instruction
stringlengths 21
21
| input
stringlengths 40
40
| output
stringlengths 62
37.3k
|
---|---|---|
Explain CVE-2023-1566 | Explain the vulnerability: CVE-2023-1566 | A vulnerability was found in SourceCodester Medical Certificate Generator App 1.0. It has been declared as critical. This vulnerability affects unknown code of the file action.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-223558 is the identifier assigned to this vulnerability.
Affected Products: Medical Certificate Generator App
References: [{'url': 'https://vuldb.com/?id.223558', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223558', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Medical%20Certificate%20Generator%20App/Medical%20Certificate%20Generator%20App%20-%20vlun(2).pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1567 | Explain the vulnerability: CVE-2023-1567 | A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/assign/assign.php. The manipulation of the argument sid leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223559.
Affected Products: Student Study Center Desk Management System
References: [{'url': 'https://vuldb.com/?id.223559', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223559', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Student%20Study%20Center%20Desk%20Management%20System/Student%20Study%20Center%20Desk%20Management%20System%20-%20vlun1.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1568 | Explain the vulnerability: CVE-2023-1568 | A vulnerability classified as problematic has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file /admin/reports/index.php of the component GET Parameter Handler. The manipulation of the argument date_to leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223560.
Affected Products: Student Study Center Desk Management System
References: [{'url': 'https://vuldb.com/?id.223560', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223560', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Student%20Study%20Center%20Desk%20Management%20System/Student%20Study%20Center%20Desk%20Management%20System%20-%20vlun2.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1569 | Explain the vulnerability: CVE-2023-1569 | A vulnerability classified as problematic was found in SourceCodester E-Commerce System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/user/controller.php?action=edit. The manipulation of the argument U_NAME with the input <script>alert('1')</script> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223561 was assigned to this vulnerability.
Affected Products: E-Commerce System
References: [{'url': 'https://vuldb.com/?id.223561', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223561', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1570 | Explain the vulnerability: CVE-2023-1570 | A vulnerability, which was classified as problematic, has been found in syoyo tinydng. Affected by this issue is the function __interceptor_memcpy of the file tiny_dng_loader.h. The manipulation leads to heap-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. It is recommended to apply a patch to fix this issue. VDB-223562 is the identifier assigned to this vulnerability.
Affected Products: tinydng
References: [{'url': 'https://vuldb.com/?id.223562', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223562', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/syoyo/tinydng/issues/28', 'tags': ['issue-tracking']}, {'url': 'https://github.com/syoyo/tinydng/issues/29', 'tags': ['issue-tracking']}, {'url': 'https://github.com/10cksYiqiyinHangzhouTechnology/tinydngSecurityIssueReport1', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1571 | Explain the vulnerability: CVE-2023-1571 | A vulnerability, which was classified as critical, was found in DataGear up to 4.5.0. This affects an unknown part of the file /analysisProject/pagingQueryData. The manipulation of the argument queryOrder leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.5.1 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-223563.
Affected Products: DataGear
References: [{'url': 'https://vuldb.com/?id.223563', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223563', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/yangyanglo/ForCVE/blob/main/2023-0x01.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1572 | Explain the vulnerability: CVE-2023-1572 | A vulnerability has been found in DataGear up to 1.11.1 and classified as problematic. This vulnerability affects unknown code of the component Plugin Handler. The manipulation leads to cross site scripting. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.12.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-223564.
Affected Products: DataGear
References: [{'url': 'https://vuldb.com/?id.223564', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.223564', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/yangyanglo/ForCVE/edit/main/2023-0x03.md', 'tags': ['related']}, {'url': 'https://github.com/yangyanglo/ForCVE/blob/main/2023-0x03.md', 'tags': ['exploit']}, {'url': 'https://github.com/datageartech/datagear/releases/tag/v1.12.0', 'tags': ['patch']}]
CVE State: PUBLISHED |
Explain CVE-2023-1573 | Explain the vulnerability: CVE-2023-1573 | A vulnerability was found in DataGear up to 1.11.1 and classified as problematic. This issue affects some unknown processing of the component Graph Dataset Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.12.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-223565 was assigned to this vulnerability.
Affected Products: DataGear
References: [{'url': 'https://vuldb.com/?id.223565', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.223565', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/yangyanglo/ForCVE/blob/main/2023-0x04.md', 'tags': ['exploit']}, {'url': 'https://github.com/datageartech/datagear/releases/tag/v1.12.0', 'tags': ['patch']}]
CVE State: PUBLISHED |
Explain CVE-2023-1574 | Explain the vulnerability: CVE-2023-1574 | Information disclosure in the user creation feature of a MSSQL data source in Devolutions Remote Desktop Manager 2023.1.9 and below on Windows allows an attacker with access to the user interface to obtain sensitive information via the error message dialog that displays the password in clear text.
Affected Products: Remote Desktop Manager
References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0006'}]
CVE State: PUBLISHED |
Explain CVE-2023-1575 | Explain the vulnerability: CVE-2023-1575 | The Mega Main Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via some of its settings parameters in versions up to, and including, 2.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Affected Products: Mega Main Menu
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/a44ce6a3-0a9d-4bce-9251-f3a38b000645?source=cve'}, {'url': 'https://codecanyon.net/item/mega-main-menu-wordpress-menu-plugin/6135125'}]
CVE State: PUBLISHED |
Explain CVE-2023-1578 | Explain the vulnerability: CVE-2023-1578 | SQL Injection in GitHub repository pimcore/pimcore prior to 10.5.19.
Affected Products: pimcore/pimcore
References: [{'url': 'https://huntr.dev/bounties/7e441a14-8e55-4ab4-932c-4dc56bb1bc2e'}, {'url': 'https://github.com/pimcore/pimcore/commit/367b74488808d71ec3f66f4ca9e8df5217c2c8d2'}]
CVE State: PUBLISHED |
Explain CVE-2023-1579 | Explain the vulnerability: CVE-2023-1579 | Heap based buffer overflow in binutils-gdb/bfd/libbfd.c in bfd_getl64.
