instruction
stringlengths 21
21
| input
stringlengths 40
40
| output
stringlengths 62
37.3k
|
---|---|---|
Explain CVE-2023-1681 | Explain the vulnerability: CVE-2023-1681 | A vulnerability, which was classified as problematic, was found in Xunrui CMS 4.61. Affected is an unknown function of the file /config/myfield/test.php. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-224238 is the identifier assigned to this vulnerability.
Affected Products: CMS
References: [{'url': 'https://vuldb.com/?id.224238', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224238', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/2714925725/CMS-bug/blob/main/Informationdisclosure-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1682 | Explain the vulnerability: CVE-2023-1682 | A vulnerability has been found in Xunrui CMS 4.61 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /dayrui/My/Config/Install.txt. The manipulation leads to direct request. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224239.
Affected Products: CMS
References: [{'url': 'https://vuldb.com/?id.224239', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224239', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/2714925725/CMS-bug/blob/main/Informationdisclosure-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1683 | Explain the vulnerability: CVE-2023-1683 | A vulnerability was found in Xunrui CMS 4.61 and classified as problematic. Affected by this issue is some unknown functionality of the file /dayrui/Fcms/View/system_log.html. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224240.
Affected Products: CMS
References: [{'url': 'https://vuldb.com/?id.224240', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224240', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/2714925725/CMS-bug/blob/main/Informationdisclosure-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1684 | Explain the vulnerability: CVE-2023-1684 | A vulnerability was found in HadSky 7.7.16. It has been classified as problematic. This affects an unknown part of the file upload/index.php?c=app&a=superadmin:index. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224241 was assigned to this vulnerability.
Affected Products: HadSky
References: [{'url': 'https://vuldb.com/?id.224241', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224241', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/wkstestete/cve/blob/master/upload/HadSky.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1685 | Explain the vulnerability: CVE-2023-1685 | A vulnerability was found in HadSky up to 7.11.8. It has been declared as critical. This vulnerability affects unknown code of the file /install/index.php of the component Installation Interface. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224242 is the identifier assigned to this vulnerability.
Affected Products: HadSky
References: [{'url': 'https://vuldb.com/?id.224242', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224242', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/xinbate/cve/blob/master/HadSky%20rce.md', 'tags': ['exploit']}, {'url': 'https://gitee.com/galaxies2580/cve/blob/master/hadSky.md', 'tags': ['related']}]
CVE State: PUBLISHED |
Explain CVE-2023-1686 | Explain the vulnerability: CVE-2023-1686 | A vulnerability was found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file bsenordering/admin/category/index.php of the component GET Parameter Handler. The manipulation of the argument view with the input <script>alert(233)</script> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224243.
Affected Products: Young Entrepreneur E-Negosyo System
References: [{'url': 'https://vuldb.com/?id.224243', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224243', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Apeng96/bug_report/blob/main/XSS-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1687 | Explain the vulnerability: CVE-2023-1687 | A vulnerability classified as problematic has been found in SourceCodester Simple Task Allocation System 1.0. Affected is an unknown function of the file LoginRegistration.php?a=register_user. The manipulation of the argument Fullname leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-224244.
Affected Products: Simple Task Allocation System
References: [{'url': 'https://vuldb.com/?id.224244', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224244', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1688 | Explain the vulnerability: CVE-2023-1688 | A vulnerability classified as problematic has been found in SourceCodester Earnings and Expense Tracker App 1.0. This affects an unknown part of the file Master.php?a=save_expense. The manipulation of the argument name leads to cross site scripting. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-224307.
Affected Products: Earnings and Expense Tracker App
References: [{'url': 'https://vuldb.com/?id.224307', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224307', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1689 | Explain the vulnerability: CVE-2023-1689 | A vulnerability classified as problematic was found in SourceCodester Earnings and Expense Tracker App 1.0. This vulnerability affects unknown code of the file Master.php?a=save_earning. The manipulation of the argument name leads to cross site scripting. The attack can be initiated remotely. The identifier of this vulnerability is VDB-224308.
Affected Products: Earnings and Expense Tracker App
References: [{'url': 'https://vuldb.com/?id.224308', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224308', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1690 | Explain the vulnerability: CVE-2023-1690 | A vulnerability, which was classified as problematic, has been found in SourceCodester Earnings and Expense Tracker App 1.0. This issue affects some unknown processing of the file LoginRegistration.php?a=register_user. The manipulation of the argument fullname leads to cross site scripting. The attack may be initiated remotely. The identifier VDB-224309 was assigned to this vulnerability.
Affected Products: Earnings and Expense Tracker App
References: [{'url': 'https://vuldb.com/?id.224309', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224309', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1691 | Explain the vulnerability: CVE-2023-1691 | Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally.
Affected Products: HarmonyOS
References: [{'url': 'https://consumer.huawei.com/en/support/bulletin/2023/7/'}, {'url': 'https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858'}]
CVE State: PUBLISHED |
Explain CVE-2023-1692 | Explain the vulnerability: CVE-2023-1692 | The window management module lacks permission verification.Successful exploitation of this vulnerability may affect confidentiality.
Affected Products: HarmonyOS
References: [{'url': 'https://consumer.huawei.com/en/support/bulletin/2023/4/'}, {'url': 'https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486'}]
CVE State: PUBLISHED |
Explain CVE-2023-1693 | Explain the vulnerability: CVE-2023-1693 | The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality.
Affected Products: HarmonyOS
References: [{'url': 'https://consumer.huawei.com/en/support/bulletin/2023/4/'}, {'url': 'https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486'}]
CVE State: PUBLISHED |
Explain CVE-2023-1694 | Explain the vulnerability: CVE-2023-1694 | The Settings module has the file privilege escalation vulnerability.Successful exploitation of this vulnerability may affect confidentiality.
