5414.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html'}, {'url': 'https://crbug.com/1404639'}] CVE State: PUBLISHED
Explain CVE-2023-0474
Explain the vulnerability: CVE-2023-0474
Use after free in GuestView in Google Chrome prior to 109.0.5414.119 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a Chrome web app. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/01/stable-channel-update-for-desktop_24.html'}, {'url': 'https://crbug.com/1400841'}] CVE State: PUBLISHED
Explain CVE-2023-0475
Explain the vulnerability: CVE-2023-0475
HashiCorp go-getter up to 1.6.2 and 2.1.1 is vulnerable to decompression bombs. Fixed in 1.7.0 and 2.2.0. Affected Products: go-getter References: [{'url': 'https://discuss.hashicorp.com/t/hcsec-2023-4-go-getter-vulnerable-to-denial-of-service-via-malicious-compressed-archive/50125'}] CVE State: PUBLISHED
Explain CVE-2023-0476
Explain the vulnerability: CVE-2023-0476
A LDAP injection vulnerability exists in Tenable.sc due to improper validation of user-supplied input before returning it to users. An authenticated attacker could generate data in Active Directory using the application account through blind LDAP injection. Affected Products: Tenable.sc References: [{'url': 'https://www.tenable.com/security/tns-2023-03'}] CVE State: PUBLISHED
Explain CVE-2023-0477
Explain the vulnerability: CVE-2023-0477
The Auto Featured Image (Auto Post Thumbnail) WordPress plugin before 3.9.16 includes an AJAX endpoint that allows any user with at least Author privileges to upload arbitrary files, such as PHP files. This is caused by incorrect file extension validation. Affected Products: Auto Featured Image (Auto Post Thumbnail) References: [{'url': 'https://wpscan.com/vulnerability/e5ef74a2-e04a-4a14-bd0e-d6910cd1c4b4', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0480
Explain the vulnerability: CVE-2023-0480
VitalPBX version 3.2.3-8 allows an unauthenticated external attacker to obtain the instance administrator's account. This is possible because the application is vulnerable to CSRF. Affected Products: VitalPBX References: [{'url': 'https://fluidattacks.com/advisories/sharp/'}, {'url': 'https://vitalpbx.com/'}] CVE State: PUBLISHED
Explain CVE-2023-0481
Explain the vulnerability: CVE-2023-0481
In RestEasy Reactive implementation of Quarkus the insecure File.createTempFile() is used in the FileBodyHandler class which creates temp files with insecure permissions that could be read by a local user. Affected Products: Quarkus References: [{'url': 'https://github.com/quarkusio/quarkus/pull/30694'}] CVE State: PUBLISHED
Explain CVE-2023-0482
Explain the vulnerability: CVE-2023-0482
In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user. Affected Products: RESTEasy References: [{'url': 'https://github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56'}, {'url': 'https://security.netapp.com/advisory/ntap-20230427-0001/'}] CVE State: PUBLISHED
Explain CVE-2023-0483
Explain the vulnerability: CVE-2023-0483
An issue has been discovered in GitLab affecting all versions starting from 12.1 before 15.7.8, all versions starting from 15.8 before 15.8.4, all versions starting from 15.9 before 15.9.2. It was possible for a project maintainer to extract a Datadog integration API key by modifying the site. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/389188'}, {'url': 'https://hackerone.com/reports/1836466'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0483.json'}] CVE State: PUBLISHED
Explain CVE-2023-0484
Explain the vulnerability: CVE-2023-0484
The Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks WordPress plugin before 1.1.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack Affected Products: Contact Form 7 Widget For Elementor Page Builder & Gutenberg Blocks References: [{'url': 'https://wpscan.com/vulnerability/e61fb245-0d7f-42b0-9b96-c17ade8c04c5', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0485
Explain the vulnerability: CVE-2023-0485
An issue has been discovered in GitLab affecting all versions starting from 13.11 before 15.8.5, all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. It was possible that a project member demoted to a user role to read project updates by doing a diff with a pre-existing fork. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/389191'}, {'url': 'https://hackerone.com/reports/1837937'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0485.json'}] CVE State: PUBLISHED
Explain CVE-2023-0486
Explain the vulnerability: CVE-2023-0486
VitalPBX version 3.2.3-8 allows an unauthenticated external attacker to obtain the instance's administrator account via a malicious link. This is possible because the application is vulnerable to XSS. Affected Products: VitalPBX References: [{'url': 'https://vitalpbx.com/'}, {'url': 'https://fluidattacks.com/advisories/smith/'}] CVE State: PUBLISHED
Explain CVE-2023-0487
Explain the vulnerability: CVE-2023-0487
The My Sticky Elements WordPress plugin before 2.0.9 does not properly sanitise and escape a parameter before using it in a SQL statement when deleting messages, leading to a SQL injection exploitable by high privilege users such as admin Affected Products: All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs References: [{'url': 'https://wpscan.com/vulnerability/0e874a1d-c866-45fa-b456-c8012dca32af', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0488