Affected Products: binutils
References: [{'url': 'https://sourceware.org/bugzilla/show_bug.cgi?id=29988'}, {'url': 'https://security.netapp.com/advisory/ntap-20230511-0009/'}, {'url': 'https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git%3Bh=11d171f1910b508a81d21faa087ad1af573407d8'}]
CVE State: PUBLISHED |
Explain CVE-2023-1580 | Explain the vulnerability: CVE-2023-1580 | Uncontrolled resource consumption in the logging feature in Devolutions Gateway 2023.1.1 and earlier allows an attacker to cause a denial of service by filling up the disk and render the system unusable.
Affected Products: Gateway
References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0007'}]
CVE State: PUBLISHED |
Explain CVE-2023-1582 | Explain the vulnerability: CVE-2023-1582 | A race problem was found in fs/proc/task_mmu.c in the memory management sub-component in the Linux kernel. This issue may allow a local attacker with user privilege to cause a denial of service.
Affected Products: Linux
References: [{'url': 'https://lore.kernel.org/linux-mm/Yg6ac8WlwtnDH6M0%40kroah.com/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1583 | Explain the vulnerability: CVE-2023-1583 | A NULL pointer dereference was found in io_file_bitmap_get in io_uring/filetable.c in the io_uring sub-component in the Linux Kernel. When fixed files are unregistered, some context information (file_alloc_{start,end} and alloc_hint) is not cleared. A subsequent request that has auto index selection enabled via IORING_FILE_INDEX_ALLOC can cause a NULL pointer dereference. An unprivileged user can use the flaw to cause a system crash.
Affected Products: Linux kernel
References: [{'url': 'https://git.kernel.org/pub/scm/linux/kernel/git/axboe/linux-block.git/commit/?h=io_uring-6.3&id=761efd55a0227aca3a69deacdaa112fffd44fe37'}, {'url': 'https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=02a4d923e4400a36d340ea12d8058f69ebf3a383'}]
CVE State: PUBLISHED |
Explain CVE-2023-1585 | Explain the vulnerability: CVE-2023-1585 | Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU) vulnerability in the Quarantine process, leading to arbitrary file/directory deletion. The issue was fixed with Avast and AVG Antivirus version 22.11 and virus definitions from 14 February 2023 or later.
Affected Products: Avast Antivirus
References: [{'url': 'https://support.norton.com/sp/static/external/tools/security-advisories.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-1586 | Explain the vulnerability: CVE-2023-1586 | Avast and AVG Antivirus for Windows were susceptible to a Time-of-check/Time-of-use (TOCTOU) vulnerability in the restore process leading to arbitrary file creation. The issue was fixed with Avast and AVG Antivirus version 22.11
Affected Products: Avast Antivirus
References: [{'url': 'https://support.norton.com/sp/static/external/tools/security-advisories.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-1587 | Explain the vulnerability: CVE-2023-1587 | Avast and AVG Antivirus for Windows were susceptible to a NULL pointer dereference issue via RPC-interface. The issue was fixed with Avast and AVG Antivirus version 22.11
Affected Products: Avast Antivirus
References: [{'url': 'https://support.norton.com/sp/static/external/tools/security-advisories.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-1588 | Explain the vulnerability: CVE-2023-1588 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-2023-1589 | Explain the vulnerability: CVE-2023-1589 | A vulnerability has been found in SourceCodester Online Tours & Travels Management System 1.0 and classified as critical. This vulnerability affects the function exec of the file admin/operations/approve_delete.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-223654 is the identifier assigned to this vulnerability.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.223654', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223654', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/weixin_43864034/article/details/129729911', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1590 | Explain the vulnerability: CVE-2023-1590 | A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0 and classified as critical. This issue affects the function exec of the file admin/operations/currency.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223655.
Affected Products: Online Tours & Travels Management System
References: [{'url': 'https://vuldb.com/?id.223655', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223655', 'tags': ['signature', 'permissions-required']}, {'url': 'https://blog.csdn.net/weixin_43864034/article/details/129730106', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1591 | Explain the vulnerability: CVE-2023-1591 | A vulnerability classified as critical has been found in SourceCodester Automatic Question Paper Generator System 1.0. This affects an unknown part of the file classes/Users.php?f=save_ruser. The manipulation of the argument id/email leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-223659.
Affected Products: Automatic Question Paper Generator System
References: [{'url': 'https://vuldb.com/?id.223659', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223659', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1592 | Explain the vulnerability: CVE-2023-1592 | A vulnerability classified as critical was found in SourceCodester Automatic Question Paper Generator System 1.0. This vulnerability affects unknown code of the file admin/courses/view_class.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-223660.
Affected Products: Automatic Question Paper Generator System
References: [{'url': 'https://vuldb.com/?id.223660', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223660', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1593 | Explain the vulnerability: CVE-2023-1593 | A vulnerability, which was classified as problematic, has been found in SourceCodester Automatic Question Paper Generator System 1.0. This issue affects some unknown processing of the file classes/Master.php?f=save_class. The manipulation of the argument description leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-223661 was assigned to this vulnerability.
Affected Products: Automatic Question Paper Generator System
References: [{'url': 'https://vuldb.com/?id.223661', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223661', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1594 | Explain the vulnerability: CVE-2023-1594 | A vulnerability, which was classified as critical, was found in novel-plus 3.6.2. Affected is the function MenuService of the file sys/menu/list. The manipulation of the argument sort leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-223662 is the identifier assigned to this vulnerability.
Affected Products: novel-plus
References: [{'url': 'https://vuldb.com/?id.223662', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223662', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/OYyunshen/Poc/blob/main/Novel-PlusV3.6.2Sqli.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1595 | Explain the vulnerability: CVE-2023-1595 | A vulnerability has been found in novel-plus 3.6.2 and classified as critical. Affected by this vulnerability is an unknown functionality of the file common/log/list. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223663.
