instruction
stringlengths
21
21
input
stringlengths
40
40
output
stringlengths
62
37.3k
Explain CVE-2023-0680
Explain the vulnerability: CVE-2023-0680
N\A Affected Products: N\A References: N\A CVE State: REJECTED
Explain CVE-2023-0681
Explain the vulnerability: CVE-2023-0681
Rapid7 InsightVM versions 6.6.178 and lower suffers from an open redirect vulnerability, whereby an attacker has the ability to redirect the user to a site of the attacker’s choice using the ‘page’ parameter of the ‘data/console/redirect’ component of the application. This issue was resolved in the February, 2023 release of version 6.6.179.  Affected Products: Nexpose References: [{'tags': ['release-notes'], 'url': 'https://docs.rapid7.com/release-notes/nexpose/20230208/'}] CVE State: PUBLISHED
Explain CVE-2023-0683
Explain the vulnerability: CVE-2023-0683
A valid, authenticated XCC user with read only access may gain elevated privileges through a specifically crafted API call. Affected Products: XClarity Controller References: [{'url': 'https://support.lenovo.com/us/en/product_security/LEN-99936'}] CVE State: PUBLISHED
Explain CVE-2023-0684
Explain the vulnerability: CVE-2023-0684
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_unassign_folders function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as changing the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/29358ea9-21b7-4294-8fc9-0d38e689cf53'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0685
Explain the vulnerability: CVE-2023-0685
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_unassign_folders function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/e52b27fa-10e8-43d0-be29-774c2f5487ae'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0686
Explain the vulnerability: CVE-2023-0686
A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been classified as critical. This affects the function update_cart of the file /oews/classes/Master.php?f=update_cart of the component HTTP POST Request Handler. The manipulation of the argument cart_id leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-220245 was assigned to this vulnerability. Affected Products: Online Eyewear Shop References: [{'url': 'https://vuldb.com/?id.220245', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220245', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0687
Explain the vulnerability: CVE-2023-0687
A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled. Affected Products: C Library References: [{'url': 'https://vuldb.com/?id.220246'}, {'url': 'https://vuldb.com/?ctiid.220246'}, {'url': 'https://sourceware.org/bugzilla/show_bug.cgi?id=29444'}, {'url': 'https://patchwork.sourceware.org/project/glibc/patch/20230204114138.5436-1-leo%40yuriev.ru/'}] CVE State: PUBLISHED
Explain CVE-2023-0688
Explain the vulnerability: CVE-2023-0688
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_thankyou' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about form submissions, including payment status, and transaction ID. Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/81fc41a4-9206-404c-bd5b-821c77ff3593?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2910040/'}] CVE State: PUBLISHED
Explain CVE-2023-0690
Explain the vulnerability: CVE-2023-0690
HashiCorp Boundary from 0.10.0 through 0.11.2 contain an issue where when using a PKI-based worker with a Key Management Service (KMS) defined in the configuration file, new credentials created after an automatic rotation may not have been encrypted via the intended KMS. This would result in the credentials being stored in plaintext on the Boundary PKI worker’s disk. This issue is fixed in version 0.12.0. Affected Products: Boundary References: [{'url': 'https://discuss.hashicorp.com/t/hcsec-2023-03-boundary-workers-store-rotated-credentials-in-plaintext-even-when-key-management-service-configured/49907'}] CVE State: PUBLISHED
Explain CVE-2023-0691
Explain the vulnerability: CVE-2023-0691
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_last_name' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about arbitrary form submissions, specifically the submitter's last name. Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/8fc4b815-dc05-4270-bf7a-3b01622739d7?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2910040/'}] CVE State: PUBLISHED
Explain CVE-2023-0692
Explain the vulnerability: CVE-2023-0692
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_payment_status' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about the payment status of arbitrary form submissions. Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/ddd85ff2-6607-4ac8-b91c-88f6f2fa6c56?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2910040/'}] CVE State: PUBLISHED
Explain CVE-2023-0693
Explain the vulnerability: CVE-2023-0693
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_transaction_id' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about the transaction ids of arbitrary form submissions that included payment. Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/1f33a8db-7cd0-4a53-b2c1-cd5b7cd16214?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2910040/'}] CVE State: PUBLISHED
