instruction
stringlengths 21
21
| input
stringlengths 40
40
| output
stringlengths 62
37.3k
|
---|---|---|
Explain CVE-2023-0680 | Explain the vulnerability: CVE-2023-0680 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-2023-0681 | Explain the vulnerability: CVE-2023-0681 | Rapid7 InsightVM versions 6.6.178 and lower suffers from an open redirect vulnerability, whereby an attacker has the ability to redirect the user to a site of the attacker’s choice using the ‘page’ parameter of the ‘data/console/redirect’ component of the application. This issue was resolved in the February, 2023 release of version 6.6.179.
Affected Products: Nexpose
References: [{'tags': ['release-notes'], 'url': 'https://docs.rapid7.com/release-notes/nexpose/20230208/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0683 | Explain the vulnerability: CVE-2023-0683 | A valid, authenticated XCC user with read only access may gain elevated privileges through a specifically crafted API call.
Affected Products: XClarity Controller
References: [{'url': 'https://support.lenovo.com/us/en/product_security/LEN-99936'}]
CVE State: PUBLISHED |
Explain CVE-2023-0684 | Explain the vulnerability: CVE-2023-0684 | The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_unassign_folders function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as changing the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/29358ea9-21b7-4294-8fc9-0d38e689cf53'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0685 | Explain the vulnerability: CVE-2023-0685 | The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_unassign_folders function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin..
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/e52b27fa-10e8-43d0-be29-774c2f5487ae'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0686 | Explain the vulnerability: CVE-2023-0686 | A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been classified as critical. This affects the function update_cart of the file /oews/classes/Master.php?f=update_cart of the component HTTP POST Request Handler. The manipulation of the argument cart_id leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-220245 was assigned to this vulnerability.
Affected Products: Online Eyewear Shop
References: [{'url': 'https://vuldb.com/?id.220245', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220245', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0687 | Explain the vulnerability: CVE-2023-0687 | A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.
Affected Products: C Library
References: [{'url': 'https://vuldb.com/?id.220246'}, {'url': 'https://vuldb.com/?ctiid.220246'}, {'url': 'https://sourceware.org/bugzilla/show_bug.cgi?id=29444'}, {'url': 'https://patchwork.sourceware.org/project/glibc/patch/20230204114138.5436-1-leo%40yuriev.ru/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0688 | Explain the vulnerability: CVE-2023-0688 | The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_thankyou' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about form submissions, including payment status, and transaction ID.
Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/81fc41a4-9206-404c-bd5b-821c77ff3593?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2910040/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0690 | Explain the vulnerability: CVE-2023-0690 | HashiCorp Boundary from 0.10.0 through 0.11.2 contain an issue where when using a PKI-based worker with a Key Management Service (KMS) defined in the configuration file, new credentials created after an automatic rotation may not have been encrypted via the intended KMS. This would result in the credentials being stored in plaintext on the Boundary PKI worker’s disk.
This issue is fixed in version 0.12.0.
Affected Products: Boundary
References: [{'url': 'https://discuss.hashicorp.com/t/hcsec-2023-03-boundary-workers-store-rotated-credentials-in-plaintext-even-when-key-management-service-configured/49907'}]
CVE State: PUBLISHED |
Explain CVE-2023-0691 | Explain the vulnerability: CVE-2023-0691 | The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_last_name' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about arbitrary form submissions, specifically the submitter's last name.
Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/8fc4b815-dc05-4270-bf7a-3b01622739d7?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2910040/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0692 | Explain the vulnerability: CVE-2023-0692 | The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_payment_status' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about the payment status of arbitrary form submissions.
Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/ddd85ff2-6607-4ac8-b91c-88f6f2fa6c56?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2910040/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0693 | Explain the vulnerability: CVE-2023-0693 | The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf_transaction_id' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about the transaction ids of arbitrary form submissions that included payment.
Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/1f33a8db-7cd0-4a53-b2c1-cd5b7cd16214?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2910040/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0694 | Explain the vulnerability: CVE-2023-0694 | The Metform Elementor Contact Form Builder for WordPress is vulnerable to Information Disclosure via the 'mf' shortcode in versions up to, and including, 3.3.1. This allows authenticated attackers, with subscriber-level capabilities or above to obtain sensitive information about any standard form field of any form submission.
Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/1a8b194c-371f-4adc-98fa-8f4e47a38ee7?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2910040/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0695 | Explain the vulnerability: CVE-2023-0695 | The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'mf' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a specific link. Note that getting the JavaScript to execute still requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database.
Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/1c866d8d-399c-4bda-a3c9-17c7e5d2ffb8?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}]
CVE State: PUBLISHED |
Explain CVE-2023-0696 | Explain the vulnerability: CVE-2023-0696 | Type confusion in V8 in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1402270'}]
CVE State: PUBLISHED |
Explain CVE-2023-0697 | Explain the vulnerability: CVE-2023-0697 | Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 110.0.5481.77 allowed a remote attacker to spoof the contents of the security UI via a crafted HTML page. (Chromium security severity: High)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1341541'}]
CVE State: PUBLISHED |
Explain CVE-2023-0698 | Explain the vulnerability: CVE-2023-0698 | Out of bounds read in WebRTC in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1403573'}, {'url': 'https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1693'}]
CVE State: PUBLISHED |
Explain CVE-2023-0699 | Explain the vulnerability: CVE-2023-0699 | Use after free in GPU in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page and browser shutdown. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1371859'}]
CVE State: PUBLISHED |
Explain CVE-2023-0700 | Explain the vulnerability: CVE-2023-0700 | Inappropriate implementation in Download in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1393732'}]
CVE State: PUBLISHED |
Explain CVE-2023-0701 | Explain the vulnerability: CVE-2023-0701 | Heap buffer overflow in WebUI in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interaction . (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1405123'}]
CVE State: PUBLISHED |
Explain CVE-2023-0702 | Explain the vulnerability: CVE-2023-0702 | Type confusion in Data Transfer in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1316301'}]
CVE State: PUBLISHED |
Explain CVE-2023-0703 | Explain the vulnerability: CVE-2023-0703 | Type confusion in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who convinced a user to engage in specific UI interactions to potentially exploit heap corruption via UI interactions. (Chromium security severity: Medium)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1405574'}]
CVE State: PUBLISHED |
Explain CVE-2023-0704 | Explain the vulnerability: CVE-2023-0704 | Insufficient policy enforcement in DevTools in Google Chrome prior to 110.0.5481.77 allowed a remote attacker to bypass same origin policy and proxy settings via a crafted HTML page. (Chromium security severity: Low)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1385982'}]
CVE State: PUBLISHED |
Explain CVE-2023-0705 | Explain the vulnerability: CVE-2023-0705 | Integer overflow in Core in Google Chrome prior to 110.0.5481.77 allowed a remote attacker who had one a race condition to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)
Affected Products: Chrome
References: [{'url': 'https://chromereleases.googleblog.com/2023/02/stable-channel-update-for-desktop.html'}, {'url': 'https://crbug.com/1238642'}]
CVE State: PUBLISHED |
Explain CVE-2023-0706 | Explain the vulnerability: CVE-2023-0706 | A vulnerability, which was classified as critical, has been found in SourceCodester Medical Certificate Generator App 1.0. Affected by this issue is some unknown functionality of the file manage_record.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-220340.
Affected Products: Medical Certificate Generator App
References: [{'url': 'https://vuldb.com/?id.220340', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220340', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0707 | Explain the vulnerability: CVE-2023-0707 | A vulnerability was found in SourceCodester Medical Certificate Generator App 1.0. It has been rated as critical. Affected by this issue is the function delete_record of the file function.php. The manipulation of the argument id leads to sql injection. VDB-220346 is the identifier assigned to this vulnerability.
Affected Products: Medical Certificate Generator App
References: [{'url': 'https://vuldb.com/?id.220346', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220346', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0708 | Explain the vulnerability: CVE-2023-0708 | The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'mf_first_name' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a a page containing the shortcode when the submission id is present in the query string. Note that getting the JavaScript to execute requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database.
Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/ae7549db-9a4b-4dee-8023-d7863dc3b4c8?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2907471/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0709 | Explain the vulnerability: CVE-2023-0709 | The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'mf_last_name' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a a page containing the shortcode when the submission id is present in the query string. Note that getting the JavaScript to execute requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database.
Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/25200656-a6a2-42f2-a607-26d4ff502cbf?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2907471/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0710 | Explain the vulnerability: CVE-2023-0710 | The Metform Elementor Contact Form Builder for WordPress is vulnerable to Cross-Site Scripting by using the 'fname' attribute of the 'mf_thankyou' shortcode to echo unescaped form submissions in versions up to, and including, 3.3.0. This allows authenticated attackers, with contributor-level permissions or above, to inject arbitrary web scripts in pages that will execute when the victim visits a a page containing the shortcode when the submission id is present in the query string. Note that getting the JavaScript to execute requires user interaction as the victim must visit a crafted link with the form entry id, but the script itself is stored in the site database. Additionally this requires successful payment, increasing the complexity.
Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/89a98053-33c7-4e75-87a1-0f483a990641?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078'}]
CVE State: PUBLISHED |
Explain CVE-2023-0711 | Explain the vulnerability: CVE-2023-0711 | The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_state function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the view state of the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/d1c43e93-69a3-407e-860e-ab25af5d7177'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0712 | Explain the vulnerability: CVE-2023-0712 | The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_move_object function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/0be428ae-40ae-4cc0-82ad-d121b6d2d27e'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0713 | Explain the vulnerability: CVE-2023-0713 | The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_add_folder function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/2764b360-228d-48c1-8a29-d3764e532799'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0715 | Explain the vulnerability: CVE-2023-0715 | The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_clone_folder function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/c3728280-3487-4cb2-8e37-f33811bc0a22'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0716 | Explain the vulnerability: CVE-2023-0716 | The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_edit_folder function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/3ad60a11-e307-4ec9-9099-091a87ff1d3b'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0717 | Explain the vulnerability: CVE-2023-0717 | The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_delete_folder function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/35fb658f-6ffa-4df7-bfcd-25307d89fc26'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0718 | Explain the vulnerability: CVE-2023-0718 | The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_folder function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/2c26d6de-5653-4be8-9526-39b30cb61625'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0719 | Explain the vulnerability: CVE-2023-0719 | The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_sort_order function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/9b26604b-2423-4130-b0ef-8f63a392c760'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0720 | Explain the vulnerability: CVE-2023-0720 | The Wicked Folders plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the ajax_save_folder_order function in versions up to, and including, 2.18.16. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke this function and perform actions intended for administrators such as modifying the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/8d392d0b-f286-44da-aa32-a08d0279baed'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0721 | Explain the vulnerability: CVE-2023-0721 | The Metform Elementor Contact Form Builder plugin for WordPress is vulnerable to CSV injection in versions up to, and including, 3.3.0. This allows unauthenticated attackers to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.
Affected Products: Metform Elementor Contact Form Builder – Flexible and Design-Friendly Contact Form builder plugin for WordPress
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/ccd85a72-1872-4c4f-8ba7-7f91b0b37d4a?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/metform/trunk/core/entries/export.php?rev=2845078'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2907471/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0722 | Explain the vulnerability: CVE-2023-0722 | The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_state function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/261a1bf0-a147-48c8-878e-f9b725ac74d8'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0723 | Explain the vulnerability: CVE-2023-0723 | The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_move_object function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/dc01108f-e781-484b-997a-c1d4e218a3f4'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0724 | Explain the vulnerability: CVE-2023-0724 | The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_add_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/08c0ea6c-7e2f-482f-b30c-0e3bcd992159'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0725 | Explain the vulnerability: CVE-2023-0725 | The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_clone_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/80797183-c69f-4dce-a2e0-52a395ceffaa'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0726 | Explain the vulnerability: CVE-2023-0726 | The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_edit_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/51b88442-3961-42e2-8ff4-7726819a7f0f'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0727 | Explain the vulnerability: CVE-2023-0727 | The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_delete_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/62b56928-7125-4211-b233-07b5b51881c1'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0728 | Explain the vulnerability: CVE-2023-0728 | The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_folder function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/43b43802-f301-4748-98b9-eea78a249355'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0729 | Explain the vulnerability: CVE-2023-0729 | The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_sort_order function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/ae8dbf54-ea62-4901-b34f-079b708ca0b5?source=cve'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0730 | Explain the vulnerability: CVE-2023-0730 | The Wicked Folders plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.18.16. This is due to missing or incorrect nonce validation on the ajax_save_folder_order function. This makes it possible for unauthenticated attackers to invoke this function via forged request granted they can trick a site administrator into performing an action such as clicking on a link leading them to perform actions intended for administrators such as changing the folder structure maintained by the plugin.
Affected Products: Wicked Folders
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/4104f69f-b185-498a-aabf-2126ffb94ab3'}, {'url': 'https://plugins.trac.wordpress.org/browser/wicked-folders/tags/2.18.16/lib/class-wicked-folders-ajax.php'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2860994%40wicked-folders%2Ftrunk&old=2805161%40wicked-folders%2Ftrunk&sfp_email=&sfph_mail='}]
CVE State: PUBLISHED |
Explain CVE-2023-0731 | Explain the vulnerability: CVE-2023-0731 | The Interactive Geo Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the action content parameter in versions up to, and including, 1.5.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with editor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected Products: Interactive Geo Maps
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/95ce515a-377c-49b4-8d1b-7ac22769c759'}, {'url': 'https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2861473%40interactive-geo-maps%2Ftrunk&old=2857078%40interactive-geo-maps%2Ftrunk&sfp_email=&sfph_mail=#file4'}]
CVE State: PUBLISHED |
Explain CVE-2023-0732 | Explain the vulnerability: CVE-2023-0732 | A vulnerability has been found in SourceCodester Online Eyewear Shop 1.0 and classified as problematic. Affected by this vulnerability is the function registration of the file oews/classes/Users.php of the component POST Request Handler. The manipulation of the argument firstname/middlename/lastname/email/contact leads to cross site scripting. The attack can be launched remotely. The identifier VDB-220369 was assigned to this vulnerability.