Affected Products: novel-plus
References: [{'url': 'https://vuldb.com/?id.223663', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223663', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/1610349395/novel-plus-v3.6.2----Background-SQL-Injection-Vulnerability-/blob/main/novel-plus%20v3.6.2%20--%20Background%20SQL%20Injection%20Vulnerability.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1596 | Explain the vulnerability: CVE-2023-1596 | The tagDiv Composer WordPress plugin before 4.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Affected Products: tagDiv Composer
References: [{'url': 'https://wpscan.com/vulnerability/cada9be9-522a-4ce8-847d-c8fff2ddcc07', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1597 | Explain the vulnerability: CVE-2023-1597 | The tagDiv Cloud Library WordPress plugin before 2.7 does not have authorisation and CSRF in an AJAX action accessible to both unauthenticated and authenticated users, allowing unauthenticated users to change arbitrary user metadata, which could lead to privilege escalation by setting themselves as an admin of the blog.
Affected Products: tagDiv Cloud Library
References: [{'url': 'https://wpscan.com/vulnerability/4eafe111-8874-4560-83ff-394abe7a803b', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1598 | Explain the vulnerability: CVE-2023-1598 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-2023-1601 | Explain the vulnerability: CVE-2023-1601 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-2023-1602 | Explain the vulnerability: CVE-2023-1602 | The Short URL plugin for WordPress is vulnerable to stored Cross-Site Scripting via the 'comment' parameter due to insufficient input sanitization and output escaping in versions up to, and including, 1.6.4. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected Products: Short URL
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/a5f29f35-da79-4389-a0a5-a1be0b0b8996?source=cve'}, {'url': 'https://wordpress.org/plugins/shorten-url/#developers'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2931815/shorten-url/trunk/shorten-url.php'}]
CVE State: PUBLISHED |
Explain CVE-2023-1603 | Explain the vulnerability: CVE-2023-1603 |
Permission bypass when importing or synchronizing entries in User vault
in Devolutions Server 2022.3.13 and prior versions allows users with restricted rights to bypass entry permission via id collision.
Affected Products: Server
References: [{'url': 'https://devolutions.net/security/advisories/DEVO-2023-0008'}]
CVE State: PUBLISHED |
Explain CVE-2023-1605 | Explain the vulnerability: CVE-2023-1605 | Denial of Service in GitHub repository radareorg/radare2 prior to 5.8.6.
Affected Products: radareorg/radare2
References: [{'url': 'https://huntr.dev/bounties/9dddcf5b-7dd4-46cc-abf9-172dce20bab2'}, {'url': 'https://github.com/radareorg/radare2/commit/508a6307045441defd1bef0999a1f7052097613f'}]
CVE State: PUBLISHED |
Explain CVE-2023-1606 | Explain the vulnerability: CVE-2023-1606 | A vulnerability was found in novel-plus 3.6.2 and classified as critical. Affected by this issue is some unknown functionality of the file DictController.java. The manipulation of the argument orderby leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223736.
Affected Products: novel-plus
References: [{'url': 'https://vuldb.com/?id.223736', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223736', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/OYyunshen/Poc/blob/main/Novel-PlusSqli1.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1607 | Explain the vulnerability: CVE-2023-1607 | A vulnerability was found in novel-plus 3.6.2. It has been classified as critical. This affects an unknown part of the file /common/sysFile/list. The manipulation of the argument sort leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-223737 was assigned to this vulnerability.
Affected Products: novel-plus
References: [{'url': 'https://vuldb.com/?id.223737', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223737', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/1610349395/novel-plus-v3.6.2----SQL-Injection-Vulnerability-/blob/main/novel-plus%20v3.6.2%20--%20%20SQL%20Injection%20Vulnerability%20.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1608 | Explain the vulnerability: CVE-2023-1608 | A vulnerability was found in Zhong Bang CRMEB Java up to 1.3.4. It has been declared as critical. This vulnerability affects the function getAdminList of the file /api/admin/store/product/list. The manipulation of the argument cateId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-223738 is the identifier assigned to this vulnerability.
Affected Products: CRMEB Java
References: [{'url': 'https://vuldb.com/?id.223738', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223738', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/crmeb/crmeb_java/issues/11', 'tags': ['exploit', 'issue-tracking']}]
CVE State: PUBLISHED |
Explain CVE-2023-1609 | Explain the vulnerability: CVE-2023-1609 | A vulnerability was found in Zhong Bang CRMEB Java up to 1.3.4. It has been rated as problematic. This issue affects the function save of the file /api/admin/store/product/save. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223739.
Affected Products: CRMEB Java
References: [{'url': 'https://vuldb.com/?id.223739', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223739', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/crmeb/crmeb_java/issues/12', 'tags': ['exploit', 'issue-tracking']}]
CVE State: PUBLISHED |
Explain CVE-2023-1610 | Explain the vulnerability: CVE-2023-1610 | A vulnerability, which was classified as critical, has been found in Rebuild up to 3.2.3. Affected by this issue is some unknown functionality of the file /project/tasks/list. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. VDB-223742 is the identifier assigned to this vulnerability.
Affected Products: Rebuild
References: [{'url': 'https://vuldb.com/?id.223742', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.223742', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/getrebuild/rebuild/issues/597', 'tags': ['exploit', 'issue-tracking']}]
CVE State: PUBLISHED |
Explain CVE-2023-1611 | Explain the vulnerability: CVE-2023-1611 | A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea
Affected Products: Kernel
References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2181342'}, {'url': 'https://lore.kernel.org/linux-btrfs/35b9a70650ea947387cf352914a8774b4f7e8a6f.1679481128.git.fdmanana%40suse.com/'}, {'name': 'FEDORA-2023-98251cef79', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZWECAZ7V7EPSXMINO6Q6KWNKDY2CO6ZW/'}, {'name': 'FEDORA-2023-d525cf5272', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5QCM6XO4HSPLGR3DFYWFRIA3GCBIHZR4/'}, {'name': '[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html'}, {'url': 'https://github.com/torvalds/linux/commit/2f1a6be12ab6c8470d5776e68644726c94257c54'}]
CVE State: PUBLISHED |
Explain CVE-2023-1612 | Explain the vulnerability: CVE-2023-1612 | A vulnerability, which was classified as critical, was found in Rebuild up to 3.2.3. This affects an unknown part of the file /files/list-file. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-223743.