Explain CVE-2023-0694
Explain the vulnerability: CVE-2023-0694
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about any standard form field of any form submission. Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/1a8b194c-371f-4adc-98fa-8f4e47a38ee7?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2910040/'}] CVE State: PUBLISHED
Explain CVE-2023-0695
Explain the vulnerability: CVE-2023-0695
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'mf' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a specific link. Note that getting the JavaScript to execute still requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database. Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/1c866d8d-399c-4bda-a3c9-17c7e5d2ffb8?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}] CVE State: PUBLISHED
Explain CVE-2023-0696
Explain the vulnerability: CVE-2023-0696
Type confusion in V8 in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1402270'}] CVE State: PUBLISHED
Explain CVE-2023-0697
Explain the vulnerability: CVE-2023-0697
Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 110.0.5481.77 allowed a remote attacker to spoof the contents of the security UI via a crafted HTML page. (Chromium security severity: High) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1341541'}] CVE State: PUBLISHED
Explain CVE-2023-0698
Explain the vulnerability: CVE-2023-0698
Out of bounds read in WebRTC in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1403573'}, {'url': 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1693'}] CVE State: PUBLISHED
Explain CVE-2023-0699
Explain the vulnerability: CVE-2023-0699
Use after free in GPU in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page and browser shutdown. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1371859'}] CVE State: PUBLISHED
Explain CVE-2023-0700
Explain the vulnerability: CVE-2023-0700
Inappropriate implementation in Download in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1393732'}] CVE State: PUBLISHED
Explain CVE-2023-0701
Explain the vulnerability: CVE-2023-0701
Heap buffer overflow in WebUI in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interaction . (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1405123'}] CVE State: PUBLISHED
Explain CVE-2023-0702
Explain the vulnerability: CVE-2023-0702
Type confusion in Data Transfer in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1316301'}] CVE State: PUBLISHED
Explain CVE-2023-0703
Explain the vulnerability: CVE-2023-0703
Type confusion in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. (Chromium security severity: Medium) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1405574'}] CVE State: PUBLISHED
Explain CVE-2023-0704
Explain the vulnerability: CVE-2023-0704
Insufficient policy enforcement in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to bypass same origin policy and proxy settings via a crafted HTML page. (Chromium security severity: Low) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1385982'}] CVE State: PUBLISHED
Explain CVE-2023-0705
Explain the vulnerability: CVE-2023-0705
Integer overflow in Core in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who had one a race condition to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low) Affected Products: Chrome References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1238642'}] CVE State: PUBLISHED
Explain CVE-2023-0706
Explain the vulnerability: CVE-2023-0706
A vulnerability, which was classified as critical, has been found in SourceCodester Medical Certificate Generator App 1.0. Affected by this issue is some unknown functionality of the file manage_record.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-220340. Affected Products: Medical Certificate Generator App References: [{'url': 'https://vuldb.com/?id.220340', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220340', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0707
Explain the vulnerability: CVE-2023-0707
A vulnerability was found in SourceCodester Medical Certificate Generator App 1.0. It has been rated as critical. Affected by this issue is the function delete_record of the file function.php. The manipulation of the argument id leads to sql injection. VDB-220346 is the identifier assigned to this vulnerability. Affected Products: Medical Certificate Generator App References: [{'url': 'https://vuldb.com/?id.220346', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220346', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0708
Explain the vulnerability: CVE-2023-0708
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'mf_first_name' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a a page containing the shortcode when the submission id is present in the query string. Note that getting the JavaScript to execute requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database. Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/ae7549db-9a4b-4dee-8023-d7863dc3b4c8?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2907471/'}] CVE State: PUBLISHED