Explain the vulnerability: CVE-2023-0488
Cross-site Scripting (XSS) - Stored in GitHub repository pyload/pyload prior to 0.5.0b3.dev42. Affected Products: pyload/pyload References: [{'url': 'https://huntr.dev/bounties/4311d8d7-682c-4f2a-b92c-3f9f1a36255a'}, {'url': 'https://github.com/pyload/pyload/commit/46d75a3087f3237d06530d55998938e2e2bda6bd'}] CVE State: PUBLISHED
Explain CVE-2023-0489
Explain the vulnerability: CVE-2023-0489
The SlideOnline WordPress plugin through 1.2.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks Affected Products: SlideOnline References: [{'url': 'https://wpscan.com/vulnerability/238842ee-6392-4eb2-96cb-08e4ece6fca1', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0490
Explain the vulnerability: CVE-2023-0490
The f(x) TOC WordPress plugin through 1.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. Affected Products: f(x) TOC References: [{'url': 'https://wpscan.com/vulnerability/9b497d21-f075-41a9-afec-3e24034c8c63', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0491
Explain the vulnerability: CVE-2023-0491
The Schedulicity WordPress plugin through 2.21 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. Affected Products: Schedulicity References: [{'url': 'https://wpscan.com/vulnerability/b1a7e8fc-ffcf-493b-9f2d-ffa5d2348b60', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0492
Explain the vulnerability: CVE-2023-0492
The GS Products Slider for WooCommerce WordPress plugin before 1.5.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks Affected Products: GS Products Slider for WooCommerce References: [{'url': 'https://wpscan.com/vulnerability/ea3b129d-32d8-40e3-b1af-8b92a760db23', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0493
Explain the vulnerability: CVE-2023-0493
Improper Neutralization of Equivalent Special Elements in GitHub repository btcpayserver/btcpayserver prior to 1.7.5. Affected Products: btcpayserver/btcpayserver References: [{'url': 'https://huntr.dev/bounties/3a73b45c-6f3e-4536-a327-cdfdbc59896f'}, {'url': 'https://github.com/btcpayserver/btcpayserver/commit/02070d65836cd24627929b3403efbae8de56039a'}, {'url': 'http://packetstormsecurity.com/files/171732/BTCPay-Server-1.7.4-HTML-Injection.html'}] CVE State: PUBLISHED
Explain CVE-2023-0494
Explain the vulnerability: CVE-2023-0494
A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. Affected Products: xorg-x11-server References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2165995'}, {'url': 'https://lists.x.org/archives/xorg-announce/2023-February/003320.html'}, {'url': 'https://gitlab.freedesktop.org/xorg/xserver/-/commit/0ba6d8c37071131a49790243cdac55392ecf71ec'}, {'name': 'GLSA-202305-30', 'tags': ['vendor-advisory'], 'url': 'https://security.gentoo.org/glsa/202305-30'}] CVE State: PUBLISHED
Explain CVE-2023-0495
Explain the vulnerability: CVE-2023-0495
The HT Slider For Elementor WordPress plugin before 1.4.0 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack Affected Products: HT Slider For Elementor References: [{'url': 'https://wpscan.com/vulnerability/2e3af480-b1a4-404c-b0fc-2b7b6a6b9c27', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0496
Explain the vulnerability: CVE-2023-0496
The HT Event WordPress plugin before 1.4.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack Affected Products: HT Event References: [{'url': 'https://wpscan.com/vulnerability/451b47d5-7bd2-4a82-9c8e-fe6601bcd2ab', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0497
Explain the vulnerability: CVE-2023-0497
The HT Portfolio WordPress plugin before 1.1.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack Affected Products: HT Portfolio References: [{'url': 'https://wpscan.com/vulnerability/ae5b7776-9d0d-4db8-81c3-237b16cd9c62', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0498
Explain the vulnerability: CVE-2023-0498
The WP Education WordPress plugin before 1.2.7 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack Affected Products: WP Education References: [{'url': 'https://wpscan.com/vulnerability/8fa051ad-5b35-46d8-be95-0ac4e73d5eff', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0499
Explain the vulnerability: CVE-2023-0499
The QuickSwish WordPress plugin before 1.1.0 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack Affected Products: QuickSwish References: [{'url': 'https://wpscan.com/vulnerability/9342470a-a0ad-4f0b-b95f-7daa39a6362b', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0500
Explain the vulnerability: CVE-2023-0500
The WP Film Studio WordPress plugin before 1.3.5 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack Affected Products: WP Film Studio References: [{'url': 'https://wpscan.com/vulnerability/95a6a11e-da5d-4fac-aff6-a3f7624682b7', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0501
Explain the vulnerability: CVE-2023-0501
The WP Insurance WordPress plugin before 2.1.4 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack Affected Products: WP Insurance References: [{'url': 'https://wpscan.com/vulnerability/36fd6c0d-3f0c-4f7d-aa17-5b2d084ab94c', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0502
Explain the vulnerability: CVE-2023-0502
The WP News WordPress plugin through 1.1.9 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack Affected Products: WP News References: [{'url': 'https://wpscan.com/vulnerability/c959f4ce-b6ea-4aee-9a98-aa98d2a62138', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0503
