CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-5264
A vulnerability classified as critical was found in huakecms 3.0. Affected by this vulnerability is an unknown functionality of the file /admin/cms_content.php. The manipulation of the argument cid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240877 was assigned to this vulnerability.
https://vuldb.com/?id.240877
2023-09-29T05:37:52.456Z
2023-09-29T14:00:09.303Z
2023-10-24T19:49:56.478Z
{'Vendor': 'n/a', 'Product': 'huakecms', 'Versions': '3.0'}
CVE-2023-5634
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ArslanSoft Education Portal allows SQL Injection.This issue affects Education Portal: before v1.1.
https://www.usom.gov.tr/bildirim/tr-23-0670
2023-10-18T11:04:00.757Z
2023-12-01T13:19:13.935Z
2023-12-01T13:19:13.935Z
{'Vendor': 'ArslanSoft', 'Product': 'Education Portal', 'Versions': '0'}
CVE-2023-5321
Missing Authorization in GitHub repository hamza417/inure prior to build94.
https://huntr.dev/bounties/b1becc68-e738-458f-bd99-06ee77580d3a
2023-09-30T13:43:01.219Z
2023-09-30T13:43:14.012Z
2023-09-30T13:43:14.012Z
{'Vendor': 'hamza417', 'Product': 'hamza417/inure', 'Versions': 'unspecified'}
CVE-2023-5771
Proofpoint Enterprise Protection contains a stored XSS vulnerability in the AdminUI. An unauthenticated attacker can send a specially crafted email with HTML in the subject which triggers XSS when viewing quarantined messages.  This issue affects Proofpoint Enterprise Protection: from 8.20.0 before patch 4796, from 8.18.6 before patch 4795 and all other prior versions.
https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0010
2023-10-25T17:57:54.611Z
2023-11-06T20:06:28.575Z
2023-11-06T20:06:30.766Z
{'Vendor': 'Proofpoint', 'Product': 'Proofpoint Enterprise Protection', 'Versions': '8.20.0, 8.18.6, 8.0'}
CVE-2023-5458
The CITS Support svg, webp Media and TTF,OTF File Upload WordPress plugin before 3.0 does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads.
https://wpscan.com/vulnerability/47d15f1c-b9ca-494d-be8f-63c30e92f9b8
2023-10-09T08:51:31.456Z
2023-10-31T13:54:42.463Z
2023-10-31T13:54:42.463Z
{'Vendor': 'Unknown', 'Product': 'CITS Support svg, webp Media and TTF,OTF File Upload', 'Versions': '0'}
CVE-2023-5008
Student Information System v1.0 is vulnerable to an unauthenticated SQL Injection vulnerability on the 'regno' parameter of index.php page, allowing an external attacker to dump all the contents of the database contents and bypass the login control.
https://fluidattacks.com/advisories/blechacz/
2023-09-15T22:26:16.954Z
2023-12-07T23:16:52.700Z
2023-12-07T23:16:52.700Z
{'Vendor': 'Kashipara Group', 'Product': 'Student Information System', 'Versions': '1.0'}
CVE-2023-5835
A vulnerability classified as problematic was found in hu60t hu60wap6. Affected by this vulnerability is the function markdown of the file src/class/ubbparser.php. The manipulation leads to cross site scripting. The attack can be launched remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named a1cd9f12d7687243bfcb7ce295665acb83b9174e. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-243775.
https://vuldb.com/?id.243775
2023-10-27T21:43:57.190Z
2023-10-28T13:31:05.324Z
2023-10-28T13:31:05.324Z
{'Vendor': 'hu60t', 'Product': 'hu60wap6', 'Versions': 'n/a'}
CVE-2023-5566
The Simple Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 1.0.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/a153d6b2-e3fd-42db-90ba-d899a07d60c1?source=cve
2023-10-13T00:32:15.078Z
2023-10-30T13:48:59.219Z
2023-10-30T13:48:59.219Z
{'Vendor': 'simplethemes', 'Product': 'Simple Shortcodes', 'Versions': '*'}
CVE-2023-5136
An incorrect permission assignment in the TopoGrafix DataPlugin for GPX could result in information disclosure. An attacker could exploit this vulnerability by getting a user to open a specially crafted data file.
https://www.ni.com/en/support/documentation/supplemental/23/incorrect-permission-assignment-in-the-topografix-dataplug-for-gpx.html
2023-09-22T19:29:47.084Z
2023-11-08T15:24:10.867Z
2023-11-08T15:24:10.867Z
{'Vendor': 'NI', 'Product': 'TopoGrafix DataPlugin for GPX', 'Versions': '0'}
CVE-2023-5423
A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/ajax.php?action=confirm_order. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-241384.
https://vuldb.com/?id.241384
2023-10-05T10:01:49.541Z
2023-10-05T17:00:07.714Z
2023-10-05T17:00:07.714Z
{'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'}
CVE-2023-5073
The iframe forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'iframe' shortcode in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/818de7f7-913a-4ade-927e-bba281b4709a?source=cve
2023-09-19T18:53:43.898Z
2023-10-31T11:29:12.022Z
2023-10-31T11:29:12.022Z
{'Vendor': 'jrbecart', 'Product': 'iframe forms', 'Versions': '*'}
CVE-2023-5589
A vulnerability was found in SourceCodester Judging Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login.php. The manipulation of the argument password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-242188.
https://vuldb.com/?id.242188
2023-10-15T15:40:15.469Z
2023-10-15T22:31:04.177Z
2023-10-15T22:31:04.177Z
{'Vendor': 'SourceCodester', 'Product': 'Judging Management System', 'Versions': '1.0'}
CVE-2023-5970
Improper authentication in the SMA100 SSL-VPN virtual office portal allows a remote authenticated attacker to create an identical external domain user using accent characters, resulting in an MFA bypass.