Explain CVE-2023-0709
Explain the vulnerability: CVE-2023-0709
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'mf_last_name' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a a page containing the shortcode when the submission id is present in the query string. Note that getting the JavaScript to execute requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database. Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/25200656-a6a2-42f2-a607-26d4ff502cbf?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2907471/'}] CVE State: PUBLISHED
Explain CVE-2023-0710
Explain the vulnerability: CVE-2023-0710
The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'fname' attribute of the 'mf_thankyou' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a a page containing the shortcode when the submission id is present in the query string. Note that getting the JavaScript to execute requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database. Additionally this requires successful payment, increasing the complexity. Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/89a98053-33c7-4e75-87a1-0f483a990641?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}] CVE State: PUBLISHED
Explain CVE-2023-0711
Explain the vulnerability: CVE-2023-0711
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_state function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the view state of the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/d1c43e93-69a3-407e-860e-ab25af5d7177'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0712
Explain the vulnerability: CVE-2023-0712
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_move_object function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/0be428ae-40ae-4cc0-82ad-d121b6d2d27e'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0713
Explain the vulnerability: CVE-2023-0713
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_add_folder function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/2764b360-228d-48c1-8a29-d3764e532799'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0715
Explain the vulnerability: CVE-2023-0715
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_clone_folder function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/c3728280-3487-4cb2-8e37-f33811bc0a22'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0716
Explain the vulnerability: CVE-2023-0716
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_edit_folder function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/3ad60a11-e307-4ec9-9099-091a87ff1d3b'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0717
Explain the vulnerability: CVE-2023-0717
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_delete_folder function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/35fb658f-6ffa-4df7-bfcd-25307d89fc26'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0718
Explain the vulnerability: CVE-2023-0718
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_folder function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/2c26d6de-5653-4be8-9526-39b30cb61625'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0719
Explain the vulnerability: CVE-2023-0719
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_sort_order function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/9b26604b-2423-4130-b0ef-8f63a392c760'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0720
Explain the vulnerability: CVE-2023-0720
The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_folder_order function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/8d392d0b-f286-44da-aa32-a08d0279baed'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0721
Explain the vulnerability: CVE-2023-0721
The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to CSV injection in versions up to, and including, 3.3.0. This allows unauthenticated attackers to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration. Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/ccd85a72-1872-4c4f-8ba7-7f91b0b37d4a?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/core/entries/export.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2907471/'}] CVE State: PUBLISHED
Explain CVE-2023-0722
Explain the vulnerability: CVE-2023-0722
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_state function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/261a1bf0-a147-48c8-878e-f9b725ac74d8'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0723
Explain the vulnerability: CVE-2023-0723
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_move_object function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/dc01108f-e781-484b-997a-c1d4e218a3f4'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0724
Explain the vulnerability: CVE-2023-0724
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_add_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/08c0ea6c-7e2f-482f-b30c-0e3bcd992159'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0725
Explain the vulnerability: CVE-2023-0725
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_clone_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/80797183-c69f-4dce-a2e0-52a395ceffaa'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0726