Affected Products: Online Eyewear Shop
References: [{'url': 'https://vuldb.com/?id.220369', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220369', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-0733 | Explain the vulnerability: CVE-2023-0733 | The Newsletter Popup WordPress plugin through 1.2 does not sanitise and escape some of its settings, which could allow unauthenticated users to perform Stored Cross-Site Scripting attacks
Affected Products: Newsletter Popup
References: [{'url': 'https://wpscan.com/vulnerability/fed1e184-ff56-44fe-9876-d17c0156447a', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0734 | Explain the vulnerability: CVE-2023-0734 | Improper Authorization in GitHub repository wallabag/wallabag prior to 2.5.4.
Affected Products: wallabag/wallabag
References: [{'url': 'https://huntr.dev/bounties/a296324c-6925-4f5f-a729-39b0d73d5b8b'}, {'url': 'https://github.com/wallabag/wallabag/commit/acd285dcbb71b595e6320bb1d0d3a44cdf646ac0'}]
CVE State: PUBLISHED |
Explain CVE-2023-0735 | Explain the vulnerability: CVE-2023-0735 | Cross-Site Request Forgery (CSRF) in GitHub repository wallabag/wallabag prior to 2.5.4.
Affected Products: wallabag/wallabag
References: [{'url': 'https://huntr.dev/bounties/8bc78cb1-b10b-4152-842e-ceb999fc5508'}, {'url': 'https://github.com/wallabag/wallabag/commit/268372dbbdd7ef87b84617fdebf95d0a86caf7dc'}]
CVE State: PUBLISHED |
Explain CVE-2023-0736 | Explain the vulnerability: CVE-2023-0736 | Cross-site Scripting (XSS) - Stored in GitHub repository wallabag/wallabag prior to 2.5.4.
Affected Products: wallabag/wallabag
References: [{'url': 'https://huntr.dev/bounties/7e6f9614-6a96-4295-83f0-06a240be844e'}, {'url': 'https://github.com/wallabag/wallabag/commit/4e023bddc3622ba5e901cc14a261fcb98d955cd7'}]
CVE State: PUBLISHED |
Explain CVE-2023-0738 | Explain the vulnerability: CVE-2023-0738 | OrangeScrum version 2.0.11 allows an external attacker to obtain arbitrary user accounts from the application. This is possible because the application returns malicious user input in the response with the content-type set to text/html.
Affected Products: OrangeScrum
References: [{'url': 'https://github.com/Orangescrum/orangescrum/'}, {'url': 'https://fluidattacks.com/advisories/eilish/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0739 | Explain the vulnerability: CVE-2023-0739 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in GitHub repository answerdev/answer prior to 1.0.4.
Affected Products: answerdev/answer
References: [{'url': 'https://huntr.dev/bounties/93d7fac9-50be-4624-9096-45b89fbfd4ae'}, {'url': 'https://github.com/answerdev/answer/commit/1ee34b884b905d14d4db457563176b77a974b992'}]
CVE State: PUBLISHED |
Explain CVE-2023-0740 | Explain the vulnerability: CVE-2023-0740 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4.
Affected Products: answerdev/answer
References: [{'url': 'https://github.com/answerdev/answer/commit/c3001de52af91f09c96e701facbce0b9fa0c98ad'}, {'url': 'https://huntr.dev/bounties/802ee76d-fe01-482b-a9a4-34699a7c9110'}]
CVE State: PUBLISHED |
Explain CVE-2023-0741 | Explain the vulnerability: CVE-2023-0741 | Cross-site Scripting (XSS) - DOM in GitHub repository answerdev/answer prior to 1.0.4.
Affected Products: answerdev/answer
References: [{'url': 'https://huntr.dev/bounties/78233bfa-871d-45e1-815f-dee73e397809'}, {'url': 'https://github.com/answerdev/answer/commit/c3001de52af91f09c96e701facbce0b9fa0c98ad'}]
CVE State: PUBLISHED |
Explain CVE-2023-0742 | Explain the vulnerability: CVE-2023-0742 | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.4.
Affected Products: answerdev/answer
References: [{'url': 'https://github.com/answerdev/answer/commit/c3001de52af91f09c96e701facbce0b9fa0c98ad'}, {'url': 'https://huntr.dev/bounties/d73a2c03-7035-453b-9c04-c733ace65544'}]
CVE State: PUBLISHED |
Explain CVE-2023-0743 | Explain the vulnerability: CVE-2023-0743 | Cross-site Scripting (XSS) - Generic in GitHub repository answerdev/answer prior to 1.0.4.
Affected Products: answerdev/answer
References: [{'url': 'https://huntr.dev/bounties/366cf8bb-19f6-4388-b089-d0a260efd863'}, {'url': 'https://github.com/answerdev/answer/commit/860b1a3bd8cfaa8827e6e6f50ab1d98fa4c2c816'}]
CVE State: PUBLISHED |
Explain CVE-2023-0744 | Explain the vulnerability: CVE-2023-0744 | Improper Access Control in GitHub repository answerdev/answer prior to 1.0.4.