Affected Products: HarmonyOS
References: [{'url': 'https://consumer.huawei.com/en/support/bulletin/2023/4/'}, {'url': 'https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486'}]
CVE State: PUBLISHED |
Explain CVE-2023-1695 | Explain the vulnerability: CVE-2023-1695 | Vulnerability of failures to capture exceptions in the communication framework. Successful exploitation of this vulnerability may cause features to perform abnormally.
Affected Products: HarmonyOS
References: [{'url': 'https://consumer.huawei.com/en/support/bulletin/2023/7/'}, {'url': 'https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858'}]
CVE State: PUBLISHED |
Explain CVE-2023-1696 | Explain the vulnerability: CVE-2023-1696 | The multimedia video module has a vulnerability in data processing.Successful exploitation of this vulnerability may affect availability.
Affected Products: HarmonyOS
References: [{'url': 'https://consumer.huawei.com/en/support/bulletin/2023/4/'}, {'url': 'https://device.harmonyos.com/en/docs/security/update/security-bulletins-202304-0000001506528486'}]
CVE State: PUBLISHED |
Explain CVE-2023-1697 | Explain the vulnerability: CVE-2023-1697 | An Improper Handling of Missing Values vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an adjacent, unauthenticated attacker to cause a dcpfe process core and thereby a Denial of Service (DoS). Continued receipt of these specific frames will cause a sustained Denial of Service condition. This issue occurs when a specific malformed ethernet frame is received. This issue affects Juniper Networks Junos OS on QFX10000 Series, PTX1000 Series Series: All versions prior to 19.4R3-S10; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S6; 20.3 versions prior to 20.3R3-S6; 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S1; 22.1 versions prior to 22.1R2-S1, 22.1R3; 22.2 versions prior to 22.2R1-S2, 22.2R2.
Affected Products: Junos OS
References: [{'url': 'https://supportportal.juniper.net/JSA70612'}]
CVE State: PUBLISHED |
Explain CVE-2023-1698 | Explain the vulnerability: CVE-2023-1698 | In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
Affected Products: Compact Controller CC100
References: [{'url': 'https://cert.vde.com/en/advisories/VDE-2023-007/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1699 | Explain the vulnerability: CVE-2023-1699 | Rapid7 Nexpose versions 6.6.186 and below suffer from a forced browsing vulnerability. This vulnerability allows an attacker to manipulate URLs to forcefully browse to and access administrative pages. This vulnerability is fixed in version 6.6.187.
Affected Products: Nexpose
References: [{'url': 'https://docs.rapid7.com/release-notes/nexpose/20230329/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1701 | Explain the vulnerability: CVE-2023-1701 | Cross-site Scripting (XSS) - Reflected in GitHub repository pimcore/pimcore prior to 10.5.20.
Affected Products: pimcore/pimcore
References: [{'url': 'https://huntr.dev/bounties/64f943c4-68e5-4ef8-82f6-9c4abe928256'}, {'url': 'https://github.com/pimcore/pimcore/commit/2b997737dd6a60be2239a51dd6d9ef5881568e6d'}]
CVE State: PUBLISHED |
Explain CVE-2023-1702 | Explain the vulnerability: CVE-2023-1702 | Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.20.
Affected Products: pimcore/pimcore
References: [{'url': 'https://github.com/pimcore/pimcore/commit/2b997737dd6a60be2239a51dd6d9ef5881568e6d'}, {'url': 'https://huntr.dev/bounties/d8a47f29-3297-4fce-b534-e1d95a2b3e19'}]
CVE State: PUBLISHED |
Explain CVE-2023-1703 | Explain the vulnerability: CVE-2023-1703 | Cross-site Scripting (XSS) - Generic in GitHub repository pimcore/pimcore prior to 10.5.20.
Affected Products: pimcore/pimcore
References: [{'url': 'https://huntr.dev/bounties/d12d105c-18fa-4d08-b591-b0e89e39eec1'}, {'url': 'https://github.com/pimcore/pimcore/commit/765832f0dc5f6cfb296a82e089b701066f27bcef'}]
CVE State: PUBLISHED |
Explain CVE-2023-1704 | Explain the vulnerability: CVE-2023-1704 | Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.20.
Affected Products: pimcore/pimcore
References: [{'url': 'https://huntr.dev/bounties/84419c7b-ae29-401b-bdfd-5d0c498d320f'}, {'url': 'https://github.com/pimcore/pimcore/commit/295f5e8d108b68198e36399bea0f69598eb108a0'}]
CVE State: PUBLISHED |
Explain CVE-2023-1706 | Explain the vulnerability: CVE-2023-1706 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-2023-1707 | Explain the vulnerability: CVE-2023-1707 | Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to information disclosure when IPsec is enabled with FutureSmart version 5.6.
Affected Products: HP Enterprise LaserJet and HP LaserJet Managed Printers
References: [{'url': 'https://support.hp.com/us-en/document/ish_7905330-7905358-16/hpsbpi03838'}]
CVE State: PUBLISHED |
Explain CVE-2023-1708 | Explain the vulnerability: CVE-2023-1708 | An issue was identified in GitLab CE/EE affecting all versions from 1.0 prior to 15.8.5, 15.9 prior to 15.9.4, and 15.10 prior to 15.10.1 where non-printable characters gets copied from clipboard, allowing unexpected commands to be executed on victim machine.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/387185'}, {'url': 'https://hackerone.com/reports/1805604'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1708.json'}]
CVE State: PUBLISHED |
Explain CVE-2023-1709 | Explain the vulnerability: CVE-2023-1709 |
Datalogics Library APDFLThe v18.0.4PlusP1e and prior contains a stack-based buffer overflow due to documents containing corrupted fonts, which could allow an attack that causes an unhandled crash during the rendering process.