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0018
2023-11-06T17:14:04.677Z
2023-12-05T20:20:01.534Z
2023-12-05T20:20:01.534Z
{'Vendor': 'SonicWall', 'Product': 'SMA100', 'Versions': '10.2.1.9-57sv and earlier versions'}
CVE-2023-5618
The Modern Footnotes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode in versions up to, and including, 1.4.16 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c20c674f-54b5-470f-b470-07a63501eb4d?source=cve
2023-10-17T16:38:43.140Z
2023-10-20T11:33:24.931Z
2023-10-20T11:33:24.931Z
{'Vendor': 'prismtechstudios', 'Product': 'Modern Footnotes', 'Versions': '*'}
CVE-2023-5161
The Modal Window plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 5.3.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/48e2129f-6a2c-45e4-a0cf-7d8d5f563a7f?source=cve
2023-09-25T13:32:36.093Z
2023-09-26T01:51:14.286Z
2023-09-26T01:51:14.286Z
{'Vendor': 'wpcalc', 'Product': 'Modal Window – create popup modal window', 'Versions': '*'}
CVE-2023-5531
The Thumbnail Slider With Lightbox plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the delete functionality. This makes it possible for unauthenticated attackers to delete image lightboxes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/055b7ed5-268a-485e-ac7d-8082dc9fb2ad?source=cve
2023-10-11T17:25:08.940Z
2023-10-12T05:30:34.818Z
2023-10-12T05:30:34.818Z
{'Vendor': 'nik00726', 'Product': 'Thumbnail Slider With Lightbox', 'Versions': '*'}
CVE-2023-5862
Missing Authorization in GitHub repository hamza417/inure prior to Build95.
https://huntr.com/bounties/0e517db6-d8ba-4cb9-9339-7991dda52e6d
2023-10-31T00:00:06.449Z
2023-10-31T00:00:18.766Z
2023-10-31T00:00:18.766Z
{'Vendor': 'hamza417', 'Product': 'hamza417/inure', 'Versions': 'unspecified'}
CVE-2023-5927
A vulnerability has been found in Campcodes Simple Student Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/courses/manage_course.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-244327.
https://vuldb.com/?id.244327
2023-11-02T13:00:39.444Z
2023-11-02T19:31:04.823Z
2023-11-02T19:31:04.823Z
{'Vendor': 'Campcodes', 'Product': 'Simple Student Information System', 'Versions': '1.0'}
CVE-2023-5024
A vulnerability was found in Planno 23.04.04. It has been classified as problematic. This affects an unknown part of the component Comment Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239865 was assigned to this vulnerability.
https://vuldb.com/?id.239865
2023-09-16T07:57:19.804Z
2023-09-17T06:31:04.839Z
2023-10-24T19:08:28.124Z
{'Vendor': 'n/a', 'Product': 'Planno', 'Versions': '23.04.04'}
CVE-2023-5474
Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
2023-10-10T00:12:40.051Z
2023-10-11T22:28:53.165Z
2023-10-11T22:28:53.165Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'}
CVE-2023-5874
The Popup box WordPress plugin before 3.8.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/ebe3e873-1259-43b9-a027-daa4dbd937f3
2023-10-31T09:31:48.816Z
2023-12-04T21:28:13.541Z
2023-12-04T21:28:13.541Z
{'Vendor': 'Unknown', 'Product': 'Popup box', 'Versions': '0'}
CVE-2023-5177
The Vrm 360 3D Model Viewer WordPress plugin through 1.2.1 exposes the full path of a file when putting in a non-existent file in a parameter of the shortcode.
https://wpscan.com/vulnerability/a67b9c21-a35a-4cdb-9627-a5932334e5f0
2023-09-25T15:28:47.717Z
2023-10-16T19:38:53.691Z
2023-10-16T19:38:53.691Z
{'Vendor': 'Unknown', 'Product': 'Vrm 360 3D Model Viewer', 'Versions': '0'}
CVE-2023-5462
A vulnerability was found in XINJE XD5E-30R-E 3.5.3b. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Modbus Handler. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. The identifier VDB-241585 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.241585
2023-10-09T14:09:00.471Z
2023-10-09T21:31:04.182Z
2023-10-09T21:31:04.182Z
{'Vendor': 'XINJE', 'Product': 'XD5E-30R-E', 'Versions': '3.5.3b'}
CVE-2023-5198
An issue has been discovered in GitLab affecting all versions prior to 16.2.7, all versions starting from 16.3 before 16.3.5, and all versions starting from 16.4 before 16.4.1. It was possible for a removed project member to write to protected branches using deploy keys.
https://gitlab.com/gitlab-org/gitlab/-/issues/416957
2023-09-26T10:01:49.676Z
2023-09-29T07:01:42.219Z
2023-09-29T07:01:42.219Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '0, 16.3, 16.4'}
CVE-2023-5032
A vulnerability was found in OpenRapid RapidCMS 1.3.1. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/article/article-edit-run.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239876.