Affected Products: Rebuild
References: [{'url': 'https://vuldb.com/?id.223743', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.223743', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/getrebuild/rebuild/issues/598', 'tags': ['exploit', 'issue-tracking']}]
CVE State: PUBLISHED |
Explain CVE-2023-1613 | Explain the vulnerability: CVE-2023-1613 | A vulnerability has been found in Rebuild up to 3.2.3 and classified as problematic. This vulnerability affects unknown code of the file /feeds/post/publish. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-223744.
Affected Products: Rebuild
References: [{'url': 'https://vuldb.com/?id.223744', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.223744', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/getrebuild/rebuild/issues/596', 'tags': ['exploit', 'issue-tracking']}]
CVE State: PUBLISHED |
Explain CVE-2023-1614 | Explain the vulnerability: CVE-2023-1614 | The WP Custom Author URL WordPress plugin before 1.0.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Affected Products: WP Custom Author URL
References: [{'url': 'https://wpscan.com/vulnerability/56abd1e2-0ea9-47f7-9a1b-2093ac15d39c', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1615 | Explain the vulnerability: CVE-2023-1615 | The Ultimate Addons for Contact Form 7 plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in versions up to, and including, 3.1.23. This makes it possible for authenticated attackers of any authorization level to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Affected Products: Ultimate Addons for Contact Form 7
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/817ca119-ddaf-4525-beee-68c4e0aac544?source=cve'}, {'url': 'https://wordpress.org/plugins/ultimate-addons-for-contact-form-7/#developers'}, {'url': 'https://plugins.trac.wordpress.org/browser/ultimate-addons-for-contact-form-7/trunk/addons/database/database.php?rev=2897709#L255'}, {'url': 'https://plugins.trac.wordpress.org/changeset/2901676/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1616 | Explain the vulnerability: CVE-2023-1616 | A vulnerability was found in XiaoBingBy TeaCMS up to 2.0.2. It has been classified as problematic. Affected is an unknown function of the component Article Title Handler. The manipulation with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223800.
Affected Products: TeaCMS
References: [{'url': 'https://vuldb.com/?id.223800', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.223800', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/xiaobingby/TeaCMS/issues/I6L9Z2', 'tags': ['exploit', 'issue-tracking']}]
CVE State: PUBLISHED |
Explain CVE-2023-1617 | Explain the vulnerability: CVE-2023-1617 | Improper Authentication vulnerability in B&R Industrial Automation B&R VC4 (VNC-Server modules). This vulnerability may allow an unauthenticated network-based attacker to bypass the authentication mechanism of the VC4 visualization on affected devices. The impact of this vulnerability depends on the functionality provided in the visualization.
This issue affects B&R VC4: from 3.* through 3.96.7, from 4.0* through 4.06.7, from 4.1* through 4.16.3, from 4.2* through 4.26.8, from 4.3* through 4.34.6, from 4.4* through 4.45.1, from 4.5* through 4.45.3, from 4.7* through 4.72.9.
Affected Products: B&R VC4
References: [{'url': 'https://www.br-automation.com/downloads_br_productcatalogue/assets/1681046878970-en-original-1.0.pdf'}]
CVE State: PUBLISHED |
Explain CVE-2023-1618 | Explain the vulnerability: CVE-2023-1618 | Active Debug Code vulnerability in Mitsubishi Electric Corporation MELSEC WS Series WS0-GETH00200 all versions allows a remote unauthenticated attacker to bypass authentication and illegally log into the affected module by connecting to it via telnet which is hidden function and is enabled by default when shipped from the factory. As a result, a remote attacker with unauthorized login can reset the module, and if certain conditions are met, he/she can disclose or tamper with the module's configuration or rewrite the firmware.
Affected Products: MELSEC WS Series WS0-GETH00200
References: [{'url': 'https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-002_en.pdf'}, {'url': 'https://jvn.jp/vu/JVNVU96063959'}, {'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-138-02'}]
CVE State: PUBLISHED |
Explain CVE-2023-1619 | Explain the vulnerability: CVE-2023-1619 | Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.
Affected Products: 750-8202/xxx-xxx
References: [{'tags': ['vendor-advisory'], 'url': 'https://cert.vde.com/en/advisories/VDE-2023-006/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1620 | Explain the vulnerability: CVE-2023-1620 | Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.
Affected Products: 750-8202/xxx-xxx
References: [{'tags': ['vendor-advisory'], 'url': 'https://cert.vde.com/en/advisories/VDE-2023-006/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1621 | Explain the vulnerability: CVE-2023-1621 | An issue has been discovered in GitLab EE affecting all versions starting from 12.0 before 15.10.5, all versions starting from 15.11 before 15.11.1. A malicious group member may continue to commit to projects even from a restricted IP address.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/399774'}, {'url': 'https://hackerone.com/reports/1914049'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1621.json'}]
CVE State: PUBLISHED |
Explain CVE-2023-1622 | Explain the vulnerability: CVE-2023-1622 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-2023-1623 | Explain the vulnerability: CVE-2023-1623 | The Custom Post Type UI WordPress plugin before 1.13.5 does not properly check for CSRF when sending the debug information to a user supplied email, which could allow attackers to make a logged in admin send such information to an arbitrary email address via a CSRF attack.
Affected Products: Custom Post Type UI
References: [{'url': 'https://wpscan.com/vulnerability/a04d3808-f4fc-4d77-a1bd-be623cd7053e', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1624 | Explain the vulnerability: CVE-2023-1624 | The WPCode WordPress plugin before 2.0.9 has a flawed CSRF when deleting log, and does not ensure that the file to be deleted is inside the expected folder. This could allow attackers to make users with the wpcode_activate_snippets capability delete arbitrary log files on the server, including outside of the blog folders
Affected Products: WPCode
References: [{'url': 'https://wpscan.com/vulnerability/132b70e5-4368-43b4-81f6-2d01bc09dc8f', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1626 | Explain the vulnerability: CVE-2023-1626 | A vulnerability was found in Jianming Antivirus 16.2.2022.418. It has been declared as critical. This vulnerability affects unknown code in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224008.