Affected Products: JT2Go
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-103-11'}, {'url': 'https://cert-portal.siemens.com/productcert/html/ssa-629917.html'}, {'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-164-01'}]
CVE State: PUBLISHED |
Explain CVE-2023-1710 | Explain the vulnerability: CVE-2023-1710 | A sensitive information disclosure vulnerability in GitLab affecting all versions from 15.0 prior to 15.8.5, 15.9 prior to 15.9.4 and 15.10 prior to 15.10.1 allows an attacker to view the count of internal notes for a given issue.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/388242'}, {'url': 'https://hackerone.com/reports/1829768'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1710.json'}]
CVE State: PUBLISHED |
Explain CVE-2023-1711 | Explain the vulnerability: CVE-2023-1711 | A vulnerability exists in a FOXMAN-UN and UNEM logging component, it only affects systems that use remote authentication to the network elements.
If exploited an attacker could obtain confidential information.
List of CPEs:
* cpe:2.3:a:hitachienergy:foxman_un:R9C:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R10C:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R11A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R11B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R14A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R14B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R15A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R15B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy:foxman_un:R16A:*:*:*:*:*:*:*
*
* cpe:2.3:a:hitachienergy:unem:R9C:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R10C:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R11A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R11B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R14A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R14B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R15A:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R15B:*:*:*:*:*:*:*
* cpe:2.3:a:hitachienergy: unem :R16A:*:*:*:*:*:*:*
Affected Products: FOXMAN-UN
References: [{'url': 'https://search.abb.com/library/Download.aspx?DocumentID=8DBD000155&LanguageCode=en&DocumentPartId=&Action=Launch'}, {'url': 'https://search.abb.com/library/Download.aspx?DocumentID=8DBD000166&LanguageCode=en&DocumentPartId=&Action=Launch'}]
CVE State: PUBLISHED |
Explain CVE-2023-1712 | Explain the vulnerability: CVE-2023-1712 | Use of Hard-coded, Security-relevant Constants in GitHub repository deepset-ai/haystack prior to 0.1.30.
Affected Products: deepset-ai/haystack
References: [{'url': 'https://huntr.dev/bounties/9a6b1fb4-ec9b-4cfa-af1e-9ce304924829'}, {'url': 'https://github.com/deepset-ai/haystack/commit/5fc84904f198de661d5b933fde756aa922bf09f1'}]
CVE State: PUBLISHED |
Explain CVE-2023-1721 | Explain the vulnerability: CVE-2023-1721 | Yoga Class Registration System version 1.0 allows an administrator to execute commands on the server. This is possible because the application does not correctly validate the thumbnails of the classes uploaded by the administrators.
Affected Products: Yoga Class Registration System
References: [{'url': 'https://fluidattacks.com/advisories/blessd/'}, {'url': 'https://www.sourcecodester.com/php/16097/yoga-class-registration-system-php-and-mysql-free-source-code.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-1722 | Explain the vulnerability: CVE-2023-1722 | Yoga Class Registration System version 1.0 allows an administrator to execute commands on the server. This is possible because the application does not correctly validate the thumbnails of the classes uploaded by the administrators.
Affected Products: Yoga Class Registration System
References: [{'url': 'https://fluidattacks.com/advisories/wyckoff/'}, {'url': 'https://www.sourcecodester.com/php/16097/yoga-class-registration-system-php-and-mysql-free-source-code.html'}]
CVE State: PUBLISHED |
Explain CVE-2023-1723 | Explain the vulnerability: CVE-2023-1723 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Veragroup Mobile Assistant allows SQL Injection.This issue affects Mobile Assistant: before 21.S.2343.
Affected Products: Mobile Assistant
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0228'}]
CVE State: PUBLISHED |
Explain CVE-2023-1724 | Explain the vulnerability: CVE-2023-1724 | Faveo Helpdesk Enterprise version 6.0.1 allows an attacker with agent permissions to perform privilege escalation on the application. This occurs because the application is vulnerable to stored XSS.
Affected Products: Faveo Helpdesk
References: [{'url': 'https://github.com/ladybirdweb/faveo-helpdesk/'}, {'url': 'https://fluidattacks.com/advisories/towers/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1725 | Explain the vulnerability: CVE-2023-1725 | Server-Side Request Forgery (SSRF) vulnerability in Infoline Project Management System allows Server Side Request Forgery.This issue affects Project Management System: before 4.09.31.125.
Affected Products: Project Management System
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0187'}]
CVE State: PUBLISHED |
Explain CVE-2023-1726 | Explain the vulnerability: CVE-2023-1726 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Proliz OBS allows Stored XSS for an authenticated user.This issue affects OBS: before 23.04.01.
Affected Products: OBS
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0205'}]
CVE State: PUBLISHED |
Explain CVE-2023-1728 | Explain the vulnerability: CVE-2023-1728 | Unrestricted Upload of File with Dangerous Type vulnerability in Fernus Informatics LMS allows OS Command Injection, Server Side Include (SSI) Injection.This issue affects LMS: before 23.04.03.
Affected Products: LMS
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0194'}]
CVE State: PUBLISHED |
Explain CVE-2023-1729 | Explain the vulnerability: CVE-2023-1729 | A flaw was found in LibRaw. A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.