Explain the vulnerability: CVE-2023-0726
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_edit_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/51b88442-3961-42e2-8ff4-7726819a7f0f'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0727
Explain the vulnerability: CVE-2023-0727
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_delete_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/62b56928-7125-4211-b233-07b5b51881c1'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0728
Explain the vulnerability: CVE-2023-0728
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/43b43802-f301-4748-98b9-eea78a249355'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0729
Explain the vulnerability: CVE-2023-0729
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_sort_order function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/ae8dbf54-ea62-4901-b34f-079b708ca0b5?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0730
Explain the vulnerability: CVE-2023-0730
The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_folder_order function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin. Affected Products: Wicked Folders References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/4104f69f-b185-498a-aabf-2126ffb94ab3'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}] CVE State: PUBLISHED
Explain CVE-2023-0731
Explain the vulnerability: CVE-2023-0731
The Interactive Geo Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the action content parameter in versions up to, and including, 1.5.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with editor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Affected Products: Interactive Geo Maps References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/95ce515a-377c-49b4-8d1b-7ac22769c759'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2861473%40interactive-geo-maps%2Ftrunk&old=2857078%40interactive-geo-maps%2Ftrunk&sfp_email=&sfph_mail=#file4'}] CVE State: PUBLISHED
Explain CVE-2023-0732
Explain the vulnerability: CVE-2023-0732
A vulnerability has been found in SourceCodester Online Eyewear Shop 1.0 and classified as problematic. Affected by this vulnerability is the function registration of the file oews/classes/Users.php of the component POST Request Handler. The manipulation of the argument firstname/middlename/lastname/email/contact leads to cross site scripting. The attack can be launched remotely. The identifier VDB-220369 was assigned to this vulnerability. Affected Products: Online Eyewear Shop References: [{'url': 'https://vuldb.com/?id.220369', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220369', 'tags': ['signature', 'permissions-required']}] CVE State: PUBLISHED
Explain CVE-2023-0733
Explain the vulnerability: CVE-2023-0733
The Newsletter Popup WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow unauthenticated users to perform Stored Cross-Site Scripting attacks Affected Products: Newsletter Popup References: [{'url': 'https://wpscan.com/vulnerability/fed1e184-ff56-44fe-9876-d17c0156447a', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0734
Explain the vulnerability: CVE-2023-0734
Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.4. Affected Products: wallabag/wallabag References: [{'url': 'https://huntr.dev/bounties/a296324c-6925-4f5f-a729-39b0d73d5b8b'}, {'url': 'https://github.com/wallabag/wallabag/commit/acd285dcbb71b595e6320bb1d0d3a44cdf646ac0'}] CVE State: PUBLISHED
Explain CVE-2023-0735
Explain the vulnerability: CVE-2023-0735
Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.5.4. Affected Products: wallabag/wallabag References: [{'url': 'https://huntr.dev/bounties/8bc78cb1-b10b-4152-842e-ceb999fc5508'}, {'url': 'https://github.com/wallabag/wallabag/commit/268372dbbdd7ef87b84617fdebf95d0a86caf7dc'}] CVE State: PUBLISHED
Explain CVE-2023-0736
Explain the vulnerability: CVE-2023-0736
Cross-site Scripting (XSS) - Stored in GitHub repository wallabag/wallabag prior to 2.5.4. Affected Products: wallabag/wallabag References: [{'url': 'https://huntr.dev/bounties/7e6f9614-6a96-4295-83f0-06a240be844e'}, {'url': 'https://github.com/wallabag/wallabag/commit/4e023bddc3622ba5e901cc14a261fcb98d955cd7'}] CVE State: PUBLISHED
Explain CVE-2023-0738
Explain the vulnerability: CVE-2023-0738
OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html. Affected Products: OrangeScrum References: [{'url': 'https://github.com/Orangescrum/orangescrum/'}, {'url': 'https://fluidattacks.com/advisories/eilish/'}] CVE State: PUBLISHED
Explain CVE-2023-0739
Explain the vulnerability: CVE-2023-0739
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in GitHub repository answerdev/answer prior to 1.0.4. Affected Products: answerdev/answer References: [{'url': 'https://huntr.dev/bounties/93d7fac9-50be-4624-9096-45b89fbfd4ae'}, {'url': 'https://github.com/answerdev/answer/commit/1ee34b884b905d14d4db457563176b77a974b992'}] CVE State: PUBLISHED
Explain CVE-2023-0740
Explain the vulnerability: CVE-2023-0740