https://vuldb.com/?id.239876
2023-09-17T17:26:14.064Z
2023-09-18T03:31:04.782Z
2023-10-24T19:18:13.675Z
{'Vendor': 'OpenRapid', 'Product': 'RapidCMS', 'Versions': '1.3.1'}
CVE-2023-5931
The rtMedia for WordPress, BuddyPress and bbPress WordPress plugin before 4.6.16 does not validate files to be uploaded, which could allow attackers with a low-privilege account (e.g. subscribers) to upload arbitrary files such as PHP on the server
https://wpscan.com/vulnerability/3d6889e3-a01b-4e7f-868f-af7cc8c7531a
2023-11-02T13:39:26.334Z
2023-12-26T18:33:01.473Z
2023-12-26T18:33:01.473Z
{'Vendor': 'Unknown', 'Product': 'rtMedia for WordPress, BuddyPress and bbPress', 'Versions': '0'}
CVE-2023-5659
The Interact: Embed A Quiz On Your Site plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'interact-quiz' shortcode in all versions up to, and including, 3.0.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/69ba1a39-ddb0-4661-8104-d8bb71710e0c?source=cve
2023-10-19T16:05:54.469Z
2023-11-07T11:31:06.961Z
2023-11-07T11:31:06.961Z
{'Vendor': 'tryinteract', 'Product': 'Interact: Embed A Quiz On Your Site', 'Versions': '*'}
CVE-2023-5209
The WordPress Online Booking and Scheduling Plugin WordPress plugin before 22.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/dea6077a-81ee-451f-b049-3749a2252c88
2023-09-26T19:04:05.898Z
2023-11-27T16:21:59.004Z
2023-11-27T16:21:59.004Z
{'Vendor': 'Unknown', 'Product': 'WordPress Online Booking and Scheduling Plugin', 'Versions': '0'}
CVE-2023-5120
The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image file path parameter in versions up to, and including, 0.9.89 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/320f4260-20c2-4f27-91ba-d2488b417f62?source=cve
2023-09-22T14:13:48.298Z
2023-10-20T06:35:16.563Z
2023-10-20T06:35:16.563Z
{'Vendor': 'wpvividplugins', 'Product': 'Migration, Backup, Staging – WPvivid', 'Versions': '*'}
CVE-2023-5570
Improper Protection for Outbound Error Messages and Alert Signals vulnerability in Inohom Home Manager Gateway allows Account Footprinting.This issue affects Home Manager Gateway: before v.1.27.12.
https://www.usom.gov.tr/bildirim/tr-23-0609
2023-10-13T08:09:58.772Z
2023-10-27T11:53:43.885Z
2023-10-27T12:47:31.330Z
{'Vendor': 'Inohom', 'Product': 'Home Manager Gateway', 'Versions': '0'}
CVE-2023-5823
Cross-Site Request Forgery (CSRF) vulnerability in ThemeKraft TK Google Fonts GDPR Compliant plugin <= 2.2.11 versions.
https://patchstack.com/database/vulnerability/tk-google-fonts/wordpress-tk-google-fonts-gdpr-compliant-plugin-2-2-11-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-27T07:27:51.922Z
2023-11-06T11:21:53.681Z
2023-11-06T11:21:53.681Z
{'Vendor': 'ThemeKraft', 'Product': 'TK Google Fonts GDPR Compliant', 'Versions': 'n/a'}
CVE-2023-5989
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Uyumsoft Information System and Technologies LioXERP allows Stored XSS.This issue affects LioXERP: before v.146.
https://www.usom.gov.tr/bildirim/tr-23-0721
2023-11-07T11:31:35.214Z
2023-12-21T09:45:37.933Z
2023-12-21T09:45:37.933Z
{'Vendor': ' Uyumsoft Information System and Technologies', 'Product': 'LioXERP', 'Versions': '0'}
CVE-2023-5966
An authenticated privileged attacker could upload a specially crafted zip to the EspoCRM server in version 7.2.5, via the extension deployment form, which could lead to arbitrary PHP code execution.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-espocrm
2023-11-06T13:18:11.772Z
2023-11-30T13:26:48.245Z
2023-11-30T13:26:48.245Z
{'Vendor': 'EspoCRM', 'Product': 'EspoCRM', 'Versions': '0'}
CVE-2023-5435
The Up down image slideshow gallery plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/0b72cf6f-4924-4fa5-8e1a-4054dfe73be0?source=cve
2023-10-05T19:17:05.805Z
2023-10-31T08:32:49.428Z
2023-10-31T08:32:49.428Z
{'Vendor': 'gopiplus', 'Product': 'Up down image slideshow gallery', 'Versions': '*'}
CVE-2023-5121
The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings (the backup path parameter) in versions up to, and including, 0.9.89 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/cdcac5f9-a744-4853-8a80-ed38fec81dbb?source=cve
2023-09-22T14:22:52.897Z
2023-10-20T07:29:31.733Z
2023-10-20T07:29:31.733Z
{'Vendor': 'wpvividplugins', 'Product': 'Migration, Backup, Staging – WPvivid', 'Versions': '*'}
CVE-2023-5571
Improper Input Validation in GitHub repository vriteio/vrite prior to 0.3.0.
https://huntr.dev/bounties/926ca25f-dd4a-40cf-8e6b-9d7b5938e95a
2023-10-13T09:55:20.180Z
2023-10-13T09:55:33.149Z
2023-10-13T09:55:33.149Z
{'Vendor': 'vriteio', 'Product': 'vriteio/vrite', 'Versions': 'unspecified'}
CVE-2023-5822
The Drag and Drop Multiple File Upload - Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads to insufficient file type validation in the 'dnd_upload_cf7_upload' function in versions up to, and including, 1.3.7.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. This can be exploited if a user authorized to edit form, which means editor privileges or above, has added a 'multiple file upload' form field with '*' acceptable file types.