Affected Products: LibRaw
References: [{'url': 'https://github.com/LibRaw/LibRaw/issues/557'}, {'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2188240'}, {'name': 'FEDORA-2023-b19f236bc7', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5ZJ3UBTJBZHNPJQFOSGM5L7WAHHE2GY/'}, {'name': 'FEDORA-2023-88c87f6191', 'tags': ['vendor-advisory'], 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGZ6XF5WTPJ4GLXQ62JVRDZSVSJHXNQU/'}, {'name': '[debian-lts-announce] 20230527 [SECURITY] [DLA 3433-1] libraw security update', 'tags': ['mailing-list'], 'url': 'https://lists.debian.org/debian-lts-announce/2023/05/msg00025.html'}, {'name': 'DSA-5412', 'tags': ['vendor-advisory'], 'url': 'https://www.debian.org/security/2023/dsa-5412'}]
CVE State: PUBLISHED |
Explain CVE-2023-1730 | Explain the vulnerability: CVE-2023-1730 | The SupportCandy WordPress plugin before 3.1.5 does not validate and escape user input before using it in an SQL statement, which could allow unauthenticated attackers to perform SQL injection attacks
Affected Products: SupportCandy
References: [{'url': 'https://wpscan.com/vulnerability/44b51a56-ff05-4d50-9327-fc9bab74d4b7', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1731 | Explain the vulnerability: CVE-2023-1731 | In Meinbergs LTOS versions prior to V7.06.013, the configuration file upload function would not correctly validate the input, which would allow an remote authenticated attacker with high privileges to execute arbitrary commands.
Affected Products: LTOS
References: [{'url': 'https://www.meinbergglobal.com/english/news/meinberg-security-advisory-mbgsa-2023-02-lantime-firmware-v7-06-013.htm'}]
CVE State: PUBLISHED |
Explain CVE-2023-1732 | Explain the vulnerability: CVE-2023-1732 | When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read() returns an error. In rare deployment cases (error thrown by the Read() function), this could lead to a predictable shared secret.
The tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.
Affected Products: CIRCL
References: [{'url': 'https://github.com/cloudflare/circl/security/advisories/GHSA-2q89-485c-9j2x'}]
CVE State: PUBLISHED |
Explain CVE-2023-1733 | Explain the vulnerability: CVE-2023-1733 | A denial of service condition exists in the Prometheus server bundled with GitLab affecting all versions from 11.10 to 15.8.5, 15.9 to 15.9.4 and 15.10 to 15.10.1.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/392665'}, {'url': 'https://hackerone.com/reports/1723124'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1733.json'}]
CVE State: PUBLISHED |
Explain CVE-2023-1734 | Explain the vulnerability: CVE-2023-1734 | A vulnerability classified as critical has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. Affected is an unknown function of the file admin/products/controller.php?action=add. The manipulation of the argument image leads to unrestricted upload. It is possible to launch the attack remotely. VDB-224622 is the identifier assigned to this vulnerability.
Affected Products: Young Entrepreneur E-Negosyo System
References: [{'url': 'https://vuldb.com/?id.224622', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224622', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1735 | Explain the vulnerability: CVE-2023-1735 | A vulnerability classified as critical was found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. Affected by this vulnerability is an unknown functionality of the file passwordrecover.php. The manipulation of the argument phonenumber leads to sql injection. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-224623.
Affected Products: Young Entrepreneur E-Negosyo System
References: [{'url': 'https://vuldb.com/?id.224623', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224623', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1736 | Explain the vulnerability: CVE-2023-1736 | A vulnerability, which was classified as critical, has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. Affected by this issue is some unknown functionality of the file cart/controller.php?action=add. The manipulation of the argument PROID leads to sql injection. The identifier of this vulnerability is VDB-224624.
Affected Products: Young Entrepreneur E-Negosyo System
References: [{'url': 'https://vuldb.com/?id.224624', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224624', 'tags': ['signature', 'permissions-required']}, {'url': 'https://www.sourcecodester.com/php/12684/young-entrepreneur-e-negosyo-system.html', 'tags': ['related']}]
CVE State: PUBLISHED |
Explain CVE-2023-1737 | Explain the vulnerability: CVE-2023-1737 | A vulnerability, which was classified as critical, was found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument U_USERNAME leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-224625 was assigned to this vulnerability.
Affected Products: Young Entrepreneur E-Negosyo System
References: [{'url': 'https://vuldb.com/?id.224625', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224625', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1738 | Explain the vulnerability: CVE-2023-1738 | A vulnerability has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0 and classified as critical. This vulnerability affects unknown code of the file index.php?q=product. The manipulation of the argument search leads to sql injection. The attack can be initiated remotely. VDB-224626 is the identifier assigned to this vulnerability.
Affected Products: Young Entrepreneur E-Negosyo System
References: [{'url': 'https://vuldb.com/?id.224626', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224626', 'tags': ['signature', 'permissions-required']}]
CVE State: PUBLISHED |
Explain CVE-2023-1739 | Explain the vulnerability: CVE-2023-1739 | A vulnerability was found in SourceCodester Simple and Beautiful Shopping Cart System 1.0 and classified as critical. This issue affects some unknown processing of the file upload.php. The manipulation leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224627.
Affected Products: Simple and Beautiful Shopping Cart System
References: [{'url': 'https://vuldb.com/?id.224627', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224627', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/misak7in/cve/blob/master/simple%20and%20beautiful%20shopping%20cart%20system/simple%20and%20beautiful%20shopping%20cart%20system%20upload.php%20has%20a%20file%20upload%20vulnerability.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1740 | Explain the vulnerability: CVE-2023-1740 | A vulnerability was found in SourceCodester Air Cargo Management System 1.0. It has been classified as critical. Affected is an unknown function of the file admin/user/manage_user.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224628.