Affected Products: Antivirus
References: [{'url': 'https://vuldb.com/?id.224008', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224008', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned31', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1soMFXUAYkCttFDA_icry6q-irb2jdAxw/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1627 | Explain the vulnerability: CVE-2023-1627 | A vulnerability was found in Jianming Antivirus 16.2.2022.418. It has been rated as problematic. This issue affects some unknown processing in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier VDB-224009 was assigned to this vulnerability.
Affected Products: Antivirus
References: [{'url': 'https://vuldb.com/?id.224009', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224009', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned29', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1fQFw8ayQUFzJM2_4V-ld8CN8gvisVoiu/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1628 | Explain the vulnerability: CVE-2023-1628 | A vulnerability classified as problematic has been found in Jianming Antivirus 16.2.2022.418. Affected is an unknown function in the library kvcore.sys of the component IoControlCode Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. VDB-224010 is the identifier assigned to this vulnerability.
Affected Products: Antivirus
References: [{'url': 'https://vuldb.com/?id.224010', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224010', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/unassigned30', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1Div9mElTdsluLrU2etziLYqmXcqQFj1j/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1629 | Explain the vulnerability: CVE-2023-1629 | A vulnerability classified as critical was found in JiangMin Antivirus 16.2.2022.418. Affected by this vulnerability is the function 0x222010 in the library kvcore.sys of the component IOCTL Handler. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224011.
Affected Products: Antivirus
References: [{'url': 'https://vuldb.com/?id.224011', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224011', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1629', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1soMFXUAYkCttFDA_icry6q-irb2jdAxw/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1630 | Explain the vulnerability: CVE-2023-1630 | A vulnerability, which was classified as problematic, has been found in JiangMin Antivirus 16.2.2022.418. Affected by this issue is the function 0x222000 in the library kvcore.sys of the component IOCTL Handler. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224012.
Affected Products: Antivirus
References: [{'url': 'https://vuldb.com/?id.224012', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224012', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1630', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1fQFw8ayQUFzJM2_4V-ld8CN8gvisVoiu/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1631 | Explain the vulnerability: CVE-2023-1631 | A vulnerability, which was classified as problematic, was found in JiangMin Antivirus 16.2.2022.418. This affects the function 0x222010 in the library kvcore.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-224013 was assigned to this vulnerability.
Affected Products: Antivirus
References: [{'url': 'https://vuldb.com/?id.224013', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224013', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1631', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1Div9mElTdsluLrU2etziLYqmXcqQFj1j/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1632 | Explain the vulnerability: CVE-2023-1632 | ** DISPUTED ** A vulnerability has been found in Ellucian Banner Web Tailor 8.6 and classified as critical. This vulnerability affects unknown code of the file /PROD_ar/twbkwbis.P_FirstMenu of the component Login Page. The manipulation of the argument PIDM/WEBID leads to improper authorization. The attack can be initiated remotely. After submitting proper login credentials it becomes possible to generate new valid session identifiers on the OTP page. The real existence of this vulnerability is still doubted at the moment. VDB-224014 is the identifier assigned to this vulnerability.
Affected Products: Banner Web Tailor
References: [{'url': 'https://vuldb.com/?id.224014', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224014', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1634 | Explain the vulnerability: CVE-2023-1634 | A vulnerability was found in OTCMS 6.72. It has been classified as critical. Affected is the function UseCurl of the file /admin/info_deal.php of the component URL Parameter Handler. The manipulation leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224016.
Affected Products: OTCMS
References: [{'url': 'https://vuldb.com/?id.224016', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224016', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/BigTiger2020/2023-1/blob/main/ssrf/ssrf.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1635 | Explain the vulnerability: CVE-2023-1635 | A vulnerability was found in OTCMS 6.72. It has been declared as problematic. Affected by this vulnerability is the function AutoRun of the file apiRun.php. The manipulation of the argument mode leads to cross site scripting. The attack can be launched remotely. The identifier VDB-224017 was assigned to this vulnerability.
Affected Products: OTCMS
References: [{'url': 'https://vuldb.com/?id.224017', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224017', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/BigTiger2020/2023/blob/main/XSS.md', 'tags': ['related']}]
CVE State: PUBLISHED |
Explain CVE-2023-1637 | Explain the vulnerability: CVE-2023-1637 | A flaw that boot CPU could be vulnerable for the speculative execution behavior kind of attacks in the Linux kernel X86 CPU Power management options functionality was found in the way user resuming CPU from suspend-to-RAM. A local user could use this flaw to potentially get unauthorized access to some memory of the CPU similar to the speculative execution behavior kind of attacks.
Affected Products: Kernel
References: [{'url': 'https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e2a1256b17b16f9b9adf1b6fea56819e7b68e463'}, {'url': 'https://sourceware.org/bugzilla/show_bug.cgi?id=27398'}]
CVE State: PUBLISHED |
Explain CVE-2023-1638 | Explain the vulnerability: CVE-2023-1638 | A vulnerability was found in IObit Malware Fighter 9.4.0.776. It has been rated as problematic. Affected by this issue is the function 0x8001E024/0x8001E040 in the library ImfRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. VDB-224018 is the identifier assigned to this vulnerability.
Affected Products: Malware Fighter
References: [{'url': 'https://vuldb.com/?id.224018', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224018', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1638', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1_jYlCkQMNaUwGV5QJtyz4zhdTqaGCv6Z/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1639 | Explain the vulnerability: CVE-2023-1639 | A vulnerability classified as problematic has been found in IObit Malware Fighter 9.4.0.776. This affects the function 0x8001E04C in the library ImfRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224019.
Affected Products: Malware Fighter
References: [{'url': 'https://vuldb.com/?id.224019', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224019', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1639', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1hWgHhboaekq4hGIj2kNgEI54rM-u_rvV/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1640 | Explain the vulnerability: CVE-2023-1640 | A vulnerability classified as problematic was found in IObit Malware Fighter 9.4.0.776. This vulnerability affects the function 0x222010 in the library ObCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224020.