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4. Affected Products: answerdev/answer References: [{'url': 'https://github.com/answerdev/answer/commit/c3001de52af91f09c96e701facbce0b9fa0c98ad'}, {'url': 'https://huntr.dev/bounties/802ee76d-fe01-482b-a9a4-34699a7c9110'}] CVE State: PUBLISHED
Explain CVE-2023-0741
Explain the vulnerability: CVE-2023-0741
Cross-site Scripting (XSS) - DOM in GitHub repository answerdev/answer prior to 1.0.4. Affected Products: answerdev/answer References: [{'url': 'https://huntr.dev/bounties/78233bfa-871d-45e1-815f-dee73e397809'}, {'url': 'https://github.com/answerdev/answer/commit/c3001de52af91f09c96e701facbce0b9fa0c98ad'}] CVE State: PUBLISHED
Explain CVE-2023-0742
Explain the vulnerability: CVE-2023-0742
Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4. Affected Products: answerdev/answer References: [{'url': 'https://github.com/answerdev/answer/commit/c3001de52af91f09c96e701facbce0b9fa0c98ad'}, {'url': 'https://huntr.dev/bounties/d73a2c03-7035-453b-9c04-c733ace65544'}] CVE State: PUBLISHED
Explain CVE-2023-0743
Explain the vulnerability: CVE-2023-0743
Cross-site Scripting (XSS) - Generic in GitHub repository answerdev/answer prior to 1.0.4. Affected Products: answerdev/answer References: [{'url': 'https://huntr.dev/bounties/366cf8bb-19f6-4388-b089-d0a260efd863'}, {'url': 'https://github.com/answerdev/answer/commit/860b1a3bd8cfaa8827e6e6f50ab1d98fa4c2c816'}] CVE State: PUBLISHED
Explain CVE-2023-0744
Explain the vulnerability: CVE-2023-0744
Improper Access Control in GitHub repository answerdev/answer prior to 1.0.4. Affected Products: answerdev/answer References: [{'url': 'https://huntr.dev/bounties/35a0e12f-1d54-4fc0-8779-6a4949b7c434'}, {'url': 'https://github.com/answerdev/answer/commit/c1fa2b13f6b547b96da60b23350bbe2b29de542d'}, {'url': 'http://packetstormsecurity.com/files/171733/Answerdev-1.0.3-Account-Takeover.html'}] CVE State: PUBLISHED
Explain CVE-2023-0745
Explain the vulnerability: CVE-2023-0745
Relative Path Traversal vulnerability in YugaByte, Inc. Yugabyte Managed (PlatformReplicationManager.Java modules) allows Path Traversal. This vulnerability is associated with program files PlatformReplicationManager.Java. This issue affects Yugabyte Managed: from 2.0 through 2.13. Affected Products: Yugabyte Managed References: [{'tags': ['issue-tracking'], 'url': 'https://www.yugabyte.com/'}] CVE State: PUBLISHED
Explain CVE-2023-0746
Explain the vulnerability: CVE-2023-0746
The help page in GigaVUE-FM, when using GigaVUE-OS software version 5.0 202, does not require an authenticated user. An attacker could enforce a user into inserting malicious JavaScript code into the URI, that could lead to a Reflected Cross site Scripting. Affected Products: GigaVUE-FM References: [{'url': 'https://www.incibe-cert.es/en/early-warning/ics-advisories/xss-vulnerability-gigavue-fm'}] CVE State: PUBLISHED
Explain CVE-2023-0747
Explain the vulnerability: CVE-2023-0747
Cross-site Scripting (XSS) - Stored in GitHub repository btcpayserver/btcpayserver prior to 1.7.6. Affected Products: btcpayserver/btcpayserver References: [{'url': 'https://huntr.dev/bounties/7830b9b4-af2e-44ef-8b00-ee2491d4e7ff'}, {'url': 'https://github.com/btcpayserver/btcpayserver/commit/d4e464ad4ef0cbbf61751e70f77865de325dd6cf'}] CVE State: PUBLISHED
Explain CVE-2023-0748
Explain the vulnerability: CVE-2023-0748
Open Redirect in GitHub repository btcpayserver/btcpayserver prior to 1.7.6. Affected Products: btcpayserver/btcpayserver References: [{'url': 'https://huntr.dev/bounties/1a0403b6-9ec9-4587-b559-b1afba798c86'}, {'url': 'https://github.com/btcpayserver/btcpayserver/commit/c2cfa17e9619046b43987627b8429541d2834109'}] CVE State: PUBLISHED
Explain CVE-2023-0749
Explain the vulnerability: CVE-2023-0749
The Ocean Extra WordPress plugin before 2.1.3 does not ensure that the template to be loaded via a shortcode is actually a template, allowing any authenticated users such as subscriber to retrieve the content of arbitrary posts, such as draft, private or even password protected ones. Affected Products: Ocean Extra References: [{'url': 'https://wpscan.com/vulnerability/9caa8d2e-383b-47d7-8d21-d2ed6b1664cb', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0750
Explain the vulnerability: CVE-2023-0750
Yellobrik PEC-1864 implements authentication checks via javascript in the frontend interface.  When the device can be accessed over the network an attacker could bypass authentication. This would allow an attacker to : - Change the password, resulting in a DOS of the users - Change the streaming source, compromising the integrity of the stream - Change the streaming destination, compromising the confidentiality of the stream This issue affects Yellowbrik: PEC 1864. No patch has been issued by the manufacturer as this model was discontinued. Affected Products: Yellowbrik References: [{'url': 'https://support.lynx-technik.com/support/solutions/articles/1000317081-pec-1864-web-ui-for-configuration'}] CVE State: PUBLISHED
Explain CVE-2023-0751
Explain the vulnerability: CVE-2023-0751