Affected Products: Air Cargo Management System
References: [{'url': 'https://vuldb.com/?id.224628', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224628', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/west9b/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1741 | Explain the vulnerability: CVE-2023-1741 | A vulnerability was found in jeecg-boot 3.5.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file SysDictMapper.java of the component Sleep Command Handler. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224629 was assigned to this vulnerability.
Affected Products: jeecg-boot
References: [{'url': 'https://vuldb.com/?id.224629', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224629', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/private-null/report/blob/main/README.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1742 | Explain the vulnerability: CVE-2023-1742 | A vulnerability was found in IBOS 4.5.5. It has been rated as critical. Affected by this issue is some unknown functionality of the file /?r=report/api/getlist of the component Report Search. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-224630 is the identifier assigned to this vulnerability.
Affected Products: IBOS
References: [{'url': 'https://vuldb.com/?id.224630', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224630', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/wkstestete/cve/blob/master/sql/ibos%20sql%20injection3.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1743 | Explain the vulnerability: CVE-2023-1743 | A vulnerability classified as problematic has been found in SourceCodester Grade Point Average GPA Calculator 1.0. This affects an unknown part of the file index.php. The manipulation of the argument page leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224631.
Affected Products: Grade Point Average GPA Calculator
References: [{'url': 'https://vuldb.com/?id.224631', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224631', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Grade%20Point%20Average%20(GPA)%20Calculator%20in%20PHP%20and%20SQLite3/Grade%20Point%20Average%20(GPA)%20Calculator%20in%20PHP%20and%20SQLite3%20vlun%202.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1744 | Explain the vulnerability: CVE-2023-1744 | A vulnerability classified as critical was found in IBOS 4.5.5. This vulnerability affects unknown code of the component htaccess Handler. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224632.
Affected Products: IBOS
References: [{'url': 'https://vuldb.com/?id.224632', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224632', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/xieqiangweb/cve/blob/master/cve/IBOS%20oa%20v4.5.5%20upload.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1745 | Explain the vulnerability: CVE-2023-1745 | A vulnerability, which was classified as problematic, has been found in KMPlayer 4.2.2.73. This issue affects some unknown processing in the library SHFOLDER.dll. The manipulation leads to uncontrolled search path. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-224633 was assigned to this vulnerability.
Affected Products: KMPlayer
References: [{'url': 'https://vuldb.com/?id.224633', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224633', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/10cksYiqiyinHangzhouTechnology/KMPlayer_Poc', 'tags': ['exploit']}, {'url': 'https://drive.google.com/file/d/1bdYaDmtWhnjaHkzv3bZ4PUSMzDJ8JjSV/view', 'tags': ['exploit']}, {'url': 'https://youtu.be/7bh2BQOqxFo', 'tags': ['media-coverage']}]
CVE State: PUBLISHED |
Explain CVE-2023-1746 | Explain the vulnerability: CVE-2023-1746 | A vulnerability, which was classified as problematic, was found in Dreamer CMS up to 3.5.0. Affected is an unknown function of the component File Upload Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. VDB-224634 is the identifier assigned to this vulnerability.
Affected Products: Dreamer CMS
References: [{'url': 'https://vuldb.com/?id.224634', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224634', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/iteachyou-wjn/dreamer_cms/issues/11', 'tags': ['issue-tracking']}]
CVE State: PUBLISHED |
Explain CVE-2023-1747 | Explain the vulnerability: CVE-2023-1747 | A vulnerability has been found in IBOS up to 4.5.4 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /?r=email/api/mark&op=delFromSend. The manipulation of the argument emailids leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.5.5 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-224635.
Affected Products: IBOS
References: [{'url': 'https://vuldb.com/?id.224635', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224635', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/wkstestete/cve/blob/master/sql/ibos%20sql%20injection.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1748 | Explain the vulnerability: CVE-2023-1748 | The listed versions of Nexx Smart Home devices use hard-coded credentials. An attacker with unauthenticated access to the Nexx Home mobile application or the affected firmware could view the credentials and access the MQ Telemetry Server (MQTT) server and the ability to remotely control garage doors or smart plugs for any customer.
Affected Products: Smart Alarm NXAL-100
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01'}]
CVE State: PUBLISHED |
Explain CVE-2023-1749 | Explain the vulnerability: CVE-2023-1749 | The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could send API requests that the affected devices would execute.
Affected Products: Smart Alarm NXAL-100
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01'}]
CVE State: PUBLISHED |
Explain CVE-2023-1750 | Explain the vulnerability: CVE-2023-1750 | The listed versions of Nexx Smart Home devices lack proper access control when executing actions. An attacker with a valid NexxHome deviceId could retrieve device history, set device settings, and retrieve device information.
Affected Products: Smart Alarm NXAL-100
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01'}]
CVE State: PUBLISHED |
Explain CVE-2023-1751 | Explain the vulnerability: CVE-2023-1751 | The listed versions of Nexx Smart Home devices use a WebSocket server that does not validate if the bearer token in the Authorization header belongs to the device attempting to associate. This could allow any authorized user to receive alarm information and signals meant for other devices which leak a deviceId.
Affected Products: Smart Alarm NXAL-100
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01'}]
CVE State: PUBLISHED |
Explain CVE-2023-1752 | Explain the vulnerability: CVE-2023-1752 | The listed versions of Nexx Smart Home devices could allow any user to register an already registered alarm or associated device with only the device’s MAC address.