Explain the vulnerability: CVE-2023-0503
The Free WooCommerce Theme 99fy Extension WordPress plugin before 1.2.8 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack Affected Products: Free WooCommerce Theme 99fy Extension References: [{'url': 'https://wpscan.com/vulnerability/3cb148fb-1f30-4316-a421-10da51d849f3', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0504
Explain the vulnerability: CVE-2023-0504
The HT Politic WordPress plugin before 2.3.8 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack Affected Products: HT Politic References: [{'url': 'https://wpscan.com/vulnerability/b427841d-a3ad-4e3a-8964-baad90a9aedb', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0505
Explain the vulnerability: CVE-2023-0505
The Ever Compare WordPress plugin through 1.2.3 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack Affected Products: Ever Compare References: [{'url': 'https://wpscan.com/vulnerability/dbabff3e-b021-49ed-aaf3-b73a77d4b354', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0507
Explain the vulnerability: CVE-2023-0507
Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible due to map attributions weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. An attacker needs to have the Editor role in order to change a panel to include a map attribution containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.21, 9.2.13 and 9.3.8 to receive a fix. Affected Products: Grafana References: [{'url': 'https://grafana.com/security/security-advisories/cve-2023-0507/'}, {'url': 'https://security.netapp.com/advisory/ntap-20230413-0001/'}] CVE State: PUBLISHED
Explain CVE-2023-0508
Explain the vulnerability: CVE-2023-0508
An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. Open redirection was possible via HTTP response splitting in the NPM package API. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/389328'}, {'url': 'https://hackerone.com/reports/1842314'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0508.json'}] CVE State: PUBLISHED
Explain CVE-2023-0509
Explain the vulnerability: CVE-2023-0509
Improper Certificate Validation in GitHub repository pyload/pyload prior to 0.5.0b3.dev44. Affected Products: pyload/pyload References: [{'url': 'https://huntr.dev/bounties/a370e0c2-a41c-4871-ad91-bc6f31a8e839'}, {'url': 'https://github.com/pyload/pyload/commit/a9098bdf7406e6faf9df3da6ff2d584e90c13bbb'}] CVE State: PUBLISHED
Explain CVE-2023-0511
Explain the vulnerability: CVE-2023-0511
Relative Path Traversal vulnerability in ForgeRock Access Management Java Policy Agent allows Authentication Bypass. This issue affects Access Management Java Policy Agent: all versions up to 5.10.1 Affected Products: Access Management Java Policy Agent References: [{'url': 'https://backstage.forgerock.com/downloads/browse/am/featured/java-agents'}, {'url': 'https://backstage.forgerock.com/knowledge/kb/article/a21576868'}] CVE State: PUBLISHED
Explain CVE-2023-0512
Explain the vulnerability: CVE-2023-0512
Divide By Zero in GitHub repository vim/vim prior to 9.0.1247. Affected Products: vim/vim References: [{'url': 'https://huntr.dev/bounties/de83736a-1936-4872-830b-f1e9b0ad2a74'}, {'url': 'https://github.com/vim/vim/commit/870219c58c0804bdc55419b2e455c06ac715a835'}, {'url': 'https://support.apple.com/kb/HT213677'}, {'url': 'https://support.apple.com/kb/HT213675'}, {'url': 'https://support.apple.com/kb/HT213670'}, {'name': '20230327 APPLE-SA-2023-03-27-3 macOS Ventura 13.3', 'tags': ['mailing-list'], 'url': 'http://seclists.org/fulldisclosure/2023/Mar/17'}, {'name': '20230327 APPLE-SA-2023-03-27-4 macOS Monterey 12.6.4', 'tags': ['mailing-list'], 'url': 'http://seclists.org/fulldisclosure/2023/Mar/18'}, {'name': '20230327 APPLE-SA-2023-03-27-5 macOS Big Sur 11.7.5', 'tags': ['mailing-list'], 'url': 'http://seclists.org/fulldisclosure/2023/Mar/21'}, {'name': 'FEDORA-2023-030318ca00', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IE44W6WMMREYCW3GJHPSYP7NK2VT5NY6/'}] CVE State: PUBLISHED
Explain CVE-2023-0513
Explain the vulnerability: CVE-2023-0513
A vulnerability has been found in isoftforce Dreamer CMS up to 4.0.1 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.3 is able to address this issue. It is recommended to upgrade the affected component. VDB-219334 is the identifier assigned to this vulnerability. Affected Products: Dreamer CMS References: [{'url': 'https://vuldb.com/?id.219334', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.219334', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/isoftforce/dreamer_cms/issues/I68UYM', 'tags': ['exploit', 'issue-tracking']}, {'url': 'https://gitee.com/isoftforce/dreamer_cms/tree/Latest_Stable_Release_4.1.3', 'tags': ['patch']}] CVE State: PUBLISHED
Explain CVE-2023-0514
Explain the vulnerability: CVE-2023-0514
The Membership Database WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin Affected Products: Membership Database References: [{'url': 'https://wpscan.com/vulnerability/c6cc400a-9bfb-417d-9206-5582a49d0f05', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0515
Explain the vulnerability: CVE-2023-0515