Affected Products: answerdev/answer
References: [{'url': 'https://huntr.dev/bounties/35a0e12f-1d54-4fc0-8779-6a4949b7c434'}, {'url': 'https://github.com/answerdev/answer/commit/c1fa2b13f6b547b96da60b23350bbe2b29de542d'}, {'url': 'http://packetstormsecurity.com/files/171733/Answerdev-1.0.3-Account-Takeover.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-0745 | Explain the vulnerability: CVE-2023-0745 | Relative Path Traversal vulnerability in YugaByte, Inc. Yugabyte Managed (PlatformReplicationManager.Java modules) allows Path Traversal. This vulnerability is associated with program files PlatformReplicationManager.Java.
This issue affects Yugabyte Managed: from 2.0 through 2.13.
Affected Products: Yugabyte Managed
References: [{'tags': ['issue-tracking'], 'url': 'https://www.yugabyte.com/'}]
CVE State: PUBLISHED |
Explain CVE-2023-0746 | Explain the vulnerability: CVE-2023-0746 | The help page in GigaVUE-FM, when using GigaVUE-OS software version 5.0 202, does not require an authenticated user. An attacker could enforce a user into inserting malicious JavaScript code into the URI, that could lead to a Reflected Cross site Scripting.
Affected Products: GigaVUE-FM
References: [{'url': 'https://www.incibe-cert.es/en/early-warning/ics-advisories/xss-vulnerability-gigavue-fm'}]
CVE State: PUBLISHED |
Explain CVE-2023-0747 | Explain the vulnerability: CVE-2023-0747 | Cross-site Scripting (XSS) - Stored in GitHub repository btcpayserver/btcpayserver prior to 1.7.6.
Affected Products: btcpayserver/btcpayserver
References: [{'url': 'https://huntr.dev/bounties/7830b9b4-af2e-44ef-8b00-ee2491d4e7ff'}, {'url': 'https://github.com/btcpayserver/btcpayserver/commit/d4e464ad4ef0cbbf61751e70f77865de325dd6cf'}]
CVE State: PUBLISHED |
Explain CVE-2023-0748 | Explain the vulnerability: CVE-2023-0748 | Open Redirect in GitHub repository btcpayserver/btcpayserver prior to 1.7.6.
Affected Products: btcpayserver/btcpayserver
References: [{'url': 'https://huntr.dev/bounties/1a0403b6-9ec9-4587-b559-b1afba798c86'}, {'url': 'https://github.com/btcpayserver/btcpayserver/commit/c2cfa17e9619046b43987627b8429541d2834109'}]
CVE State: PUBLISHED |
Explain CVE-2023-0749 | Explain the vulnerability: CVE-2023-0749 | The Ocean Extra WordPress plugin before 2.1.3 does not ensure that the template to be loaded via a shortcode is actually a template, allowing any authenticated users such as subscriber to retrieve the content of arbitrary posts, such as draft, private or even password protected ones.
Affected Products: Ocean Extra
References: [{'url': 'https://wpscan.com/vulnerability/9caa8d2e-383b-47d7-8d21-d2ed6b1664cb', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0750 | Explain the vulnerability: CVE-2023-0750 | Yellobrik PEC-1864 implements authentication checks via javascript in the frontend interface. When the device can be accessed over the network an attacker could bypass authentication.
This would allow an attacker to :
- Change the password, resulting in a DOS of the users
- Change the streaming source, compromising the integrity of the stream
- Change the streaming destination, compromising the confidentiality of the stream
This issue affects Yellowbrik: PEC 1864. No patch has been issued by the manufacturer as this model was discontinued.
Affected Products: Yellowbrik
References: [{'url': 'https://support.lynx-technik.com/support/solutions/articles/1000317081-pec-1864-web-ui-for-configuration'}]
CVE State: PUBLISHED |
Explain CVE-2023-0751 | Explain the vulnerability: CVE-2023-0751 | When GELI reads a key file from standard input, it does not reuse the key file to initialize multiple providers at once resulting in the second and subsequent devices silently using a NULL key as the user key file. If a user only uses a key file without a user passphrase, the master key is encrypted with an empty key file allowing trivial recovery of the master key.
Affected Products: FreeBSD
References: [{'url': 'https://security.FreeBSD.org/advisories/FreeBSD-SA-23:01.geli.asc'}]
CVE State: PUBLISHED |
Explain CVE-2023-0754 | Explain the vulnerability: CVE-2023-0754 |
The affected products are vulnerable to an integer
overflow or wraparound, which could allow an attacker to crash the server and remotely
execute arbitrary code.
Affected Products: ThingWorx Edge C-SDK
References: [{'url': 'https://www.cisa.gov/uscert/ics/advisories/icsa-23-054-01'}]
CVE State: PUBLISHED |
Explain CVE-2023-0755 | Explain the vulnerability: CVE-2023-0755 |
The affected products are vulnerable to an improper validation of array index, which could allow an attacker to crash the server and remotely execute arbitrary code.