When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key. Affected Products: FreeBSD References: [{'url': 'https://security.FreeBSD.org/advisories/FreeBSD-SA-23:01.geli.asc'}] CVE State: PUBLISHED
Explain CVE-2023-0754
Explain the vulnerability: CVE-2023-0754
The affected products are vulnerable to an integer overflow or wraparound, which could  allow an attacker to crash the server and remotely execute arbitrary code. Affected Products: ThingWorx Edge C-SDK References: [{'url': 'https://www.cisa.gov/uscert/ics/advisories/icsa-23-054-01'}] CVE State: PUBLISHED
Explain CVE-2023-0755
Explain the vulnerability: CVE-2023-0755
The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code. Affected Products: ThingWorx Edge C-SDK References: [{'url': 'https://www.cisa.gov/uscert/ics/advisories/icsa-23-054-01'}] CVE State: PUBLISHED
Explain CVE-2023-0756
Explain the vulnerability: CVE-2023-0756
An issue has been discovered in GitLab affecting all versions before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. The main branch of a repository with a specially crafted name allows an attacker to create repositories with malicious code, victims who clone or download these repositories will execute arbitrary code on their systems. Affected Products: GitLab References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/390910'}, {'url': 'https://hackerone.com/reports/1864278'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0756.json'}] CVE State: PUBLISHED
Explain CVE-2023-0758
Explain the vulnerability: CVE-2023-0758
A vulnerability was found in glorylion JFinalOA 1.0.2 and classified as critical. This issue affects some unknown processing of the file src/main/java/com/pointlion/mvc/common/model/SysOrg.java. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220469 was assigned to this vulnerability. Affected Products: JFinalOA References: [{'url': 'https://vuldb.com/?id.220469', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220469', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/skisw/Vul/blob/main/vuloa', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0759
Explain the vulnerability: CVE-2023-0759
Privilege Chaining in GitHub repository cockpit-hq/cockpit prior to 2.3.8. Affected Products: cockpit-hq/cockpit References: [{'url': 'https://huntr.dev/bounties/49e2cccc-bb56-4633-ba6a-b3803e251347'}, {'url': 'https://github.com/cockpit-hq/cockpit/commit/78d6ed3bf093ee11356ba66320c628c727068714'}] CVE State: PUBLISHED
Explain CVE-2023-0760
Explain the vulnerability: CVE-2023-0760
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV. Affected Products: gpac/gpac References: [{'url': 'https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21'}, {'url': 'https://github.com/gpac/gpac/commit/ea7395f39f601a7750d48d606e9d10ea0b7beefe'}, {'name': 'DSA-5452', 'tags': ['vendor-advisory'], 'url': 'https://www.debian.org/security/2023/dsa-5452'}] CVE State: PUBLISHED
Explain CVE-2023-0761
Explain the vulnerability: CVE-2023-0761
The Clock In Portal- Staff & Attendance Management WordPress plugin through 2.1 does not have CSRF check when deleting Staff members, which could allow attackers to make logged in admins delete arbitrary Staff via a CSRF attack Affected Products: Clock In Portal- Staff & Attendance Management References: [{'url': 'https://wpscan.com/vulnerability/88fb064e-0001-446c-8e43-9fe3feff6c1f', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0762
Explain the vulnerability: CVE-2023-0762
The Clock In Portal- Staff & Attendance Management WordPress plugin through 2.1 does not have CSRF check when deleting designations, which could allow attackers to make logged in admins delete arbitrary designations via a CSRF attack Affected Products: Clock In Portal- Staff & Attendance Management References: [{'url': 'https://wpscan.com/vulnerability/9be952e0-d8ae-440f-8819-cb19485f35f3', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0763
Explain the vulnerability: CVE-2023-0763
The Clock In Portal- Staff & Attendance Management WordPress plugin through 2.1 does not have CSRF check when deleting Holidays, which could allow attackers to make logged in admins delete arbitrary holidays via a CSRF attack Affected Products: Clock In Portal- Staff & Attendance Management References: [{'url': 'https://wpscan.com/vulnerability/4b55f868-62f8-43a1-9817-68cd1fc6190f', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0764
Explain the vulnerability: CVE-2023-0764
The Gallery by BestWebSoft WordPress plugin before 4.7.0 does not perform proper sanitization of gallery information, leading to a Stored Cross-Site Scription vulnerability. The attacker must have at least the privileges of the Author role. Affected Products: Gallery by BestWebSoft References: [{'url': 'https://wpscan.com/vulnerability/d48c6c50-3734-4191-9833-0d9b09b1bd8a', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0765
Explain the vulnerability: CVE-2023-0765
The Gallery by BestWebSoft WordPress plugin before 4.7.0 does not properly escape values used in SQL queries, leading to an Blind SQL Injection vulnerability. The attacker must have at least the privileges of an Author, and the vendor's Slider plugin (https://wordpress.org/plugins/slider-bws/) must also be installed for this vulnerability to be exploitable. Affected Products: Gallery by BestWebSoft References: [{'url': 'https://wpscan.com/vulnerability/2699cefa-1cae-4ef3-ad81-7f3db3fcce25', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0766