https://www.wordfence.com/threat-intel/vulnerabilities/id/1b3be300-5b7f-4844-8637-1bb8c939ed4c?source=cve
2023-10-26T23:08:03.308Z
2023-11-22T15:33:21.106Z
2023-11-22T15:33:21.106Z
{'Vendor': 'glenwpcoder', 'Product': 'Drag and Drop Multiple File Upload – Contact Form 7', 'Versions': '*'}
CVE-2023-5988
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Uyumsoft Information System and Technologies LioXERP allows Reflected XSS.This issue affects LioXERP: before v.146.
https://www.usom.gov.tr/bildirim/tr-23-0721
2023-11-07T11:31:32.859Z
2023-12-21T09:40:25.554Z
2023-12-21T09:40:25.554Z
{'Vendor': ' Uyumsoft Information System and Technologies', 'Product': 'LioXERP', 'Versions': '0'}
CVE-2023-5967
Mattermost fails to properly validate requests to the Calls plugin, allowing an attacker sending a request without a User Agent header to cause a panic and crash the Calls plugin
https://mattermost.com/security-updates
2023-11-06T15:14:58.458Z
2023-11-06T15:24:24.544Z
2023-11-06T15:24:24.544Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 8.1.3, 8.0.4, 7.8.12'}
CVE-2023-5434
The Superb slideshow gallery plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 13.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/3a12945d-a67c-4a19-a4e7-f65f5f2a21bb?source=cve
2023-10-05T19:16:52.260Z
2023-10-31T08:32:49.889Z
2023-10-31T08:32:49.889Z
{'Vendor': 'gopiplus', 'Product': 'Superb slideshow gallery', 'Versions': '*'}
CVE-2023-5658
The WP MapIt plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_mapit' shortcode in all versions up to, and including, 2.7.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/7ef6f598-e1a7-4036-9485-1aad0416349a?source=cve
2023-10-19T16:05:33.929Z
2023-11-07T11:01:44.546Z
2023-11-07T11:01:44.546Z
{'Vendor': 'phpwebdev', 'Product': 'WP MapIt', 'Versions': '*'}
CVE-2023-5875
Mattermost Desktop fails to correctly handle permissions or prompt the user for consent on certain sensitive ones allowing media exploitation from a malicious mattermost server
https://mattermost.com/security-updates
2023-10-31T10:43:53.126Z
2023-11-02T08:27:05.082Z
2023-11-02T08:27:05.082Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost Desktop', 'Versions': '0, 5.5.1'}
CVE-2023-5176
Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195
2023-09-25T15:03:44.531Z
2023-09-27T14:13:25.411Z
2023-09-27T14:13:25.411Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5463
A vulnerability was found in XINJE XDPPro up to 3.7.17a. It has been rated as critical. Affected by this issue is some unknown functionality in the library cfgmgr32.dll. The manipulation leads to uncontrolled search path. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. VDB-241586 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.241586
2023-10-09T14:09:03.490Z
2023-10-09T21:31:05.292Z
2023-10-09T21:31:05.292Z
{'Vendor': 'XINJE', 'Product': 'XDPPro', 'Versions': '3.7.17a'}
CVE-2023-5199
The PHP to Page plugin for WordPress is vulnerable Local File Inclusion to Remote Code Execution in versions up to, and including, 0.3 via the 'php-to-page' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to include local file and potentially execute code on the server. While subscribers may need to poison log files or otherwise get a file installed in order to achieve remote code execution, author and above users can upload files by default and achieve remote code execution easily.
https://www.wordfence.com/threat-intel/vulnerabilities/id/83e5a0dc-fc51-4565-945f-190cf9175874?source=cve
2023-09-26T12:44:15.027Z
2023-10-30T13:48:58.665Z
2023-10-30T13:48:58.665Z
{'Vendor': 'bloafer', 'Product': 'PHP to Page', 'Versions': '*'}
CVE-2023-5033
A vulnerability classified as critical has been found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file /admin/category/cate-edit-run.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239877 was assigned to this vulnerability.
https://vuldb.com/?id.239877
2023-09-17T17:26:16.822Z
2023-09-18T04:31:04.707Z
2023-10-24T19:19:26.827Z
{'Vendor': 'OpenRapid', 'Product': 'RapidCMS', 'Versions': '1.3.1'}
CVE-2023-5930
A vulnerability was found in Campcodes Simple Student Information System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/students/manage_academic.php. The manipulation of the argument student_id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-244330 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.244330
2023-11-02T13:00:52.731Z
2023-11-02T20:00:08.389Z
2023-11-02T20:00:08.389Z
{'Vendor': 'Campcodes', 'Product': 'Simple Student Information System', 'Versions': '1.0'}
CVE-2023-5160
Mattermost fails to check the Show Full Name option at the /api/v4/teams/TEAM_ID/top/team_members endpoint allowing a member to get the full name of another user even if the Show Full Name option was disabled
https://mattermost.com/security-updates
2023-09-25T11:43:46.566Z
2023-10-02T10:46:33.153Z
2023-10-02T10:46:33.153Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 7.8.10, 8.1.1'}
CVE-2023-5530
The Ninja Forms Contact Form WordPress plugin before 3.6.34 does not sanitize and escape its label fields, which could allow high privilege users such as admin to perform Stored XSS attacks. Only users with the unfiltered_html capability can perform this, and such users are already allowed to use JS in posts/comments etc however the vendor acknowledged and fixed the issue
https://wpscan.com/vulnerability/a642f313-cc3e-4d75-b207-1dceb6a7fbae
2023-10-11T17:01:33.156Z
2023-11-06T20:41:40.862Z
2023-11-06T20:41:40.862Z
{'Vendor': 'Unknown', 'Product': 'Ninja Forms Contact Form', 'Versions': '0'}
CVE-2023-5863
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.2.