Affected Products: ThingWorx Edge C-SDK
References: [{'url': 'https://www.cisa.gov/uscert/ics/advisories/icsa-23-054-01'}]
CVE State: PUBLISHED |
Explain CVE-2023-0756 | Explain the vulnerability: CVE-2023-0756 | An issue has been discovered in GitLab affecting all versions before 15.9.6, all versions starting from 15.10 before 15.10.5, all versions starting from 15.11 before 15.11.1. The main branch of a repository with a specially crafted name allows an attacker to create repositories with malicious code, victims who clone or download these repositories will execute arbitrary code on their systems.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/390910'}, {'url': 'https://hackerone.com/reports/1864278'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0756.json'}]
CVE State: PUBLISHED |
Explain CVE-2023-0758 | Explain the vulnerability: CVE-2023-0758 | A vulnerability was found in glorylion JFinalOA 1.0.2 and classified as critical. This issue affects some unknown processing of the file src/main/java/com/pointlion/mvc/common/model/SysOrg.java. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220469 was assigned to this vulnerability.
Affected Products: JFinalOA
References: [{'url': 'https://vuldb.com/?id.220469', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220469', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/skisw/Vul/blob/main/vuloa', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0759 | Explain the vulnerability: CVE-2023-0759 | Privilege Chaining in GitHub repository cockpit-hq/cockpit prior to 2.3.8.
Affected Products: cockpit-hq/cockpit
References: [{'url': 'https://huntr.dev/bounties/49e2cccc-bb56-4633-ba6a-b3803e251347'}, {'url': 'https://github.com/cockpit-hq/cockpit/commit/78d6ed3bf093ee11356ba66320c628c727068714'}]
CVE State: PUBLISHED |
Explain CVE-2023-0760 | Explain the vulnerability: CVE-2023-0760 | Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to V2.1.0-DEV.
Affected Products: gpac/gpac
References: [{'url': 'https://huntr.dev/bounties/d06223df-a473-4c82-96d0-23726b844b21'}, {'url': 'https://github.com/gpac/gpac/commit/ea7395f39f601a7750d48d606e9d10ea0b7beefe'}, {'name': 'DSA-5452', 'tags': ['vendor-advisory'], 'url': 'https://www.debian.org/security/2023/dsa-5452'}]
CVE State: PUBLISHED |
Explain CVE-2023-0761 | Explain the vulnerability: CVE-2023-0761 | The Clock In Portal- Staff & Attendance Management WordPress plugin through 2.1 does not have CSRF check when deleting Staff members, which could allow attackers to make logged in admins delete arbitrary Staff via a CSRF attack
Affected Products: Clock In Portal- Staff & Attendance Management
References: [{'url': 'https://wpscan.com/vulnerability/88fb064e-0001-446c-8e43-9fe3feff6c1f', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0762 | Explain the vulnerability: CVE-2023-0762 | The Clock In Portal- Staff & Attendance Management WordPress plugin through 2.1 does not have CSRF check when deleting designations, which could allow attackers to make logged in admins delete arbitrary designations via a CSRF attack
Affected Products: Clock In Portal- Staff & Attendance Management
References: [{'url': 'https://wpscan.com/vulnerability/9be952e0-d8ae-440f-8819-cb19485f35f3', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0763 | Explain the vulnerability: CVE-2023-0763 | The Clock In Portal- Staff & Attendance Management WordPress plugin through 2.1 does not have CSRF check when deleting Holidays, which could allow attackers to make logged in admins delete arbitrary holidays via a CSRF attack
Affected Products: Clock In Portal- Staff & Attendance Management
References: [{'url': 'https://wpscan.com/vulnerability/4b55f868-62f8-43a1-9817-68cd1fc6190f', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0764 | Explain the vulnerability: CVE-2023-0764 | The Gallery by BestWebSoft WordPress plugin before 4.7.0 does not perform proper sanitization of gallery information, leading to a Stored Cross-Site Scription vulnerability. The attacker must have at least the privileges of the Author role.
Affected Products: Gallery by BestWebSoft
References: [{'url': 'https://wpscan.com/vulnerability/d48c6c50-3734-4191-9833-0d9b09b1bd8a', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0765 | Explain the vulnerability: CVE-2023-0765 | The Gallery by BestWebSoft WordPress plugin before 4.7.0 does not properly escape values used in SQL queries, leading to an Blind SQL Injection vulnerability. The attacker must have at least the privileges of an Author, and the vendor's Slider plugin (https://wordpress.org/plugins/slider-bws/) must also be installed for this vulnerability to be exploitable.
Affected Products: Gallery by BestWebSoft
References: [{'url': 'https://wpscan.com/vulnerability/2699cefa-1cae-4ef3-ad81-7f3db3fcce25', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0766 | Explain the vulnerability: CVE-2023-0766 | The Newsletter Popup WordPress plugin through 1.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks as the wp_newsletter_show_localrecord page is not protected with a nonce.