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0 and classified as critical. This issue affects some unknown processing of the file admin/forget_password.php of the component Parameter Handler. The manipulation of the argument email leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219335. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.219335', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219335', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/admin_forget_password_email.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0516
Explain the vulnerability: CVE-2023-0516
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been classified as critical. Affected is an unknown function of the file user/forget_password.php of the component Parameter Handler. The manipulation of the argument email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219336. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.219336', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219336', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/user_forget_password_email.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0518
Explain the vulnerability: CVE-2023-0518
An issue has been discovered in GitLab CE/EE affecting all versions starting from 14.0 before 15.6.7, all versions starting from 15.7 before 15.7.6, all versions starting from 15.8 before 15.8.1. It was possible to trigger a DoS attack by uploading a malicious Helm chart. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/383082'}, {'url': 'https://hackerone.com/reports/1766973'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0518.json'}] CVE State: PUBLISHED
Explain CVE-2023-0519
Explain the vulnerability: CVE-2023-0519
Cross-site Scripting (XSS) - Stored in GitHub repository modoboa/modoboa prior to 2.0.4. Affected Products: modoboa/modoboa References: [{'url': 'https://huntr.dev/bounties/891ad0cb-d12f-4c5e-aac8-d7326caf2129'}, {'url': 'https://github.com/modoboa/modoboa/commit/eef9ab72b5305578a3ad7a7463bd284aa645e98b'}] CVE State: PUBLISHED
Explain CVE-2023-0520
Explain the vulnerability: CVE-2023-0520
The RapidExpCart WordPress plugin through 1.0 does not sanitize and escape the url parameter in the rapidexpcart endpoint before storing it and outputting it back in the page, leading to a Stored Cross-Site Scripting vulnerability which could be used against high-privilege users such as admin, furthermore lack of csrf protection means an attacker can trick a logged in admin to perform the attack by submitting a hidden form. Affected Products: RapidExpCart References: [{'url': 'https://wpscan.com/vulnerability/be4f7ff9-af79-477b-9f47-e40e25a3558e', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0522
Explain the vulnerability: CVE-2023-0522
The Enable/Disable Auto Login when Register WordPress plugin through 1.1.0 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack Affected Products: Enable/Disable Auto Login when Register References: [{'url': 'https://wpscan.com/vulnerability/c7984bfb-86a3-4530-90ae-17ab39af1c54', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0523
Explain the vulnerability: CVE-2023-0523
An issue has been discovered in GitLab affecting all versions starting from 15.6 before 15.8.5, 15.9 before 15.9.4, and 15.10 before 15.10.1. An XSS was possible via a malicious email address for certain instances. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/389487'}, {'url': 'https://hackerone.com/reports/1842867'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0523.json'}] CVE State: PUBLISHED
Explain CVE-2023-0524
Explain the vulnerability: CVE-2023-0524
As part of our Security Development Lifecycle, a potential privilege escalation issue was identified internally. This could allow a malicious actor with sufficient permissions to modify environment variables and abuse an impacted plugin in order to escalate privileges. We have resolved the issue and also made several defense-in-depth fixes alongside. While the probability of successful exploitation is low, Tenable is committed to securing our customers’ environments and our products. The updates have been distributed via the Tenable plugin feed in feed serial numbers equal to or greater than #202212212055. Affected Products: Tenable.io, Tenable.sc, Nessus References: [{'url': 'https://www.tenable.com/security/tns-2023-04'}] CVE State: PUBLISHED
Explain CVE-2023-0525
Explain the vulnerability: CVE-2023-0525
Weak Encoding for Password vulnerability in Mitsubishi Electric Corporation GOT2000 Series GT27 model versions 01.49.000 and prior, GT25 model versions 01.49.000 and prior, GT23 model versions 01.49.000 and prior, GT21 model versions 01.49.000 and prior, GOT SIMPLE Series GS25 model versions 01.49.000 and prior, GS21 model versions 01.49.000 and prior, GT Designer3 Version1 (GOT2000) versions 1.295H and prior and GT SoftGOT2000 versions 1.295H and prior allows a remote unauthenticated attacker to obtain plaintext passwords by sniffing packets containing encrypted passwords and decrypting the encrypted passwords, in the case of transferring data with GT Designer3 Version1(GOT2000) and GOT2000 Series or GOT SIMPLE Series with the Data Transfer Security function enabled, or in the case of transferring data by the SoftGOT-GOT link function with GT SoftGOT2000 and GOT2000 series with the Data Transfer Security function enabled. Affected Products: GOT2000 Series GT27 model References: [{'url': 'https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-008_en.pdf'}, {'url': 'https://jvn.jp/vu/JVNVU95285923/index.html'}, {'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-215-02'}] CVE State: PUBLISHED