https://huntr.com/bounties/fbfd4e84-61fb-4063-8f11-15877b8c1f6f
2023-10-31T00:00:06.770Z
2023-10-31T00:00:19.197Z
2023-10-31T00:00:19.197Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-5926
A vulnerability, which was classified as critical, was found in Campcodes Simple Student Information System 1.0. Affected is an unknown function of the file /admin/students/update_status.php. The manipulation of the argument student_id leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-244326 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.244326
2023-11-02T13:00:35.703Z
2023-11-02T19:00:09.944Z
2023-11-02T19:00:09.944Z
{'Vendor': 'Campcodes', 'Product': 'Simple Student Information System', 'Versions': '1.0'}
CVE-2023-5025
A vulnerability was found in KOHA up to 23.05.03. It has been declared as problematic. This vulnerability affects unknown code of the file /cgi-bin/koha/catalogue/search.pl of the component MARC. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-239866 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.239866
2023-09-16T08:19:19.064Z
2023-09-17T07:00:07.258Z
2023-10-24T19:09:41.254Z
{'Vendor': 'n/a', 'Product': 'KOHA', 'Versions': '23.05.03'}
CVE-2023-5475
Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
2023-10-10T00:12:40.135Z
2023-10-11T22:28:52.356Z
2023-10-11T22:28:52.356Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'}
CVE-2023-5619
null
null
2023-10-17T17:37:15.944Z
null
2024-01-04T19:11:30.595Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-5834
HashiCorp Vagrant's Windows installer targeted a custom location with a non-protected path that could be junctioned, introducing potential for unauthorized file system writes. Fixed in Vagrant 2.4.0.
https://discuss.hashicorp.com/t/hcsec-2023-31-vagrant-s-windows-installer-allowed-directory-junction-write/59568
2023-10-27T19:52:44.844Z
2023-10-27T21:06:38.680Z
2023-10-27T21:06:38.680Z
{'Vendor': 'HashiCorp', 'Product': 'Vagrant', 'Versions': '*'}
CVE-2023-5567
The QR Code Tag plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'qrcodetag' shortcode in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/be004002-a3ac-46e9-b0c1-258f05f97b2a?source=cve
2023-10-13T00:32:35.816Z
2023-11-07T11:31:08.826Z
2023-11-07T11:31:08.826Z
{'Vendor': 'dspreen', 'Product': 'QR Code Tag', 'Versions': '*'}
CVE-2023-5137
The Simply Excerpts WordPress plugin through 1.4 does not sanitize and escape some fields in the plugin settings, which could allow high-privilege users such as an administrator to inject arbitrary web scripts even when the unfiltered_html capability is disallowed (for example in a multisite setup).
https://wpscan.com/vulnerability/79b79e9c-ea4f-4188-a1b5-61dda0b5d434
2023-09-22T19:39:18.392Z
2023-12-04T21:28:33.766Z
2023-12-04T21:28:33.766Z
{'Vendor': 'Unknown', 'Product': 'Simply Excerpts', 'Versions': '0'}
CVE-2023-5422
The functions to fetch e-mail via POP3 or IMAP as well as sending e-mail via SMTP use OpenSSL for static SSL or TLS based communication. As the SSL_get_verify_result() function is not used the certificated is trusted always and it can not be ensured that the certificate satisfies all necessary security requirements. This could allow an attacker to use an invalid certificate to claim to be a trusted host, use expired certificates, or conduct other attacks that could be detected if the certificate is properly validated. This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.
https://otrs.com/release-notes/otrs-security-advisory-2023-10/
2023-10-05T08:12:18.101Z
2023-10-16T08:10:35.192Z
2023-10-16T08:10:35.192Z
{'Vendor': 'OTRS AG', 'Product': 'OTRS', 'Versions': '7.0.x, 8.0.x'}
CVE-2023-5072
Denial of Service in JSON-Java versions up to and including 20230618.  A bug in the parser means that an input string of modest size can lead to indefinite amounts of memory being used. 
https://github.com/stleary/JSON-java/issues/758
2023-09-19T18:29:03.608Z
2023-10-12T16:13:27.974Z
2023-10-12T19:54:45.413Z
{'Vendor': 'https://github.com/stleary/JSON-java', 'Product': 'n/a', 'Versions': '≤ 20230618'}
CVE-2023-5588
A vulnerability was found in kphrx pleroma. It has been classified as problematic. This affects the function Pleroma.Emoji.Pack of the file lib/pleroma/emoji/pack.ex. The manipulation of the argument name leads to path traversal. The complexity of an attack is rather high. The exploitability is told to be difficult. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 2c795094535537a8607cc0d3b7f076a609636f40. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-242187.
https://vuldb.com/?id.242187
2023-10-15T13:27:34.568Z
2023-10-15T22:00:06.500Z
2023-10-15T22:00:06.500Z
{'Vendor': 'kphrx', 'Product': 'pleroma', 'Versions': 'n/a'}
CVE-2023-5459
A vulnerability has been found in Delta Electronics DVP32ES2 PLC 1.48 and classified as critical. This vulnerability affects unknown code of the component Password Transmission Handler. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. VDB-241582 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.241582
2023-10-09T13:46:22.947Z
2023-10-09T19:00:06.726Z
2023-10-09T19:00:06.726Z
{'Vendor': 'Delta Electronics', 'Product': 'DVP32ES2 PLC', 'Versions': '1.48'}
CVE-2023-5009
An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. This was a bypass of [CVE-2023-3932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3932) showing additional impact.