Affected Products: Newsletter Popup
References: [{'url': 'https://wpscan.com/vulnerability/90a1976c-0348-41ea-90b4-f7a5d9306c88', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0767 | Explain the vulnerability: CVE-2023-0767 | An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
Affected Products: Firefox
References: [{'url': 'https://www.mozilla.org/security/advisories/mfsa2023-06/'}, {'url': 'https://www.mozilla.org/security/advisories/mfsa2023-05/'}, {'url': 'https://www.mozilla.org/security/advisories/mfsa2023-07/'}, {'url': 'https://bugzilla.mozilla.org/show_bug.cgi?id=1804640'}, {'url': 'https://alas.aws.amazon.com/AL2/ALAS-2023-1992.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-0768 | Explain the vulnerability: CVE-2023-0768 | The Avirato hotels online booking engine WordPress plugin through 5.0.5 does not validate and escape some of its shortcode attributes before using them in SQL statement/s, which could allow any authenticated users, such as subscriber to perform SQL Injection attacks.
Affected Products: Avirato hotels online booking engine
References: [{'url': 'https://wpscan.com/vulnerability/03d061b4-1b71-44f5-b3dc-f82a5fcd92eb', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0770 | Explain the vulnerability: CVE-2023-0770 | Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.
Affected Products: gpac/gpac
References: [{'url': 'https://huntr.dev/bounties/e0fdeee5-7909-446e-9bd0-db80fd80e8dd'}, {'url': 'https://github.com/gpac/gpac/commit/c31941822ee275a35bc148382bafef1c53ec1c26'}, {'name': 'DSA-5411', 'tags': ['vendor-advisory'], 'url': 'https://www.debian.org/security/2023/dsa-5411'}]
CVE State: PUBLISHED |
Explain CVE-2023-0771 | Explain the vulnerability: CVE-2023-0771 | SQL Injection in GitHub repository ampache/ampache prior to 5.5.7,develop.
Affected Products: ampache/ampache
References: [{'url': 'https://huntr.dev/bounties/2493f350-271b-4c38-9e1d-c8fa189c5ce1'}, {'url': 'https://github.com/ampache/ampache/commit/c456e66ef6fd8d11390181a40c66910ae01fbf4c'}]
CVE State: PUBLISHED |
Explain CVE-2023-0772 | Explain the vulnerability: CVE-2023-0772 | The Popup Builder by OptinMonster WordPress plugin before 2.12.2 does not ensure that the campaign to be loaded via some shortcodes is actually a campaign, allowing any authenticated users such as subscriber to retrieve the content of arbitrary posts, like draft, private or even password protected ones.
Affected Products: Popup Builder by OptinMonster
References: [{'url': 'https://wpscan.com/vulnerability/28754886-b7b4-44f7-9042-b81c542d3c9c', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-0774 | Explain the vulnerability: CVE-2023-0774 | A vulnerability has been found in SourceCodester Medical Certificate Generator App 1.0 and classified as critical. This vulnerability affects unknown code of the file action.php. The manipulation of the argument lastname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-220558 is the identifier assigned to this vulnerability.
Affected Products: Medical Certificate Generator App
References: [{'url': 'https://vuldb.com/?id.220558', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220558', 'tags': ['signature', 'permissions-required']}, {'url': 'https://www.youtube.com/watch?v=s3oK5jebx_I', 'tags': ['media-coverage']}]
CVE State: PUBLISHED |
Explain CVE-2023-0775 | Explain the vulnerability: CVE-2023-0775 | An invalid ‘prepare write request’ command can cause the Bluetooth LE stack to run out of memory and fail to be able to handle subsequent connection requests, resulting in a denial-of-service.
Affected Products: GSDK
References: [{'url': 'https://siliconlabs.lightning.force.com/sfc/servlet.shepherd/document/download/0698Y00000SMMyGQAX?operationContext=S1'}, {'url': 'https://github.com/SiliconLabs/gecko_sdk'}]
CVE State: PUBLISHED |
Explain CVE-2023-0776 | Explain the vulnerability: CVE-2023-0776 | Baicells Nova 436Q, Nova 430E, Nova 430I, and Neutrino 430 LTE TDD eNodeB devices with firmware through QRTB 2.12.7 are vulnerable to remote shell code exploitation via HTTP command injections. Commands are executed using pre-login execution and executed with root permissions. The following methods below have been tested and validated by a 3rd party analyst and has been confirmed exploitable special thanks to Rustam Amin for providing the steps to reproduce.
Affected Products: Nova 436Q
References: [{'url': 'https://baicells.com/Service/Firmware'}]
CVE State: PUBLISHED |
Explain CVE-2023-0777 | Explain the vulnerability: CVE-2023-0777 | Authentication Bypass by Primary Weakness in GitHub repository modoboa/modoboa prior to 2.0.4.