Explain CVE-2023-0526
Explain the vulnerability: CVE-2023-0526
The Post Shortcode WordPress plugin through 2.0.9 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks Affected Products: Post Shortcode References: [{'url': 'https://wpscan.com/vulnerability/0ec58310-243d-40c8-9fa6-8753947bfa89', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0527
Explain the vulnerability: CVE-2023-0527
A vulnerability was found in PHPGurukul Online Security Guards Hiring System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file search-request.php. The manipulation of the argument searchdata with the input "><script>alert(document.domain)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219596. Affected Products: Online Security Guards Hiring System References: [{'url': 'https://vuldb.com/?id.219596', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219596', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ctflearner/Vulnerability/blob/main/Online-Security-guard-POC.md', 'tags': ['exploit']}, {'url': 'http://packetstormsecurity.com/files/172667/Online-Security-Guards-Hiring-System-1.0-Cross-Site-Scripting.html'}] CVE State: PUBLISHED
Explain CVE-2023-0528
Explain the vulnerability: CVE-2023-0528
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been classified as critical. This affects an unknown part of the file admin/abc.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219597 was assigned to this vulnerability. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.219597', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219597', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/admin_abc_id.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0529
Explain the vulnerability: CVE-2023-0529
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file admin/add_payment.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-219598 is the identifier assigned to this vulnerability. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.219598', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219598', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/_admin_add_payment_id.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0530
Explain the vulnerability: CVE-2023-0530
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file admin/approve_user.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219599. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.219599', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219599', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/admin_approve_user_id.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0531
Explain the vulnerability: CVE-2023-0531
A vulnerability classified as critical has been found in SourceCodester Online Tours & Travels Management System 1.0. Affected is an unknown function of the file admin/booking_report.php. The manipulation of the argument to_date leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219600. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.219600', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219600', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/tototo_date.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0532
Explain the vulnerability: CVE-2023-0532
A vulnerability classified as critical was found in SourceCodester Online Tours & Travels Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/disapprove_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219601 was assigned to this vulnerability. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.219601', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219601', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/admin_disapprove_user_id.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0533
Explain the vulnerability: CVE-2023-0533
A vulnerability, which was classified as critical, has been found in SourceCodester Online Tours & Travels Management System 1.0. Affected by this issue is some unknown functionality of the file admin/expense_report.php. The manipulation of the argument from_date leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-219602 is the identifier assigned to this vulnerability. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.219602', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219602', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/admin_expense_report_from_date.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0534
Explain the vulnerability: CVE-2023-0534
A vulnerability, which was classified as critical, was found in SourceCodester Online Tours & Travels Management System 1.0. This affects an unknown part of the file admin/expense_report.php. The manipulation of the argument to_date leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-219603. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.219603', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219603', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/admin_expense_report_to_date.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0535
Explain the vulnerability: CVE-2023-0535
The Donation Block For PayPal WordPress plugin before 2.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. Affected Products: Donation Block For PayPal References: [{'url': 'https://wpscan.com/vulnerability/8c50321a-dba8-4379-9b9c-4c349e44b2ed', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0536