https://gitlab.com/gitlab-org/gitlab/-/issues/425304
2023-09-15T22:30:36.931Z
2023-09-19T07:01:14.930Z
2023-10-03T09:03:02.272Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '13.12, 16.3'}
CVE-2023-5265
A vulnerability, which was classified as critical, has been found in Tongda OA 2017. Affected by this issue is some unknown functionality of the file general/hr/manage/staff_transfer/delete.php. The manipulation of the argument TRANSFER_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-240878 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.240878
2023-09-29T05:40:02.037Z
2023-09-29T14:31:04.410Z
2023-10-24T19:51:09.627Z
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': 'n/a'}
CVE-2023-5635
Improper Protection for Outbound Error Messages and Alert Signals vulnerability in ArslanSoft Education Portal allows Account Footprinting.This issue affects Education Portal: before v1.1.
https://www.usom.gov.tr/bildirim/tr-23-0670
2023-10-18T11:04:01.788Z
2023-12-01T13:29:44.356Z
2023-12-01T13:29:44.356Z
{'Vendor': 'ArslanSoft', 'Product': 'Education Portal', 'Versions': '0'}
CVE-2023-5320
Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18.
https://huntr.dev/bounties/3a2bc18b-5932-4fb5-a01e-24b2b0443b67
2023-09-30T00:00:37.900Z
2023-09-30T00:00:42.559Z
2023-09-30T00:00:42.559Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-5770
Proofpoint Enterprise Protection contains a vulnerability in the email delivery agent that allows an unauthenticated attacker to inject improperly encoded HTML into the email body of a message through the email subject. The vulnerability is caused by inappropriate encoding when rewriting the email before delivery.This issue affects Proofpoint Enterprise Protection: from 8.20.2 before patch 4809, from 8.20.0 before patch 4805, from 8.18.6 before patch 4804 and all other prior versions.
https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0009
2023-10-25T17:57:53.751Z
2024-01-09T22:02:03.839Z
2024-01-09T22:02:03.839Z
{'Vendor': 'Proofpoint', 'Product': 'Proofpoint Enterprise Protection', 'Versions': '8.20.2, 8.20.0, 8.18.6, 8.0'}
CVE-2023-5818
The Amazonify plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.8.1. This is due to missing or incorrect nonce validation on the amazonifyOptionsPage() function. This makes it possible for unauthenticated attackers to update the plugins settings, including the Amazon Tracking ID, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/33f3c466-bdeb-402f-bf34-bc703f35e1e2?source=cve
2023-10-26T22:40:15.553Z
2023-11-07T19:31:33.680Z
2023-11-07T19:31:33.680Z
{'Vendor': 'garykeorkunian', 'Product': 'Amazonify', 'Versions': '*'}
CVE-2023-5662
The Sponsors plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sponsors' shortcode in all versions up to, and including, 3.5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4af04219-26c5-401d-94ef-11d2321f98bf?source=cve
2023-10-19T16:07:17.534Z
2023-11-22T15:33:23.830Z
2023-11-22T15:33:23.830Z
{'Vendor': 'ibenic', 'Product': 'Sponsors', 'Versions': '*'}
CVE-2023-5232
The Font Awesome More Icons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'icon' shortcode in versions up to, and including, 3.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/15947764-a070-4715-bd44-cb79b62ed59d?source=cve
2023-09-27T15:50:23.159Z
2023-09-28T04:31:34.717Z
2023-09-28T04:31:34.717Z
{'Vendor': 'jr00ck', 'Product': 'Font Awesome More Icons', 'Versions': '*'}
CVE-2023-5727
The executable file warning was not presented when downloading .msix, .msixbundle, .appx, and .appxbundle files, which can run commands on a user's computer. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1.
https://bugzilla.mozilla.org/show_bug.cgi?id=1847180
2023-10-23T17:22:05.928Z
2023-10-24T12:47:13.501Z
2023-10-24T21:06:50.044Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5377
Out-of-bounds Read in GitHub repository gpac/gpac prior to v2.2.2-DEV.
https://huntr.dev/bounties/fe778df4-3867-41d6-954b-211c81bccbbf
2023-10-04T09:53:41.329Z
2023-10-04T09:53:52.991Z
2023-10-04T09:53:52.991Z
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
CVE-2023-5048
The WDContactFormBuilder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Contact_Form_Builder' shortcode in versions up to, and including, 1.0.72 due to insufficient input sanitization and output escaping on 'id' user supplied attribute. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/7152253a-7bb8-4b5c-bffd-86e46df54b7e?source=cve
2023-09-18T13:59:24.321Z
2023-11-22T15:33:27.053Z
2023-11-22T15:33:27.053Z
{'Vendor': '10web', 'Product': 'WDContactFormBuilder', 'Versions': '*'}
CVE-2023-5674
The WP Mail Log WordPress plugin before 1.1.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Contributor.
https://wpscan.com/vulnerability/32a23d0d-7ece-4870-a99d-f3f344be2d67
2023-10-20T00:26:27.145Z
2023-12-26T18:33:03.106Z
2023-12-26T18:33:03.106Z
{'Vendor': 'Unknown', 'Product': 'WP Mail Log', 'Versions': '0'}
CVE-2023-5731
Memory safety bugs present in Firefox 118. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 119.