Affected Products: modoboa/modoboa
References: [{'url': 'https://huntr.dev/bounties/a17e7a9f-0fee-4130-a522-5a0466fc17c7'}, {'url': 'https://github.com/modoboa/modoboa/commit/47d17ac6643f870719691073956a26e4be0a4806'}, {'url': 'http://packetstormsecurity.com/files/171744/modoboa-2.0.4-Admin-Takeover.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-0778 | Explain the vulnerability: CVE-2023-0778 | A Time-of-check Time-of-use (TOCTOU) flaw was found in podman. This issue may allow a malicious user to replace a normal file in a volume with a symlink while exporting the volume, allowing for access to arbitrary files on the host file system.
Affected Products: podman
References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2168256'}]
CVE State: PUBLISHED |
Explain CVE-2023-0779 | Explain the vulnerability: CVE-2023-0779 | At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device’s memory layout, further exploitation is possible.
Affected Products: zephyr
References: [{'url': 'https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-9xj8-6989-r549'}]
CVE State: PUBLISHED |
Explain CVE-2023-0780 | Explain the vulnerability: CVE-2023-0780 | Improper Restriction of Rendered UI Layers or Frames in GitHub repository cockpit-hq/cockpit prior to 2.3.9-dev.
Affected Products: cockpit-hq/cockpit
References: [{'url': 'https://huntr.dev/bounties/801efd0b-404b-4670-961a-12a986252fa4'}, {'url': 'https://github.com/cockpit-hq/cockpit/commit/8450bdf7e1dc23e9d88adf30a2aa9101c0c41720'}]
CVE State: PUBLISHED |
Explain CVE-2023-0781 | Explain the vulnerability: CVE-2023-0781 | A vulnerability was found in SourceCodester Canteen Management System 1.0. It has been declared as critical. This vulnerability affects the function query of the file removeOrder.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220624.
Affected Products: Canteen Management System
References: [{'url': 'https://vuldb.com/?id.220624', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220624', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/weixin_43864034/article/details/128986083', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0782 | Explain the vulnerability: CVE-2023-0782 | A vulnerability was found in Tenda AC23 16.03.07.45 and classified as critical. Affected by this issue is the function formSetSysToolDDNS/formGetSysToolDDNS of the file /bin/httpd. The manipulation leads to out-of-bounds write. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220640.
Affected Products: AC23
References: [{'url': 'https://vuldb.com/?id.220640', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220640', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/jingping911/tendaAC23overflow/blob/main/README.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0783 | Explain the vulnerability: CVE-2023-0783 | A vulnerability was found in EcShop 4.1.5. It has been classified as critical. This affects an unknown part of the file /ecshop/admin/template.php of the component PHP File Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220641 was assigned to this vulnerability.
Affected Products: EcShop
References: [{'url': 'https://vuldb.com/?id.220641', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.220641', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/jingping911/exshopbug/blob/main/README.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-0784 | Explain the vulnerability: CVE-2023-0784 | A vulnerability classified as critical has been found in SourceCodester Best Online News Portal 1.0. Affected is an unknown function of the component Login Page. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220644.
Affected Products: Best Online News Portal
References: [{'url': 'https://vuldb.com/?id.220644', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220644', 'tags': ['signature', 'permissions-required']}, {'url': 'https://youtu.be/V62MSWhLGL4', 'tags': ['media-coverage']}]
CVE State: PUBLISHED |
Explain CVE-2023-0785 | Explain the vulnerability: CVE-2023-0785 | A vulnerability classified as problematic was found in SourceCodester Best Online News Portal 1.0. Affected by this vulnerability is an unknown functionality of the file check_availability.php. The manipulation of the argument username leads to exposure of sensitive information through data queries. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-220645 was assigned to this vulnerability.
Affected Products: Best Online News Portal
References: [{'url': 'https://vuldb.com/?id.220645', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.220645', 'tags': ['signature', 'permissions-required']}, {'url': 'https://youtu.be/n_BfBlsUIN8', 'tags': ['media-coverage']}]
CVE State: PUBLISHED |
Explain CVE-2023-0786 | Explain the vulnerability: CVE-2023-0786 | Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/8c74ccab-0d1d-4c6b-a0fa-803aa65de04f'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/ce676eb9e9d8cb7864f36ee124e838b1ad15415f'}]
CVE State: PUBLISHED |
Explain CVE-2023-0787 | Explain the vulnerability: CVE-2023-0787 | Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/87397c71-7b84-4617-a66e-fa6c73be9024'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/b76d58321a7a595eeaf4f7a30403ca6cd8506612'}]
CVE State: PUBLISHED |
Explain CVE-2023-0788 | Explain the vulnerability: CVE-2023-0788 | Code Injection in GitHub repository thorsten/phpmyfaq prior to 3.1.11.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/808d5452-607c-4af1-812f-26c49faf3e61'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/77b42b9d0be3990ee7389207a71528b304b03039'}]
CVE State: PUBLISHED |