Explain the vulnerability: CVE-2023-0536
The Wp-D3 WordPress plugin through 2.4.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. Affected Products: Wp-D3 References: [{'url': 'https://wpscan.com/vulnerability/7b19d792-8083-4c0c-a45e-a99c1f5f0df0', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0537
Explain the vulnerability: CVE-2023-0537
The Product Slider For WooCommerce Lite WordPress plugin through 1.1.7 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks Affected Products: Product Slider For WooCommerce Lite References: [{'url': 'https://wpscan.com/vulnerability/d7369f1d-d1a0-4576-a676-c70525a6c743', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0538
Explain the vulnerability: CVE-2023-0538
The Campaign URL Builder WordPress plugin before 1.8.2 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks Affected Products: Campaign URL Builder References: [{'url': 'https://wpscan.com/vulnerability/4869fdc7-4fc7-4917-bc00-b6ced9ccc871', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0539
Explain the vulnerability: CVE-2023-0539
The GS Insever Portfolio WordPress plugin before 1.4.5 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. Affected Products: GS Insever Portfolio References: [{'url': 'https://wpscan.com/vulnerability/a4b6a83a-6394-4dfc-8bb3-4982867dab7d', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0540
Explain the vulnerability: CVE-2023-0540
The GS Filterable Portfolio WordPress plugin before 1.6.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. Affected Products: GS Filterable Portfolio References: [{'url': 'https://wpscan.com/vulnerability/b35b3da2-468d-4fe5-bff6-812432197a38', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0541
Explain the vulnerability: CVE-2023-0541
The GS Books Showcase WordPress plugin before 1.3.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. Affected Products: GS Books Showcase References: [{'url': 'https://wpscan.com/vulnerability/8453e587-cc8c-491a-af09-fc4ab215134b', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0542
Explain the vulnerability: CVE-2023-0542
The Custom Post Type List Shortcode WordPress plugin through 1.4.4 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. Affected Products: Custom Post Type List Shortcode References: [{'url': 'https://wpscan.com/vulnerability/17de2f77-3e6c-4c22-9196-6e5577ee7fcf', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0543
Explain the vulnerability: CVE-2023-0543
The Arigato Autoresponder and Newsletter WordPress plugin before 2.1.7.2 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. Affected Products: Arigato Autoresponder and Newsletter References: [{'url': 'https://wpscan.com/vulnerability/e3771938-40b5-4e8b-bb5a-847131a2b4a7', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0544
Explain the vulnerability: CVE-2023-0544
The WP Login Box WordPress plugin through 2.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) Affected Products: WP Login Box References: [{'url': 'https://wpscan.com/vulnerability/8ef9585f-67d7-4651-977a-fcad113882bd', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0545
Explain the vulnerability: CVE-2023-0545
The Hostel WordPress plugin before 1.1.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). Affected Products: Hostel References: [{'url': 'https://wpscan.com/vulnerability/b604afc8-61d0-4e98-8950-f3d29f9e9ee1', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0546
Explain the vulnerability: CVE-2023-0546
The Contact Form Plugin WordPress plugin before 4.3.25 does not properly sanitize and escape the srcdoc attribute in iframes in it's custom HTML field type, allowing a logged in user with roles as low as contributor to inject arbitrary javascript into a form which will trigger for any visitor to the form or admins previewing or editing the form. Affected Products: Contact Form Plugin References: [{'url': 'https://wpscan.com/vulnerability/078f33cd-0f5c-46fe-b858-2107a09c6b69', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0547
Explain the vulnerability: CVE-2023-0547
OCSP revocation status of recipient certificates was not checked when sending S/Mime encrypted email, and revoked certificates would be accepted. Thunderbird versions from 68 to 102.9.1 were affected by this bug. This vulnerability affects Thunderbird < 102.10. Affected Products: Thunderbird References: [{'url': 'https://www.mozilla.org/security/advisories/mfsa2023-15/'}, {'url': 'https://bugzilla.mozilla.org/show_bug.cgi?id=1811298'}] CVE State: PUBLISHED
Explain CVE-2023-0548
Explain the vulnerability: CVE-2023-0548
The Namaste! LMS WordPress plugin before 2.5.9.4 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). Affected Products: Namaste! LMS References: [{'url': 'https://wpscan.com/vulnerability/b6c1ed7a-5b2d-4985-847d-56586b1aae9b', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0549
Explain the vulnerability: CVE-2023-0549