Affected Products: Smart Alarm NXAL-100
References: [{'url': 'https://www.cisa.gov/news-events/ics-advisories/icsa-23-094-01'}]
CVE State: PUBLISHED |
Explain CVE-2023-1753 | Explain the vulnerability: CVE-2023-1753 | Weak Password Requirements in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/01d6ae23-3a8f-42a8-99f4-10246187d71b'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/f612a72494080e04947da7028340fee4493fe8a5'}]
CVE State: PUBLISHED |
Explain CVE-2023-1754 | Explain the vulnerability: CVE-2023-1754 | Improper Neutralization of Input During Web Page Generation in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/529f2361-eb2e-476f-b7ef-4e561a712e28'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/d773df925cb74e874527458beed1f66f966ec491'}]
CVE State: PUBLISHED |
Explain CVE-2023-1755 | Explain the vulnerability: CVE-2023-1755 | Cross-site Scripting (XSS) - Generic in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/882ffa07-5397-4dbb-886f-4626859d711a'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/2156573100fd3abf4c65270def77aed20ffc8994'}]
CVE State: PUBLISHED |
Explain CVE-2023-1756 | Explain the vulnerability: CVE-2023-1756 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/e495b443-b328-42f5-aed5-d68b929b4cb9'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/ca75f4688a8b0f14d5d0697b9f4b6ea66088f726'}]
CVE State: PUBLISHED |
Explain CVE-2023-1757 | Explain the vulnerability: CVE-2023-1757 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/584a200a-6ff8-4d53-a3c0-e7893edff60c'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/5061e5841be6c218ebb0de0cbf7b7f195dc46d19'}]
CVE State: PUBLISHED |
Explain CVE-2023-1758 | Explain the vulnerability: CVE-2023-1758 | Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/0854328e-eb00-41a3-9573-8da8f00e369c'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/f3380f46c464d1bc6f3ded29213c79be0de8fc57'}]
CVE State: PUBLISHED |
Explain CVE-2023-1759 | Explain the vulnerability: CVE-2023-1759 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/e8109aed-d364-4c0c-9545-4de0347b10e1'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/ecbd8107fe954b6be95dab315862d1caa0b94efa'}]
CVE State: PUBLISHED |
Explain CVE-2023-1760 | Explain the vulnerability: CVE-2023-1760 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/2d0ac48a-490d-4548-8d98-7447042dd1b5'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/56295b54062a284020fccce12a5044f9fa7d2770'}]
CVE State: PUBLISHED |
Explain CVE-2023-1761 | Explain the vulnerability: CVE-2023-1761 | Cross-site Scripting in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/24c0a65f-0751-4ff8-af63-4b325ac8879f'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/128ef85f8e3ab7869d3107aa4d0b6867b53391d7'}]
CVE State: PUBLISHED |
Explain CVE-2023-1762 | Explain the vulnerability: CVE-2023-1762 | Improper Privilege Management in GitHub repository thorsten/phpmyfaq prior to 3.1.12.
Affected Products: thorsten/phpmyfaq
References: [{'url': 'https://huntr.dev/bounties/3c2374cc-7082-44b7-a6a6-ccff7a650a3a'}, {'url': 'https://github.com/thorsten/phpmyfaq/commit/ae6c1d8c3eab05d6e2227c7a9998707f4f891514'}]
CVE State: PUBLISHED |
Explain CVE-2023-1763 | Explain the vulnerability: CVE-2023-1763 | Canon IJ Network Tool/Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13),IJ Network Tool/Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8) allows an attacker to acquire sensitive information on the Wi-Fi connection setup of the printer from the software.
Affected Products: Canon IJ NW Tool
References: [{'url': 'https://psirt.canon/advisory-information/cp2023-002/'}, {'url': 'https://psirt.canon/hardening/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1764 | Explain the vulnerability: CVE-2023-1764 | Canon IJ Network Tool/Ver.4.7.5 and earlier (supported OS: OS X 10.9.5-macOS 13),IJ Network Tool/Ver.4.7.3 and earlier (supported OS: OS X 10.7.5-OS X 10.8) allows an attacker to acquire sensitive information on the Wi-Fi connection setup of the printer from the communication of the software.
Affected Products: Canon IJ NW Tool
References: [{'url': 'https://psirt.canon/advisory-information/cp2023-002/'}, {'url': 'https://psirt.canon/hardening/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1765 | Explain the vulnerability: CVE-2023-1765 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Akbim Computer Panon allows SQL Injection.This issue affects Panon: before 1.0.2.
Affected Products: Panon
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0193'}]
CVE State: PUBLISHED |
Explain CVE-2023-1766 | Explain the vulnerability: CVE-2023-1766 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Akbim Computer Panon allows Reflected XSS.This issue affects Panon: before 1.0.2.
Affected Products: Panon
References: [{'tags': ['government-resource'], 'url': 'https://www.usom.gov.tr/bildirim/tr-23-0193'}]
CVE State: PUBLISHED |
Explain CVE-2023-1767 | Explain the vulnerability: CVE-2023-1767 | The Snyk Advisor website (https://snyk.io/advisor/) was vulnerable to a stored XSS prior to 28th March 2023. A feature of Snyk Advisor is to display the contents of a scanned package's Readme on its package health page. An attacker could create a package in NPM with an associated markdown README file containing XSS-able HTML tags. Upon Snyk Advisor importing the package, the XSS would run each time an end user browsed to the package's page on Snyk Advisor.
Affected Products: Snyk Advisor
References: [{'url': 'https://support.snyk.io/hc/en-us/articles/10146704933405'}, {'url': 'https://weizman.github.io/2023/04/10/snyk-xss/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1768 | Explain the vulnerability: CVE-2023-1768 | Inappropriate error handling in Tribe29 Checkmk <= 2.1.0p25, <= 2.0.0p34, <= 2.2.0b3 (beta), and all versions of Checkmk 1.6.0 causes the symmetric encryption of agent data to fail silently and transmit the data in plaintext in certain configurations.