Explain the vulnerability: CVE-2023-0766
The Newsletter Popup WordPress plugin through 1.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks as the wp_newsletter_show_localrecord page is not protected with a nonce. Affected Products: Newsletter Popup References: [{'url': 'https://wpscan.com/vulnerability/90a1976c-0348-41ea-90b4-f7a5d9306c88', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0767
Explain the vulnerability: CVE-2023-0767
An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8. Affected Products: Firefox References: [{'url': 'https://www.mozilla.org/security/advisories/mfsa2023-06/'}, {'url': 'https://www.mozilla.org/security/advisories/mfsa2023-05/'}, {'url': 'https://www.mozilla.org/security/advisories/mfsa2023-07/'}, {'url': 'https://bugzilla.mozilla.org/show_bug.cgi?id=1804640'}, {'url': 'https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html'}] CVE State: PUBLISHED
Explain CVE-2023-0768
Explain the vulnerability: CVE-2023-0768
The Avirato hotels online booking engine WordPress plugin through 5.0.5 does not validate and escape some of its shortcode attributes before using them in SQL statement/s, which could allow any authenticated users, such as subscriber to perform SQL Injection attacks. Affected Products: Avirato hotels online booking engine References: [{'url': 'https://wpscan.com/vulnerability/03d061b4-1b71-44f5-b3dc-f82a5fcd92eb', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0770
Explain the vulnerability: CVE-2023-0770
Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2. Affected Products: gpac/gpac References: [{'url': 'https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd'}, {'url': 'https://github.com/gpac/gpac/commit/c31941822ee275a35bc148382bafef1c53ec1c26'}, {'name': 'DSA-5411', 'tags': ['vendor-advisory'], 'url': 'https://www.debian.org/security/2023/dsa-5411'}] CVE State: PUBLISHED
Explain CVE-2023-0771
Explain the vulnerability: CVE-2023-0771
SQL Injection in GitHub repository ampache/ampache prior to 5.5.7,develop. Affected Products: ampache/ampache References: [{'url': 'https://huntr.dev/bounties/2493f350-271b-4c38-9e1d-c8fa189c5ce1'}, {'url': 'https://github.com/ampache/ampache/commit/c456e66ef6fd8d11390181a40c66910ae01fbf4c'}] CVE State: PUBLISHED
Explain CVE-2023-0772
Explain the vulnerability: CVE-2023-0772
The Popup Builder by OptinMonster WordPress plugin before 2.12.2 does not ensure that the campaign to be loaded via some shortcodes is actually a campaign, allowing any authenticated users such as subscriber to retrieve the content of arbitrary posts, like draft, private or even password protected ones. Affected Products: Popup Builder by OptinMonster References: [{'url': 'https://wpscan.com/vulnerability/28754886-b7b4-44f7-9042-b81c542d3c9c', 'tags': ['exploit', 'vdb-entry', 'technical-description']}] CVE State: PUBLISHED
Explain CVE-2023-0774
Explain the vulnerability: CVE-2023-0774
A vulnerability has been found in SourceCodester Medical Certificate Generator App 1.0 and classified as critical. This vulnerability affects unknown code of the file action.php. The manipulation of the argument lastname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-220558 is the identifier assigned to this vulnerability. Affected Products: Medical Certificate Generator App References: [{'url': 'https://vuldb.com/?id.220558', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220558', 'tags': ['signature', 'permissions-required']}, {'url': 'https://www.youtube.com/watch?v=s3oK5jebx_I', 'tags': ['media-coverage']}] CVE State: PUBLISHED
Explain CVE-2023-0775
Explain the vulnerability: CVE-2023-0775
An invalid ‘prepare write request’ command can cause the Bluetooth LE stack to run out of memory and fail to be able to handle subsequent connection requests, resulting in a denial-of-service. Affected Products: GSDK References: [{'url': 'https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000SMMyGQAX?operationContext=S1'}, {'url': 'https://github.com/SiliconLabs/gecko_sdk'}] CVE State: PUBLISHED
Explain CVE-2023-0776
Explain the vulnerability: CVE-2023-0776
Baicells Nova 436Q, Nova 430E, Nova 430I, and Neutrino 430 LTE TDD eNodeB devices with firmware through QRTB 2.12.7 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce.  Affected Products: Nova 436Q References: [{'url': 'https://baicells.com/Service/Firmware'}] CVE State: PUBLISHED
Explain CVE-2023-0777
Explain the vulnerability: CVE-2023-0777
Authentication Bypass by Primary Weakness in GitHub repository modoboa/modoboa prior to 2.0.4. Affected Products: modoboa/modoboa References: [{'url': 'https://huntr.dev/bounties/a17e7a9f-0fee-4130-a522-5a0466fc17c7'}, {'url': 'https://github.com/modoboa/modoboa/commit/47d17ac6643f870719691073956a26e4be0a4806'}, {'url': 'http://packetstormsecurity.com/files/171744/modoboa-2.0.4-Admin-Takeover.html'}] CVE State: PUBLISHED