Affected Products: Malware Fighter
References: [{'url': 'https://vuldb.com/?id.224020', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224020', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1640', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1AcwSxTA0_zh7mmxU5J8WphRqg_mQsO-g/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1641 | Explain the vulnerability: CVE-2023-1641 | A vulnerability, which was classified as problematic, has been found in IObit Malware Fighter 9.4.0.776. This issue affects the function 0x222018 in the library ObCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier VDB-224021 was assigned to this vulnerability.
Affected Products: Malware Fighter
References: [{'url': 'https://vuldb.com/?id.224021', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224021', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1641', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1ncqfaxSdeu-mGVAOnYxqxYtyyFZClHBF/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1642 | Explain the vulnerability: CVE-2023-1642 | A vulnerability, which was classified as problematic, was found in IObit Malware Fighter 9.4.0.776. Affected is the function 0x222034/0x222038/0x22203C/0x222040 in the library ObCallbackProcess.sys of the component IOCTL Handler. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-224022 is the identifier assigned to this vulnerability.
Affected Products: Malware Fighter
References: [{'url': 'https://vuldb.com/?id.224022', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224022', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1642', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1iWdqJ9PsBp1W5xINpUdQ28xbx_tB9xxf/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1643 | Explain the vulnerability: CVE-2023-1643 | A vulnerability has been found in IObit Malware Fighter 9.4.0.776 and classified as problematic. Affected by this vulnerability is the function 0x8001E000/0x8001E004/0x8001E018/0x8001E01C/0x8001E024/0x8001E040 in the library ImfHpRegFilter.sys of the component IOCTL Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224023.
Affected Products: Malware Fighter
References: [{'url': 'https://vuldb.com/?id.224023', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224023', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1643', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1dHdltwenfMdwAPeb3JPex0fHxfK_iLYh/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1644 | Explain the vulnerability: CVE-2023-1644 | A vulnerability was found in IObit Malware Fighter 9.4.0.776 and classified as problematic. Affected by this issue is the function 0x8018E010 in the library IMFCameraProtect.sys of the component IOCTL Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224024.
Affected Products: Malware Fighter
References: [{'url': 'https://vuldb.com/?id.224024', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224024', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1644', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1TVezyDiS9Kyw7ttNlLBCstpEUqxozha0/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1645 | Explain the vulnerability: CVE-2023-1645 | A vulnerability was found in IObit Malware Fighter 9.4.0.776. It has been classified as problematic. This affects the function 0x8018E008 in the library IMFCameraProtect.sys of the component IOCTL Handler. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier VDB-224025 was assigned to this vulnerability.
Affected Products: Malware Fighter
References: [{'url': 'https://vuldb.com/?id.224025', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224025', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1645', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1RmFSm1sQWwQXPXjkeZtgf8q51hGD8tTf/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1646 | Explain the vulnerability: CVE-2023-1646 | A vulnerability was found in IObit Malware Fighter 9.4.0.776. It has been declared as critical. This vulnerability affects the function 0x8018E000/0x8018E004 in the library IMFCameraProtect.sys of the component IOCTL Handler. The manipulation leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. VDB-224026 is the identifier assigned to this vulnerability.
Affected Products: Malware Fighter
References: [{'url': 'https://vuldb.com/?id.224026', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224026', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1646', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1GITWzh29cRcycVqVJgMJuX6emE_f1KPV/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1647 | Explain the vulnerability: CVE-2023-1647 | Improper Access Control in GitHub repository calcom/cal.com prior to 2.7.
Affected Products: calcom/cal.com
References: [{'url': 'https://huntr.dev/bounties/d6de3d6e-9551-47d1-b28c-7e965c1b82b6'}, {'url': 'https://github.com/calcom/cal.com/commit/c76e5f46101a826b2de39123c22f50c840dddba0'}]
CVE State: PUBLISHED |
Explain CVE-2023-1648 | Explain the vulnerability: CVE-2023-1648 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-2023-1649 | Explain the vulnerability: CVE-2023-1649 | The AI ChatBot WordPress plugin before 4.5.1 does not sanitise and escape numerous of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Affected Products: AI ChatBot
References: [{'url': 'https://wpscan.com/vulnerability/ea806115-14ab-4bc4-a272-2141cb14454a', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1650 | Explain the vulnerability: CVE-2023-1650 | The AI ChatBot WordPress plugin before 4.4.7 unserializes user input from cookies via an AJAX action available to unauthenticated users, which could allow them to perform PHP Object Injection when a suitable gadget is present on the blog
Affected Products: AI ChatBot
References: [{'url': 'https://wpscan.com/vulnerability/7d7fe498-0aa3-4fa7-b560-610b42b2abed', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1651 | Explain the vulnerability: CVE-2023-1651 | The AI ChatBot WordPress plugin before 4.4.9 does not have authorisation and CSRF in the AJAX action responsible to update the OpenAI settings, allowing any authenticated users, such as subscriber to update them. Furthermore, due to the lack of escaping of the settings, this could also lead to Stored XSS
Affected Products: AI ChatBot
References: [{'url': 'https://wpscan.com/vulnerability/c88b22ba-4fc2-49ad-a457-224157521bad', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1652 | Explain the vulnerability: CVE-2023-1652 | A use-after-free flaw was found in nfsd4_ssc_setup_dul in fs/nfsd/nfs4proc.c in the NFS filesystem in the Linux Kernel. This issue could allow a local attacker to crash the system or it may lead to a kernel information leak problem.
Affected Products: Linux Kernel
References: [{'url': 'https://access.redhat.com/security/cve/cve-2023-1652'}, {'url': 'https://security.netapp.com/advisory/ntap-20230511-0006/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1654 | Explain the vulnerability: CVE-2023-1654 | Denial of Service in GitHub repository gpac/gpac prior to 2.4.0.
Affected Products: gpac/gpac
References: [{'url': 'https://huntr.dev/bounties/33652b56-128f-41a7-afcc-10641f69ff14'}, {'url': 'https://github.com/gpac/gpac/commit/2c055153d401b8c49422971e3a0159869652d3da'}, {'name': 'DSA-5411', 'tags': ['vendor-advisory'], 'url': 'https://www.debian.org/security/2023/dsa-5411'}]
CVE State: PUBLISHED |
Explain CVE-2023-1655 | Explain the vulnerability: CVE-2023-1655 | Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.