Affected Products: Checkmk
References: [{'url': 'https://checkmk.com/werk/15423'}]
CVE State: PUBLISHED |
Explain CVE-2023-1769 | Explain the vulnerability: CVE-2023-1769 | A vulnerability, which was classified as problematic, was found in SourceCodester Grade Point Average GPA Calculator 1.0. Affected is an unknown function of the file index.php. The manipulation of the argument page with the input php://filter/read=convert.base64-encode/resource=grade_table leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-224670 is the identifier assigned to this vulnerability.
Affected Products: Grade Point Average GPA Calculator
References: [{'url': 'https://vuldb.com/?id.224670', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224670', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Pe4cefulSnow/CVE-Advisory/blob/main/README.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1770 | Explain the vulnerability: CVE-2023-1770 | A vulnerability has been found in SourceCodester Grade Point Average GPA Calculator 1.0 and classified as critical. Affected by this vulnerability is the function get_scale of the file Master.php. The manipulation of the argument perc leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224671.
Affected Products: Grade Point Average GPA Calculator
References: [{'url': 'https://vuldb.com/?id.224671', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224671', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Pe4cefulSnow/SQL-Injection/blob/main/README.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1771 | Explain the vulnerability: CVE-2023-1771 | A vulnerability was found in SourceCodester Grade Point Average GPA Calculator 1.0 and classified as problematic. Affected by this issue is the function get_scale of the file Master.php. The manipulation of the argument perc leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224672.
Affected Products: Grade Point Average GPA Calculator
References: [{'url': 'https://vuldb.com/?id.224672', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224672', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/E1CHO/cve_hub/blob/main/Grade%20Point%20Average%20(GPA)%20Calculator%20in%20PHP%20and%20SQLite3/Grade%20Point%20Average%20(GPA)%20Calculator%20in%20PHP%20and%20SQLite3%20vlun%201.pdf', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1772 | Explain the vulnerability: CVE-2023-1772 | A vulnerability was found in DataGear up to 4.5.1. It has been classified as problematic. This affects an unknown part of the component Diagram Type Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224673 was assigned to this vulnerability.
Affected Products: DataGear
References: [{'url': 'https://vuldb.com/?id.224673', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224673', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/yangyanglo/ForCVE/blob/main/2023-0x02.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1773 | Explain the vulnerability: CVE-2023-1773 | A vulnerability was found in Rockoa 2.3.2. It has been declared as critical. This vulnerability affects unknown code of the file webmainConfig.php of the component Configuration File Handler. The manipulation leads to code injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-224674 is the identifier assigned to this vulnerability.
Affected Products: Rockoa
References: [{'url': 'https://vuldb.com/?id.224674', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224674', 'tags': ['signature', 'permissions-required']}, {'url': 'https://gitee.com/galaxies2580/cve/blob/master/xinhuv2.3.2.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1774 | Explain the vulnerability: CVE-2023-1774 | When processing an email invite to a private channel on a team, Mattermost fails to validate the inviter's permission to that channel, allowing an attacker to invite themselves to a private channel.
Affected Products: Mattermost
References: [{'url': 'https://mattermost.com/security-updates/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1775 | Explain the vulnerability: CVE-2023-1775 | When running in a High Availability configuration, Mattermost fails to sanitize some of the user_updated and post_deleted events broadcast to all users, leading to disclosure of sensitive information to some of the users with currently connected Websocket clients.
Affected Products: Mattermost
References: [{'url': 'https://mattermost.com/security-updates/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1776 | Explain the vulnerability: CVE-2023-1776 | Boards in Mattermost allows an attacker to upload a malicious SVG image file as an attachment to a card and share it using a direct link to the file.
Affected Products: Mattermost
References: [{'url': 'https://mattermost.com/security-updates/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1777 | Explain the vulnerability: CVE-2023-1777 | Mattermost allows an attacker to request a preview of an existing message when creating a new message via the createPost API call, disclosing the contents of the linked message.
Affected Products: Mattermost
References: [{'url': 'https://mattermost.com/security-updates/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1778 | Explain the vulnerability: CVE-2023-1778 | This vulnerability exists in GajShield Data Security Firewall firmware versions prior to v4.28 (except v4.21) due to insecure default credentials which allows remote attacker to login as superuser by using default username/password via web-based management interface and/or exposed SSH port thereby enabling remote attackers to execute arbitrary commands with administrative/superuser privileges on the targeted systems.
The vulnerability has been addressed by forcing the user to change their default password to a new non-default password.
Affected Products: Data Security Firewall
References: [{'url': 'https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0119'}]
CVE State: PUBLISHED |
Explain CVE-2023-1779 | Explain the vulnerability: CVE-2023-1779 | Exposure of Sensitive Information to an unauthorized actor vulnerability in MB Connect Lines mbCONNECT24, mymbCONNECT24 and Helmholz' myREX24 and myREX24.virtual in versions <=2.13.3 allow an authorized remote attacker with low privileges to view a limited amount of another accounts contact information.
Affected Products: mbCONNECT24
References: [{'url': 'https://cert.vde.com/en/advisories/VDE-2023-008/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1780 | Explain the vulnerability: CVE-2023-1780 | The Companion Sitemap Generator WordPress plugin before 4.5.3 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Affected Products: Companion Sitemap Generator
References: [{'url': 'https://wpscan.com/vulnerability/8176308f-f210-4109-9c88-9372415dbed3', 'tags': ['exploit', 'vdb-entry', 'technical-description']}]
CVE State: PUBLISHED |
Explain CVE-2023-1782 | Explain the vulnerability: CVE-2023-1782 | HashiCorp Nomad and Nomad Enterprise versions 1.5.0 up to 1.5.2 allow unauthenticated users to bypass intended ACL authorizations for clusters where mTLS is not enabled. This issue is fixed in version 1.5.3.