A vulnerability, which was classified as problematic, has been found in YAFNET up to 3.1.10. This issue affects some unknown processing of the file /forum/PostPrivateMessage of the component Private Message Handler. The manipulation of the argument subject/message leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.1.11 is able to address this issue. The name of the patch is 2237a9d552e258a43570bb478a92a5505e7c8797. It is recommended to upgrade the affected component. The identifier VDB-219665 was assigned to this vulnerability. Affected Products: YAFNET References: [{'url': 'https://vuldb.com/?id.219665', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219665', 'tags': ['signature', 'permissions-required']}, {'url': 'https://drive.google.com/drive/folders/1ct6Tp_cnsYO8L_JSvlBCf_Ae7KW3JAcD?usp=sharing', 'tags': ['exploit']}, {'url': 'https://github.com/YAFNET/YAFNET/security/advisories/GHSA-4hwx-678w-9cp5', 'tags': ['related']}, {'url': 'https://github.com/YAFNET/YAFNET/commit/2237a9d552e258a43570bb478a92a5505e7c8797', 'tags': ['patch']}, {'url': 'https://github.com/YAFNET/YAFNET/releases/tag/v3.1.11', 'tags': ['patch']}] CVE State: PUBLISHED
Explain CVE-2023-0550
Explain the vulnerability: CVE-2023-0550
The Quick Restaurant Menu plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 2.0.2. This is due to the fact that during menu item deletion/modification, the plugin does not verify that the post ID provided to the AJAX action is indeed a menu item. This makes it possible for authenticated attackers, with subscriber-level access or higher, to modify or delete arbitrary posts. Affected Products: Quick Restaurant Menu References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/faa4fba5-cd19-4b96-aa09-07ed6d52a107'}, {'url': 'https://plugins.trac.wordpress.org/browser/quick-restaurant-menu/tags/2.0.2/includes/admin/ajax-functions.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2851871/quick-restaurant-menu/trunk?contextall=1&old=2788636&old_path=%2Fquick-restaurant-menu%2Ftrunk'}] CVE State: PUBLISHED
Explain CVE-2023-0552
Explain the vulnerability: CVE-2023-0552
The Registration Forms WordPress plugin before 3.8.2.3 does not properly validate the redirection URL when logging in and login out, leading to an Open Redirect vulnerability Affected Products: Registration Forms References: [{'url': 'https://wpscan.com/vulnerability/832c6155-a413-4641-849c-b98ba55e8551', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0553
Explain the vulnerability: CVE-2023-0553
The Quick Restaurant Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters in versions up to, and including, 2.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Affected Products: Quick Restaurant Menu References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/cfd8a6a4-9159-480f-abe2-71972585217b'}, {'url': 'https://plugins.trac.wordpress.org/browser/quick-restaurant-menu/tags/2.0.2/includes/admin/settings/settings.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2851871/quick-restaurant-menu/trunk?contextall=1&old=2788636&old_path=%2Fquick-restaurant-menu%2Ftrunk'}] CVE State: PUBLISHED
Explain CVE-2023-0554
Explain the vulnerability: CVE-2023-0554
The Quick Restaurant Menu plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.2. This is due to missing or incorrect nonce validation on its AJAX actions. This makes it possible for unauthenticated attackers to update menu items, via forged request granted they can trick a site administrator into performing an action such as clicking on a link. Affected Products: Quick Restaurant Menu References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/bfc7c214-8d76-453c-a05d-682aa425b06e'}, {'url': 'https://plugins.trac.wordpress.org/browser/quick-restaurant-menu/tags/2.0.2/includes/admin/ajax-functions.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2851871/quick-restaurant-menu/trunk?contextall=1&old=2788636&old_path=%2Fquick-restaurant-menu%2Ftrunk'}] CVE State: PUBLISHED
Explain CVE-2023-0555
Explain the vulnerability: CVE-2023-0555
The Quick Restaurant Menu plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on its AJAX actions in versions up to, and including, 2.0.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke those actions intended for administrator use. Actions include menu item creation, update and deletion and other menu management functions. Since the plugin does not verify that a post ID passed to one of its AJAX actions belongs to a menu item, this can lead to arbitrary post deletion/alteration. Affected Products: Quick Restaurant Menu References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/97984c7d-d6ff-480c-acfe-20ab0eb04141'}, {'url': 'https://plugins.trac.wordpress.org/browser/quick-restaurant-menu/tags/2.0.2/includes/admin/ajax-functions.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2851871/quick-restaurant-menu/trunk?contextall=1&old=2788636&old_path=%2Fquick-restaurant-menu%2Ftrunk'}] CVE State: PUBLISHED
Explain CVE-2023-0556
Explain the vulnerability: CVE-2023-0556
The ContentStudio plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on several functions in versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to obtain the blog metadata (via the function cstu_get_metadata) that includes the plugin's contentstudio_token. Knowing this token allows for other interactions with the plugin such as creating posts in versions prior to 1.2.5, which added other requirements to posting and updating. Affected Products: ContentStudio References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/52db8d41-859a-4d68-8b83-3d3af8f1bf64'}, {'url': 'https://plugins.trac.wordpress.org/browser/contentstudio/tags/1.2.1/contentstudio-plugin.php#L517'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2851006%40contentstudio%2Ftrunk&old=2844028%40contentstudio%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0557