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1690111%2C1721904%2C1851803%2C1854068
2023-10-23T17:22:07.179Z
2023-10-24T12:47:16.806Z
2023-10-24T12:47:16.806Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5859
Incorrect security UI in Picture In Picture in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain spoofing via a crafted local HTML page. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
2023-10-30T22:11:17.575Z
2023-11-01T17:14:03.270Z
2023-11-01T17:14:03.270Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'}
CVE-2023-5623
NNM failed to properly set ACLs on its installation directory, which could allow a low privileged user to run arbitrary code with SYSTEM privileges where NNM is installed to a non-standard location
https://www.tenable.com/security/tns-2023-34
2023-10-17T19:03:43.341Z
2023-10-26T16:25:17.792Z
2023-10-26T16:25:17.792Z
{'Vendor': 'Tenable', 'Product': 'Nessus Network Monitor', 'Versions': '0'}
CVE-2023-5273
A vulnerability classified as problematic was found in SourceCodester Best Courier Management System 1.0. This vulnerability affects unknown code of the file manage_parcel_status.php. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-240886 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.240886
2023-09-29T06:33:12.045Z
2023-09-29T16:31:06.144Z
2023-10-24T21:24:25.352Z
{'Vendor': 'SourceCodester', 'Product': 'Best Courier Management System', 'Versions': '1.0'}
CVE-2023-5789
A vulnerability classified as problematic has been found in Dragon Path 707GR1 up to 20231022. Affected is an unknown function of the component Ping Diagnostics. The manipulation of the argument Host Address with the input >><img/src/onerror=alert(1)> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-243594 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.243594
2023-10-26T06:32:40.381Z
2023-10-26T16:00:08.217Z
2023-10-26T16:00:08.217Z
{'Vendor': 'Dragon Path', 'Product': '707GR1', 'Versions': '20231022'}
CVE-2023-5766
A remote code execution vulnerability in Remote Desktop Manager 2023.2.33 and earlier on Windows allows an attacker to remotely execute code from another windows user session on the same host via a specially crafted TCP packet.
https://devolutions.net/security/advisories/DEVO-2023-0019/
2023-10-25T13:48:08.445Z
2023-11-01T17:08:03.162Z
2023-11-01T17:08:03.162Z
{'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'}
CVE-2023-5336
The iPanorama 360 – WordPress Virtual Tour Builder plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 1.8.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with contributor-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/3566b602-c991-488f-9de2-57236c4735b5?source=cve
2023-10-02T12:34:55.719Z
2023-10-19T01:53:48.713Z
2023-10-19T01:53:48.713Z
{'Vendor': 'avirtum', 'Product': 'iPanorama 360 – WordPress Virtual Tour Builder', 'Versions': '*'}
CVE-2023-5341
A heap use-after-free flaw was found in coders/bmp.c in ImageMagick.
https://access.redhat.com/security/cve/CVE-2023-5341
2023-10-02T15:57:15.547Z
2023-11-19T09:20:12.642Z
2024-01-25T04:02:14.019Z
{'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': '7.1.2'}
CVE-2023-5711
The System Dashboard plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the sd_php_info() function hooked via an AJAX action in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve sensitive information provided by PHP info.
https://www.wordfence.com/threat-intel/vulnerabilities/id/17bc3a9f-2bf9-44e3-81ef-bfa932085da9?source=cve
2023-10-23T00:40:16.409Z
2023-12-07T02:00:04.709Z
2023-12-07T02:00:04.709Z
{'Vendor': 'qriouslad', 'Product': 'System Dashboard', 'Versions': '*'}
CVE-2023-5204
The ChatBot plugin for WordPress is vulnerable to SQL Injection via the $strid parameter in versions up to, and including, 4.8.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5ad12146-200b-48e5-82de-7572541edcc4?source=cve
2023-09-26T14:40:58.132Z
2023-10-19T05:34:11.125Z
2023-10-19T05:34:11.125Z
{'Vendor': 'quantumcloud', 'Product': 'AI ChatBot', 'Versions': '*'}
CVE-2023-5654
The React Developer Tools extension registers a message listener with window.addEventListener('message', <listener>) in a content script that is accessible to any webpage that is active in the browser. Within the listener is code that requests a URL derived from the received message via fetch(). The URL is not validated or sanitised before it is fetched, thus allowing a malicious web page to arbitrarily fetch URL’s via the victim's browser.
https://gist.github.com/CalumHutton/1fb89b64409570a43f89d1fd3274b231
2023-10-19T12:33:43.948Z
2023-10-19T14:28:23.769Z
2023-10-19T14:28:23.769Z
{'Vendor': 'Meta', 'Product': 'React Developer Tools Extension', 'Versions': '< 4.28.4'}
CVE-2023-5984
A CWE-494 Download of Code Without Integrity Check vulnerability exists that could allow modified firmware to be uploaded when an authorized admin user begins a firmware update procedure which could result in full control over the device.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-318-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-318-01.pdf
2023-11-07T10:54:44.542Z
2023-11-15T03:30:09.897Z
2023-12-14T05:04:52.005Z
{'Vendor': 'Schneider Electric', 'Product': 'ION8650', 'Versions': 'All versions'}
CVE-2023-5087
The Page Builder: Pagelayer WordPress plugin before 1.7.8 doesn't prevent attackers with author privileges and higher from inserting malicious JavaScript inside a post's header or footer code.
https://wpscan.com/vulnerability/3b45cc0b-7378-49f3-900e-d0e18cd4b878
2023-09-20T14:21:15.301Z
2023-10-16T19:38:57.172Z
2023-10-16T19:38:57.172Z
{'Vendor': 'Unknown', 'Product': 'Page Builder: Pagelayer', 'Versions': '1.3.2'}
CVE-2023-5438
The wp image slideshow plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/7e24383b-5b0f-4114-908b-4c2778632f73?source=cve
2023-10-05T19:17:51.543Z
2023-10-31T08:32:52.175Z
2023-10-31T08:32:52.175Z
{'Vendor': 'gopiplus', 'Product': 'wp image slideshow', 'Versions': '*'}
CVE-2023-5068
Delta Electronics DIAScreen may write past the end of an allocated buffer while parsing a specially crafted input file. This could allow an attacker to execute code in the context of the current process.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-03
2023-09-19T16:03:45.129Z
2023-09-21T22:01:07.522Z
2023-09-21T22:01:07.522Z
{'Vendor': 'Delta Electronics', 'Product': 'DIAScreen', 'Versions': '0'}
CVE-2023-5592
Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to download and execute applications without integrity checks on the device which may result in a complete loss of integrity.