Affected Products: Nomad
References: [{'url': 'https://discuss.hashicorp.com/t/hcsec-2023-12-nomad-unauthenticated-client-agent-http-request-privilege-escalation/52375'}]
CVE State: PUBLISHED |
Explain CVE-2023-1783 | Explain the vulnerability: CVE-2023-1783 | OrangeScrum version 2.0.11 allows an external attacker to remotely obtain AWS instance credentials. This is possible because the application does not properly validate the HTML content to be converted to PDF.
Affected Products: Orangescrum
References: [{'url': 'https://github.com/Orangescrum/orangescrum/'}, {'url': 'https://fluidattacks.com/advisories/stirling/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1784 | Explain the vulnerability: CVE-2023-1784 | A vulnerability was found in jeecg-boot 3.5.0 and classified as critical. This issue affects some unknown processing of the component API Documentation. The manipulation leads to improper authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224699.
Affected Products: jeecg-boot
References: [{'url': 'https://vuldb.com/?id.224699', 'tags': ['vdb-entry']}, {'url': 'https://vuldb.com/?ctiid.224699', 'tags': ['signature', 'permissions-required']}, {'url': 'https://note.youdao.com/ynoteshare/index.html?id=7eb8fc804ea3544d8add43749a09173e', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1785 | Explain the vulnerability: CVE-2023-1785 | A vulnerability was found in SourceCodester Earnings and Expense Tracker App 1.0. It has been classified as critical. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-224700.
Affected Products: Earnings and Expense Tracker App
References: [{'url': 'https://vuldb.com/?id.224700', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224700', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/web-zxl/img/blob/main/4.png', 'tags': ['related']}]
CVE State: PUBLISHED |
Explain CVE-2023-1786 | Explain the vulnerability: CVE-2023-1786 | Sensitive data could be exposed in logs of cloud-init before version 23.1.2. An attacker could use this information to find hashed passwords and possibly escalate their privilege.
Affected Products: cloud-init
References: [{'tags': ['patch'], 'url': 'https://github.com/canonical/cloud-init/commit/a378b7e4f47375458651c0972e7cd813f6fe0a6b'}, {'url': 'https://bugs.launchpad.net/cloud-init/+bug/2013967', 'tags': ['issue-tracking']}, {'url': 'https://ubuntu.com/security/notices/USN-6042-1', 'tags': ['vendor-advisory']}, {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ATBJSXPL2IOAD2LDQRKWPLIC7QXS44GZ/'}]
CVE State: PUBLISHED |
Explain CVE-2023-1787 | Explain the vulnerability: CVE-2023-1787 | An issue has been discovered in GitLab affecting all versions starting from 15.9 before 15.9.4, all versions starting from 15.10 before 15.10.1. A search timeout could be triggered if a specific HTML payload was used in the issue description.
Affected Products: GitLab
References: [{'url': 'https://gitlab.com/gitlab-org/gitlab/-/issues/394817'}, {'url': 'https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1787.json'}]
CVE State: PUBLISHED |
Explain CVE-2023-1788 | Explain the vulnerability: CVE-2023-1788 | Insufficient Session Expiration in GitHub repository firefly-iii/firefly-iii prior to 6.
Affected Products: firefly-iii/firefly-iii
References: [{'url': 'https://huntr.dev/bounties/79323c9e-e0e5-48ef-bd19-d0b09587ccb2'}, {'url': 'https://github.com/firefly-iii/firefly-iii/commit/68f398f97cbe1870fc098d8460bf903b9c3fab30'}]
CVE State: PUBLISHED |
Explain CVE-2023-1789 | Explain the vulnerability: CVE-2023-1789 | Improper Input Validation in GitHub repository firefly-iii/firefly-iii prior to 6.0.0.
Affected Products: firefly-iii/firefly-iii
References: [{'url': 'https://huntr.dev/bounties/2c3489f7-6b84-48f8-9368-9cea67cf373d'}, {'url': 'https://github.com/firefly-iii/firefly-iii/commit/6b05c0fbd3e8c40ae9b24dc2698821786fccf0c5'}]
CVE State: PUBLISHED |
Explain CVE-2023-1790 | Explain the vulnerability: CVE-2023-1790 | A vulnerability, which was classified as problematic, was found in SourceCodester Simple Task Allocation System 1.0. Affected is an unknown function of the file index.php. The manipulation of the argument page leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224724.
Affected Products: Simple Task Allocation System
References: [{'url': 'https://vuldb.com/?id.224724', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224724', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Pe4cefulSnow/CVE-Advisory/blob/main/uploadcve.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1791 | Explain the vulnerability: CVE-2023-1791 | A vulnerability has been found in SourceCodester Simple Task Allocation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224743.
Affected Products: Simple Task Allocation System
References: [{'url': 'https://vuldb.com/?id.224743', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224743', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/Pe4cefulSnow/SQL-Injection/blob/main/SQLcve.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |
Explain CVE-2023-1792 | Explain the vulnerability: CVE-2023-1792 | A vulnerability was found in SourceCodester Simple Mobile Comparison Website 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/fields/manage_field.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224744.
Affected Products: Simple Mobile Comparison Website
References: [{'url': 'https://vuldb.com/?id.224744', 'tags': ['vdb-entry', 'technical-description']}, {'url': 'https://vuldb.com/?ctiid.224744', 'tags': ['signature', 'permissions-required']}, {'url': 'https://github.com/LOBSSSA5DD5/bug_report/blob/main/SQLi-1.md', 'tags': ['exploit']}]
CVE State: PUBLISHED |