Explain the vulnerability: CVE-2023-0557
The ContentStudio plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 1.2.5. This could allow unauthenticated attackers to obtain a nonce needed for the creation of posts. Affected Products: ContentStudio References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/62eb136f-3cb0-40dc-a154-015a7fa1077b'}, {'url': 'https://plugins.trac.wordpress.org/browser/contentstudio/trunk/contentstudio-plugin.php#L709'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2851006%40contentstudio%2Ftrunk&old=2844028%40contentstudio%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0558
Explain the vulnerability: CVE-2023-0558
The ContentStudio plugin for WordPress is vulnerable to authorization bypass due to an unsecure token check that is susceptible to type juggling in versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to execute functions intended for use by users with proper API keys. Affected Products: ContentStudio References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/c31828dc-ef94-4895-8395-a5d52a0a82bd'}, {'url': 'https://plugins.trac.wordpress.org/browser/contentstudio/trunk/contentstudio-plugin.php#L416'}, {'url': 'https://ti.wordfence.io/vulnerabilities/52db8d41-859a-4d68-8b83-3d3af8f1bf64'}] CVE State: PUBLISHED
Explain CVE-2023-0559
Explain the vulnerability: CVE-2023-0559
The GS Portfolio for Envato WordPress plugin before 1.4.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embedded, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks Affected Products: GS Portfolio for Envato References: [{'url': 'https://wpscan.com/vulnerability/e5549261-66e2-4a5e-8781-bc555b629ccc', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0560
Explain the vulnerability: CVE-2023-0560
A vulnerability, which was classified as critical, has been found in SourceCodester Online Tours & Travels Management System 1.0. This issue affects some unknown processing of the file admin/practice_pdf.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219701 was assigned to this vulnerability. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.219701', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219701', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/admin_practice_pdf_id.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0561
Explain the vulnerability: CVE-2023-0561
A vulnerability, which was classified as critical, was found in SourceCodester Online Tours & Travels Management System 1.0. Affected is an unknown function of the file /user/s.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-219702 is the identifier assigned to this vulnerability. Affected Products: Online Tours & Travels Management System References: [{'url': 'https://vuldb.com/?id.219702', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219702', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/linmoren/online-tours-travels-management-system/blob/main/_user_s_id.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0562
Explain the vulnerability: CVE-2023-0562
A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219716. Affected Products: Bank Locker Management System References: [{'url': 'https://vuldb.com/?id.219716', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219716', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/Bank%20Locker%20Management%20System-SQL%20.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0563
Explain the vulnerability: CVE-2023-0563
A vulnerability classified as problematic has been found in PHPGurukul Bank Locker Management System 1.0. This affects an unknown part of the file add-locker-form.php of the component Assign Locker. The manipulation of the argument ahname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219717 was assigned to this vulnerability. Affected Products: Bank Locker Management System References: [{'url': 'https://vuldb.com/?id.219717', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.219717', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/BLMS_XSS_IN_ADMIN_BROWSER.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0564
Explain the vulnerability: CVE-2023-0564
Weak Password Requirements in GitHub repository froxlor/froxlor prior to 2.0.10. Affected Products: froxlor/froxlor References: [{'url': 'https://huntr.dev/bounties/a4f86d6f-0d5d-428d-a4b3-551b20a21ce6'}, {'url': 'https://github.com/froxlor/froxlor/commit/2a84e9c1207fd3d792b7fb198fd0c66fe1a66a7a'}] CVE State: PUBLISHED
Explain CVE-2023-0565
Explain the vulnerability: CVE-2023-0565
Business Logic Errors in GitHub repository froxlor/froxlor prior to 2.0.10. Affected Products: froxlor/froxlor References: [{'url': 'https://huntr.dev/bounties/12d78294-1723-4450-a239-023952666102'}, {'url': 'https://github.com/froxlor/froxlor/commit/2feb8020941a82bfb4ac68890f6ced0e5b3c4a15'}] CVE State: PUBLISHED
Explain CVE-2023-0566
Explain the vulnerability: CVE-2023-0566
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in froxlor/froxlor prior to 2.0.10. Affected Products: froxlor/froxlor References: [{'url': 'https://huntr.dev/bounties/8339e4f1-d430-4845-81b5-36dd9fcdac49'}, {'url': 'https://github.com/froxlor/froxlor/commit/bd5b99dc1c06f594b9563d459a50bf3b32504876'}] CVE State: PUBLISHED