Affected Products: gpac/gpac
References: [{'url': 'https://huntr.dev/bounties/05f1d1de-bbfd-43fe-bdf9-7f73419ce7c9'}, {'url': 'https://github.com/gpac/gpac/commit/e7f96c2d3774e4ea25f952bcdf55af1dd6e919f4'}]
CVE State: PUBLISHED |
Explain CVE-2023-1656 | Explain the vulnerability: CVE-2023-1656 | Cleartext Transmission of Sensitive Information vulnerability in ForgeRock Inc. OpenIDM and Java Remote Connector Server (RCS) LDAP Connector on Windows, MacOS, Linux allows Remote Services with Stolen Credentials.This issue affects OpenIDM and Java Remote Connector Server (RCS): from 1.5.20.9 through 1.5.20.13.
Affected Products: OpenIDM and Java Remote Connector Server (RCS)
References: [{'tags': ['vendor-advisory'], 'url': 'https://backstage.forgerock.com/knowledge/kb/article/a14149722'}, {'tags': ['product'], 'url': 'https://backstage.forgerock.com/downloads/browse/idm/all/productId:idm-connectors/subProductId:ldap/minorVersion:1.5/version:1.5.20.14'}]
CVE State: PUBLISHED |
Explain CVE-2023-1659 | Explain the vulnerability: CVE-2023-1659 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-2023-1660 | Explain the vulnerability: CVE-2023-1660 | The AI ChatBot WordPress plugin before 4.4.9 does not have authorisation and CSRF in a function hooked to init, allowing unauthenticated users to update some settings, leading to Stored XSS due to the lack of escaping when outputting them in the admin dashboard
Affected Products: AI ChatBot
References: [{'url': 'https://wpscan.com/vulnerability/1a5cbcfc-fa55-433a-a76b-3881b6c4bea2', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1661 | Explain the vulnerability: CVE-2023-1661 | The Display post meta, term meta, comment meta, and user meta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via post metadata in versions up to, and including, 0.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Affected Products: Display post meta, term meta, comment meta, and user meta
References: [{'url': 'https://www.wordfence.com/threat-intel/vulnerabilities/id/6f90c0d8-ede6-4f24-870f-19e888238e93?source=cve'}, {'url': 'https://wordpress.org/plugins/display-metadata/#developers'}]
CVE State: PUBLISHED |
Explain CVE-2023-1663 | Explain the vulnerability: CVE-2023-1663 | Coverity versions prior to 2023.3.2 are vulnerable to forced browsing, which exposes authenticated resources to unauthorized actors. The root cause of this vulnerability is an insecurely configured servlet mapping for the underlying Apache Tomcat server. As a result, the downloads directory and its contents are accessible. 5.9 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:P/RL:O/RC:C)
Affected Products: Coverity
References: [{'tags': ['vendor-advisory'], 'url': 'https://community.synopsys.com/s/article/SIG-Product-Security-Advisory-CVE-2023-1663-Affecting-Coverity-Platform'}, {'tags': ['mitigation'], 'url': 'https://community.synopsys.com/s/article/Mitigation-for-Coverity-Platforms-Exposure-to-CVE-2023-1663'}]
CVE State: PUBLISHED |
Explain CVE-2023-1664 | Explain the vulnerability: CVE-2023-1664 | A flaw was found in Keycloak. This flaw depends on a non-default configuration "Revalidate Client Certificate" to be enabled and the reverse proxy is not validating the certificate before Keycloak. Using this method an attacker may choose the certificate which will be validated by the server. If this happens and the KC_SPI_TRUSTSTORE_FILE_FILE variable is missing/misconfigured, any trustfile may be accepted with the logging information of "Cannot validate client certificate trust: Truststore not available". This may not impact availability as the attacker would have no access to the server, but consumer applications Integrity or Confidentiality may be impacted considering a possible access to them. Considering the environment is correctly set to use "Revalidate Client Certificate" this flaw is avoidable.
Affected Products: Keycloak
References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2182196&comment#0'}]
CVE State: PUBLISHED |
Explain CVE-2023-1665 | Explain the vulnerability: CVE-2023-1665 | Improper Restriction of Excessive Authentication Attempts in GitHub repository linagora/twake prior to 0.0.0.
Affected Products: linagora/twake
References: [{'url': 'https://huntr.dev/bounties/db8fcbab-6ef0-44ba-b5c6-3b0f17ca22a2'}, {'url': 'https://github.com/linagora/twake/commit/599f397561a771251dfc7cafb8cecda5ab22b8b3'}]
CVE State: PUBLISHED |
Explain CVE-2023-1666 | Explain the vulnerability: CVE-2023-1666 | A vulnerability has been found in SourceCodester Automatic Question Paper Generator System 1.0 and classified as critical. This vulnerability affects unknown code of the file users/classes/view_class.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224104.
Affected Products: Automatic Question Paper Generator System
References: [{'url': 'https://vuldb.com/?id.224104', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224104', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/si-xiao-kai/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1667 | Explain the vulnerability: CVE-2023-1667 | A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.
Affected Products: libssh
References: [{'url': 'https://access.redhat.com/security/cve/CVE-2023-1667'}, {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2182199'}, {'url': 'http://www.libssh.org/security/advisories/CVE-2023-1667.txt'}, {'name': 'FEDORA-2023-5fa5ca2043', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27PD44ALQTZXX7K6JAM3BXBUHYA6DFFN/'}, {'name': '[debian-lts-announce] 20230529 [SECURITY] [DLA 3437-1] libssh security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00029.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-1668 | Explain the vulnerability: CVE-2023-1668 | A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
Affected Products: openvswitch
References: [{'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2137666'}, {'url': 'https://www.openwall.com/lists/oss-security/2023/04/06/1'}, {'name': 'DSA-5387', 'tags': ['vendor-advisory'], 'url': 'https://www.debian.org/security/2023/dsa-5387'}, {'name': 'FEDORA-2023-7da03dc2ae', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V2GUNS3WSJG4TUDKZ5L7FXGJMVOD6EJZ/'}, {'name': '[debian-lts-announce] 20230501 [SECURITY] [DLA 3410-1] openvswitch security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00000.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-1669 | Explain the vulnerability: CVE-2023-1669 | The SEOPress WordPress plugin before 6.5.0.3 unserializes user input provided via the settings, which could allow high-privilege users such as admin to perform PHP Object Injection when a suitable gadget is present.