https://cert.vde.com/en/advisories/VDE-2023-054/
2023-10-16T05:31:39.868Z
2023-12-14T14:04:41.083Z
2023-12-14T14:04:41.083Z
{'Vendor': 'PHOENIX CONTACT', 'Product': 'MULTIPROG', 'Versions': 'all'}
CVE-2023-5746
A vulnerability regarding use of externally-controlled format string is found in the cgi component. This allows remote attackers to execute arbitrary code via unspecified vectors. The following models with Synology Camera Firmware versions before 1.0.5-0185 may be affected: BC500 and TC500.
https://www.synology.com/en-global/security/advisory/Synology_SA_23_11
2023-10-24T02:48:16.801Z
2023-10-24T07:32:14.184Z
2023-10-24T10:24:05.921Z
{'Vendor': 'Synology', 'Product': 'Camera Firmware', 'Versions': '1.0'}
CVE-2023-5316
Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18.
https://huntr.dev/bounties/f877e65a-e647-457b-b105-7e5c9f58fb43
2023-09-30T00:00:06.478Z
2023-09-30T00:00:17.191Z
2023-09-30T00:00:17.191Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-5253
A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication. Malicious unauthenticated users with knowledge on the underlying system may be able to extract asset information.
https://security.nozominetworks.com/NN-2023:12-01
2023-09-28T12:41:27.922Z
2024-01-15T10:53:56.305Z
2024-01-15T10:53:56.305Z
{'Vendor': 'Nozomi Networks', 'Product': 'Guardian', 'Versions': '0'}
CVE-2023-5480
Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
2023-10-10T00:12:40.725Z
2023-11-01T17:13:59.444Z
2023-11-01T17:13:59.444Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'}
CVE-2023-5879
Users’ product account authentication data was stored in clear text in The Genie Company Aladdin Connect Mobile Application Version 5.65 Build 2075 (and below) on Android Devices. This allows the attacker, with access to the android device, to potentially retrieve users' clear text authentication credentials.
https://www.rapid7.com/blog/post/2024/01/03/genie-aladdin-connect-retrofit-garage-door-opener-multiple-vulnerabilities/
2023-10-31T13:34:45.000Z
2024-01-03T19:15:59.436Z
2024-01-03T19:16:06.190Z
{'Vendor': 'The Genie Company', 'Product': 'Aladdin Connect Mobile Application', 'Versions': '0'}
CVE-2023-5896
Cross-site Scripting (XSS) - Stored in GitHub repository pkp/pkp-lib prior to 3.4.0-4.
https://huntr.com/bounties/a1f05be5-24ed-4ec5-9858-fce4233f7bb1
2023-11-01T00:00:37.367Z
2023-11-01T00:00:41.580Z
2023-11-01T00:00:41.580Z
{'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'}
CVE-2023-5195
Mattermost fails to properly validate the permissions when soft deleting a team allowing a team member to soft delete other teams that they are not part of
https://mattermost.com/security-updates
2023-09-26T09:27:01.462Z
2023-09-29T09:25:58.963Z
2023-09-29T09:25:58.963Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.10, 8.0.2, 8.1.1'}
CVE-2023-5300
A vulnerability classified as critical has been found in TTSPlanning up to 20230925. This affects an unknown part. The manipulation of the argument uid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240939.
https://vuldb.com/?id.240939
2023-09-29T16:01:21.926Z
2023-09-30T10:00:05.991Z
2023-10-25T04:58:10.913Z
{'Vendor': 'n/a', 'Product': 'TTSPlanning', 'Versions': '20230925'}
CVE-2023-5750
The EmbedPress WordPress plugin before 3.9.2 does not sanitise and escape a parameter before outputting it back in the page containing a specific content, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/cf323f72-8374-40fe-9e2e-810e46de1ec8
2023-10-24T09:39:27.034Z
2023-12-11T19:22:38.813Z
2023-12-11T19:22:38.813Z
{'Vendor': 'Unknown', 'Product': 'EmbedPress', 'Versions': '0'}
CVE-2023-5245
FileUtil.extract() enumerates all zip file entries and extracts each file without validating whether file paths in the archive are outside the intended directory. When creating an instance of TensorflowModel using the saved_model format and an exported tensorflow model, the apply() function invokes the vulnerable implementation of FileUtil.extract(). Arbitrary file creation can directly lead to code execution
https://github.com/combust/mleap/pull/866#issuecomment-1738032225
2023-09-28T06:08:57.423Z
2023-11-15T12:52:18.656Z
2023-11-15T12:52:18.656Z
{'Vendor': '', 'Product': '', 'Versions': '0.18.0'}
CVE-2023-5615
The Skype Legacy Buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'skype-status' shortcode in all versions up to, and including, 3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/914bcc8f-fecd-450e-b2a7-0989b7a0dd4c?source=cve
2023-10-17T15:17:51.151Z
2023-10-20T07:29:23.396Z
2023-10-20T07:29:23.396Z
{'Vendor': 'ravanh', 'Product': 'Skype Legacy Buttons', 'Versions': '*'}