Explain CVE-2023-0778
Explain the vulnerability: CVE-2023-0778
A Time-of-check Time-of-use (TOCTOU) flaw was found in podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system. Affected Products: podman References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2168256'}] CVE State: PUBLISHED
Explain CVE-2023-0779
Explain the vulnerability: CVE-2023-0779
At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device’s memory layout, further exploitation is possible. Affected Products: zephyr References: [{'url': 'https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-9xj8-6989-r549'}] CVE State: PUBLISHED
Explain CVE-2023-0780
Explain the vulnerability: CVE-2023-0780
Improper Restriction of Rendered UI Layers or Frames in GitHub repository cockpit-hq/cockpit prior to 2.3.9-dev. Affected Products: cockpit-hq/cockpit References: [{'url': 'https://huntr.dev/bounties/801efd0b-404b-4670-961a-12a986252fa4'}, {'url': 'https://github.com/cockpit-hq/cockpit/commit/8450bdf7e1dc23e9d88adf30a2aa9101c0c41720'}] CVE State: PUBLISHED
Explain CVE-2023-0781
Explain the vulnerability: CVE-2023-0781
A vulnerability was found in SourceCodester Canteen Management System 1.0. It has been declared as critical. This vulnerability affects the function query of the file removeOrder.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220624. Affected Products: Canteen Management System References: [{'url': 'https://vuldb.com/?id.220624', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220624', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/weixin_43864034/article/details/128986083', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0782
Explain the vulnerability: CVE-2023-0782
A vulnerability was found in Tenda AC23 16.03.07.45 and classified as critical. Affected by this issue is the function formSetSysToolDDNS/formGetSysToolDDNS of the file /bin/httpd. The manipulation leads to out-of-bounds write. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220640. Affected Products: AC23 References: [{'url': 'https://vuldb.com/?id.220640', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220640', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/jingping911/tendaAC23overflow/blob/main/README.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0783
Explain the vulnerability: CVE-2023-0783
A vulnerability was found in EcShop 4.1.5. It has been classified as critical. This affects an unknown part of the file /ecshop/admin/template.php of the component PHP File Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220641 was assigned to this vulnerability. Affected Products: EcShop References: [{'url': 'https://vuldb.com/?id.220641', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.220641', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/jingping911/exshopbug/blob/main/README.md', 'tags': ['exploit']}] CVE State: PUBLISHED
Explain CVE-2023-0784
Explain the vulnerability: CVE-2023-0784
A vulnerability classified as critical has been found in SourceCodester Best Online News Portal 1.0. Affected is an unknown function of the component Login Page. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220644. Affected Products: Best Online News Portal References: [{'url': 'https://vuldb.com/?id.220644', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220644', 'tags': ['signature', 'permissions-required']}, {'url': 'https://youtu.be/V62MSWhLGL4', 'tags': ['media-coverage']}] CVE State: PUBLISHED
Explain CVE-2023-0785
Explain the vulnerability: CVE-2023-0785
A vulnerability classified as problematic was found in SourceCodester Best Online News Portal 1.0. Affected by this vulnerability is an unknown functionality of the file check_availability.php. The manipulation of the argument username leads to exposure of sensitive information through data queries. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220645 was assigned to this vulnerability. Affected Products: Best Online News Portal References: [{'url': 'https://vuldb.com/?id.220645', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220645', 'tags': ['signature', 'permissions-required']}, {'url': 'https://youtu.be/n_BfBlsUIN8', 'tags': ['media-coverage']}] CVE State: PUBLISHED
Explain CVE-2023-0786
Explain the vulnerability: CVE-2023-0786
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/8c74ccab-0d1d-4c6b-a0fa-803aa65de04f'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/ce676eb9e9d8cb7864f36ee124e838b1ad15415f'}] CVE State: PUBLISHED
Explain CVE-2023-0787
Explain the vulnerability: CVE-2023-0787
Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/87397c71-7b84-4617-a66e-fa6c73be9024'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/b76d58321a7a595eeaf4f7a30403ca6cd8506612'}] CVE State: PUBLISHED
Explain CVE-2023-0788
Explain the vulnerability: CVE-2023-0788
Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11. Affected Products: thorsten/phpmyfaq References: [{'url': 'https://huntr.dev/bounties/808d5452-607c-4af1-812f-26c49faf3e61'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/77b42b9d0be3990ee7389207a71528b304b03039'}] CVE State: PUBLISHED