Affected Products: SEOPress
References: [{'url': 'https://wpscan.com/vulnerability/fb8791f5-2879-431e-9afc-06d5839e4b9d', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1670 | Explain the vulnerability: CVE-2023-1670 | A flaw use after free in the Linux kernel Xircom 16-bit PCMCIA (PC-card) Ethernet driver was found.A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
Affected Products: Kernel
References: [{'url': 'https://lore.kernel.org/all/20230316161526.1568982-1-zyytlz.wz%40163.com/'}, {'name': '[debian-lts-announce] 20230502 [SECURITY] [DLA 3404-1] linux-5.10 security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html'}, {'name': '[debian-lts-announce] 20230503 [SECURITY] [DLA 3403-1] linux security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html'}, {'url': 'https://security.netapp.com/advisory/ntap-20230526-0010/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1671 | Explain the vulnerability: CVE-2023-1671 | A pre-auth command injection vulnerability in the warn-proceed handler of Sophos Web Appliance older than version 4.3.10.4 allows execution of arbitrary code.
Affected Products: Sophos Web Appliance
References: [{'url': 'https://www.sophos.com/en-us/security-advisories/sophos-sa-20230404-swa-rce'}, {'url': 'http://packetstormsecurity.com/files/172016/Sophos-Web-Appliance-4.3.10.4-Command-Injection.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-1672 | Explain the vulnerability: CVE-2023-1672 | A race condition exists in the Tang server functionality for key generation and key rotation. This flaw results in a small time window where Tang private keys become readable by other processes on the same host.
Affected Products: tang
References: [{'url': 'https://access.redhat.com/security/cve/CVE-2023-1672', 'tags': ['vdb-entry', 'x_refsource_REDHAT']}, {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2180999', 'name': 'RHBZ#2180999', 'tags': ['issue-tracking', 'x_refsource_REDHAT']}, {'url': 'https://github.com/latchset/tang/commit/8dbbed10870378f1b2c3cf3df2ea7edca7617096'}, {'url': 'https://www.openwall.com/lists/oss-security/2023/06/15/1'}]
CVE State: PUBLISHED |
Explain CVE-2023-1674 | Explain the vulnerability: CVE-2023-1674 | A vulnerability was found in SourceCodester School Registration and Fee System 1.0 and classified as critical. This issue affects some unknown processing of the file /bilal final/login.php of the component POST Parameter Handler. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224231.
Affected Products: School Registration and Fee System
References: [{'url': 'https://vuldb.com/?id.224231', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224231', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/saintone98/bug_report/blob/main/vendors/hemedy99/School%20Registration%20and%20Fee%20System/SQLi-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1675 | Explain the vulnerability: CVE-2023-1675 | A vulnerability was found in SourceCodester School Registration and Fee System 1.0. It has been classified as critical. Affected is an unknown function of the file /bilal final/edit_stud.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224232.
Affected Products: School Registration and Fee System
References: [{'url': 'https://vuldb.com/?id.224232', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224232', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/saintone98/bug_report/blob/main/vendors/hemedy99/School%20Registration%20and%20Fee%20System/SQLi-2.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1676 | Explain the vulnerability: CVE-2023-1676 | A vulnerability was found in DriverGenius 9.70.0.346. It has been declared as critical. Affected by this vulnerability is the function 0x9C402088 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-224233 was assigned to this vulnerability.
Affected Products: DriverGenius
References: [{'url': 'https://vuldb.com/?id.224233', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224233', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1676', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1kYCec3kYCzD9s2Vnclp_aW5jLneWqHC_/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1677 | Explain the vulnerability: CVE-2023-1677 | A vulnerability was found in DriverGenius 9.70.0.346. It has been rated as problematic. Affected by this issue is the function 0x9c40a0c8/0x9c40a0dc/0x9c40a0e0/0x9c40a0d8/0x9c4060d4/0x9c402004/0x9c402088/0x9c40208c/0x9c4060d0/0x9c4060cc/0x9c4060c4/0x9c402084 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. VDB-224234 is the identifier assigned to this vulnerability.
Affected Products: DriverGenius
References: [{'url': 'https://vuldb.com/?id.224234', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224234', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1677', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1C7afiLbOOLuYZVeeslPW3AdNeOIwUea9/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1678 | Explain the vulnerability: CVE-2023-1678 | A vulnerability classified as critical has been found in DriverGenius 9.70.0.346. This affects the function 0x9C40A0D8/0x9C40A0DC/0x9C40A0E0 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224235.
Affected Products: DriverGenius
References: [{'url': 'https://vuldb.com/?id.224235', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224235', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1678', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1VWI0i6Zq-Fi55kbZI6l3dHCeBq-NOlJc/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1679 | Explain the vulnerability: CVE-2023-1679 | A vulnerability classified as critical was found in DriverGenius 9.70.0.346. This vulnerability affects the function 0x9C406104/0x9C40A108 in the library mydrivers64.sys of the component IOCTL Handler. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224236.
Affected Products: DriverGenius
References: [{'url': 'https://vuldb.com/?id.224236', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224236', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1679', 'tags': ['related']}, {'url': 'https://drive.google.com/file/d/1Iz4VTUUVDveZlgtxN9WkvdygHkD1BUCr/view', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1680 | Explain the vulnerability: CVE-2023-1680 | A vulnerability, which was classified as problematic, has been found in Xunrui CMS 4.61. This issue affects some unknown processing of the file /dayrui/My/View/main.html. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224237 was assigned to this vulnerability.
Affected Products: CMS
References: [{'url': 'https://vuldb.com/?id.224237', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224237', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/2714925725/CMS-bug/blob/main/Informationdisclosure-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |