CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-5264 | A vulnerability classified as critical was found in huakecms 3.0. Affected by this vulnerability is an unknown functionality of the file /admin/cms_content.php. The manipulation of the argument cid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240877 was assigned to this vulnerability. | https://vuldb.com/?id.240877 | 2023-09-29T05:37:52.456Z | 2023-09-29T14:00:09.303Z | 2023-10-24T19:49:56.478Z | {'Vendor': 'n/a', 'Product': 'huakecms', 'Versions': '3.0'} |
CVE-2023-5634 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ArslanSoft Education Portal allows SQL Injection.This issue affects Education Portal: before v1.1.
| https://www.usom.gov.tr/bildirim/tr-23-0670 | 2023-10-18T11:04:00.757Z | 2023-12-01T13:19:13.935Z | 2023-12-01T13:19:13.935Z | {'Vendor': 'ArslanSoft', 'Product': 'Education Portal', 'Versions': '0'} |
CVE-2023-5321 | Missing Authorization in GitHub repository hamza417/inure prior to build94. | https://huntr.dev/bounties/b1becc68-e738-458f-bd99-06ee77580d3a | 2023-09-30T13:43:01.219Z | 2023-09-30T13:43:14.012Z | 2023-09-30T13:43:14.012Z | {'Vendor': 'hamza417', 'Product': 'hamza417/inure', 'Versions': 'unspecified'} |
CVE-2023-5771 | Proofpoint Enterprise Protection contains a stored XSS vulnerability in the AdminUI. An unauthenticated attacker can send a specially crafted email with HTML in the subject which triggers XSS when viewing quarantined messages. This issue affects Proofpoint Enterprise Protection: from 8.20.0 before patch 4796, from 8.18.6 before patch 4795 and all other prior versions.
| https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0010 | 2023-10-25T17:57:54.611Z | 2023-11-06T20:06:28.575Z | 2023-11-06T20:06:30.766Z | {'Vendor': 'Proofpoint', 'Product': 'Proofpoint Enterprise Protection', 'Versions': '8.20.0, 8.18.6, 8.0'} |
CVE-2023-5458 | The CITS Support svg, webp Media and TTF,OTF File Upload WordPress plugin before 3.0 does not sanitise uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads. | https://wpscan.com/vulnerability/47d15f1c-b9ca-494d-be8f-63c30e92f9b8 | 2023-10-09T08:51:31.456Z | 2023-10-31T13:54:42.463Z | 2023-10-31T13:54:42.463Z | {'Vendor': 'Unknown', 'Product': 'CITS Support svg, webp Media and TTF,OTF File Upload', 'Versions': '0'} |
CVE-2023-5008 | Student Information System v1.0 is vulnerable to an unauthenticated SQL Injection vulnerability on the 'regno' parameter of index.php page, allowing an external attacker to dump all the contents of the database contents and bypass the login control. | https://fluidattacks.com/advisories/blechacz/ | 2023-09-15T22:26:16.954Z | 2023-12-07T23:16:52.700Z | 2023-12-07T23:16:52.700Z | {'Vendor': 'Kashipara Group', 'Product': 'Student Information System', 'Versions': '1.0'} |
CVE-2023-5835 | A vulnerability classified as problematic was found in hu60t hu60wap6. Affected by this vulnerability is the function markdown of the file src/class/ubbparser.php. The manipulation leads to cross site scripting. The attack can be launched remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named a1cd9f12d7687243bfcb7ce295665acb83b9174e. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-243775. | https://vuldb.com/?id.243775 | 2023-10-27T21:43:57.190Z | 2023-10-28T13:31:05.324Z | 2023-10-28T13:31:05.324Z | {'Vendor': 'hu60t', 'Product': 'hu60wap6', 'Versions': 'n/a'} |
CVE-2023-5566 | The Simple Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 1.0.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/a153d6b2-e3fd-42db-90ba-d899a07d60c1?source=cve | 2023-10-13T00:32:15.078Z | 2023-10-30T13:48:59.219Z | 2023-10-30T13:48:59.219Z | {'Vendor': 'simplethemes', 'Product': 'Simple Shortcodes', 'Versions': '*'} |
CVE-2023-5136 | An incorrect permission assignment in the TopoGrafix DataPlugin for GPX could result in information disclosure. An attacker could exploit this vulnerability by getting a user to open a specially crafted data file.
| https://www.ni.com/en/support/documentation/supplemental/23/incorrect-permission-assignment-in-the-topografix-dataplug-for-gpx.html | 2023-09-22T19:29:47.084Z | 2023-11-08T15:24:10.867Z | 2023-11-08T15:24:10.867Z | {'Vendor': 'NI', 'Product': 'TopoGrafix DataPlugin for GPX', 'Versions': '0'} |
CVE-2023-5423 | A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/ajax.php?action=confirm_order. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-241384. | https://vuldb.com/?id.241384 | 2023-10-05T10:01:49.541Z | 2023-10-05T17:00:07.714Z | 2023-10-05T17:00:07.714Z | {'Vendor': 'SourceCodester', 'Product': 'Online Pizza Ordering System', 'Versions': '1.0'} |
CVE-2023-5073 | The iframe forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'iframe' shortcode in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/818de7f7-913a-4ade-927e-bba281b4709a?source=cve | 2023-09-19T18:53:43.898Z | 2023-10-31T11:29:12.022Z | 2023-10-31T11:29:12.022Z | {'Vendor': 'jrbecart', 'Product': 'iframe forms', 'Versions': '*'} |
CVE-2023-5589 | A vulnerability was found in SourceCodester Judging Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file login.php. The manipulation of the argument password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-242188. | https://vuldb.com/?id.242188 | 2023-10-15T15:40:15.469Z | 2023-10-15T22:31:04.177Z | 2023-10-15T22:31:04.177Z | {'Vendor': 'SourceCodester', 'Product': 'Judging Management System', 'Versions': '1.0'} |
CVE-2023-5970 | Improper authentication in the SMA100 SSL-VPN virtual office portal allows a remote authenticated attacker to create an identical external domain user using accent characters, resulting in an MFA bypass. | https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0018 | 2023-11-06T17:14:04.677Z | 2023-12-05T20:20:01.534Z | 2023-12-05T20:20:01.534Z | {'Vendor': 'SonicWall', 'Product': 'SMA100', 'Versions': '10.2.1.9-57sv and earlier versions'} |
CVE-2023-5618 | The Modern Footnotes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode in versions up to, and including, 1.4.16 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c20c674f-54b5-470f-b470-07a63501eb4d?source=cve | 2023-10-17T16:38:43.140Z | 2023-10-20T11:33:24.931Z | 2023-10-20T11:33:24.931Z | {'Vendor': 'prismtechstudios', 'Product': 'Modern Footnotes', 'Versions': '*'} |
CVE-2023-5161 | The Modal Window plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 5.3.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/48e2129f-6a2c-45e4-a0cf-7d8d5f563a7f?source=cve | 2023-09-25T13:32:36.093Z | 2023-09-26T01:51:14.286Z | 2023-09-26T01:51:14.286Z | {'Vendor': 'wpcalc', 'Product': 'Modal Window – create popup modal window', 'Versions': '*'} |
CVE-2023-5531 | The Thumbnail Slider With Lightbox plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on the delete functionality. This makes it possible for unauthenticated attackers to delete image lightboxes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/055b7ed5-268a-485e-ac7d-8082dc9fb2ad?source=cve | 2023-10-11T17:25:08.940Z | 2023-10-12T05:30:34.818Z | 2023-10-12T05:30:34.818Z | {'Vendor': 'nik00726', 'Product': 'Thumbnail Slider With Lightbox', 'Versions': '*'} |
CVE-2023-5862 | Missing Authorization in GitHub repository hamza417/inure prior to Build95. | https://huntr.com/bounties/0e517db6-d8ba-4cb9-9339-7991dda52e6d | 2023-10-31T00:00:06.449Z | 2023-10-31T00:00:18.766Z | 2023-10-31T00:00:18.766Z | {'Vendor': 'hamza417', 'Product': 'hamza417/inure', 'Versions': 'unspecified'} |
CVE-2023-5927 | A vulnerability has been found in Campcodes Simple Student Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/courses/manage_course.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-244327. | https://vuldb.com/?id.244327 | 2023-11-02T13:00:39.444Z | 2023-11-02T19:31:04.823Z | 2023-11-02T19:31:04.823Z | {'Vendor': 'Campcodes', 'Product': 'Simple Student Information System', 'Versions': '1.0'} |
CVE-2023-5024 | A vulnerability was found in Planno 23.04.04. It has been classified as problematic. This affects an unknown part of the component Comment Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239865 was assigned to this vulnerability. | https://vuldb.com/?id.239865 | 2023-09-16T07:57:19.804Z | 2023-09-17T06:31:04.839Z | 2023-10-24T19:08:28.124Z | {'Vendor': 'n/a', 'Product': 'Planno', 'Versions': '23.04.04'} |
CVE-2023-5474 | Heap buffer overflow in PDF in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html | 2023-10-10T00:12:40.051Z | 2023-10-11T22:28:53.165Z | 2023-10-11T22:28:53.165Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'} |
CVE-2023-5874 | The Popup box WordPress plugin before 3.8.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/ebe3e873-1259-43b9-a027-daa4dbd937f3 | 2023-10-31T09:31:48.816Z | 2023-12-04T21:28:13.541Z | 2023-12-04T21:28:13.541Z | {'Vendor': 'Unknown', 'Product': 'Popup box', 'Versions': '0'} |
CVE-2023-5177 | The Vrm 360 3D Model Viewer WordPress plugin through 1.2.1 exposes the full path of a file when putting in a non-existent file in a parameter of the shortcode. | https://wpscan.com/vulnerability/a67b9c21-a35a-4cdb-9627-a5932334e5f0 | 2023-09-25T15:28:47.717Z | 2023-10-16T19:38:53.691Z | 2023-10-16T19:38:53.691Z | {'Vendor': 'Unknown', 'Product': 'Vrm 360 3D Model Viewer', 'Versions': '0'} |
CVE-2023-5462 | A vulnerability was found in XINJE XD5E-30R-E 3.5.3b. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Modbus Handler. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. The identifier VDB-241585 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.241585 | 2023-10-09T14:09:00.471Z | 2023-10-09T21:31:04.182Z | 2023-10-09T21:31:04.182Z | {'Vendor': 'XINJE', 'Product': 'XD5E-30R-E', 'Versions': '3.5.3b'} |
CVE-2023-5198 | An issue has been discovered in GitLab affecting all versions prior to 16.2.7, all versions starting from 16.3 before 16.3.5, and all versions starting from 16.4 before 16.4.1. It was possible for a removed project member to write to protected branches using deploy keys. | https://gitlab.com/gitlab-org/gitlab/-/issues/416957 | 2023-09-26T10:01:49.676Z | 2023-09-29T07:01:42.219Z | 2023-09-29T07:01:42.219Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '0, 16.3, 16.4'} |
CVE-2023-5032 | A vulnerability was found in OpenRapid RapidCMS 1.3.1. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/article/article-edit-run.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239876. | https://vuldb.com/?id.239876 | 2023-09-17T17:26:14.064Z | 2023-09-18T03:31:04.782Z | 2023-10-24T19:18:13.675Z | {'Vendor': 'OpenRapid', 'Product': 'RapidCMS', 'Versions': '1.3.1'} |
CVE-2023-5931 | The rtMedia for WordPress, BuddyPress and bbPress WordPress plugin before 4.6.16 does not validate files to be uploaded, which could allow attackers with a low-privilege account (e.g. subscribers) to upload arbitrary files such as PHP on the server | https://wpscan.com/vulnerability/3d6889e3-a01b-4e7f-868f-af7cc8c7531a | 2023-11-02T13:39:26.334Z | 2023-12-26T18:33:01.473Z | 2023-12-26T18:33:01.473Z | {'Vendor': 'Unknown', 'Product': 'rtMedia for WordPress, BuddyPress and bbPress', 'Versions': '0'} |
CVE-2023-5659 | The Interact: Embed A Quiz On Your Site plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'interact-quiz' shortcode in all versions up to, and including, 3.0.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/69ba1a39-ddb0-4661-8104-d8bb71710e0c?source=cve | 2023-10-19T16:05:54.469Z | 2023-11-07T11:31:06.961Z | 2023-11-07T11:31:06.961Z | {'Vendor': 'tryinteract', 'Product': 'Interact: Embed A Quiz On Your Site', 'Versions': '*'} |
CVE-2023-5209 | The WordPress Online Booking and Scheduling Plugin WordPress plugin before 22.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/dea6077a-81ee-451f-b049-3749a2252c88 | 2023-09-26T19:04:05.898Z | 2023-11-27T16:21:59.004Z | 2023-11-27T16:21:59.004Z | {'Vendor': 'Unknown', 'Product': 'WordPress Online Booking and Scheduling Plugin', 'Versions': '0'} |
CVE-2023-5120 | The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image file path parameter in versions up to, and including, 0.9.89 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/320f4260-20c2-4f27-91ba-d2488b417f62?source=cve | 2023-09-22T14:13:48.298Z | 2023-10-20T06:35:16.563Z | 2023-10-20T06:35:16.563Z | {'Vendor': 'wpvividplugins', 'Product': 'Migration, Backup, Staging – WPvivid', 'Versions': '*'} |
CVE-2023-5570 | Improper Protection for Outbound Error Messages and Alert Signals vulnerability in Inohom Home Manager Gateway allows Account Footprinting.This issue affects Home Manager Gateway: before v.1.27.12.
| https://www.usom.gov.tr/bildirim/tr-23-0609 | 2023-10-13T08:09:58.772Z | 2023-10-27T11:53:43.885Z | 2023-10-27T12:47:31.330Z | {'Vendor': 'Inohom', 'Product': 'Home Manager Gateway', 'Versions': '0'} |
CVE-2023-5823 | Cross-Site Request Forgery (CSRF) vulnerability in ThemeKraft TK Google Fonts GDPR Compliant plugin <= 2.2.11 versions. | https://patchstack.com/database/vulnerability/tk-google-fonts/wordpress-tk-google-fonts-gdpr-compliant-plugin-2-2-11-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-27T07:27:51.922Z | 2023-11-06T11:21:53.681Z | 2023-11-06T11:21:53.681Z | {'Vendor': 'ThemeKraft', 'Product': 'TK Google Fonts GDPR Compliant', 'Versions': 'n/a'} |
CVE-2023-5989 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Uyumsoft Information System and Technologies LioXERP allows Stored XSS.This issue affects LioXERP: before v.146.
| https://www.usom.gov.tr/bildirim/tr-23-0721 | 2023-11-07T11:31:35.214Z | 2023-12-21T09:45:37.933Z | 2023-12-21T09:45:37.933Z | {'Vendor': ' Uyumsoft Information System and Technologies', 'Product': 'LioXERP', 'Versions': '0'} |
CVE-2023-5966 | An authenticated privileged attacker could upload a specially crafted zip to the EspoCRM server in version 7.2.5, via the extension deployment form, which could lead to arbitrary PHP code execution. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-espocrm | 2023-11-06T13:18:11.772Z | 2023-11-30T13:26:48.245Z | 2023-11-30T13:26:48.245Z | {'Vendor': 'EspoCRM', 'Product': 'EspoCRM', 'Versions': '0'} |
CVE-2023-5435 | The Up down image slideshow gallery plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/0b72cf6f-4924-4fa5-8e1a-4054dfe73be0?source=cve | 2023-10-05T19:17:05.805Z | 2023-10-31T08:32:49.428Z | 2023-10-31T08:32:49.428Z | {'Vendor': 'gopiplus', 'Product': 'Up down image slideshow gallery', 'Versions': '*'} |
CVE-2023-5121 | The Migration, Backup, Staging – WPvivid plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings (the backup path parameter) in versions up to, and including, 0.9.89 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | https://www.wordfence.com/threat-intel/vulnerabilities/id/cdcac5f9-a744-4853-8a80-ed38fec81dbb?source=cve | 2023-09-22T14:22:52.897Z | 2023-10-20T07:29:31.733Z | 2023-10-20T07:29:31.733Z | {'Vendor': 'wpvividplugins', 'Product': 'Migration, Backup, Staging – WPvivid', 'Versions': '*'} |
CVE-2023-5571 | Improper Input Validation in GitHub repository vriteio/vrite prior to 0.3.0. | https://huntr.dev/bounties/926ca25f-dd4a-40cf-8e6b-9d7b5938e95a | 2023-10-13T09:55:20.180Z | 2023-10-13T09:55:33.149Z | 2023-10-13T09:55:33.149Z | {'Vendor': 'vriteio', 'Product': 'vriteio/vrite', 'Versions': 'unspecified'} |
CVE-2023-5822 | The Drag and Drop Multiple File Upload - Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads to insufficient file type validation in the 'dnd_upload_cf7_upload' function in versions up to, and including, 1.3.7.3. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. This can be exploited if a user authorized to edit form, which means editor privileges or above, has added a 'multiple file upload' form field with '*' acceptable file types. | https://www.wordfence.com/threat-intel/vulnerabilities/id/1b3be300-5b7f-4844-8637-1bb8c939ed4c?source=cve | 2023-10-26T23:08:03.308Z | 2023-11-22T15:33:21.106Z | 2023-11-22T15:33:21.106Z | {'Vendor': 'glenwpcoder', 'Product': 'Drag and Drop Multiple File Upload – Contact Form 7', 'Versions': '*'} |
CVE-2023-5988 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Uyumsoft Information System and Technologies LioXERP allows Reflected XSS.This issue affects LioXERP: before v.146.
| https://www.usom.gov.tr/bildirim/tr-23-0721 | 2023-11-07T11:31:32.859Z | 2023-12-21T09:40:25.554Z | 2023-12-21T09:40:25.554Z | {'Vendor': ' Uyumsoft Information System and Technologies', 'Product': 'LioXERP', 'Versions': '0'} |
CVE-2023-5967 | Mattermost fails to properly validate requests to the Calls plugin, allowing an attacker sending a request without a User Agent header to cause a panic and crash the Calls plugin
| https://mattermost.com/security-updates | 2023-11-06T15:14:58.458Z | 2023-11-06T15:24:24.544Z | 2023-11-06T15:24:24.544Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 8.1.3, 8.0.4, 7.8.12'} |
CVE-2023-5434 | The Superb slideshow gallery plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 13.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/3a12945d-a67c-4a19-a4e7-f65f5f2a21bb?source=cve | 2023-10-05T19:16:52.260Z | 2023-10-31T08:32:49.889Z | 2023-10-31T08:32:49.889Z | {'Vendor': 'gopiplus', 'Product': 'Superb slideshow gallery', 'Versions': '*'} |
CVE-2023-5658 | The WP MapIt plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_mapit' shortcode in all versions up to, and including, 2.7.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/7ef6f598-e1a7-4036-9485-1aad0416349a?source=cve | 2023-10-19T16:05:33.929Z | 2023-11-07T11:01:44.546Z | 2023-11-07T11:01:44.546Z | {'Vendor': 'phpwebdev', 'Product': 'WP MapIt', 'Versions': '*'} |
CVE-2023-5875 | Mattermost Desktop fails to correctly handle permissions or prompt the user for consent on certain sensitive ones allowing media exploitation from a malicious mattermost server | https://mattermost.com/security-updates | 2023-10-31T10:43:53.126Z | 2023-11-02T08:27:05.082Z | 2023-11-02T08:27:05.082Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost Desktop', 'Versions': '0, 5.5.1'} |
CVE-2023-5176 | Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3. | https://bugzilla.mozilla.org/buglist.cgi?bug_id=1836353%2C1842674%2C1843824%2C1843962%2C1848890%2C1850180%2C1850983%2C1851195 | 2023-09-25T15:03:44.531Z | 2023-09-27T14:13:25.411Z | 2023-09-27T14:13:25.411Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-5463 | A vulnerability was found in XINJE XDPPro up to 3.7.17a. It has been rated as critical. Affected by this issue is some unknown functionality in the library cfgmgr32.dll. The manipulation leads to uncontrolled search path. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. VDB-241586 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.241586 | 2023-10-09T14:09:03.490Z | 2023-10-09T21:31:05.292Z | 2023-10-09T21:31:05.292Z | {'Vendor': 'XINJE', 'Product': 'XDPPro', 'Versions': '3.7.17a'} |
CVE-2023-5199 | The PHP to Page plugin for WordPress is vulnerable Local File Inclusion to Remote Code Execution in versions up to, and including, 0.3 via the 'php-to-page' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to include local file and potentially execute code on the server. While subscribers may need to poison log files or otherwise get a file installed in order to achieve remote code execution, author and above users can upload files by default and achieve remote code execution easily. | https://www.wordfence.com/threat-intel/vulnerabilities/id/83e5a0dc-fc51-4565-945f-190cf9175874?source=cve | 2023-09-26T12:44:15.027Z | 2023-10-30T13:48:58.665Z | 2023-10-30T13:48:58.665Z | {'Vendor': 'bloafer', 'Product': 'PHP to Page', 'Versions': '*'} |
CVE-2023-5033 | A vulnerability classified as critical has been found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file /admin/category/cate-edit-run.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239877 was assigned to this vulnerability. | https://vuldb.com/?id.239877 | 2023-09-17T17:26:16.822Z | 2023-09-18T04:31:04.707Z | 2023-10-24T19:19:26.827Z | {'Vendor': 'OpenRapid', 'Product': 'RapidCMS', 'Versions': '1.3.1'} |
CVE-2023-5930 | A vulnerability was found in Campcodes Simple Student Information System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/students/manage_academic.php. The manipulation of the argument student_id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-244330 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.244330 | 2023-11-02T13:00:52.731Z | 2023-11-02T20:00:08.389Z | 2023-11-02T20:00:08.389Z | {'Vendor': 'Campcodes', 'Product': 'Simple Student Information System', 'Versions': '1.0'} |
CVE-2023-5160 | Mattermost fails to check the Show Full Name option at the /api/v4/teams/TEAM_ID/top/team_members endpoint allowing a member to get the full name of another user even if the Show Full Name option was disabled
| https://mattermost.com/security-updates | 2023-09-25T11:43:46.566Z | 2023-10-02T10:46:33.153Z | 2023-10-02T10:46:33.153Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 7.8.10, 8.1.1'} |
CVE-2023-5530 | The Ninja Forms Contact Form WordPress plugin before 3.6.34 does not sanitize and escape its label fields, which could allow high privilege users such as admin to perform Stored XSS attacks. Only users with the unfiltered_html capability can perform this, and such users are already allowed to use JS in posts/comments etc however the vendor acknowledged and fixed the issue | https://wpscan.com/vulnerability/a642f313-cc3e-4d75-b207-1dceb6a7fbae | 2023-10-11T17:01:33.156Z | 2023-11-06T20:41:40.862Z | 2023-11-06T20:41:40.862Z | {'Vendor': 'Unknown', 'Product': 'Ninja Forms Contact Form', 'Versions': '0'} |
CVE-2023-5863 | Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.2. | https://huntr.com/bounties/fbfd4e84-61fb-4063-8f11-15877b8c1f6f | 2023-10-31T00:00:06.770Z | 2023-10-31T00:00:19.197Z | 2023-10-31T00:00:19.197Z | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-5926 | A vulnerability, which was classified as critical, was found in Campcodes Simple Student Information System 1.0. Affected is an unknown function of the file /admin/students/update_status.php. The manipulation of the argument student_id leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-244326 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.244326 | 2023-11-02T13:00:35.703Z | 2023-11-02T19:00:09.944Z | 2023-11-02T19:00:09.944Z | {'Vendor': 'Campcodes', 'Product': 'Simple Student Information System', 'Versions': '1.0'} |
CVE-2023-5025 | A vulnerability was found in KOHA up to 23.05.03. It has been declared as problematic. This vulnerability affects unknown code of the file /cgi-bin/koha/catalogue/search.pl of the component MARC. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-239866 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.239866 | 2023-09-16T08:19:19.064Z | 2023-09-17T07:00:07.258Z | 2023-10-24T19:09:41.254Z | {'Vendor': 'n/a', 'Product': 'KOHA', 'Versions': '23.05.03'} |
CVE-2023-5475 | Inappropriate implementation in DevTools in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass discretionary access control via a crafted Chrome Extension. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html | 2023-10-10T00:12:40.135Z | 2023-10-11T22:28:52.356Z | 2023-10-11T22:28:52.356Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'} |
CVE-2023-5619 | null | null | 2023-10-17T17:37:15.944Z | null | 2024-01-04T19:11:30.595Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-5834 | HashiCorp Vagrant's Windows installer targeted a custom location with a non-protected path that could be junctioned, introducing potential for unauthorized file system writes. Fixed in Vagrant 2.4.0. | https://discuss.hashicorp.com/t/hcsec-2023-31-vagrant-s-windows-installer-allowed-directory-junction-write/59568 | 2023-10-27T19:52:44.844Z | 2023-10-27T21:06:38.680Z | 2023-10-27T21:06:38.680Z | {'Vendor': 'HashiCorp', 'Product': 'Vagrant', 'Versions': '*'} |
CVE-2023-5567 | The QR Code Tag plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'qrcodetag' shortcode in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/be004002-a3ac-46e9-b0c1-258f05f97b2a?source=cve | 2023-10-13T00:32:35.816Z | 2023-11-07T11:31:08.826Z | 2023-11-07T11:31:08.826Z | {'Vendor': 'dspreen', 'Product': 'QR Code Tag', 'Versions': '*'} |
CVE-2023-5137 | The Simply Excerpts WordPress plugin through 1.4 does not sanitize and escape some fields in the plugin settings, which could allow high-privilege users such as an administrator to inject arbitrary web scripts even when the unfiltered_html capability is disallowed (for example in a multisite setup). | https://wpscan.com/vulnerability/79b79e9c-ea4f-4188-a1b5-61dda0b5d434 | 2023-09-22T19:39:18.392Z | 2023-12-04T21:28:33.766Z | 2023-12-04T21:28:33.766Z | {'Vendor': 'Unknown', 'Product': 'Simply Excerpts', 'Versions': '0'} |
CVE-2023-5422 | The functions to fetch e-mail via POP3 or IMAP as well as sending e-mail via SMTP use OpenSSL for static SSL or TLS based communication. As the
SSL_get_verify_result() function is not used the certificated is trusted always and it can not be ensured that the certificate
satisfies all necessary security requirements.
This could allow an
attacker to use an invalid certificate to claim to be a trusted host,
use expired certificates, or conduct other attacks that could be
detected if the certificate is properly validated.
This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.
| https://otrs.com/release-notes/otrs-security-advisory-2023-10/ | 2023-10-05T08:12:18.101Z | 2023-10-16T08:10:35.192Z | 2023-10-16T08:10:35.192Z | {'Vendor': 'OTRS AG', 'Product': 'OTRS', 'Versions': '7.0.x, 8.0.x'} |
CVE-2023-5072 | Denial of Service in JSON-Java versions up to and including 20230618. A bug in the parser means that an input string of modest size can lead to indefinite amounts of memory being used.
| https://github.com/stleary/JSON-java/issues/758 | 2023-09-19T18:29:03.608Z | 2023-10-12T16:13:27.974Z | 2023-10-12T19:54:45.413Z | {'Vendor': 'https://github.com/stleary/JSON-java', 'Product': 'n/a', 'Versions': '≤ 20230618'} |
CVE-2023-5588 | A vulnerability was found in kphrx pleroma. It has been classified as problematic. This affects the function Pleroma.Emoji.Pack of the file lib/pleroma/emoji/pack.ex. The manipulation of the argument name leads to path traversal. The complexity of an attack is rather high. The exploitability is told to be difficult. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 2c795094535537a8607cc0d3b7f076a609636f40. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-242187. | https://vuldb.com/?id.242187 | 2023-10-15T13:27:34.568Z | 2023-10-15T22:00:06.500Z | 2023-10-15T22:00:06.500Z | {'Vendor': 'kphrx', 'Product': 'pleroma', 'Versions': 'n/a'} |
CVE-2023-5459 | A vulnerability has been found in Delta Electronics DVP32ES2 PLC 1.48 and classified as critical. This vulnerability affects unknown code of the component Password Transmission Handler. The manipulation leads to denial of service. The exploit has been disclosed to the public and may be used. VDB-241582 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.241582 | 2023-10-09T13:46:22.947Z | 2023-10-09T19:00:06.726Z | 2023-10-09T19:00:06.726Z | {'Vendor': 'Delta Electronics', 'Product': 'DVP32ES2 PLC', 'Versions': '1.48'} |
CVE-2023-5009 | An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. This was a bypass of [CVE-2023-3932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3932) showing additional impact. | https://gitlab.com/gitlab-org/gitlab/-/issues/425304 | 2023-09-15T22:30:36.931Z | 2023-09-19T07:01:14.930Z | 2023-10-03T09:03:02.272Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '13.12, 16.3'} |
CVE-2023-5265 | A vulnerability, which was classified as critical, has been found in Tongda OA 2017. Affected by this issue is some unknown functionality of the file general/hr/manage/staff_transfer/delete.php. The manipulation of the argument TRANSFER_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-240878 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.240878 | 2023-09-29T05:40:02.037Z | 2023-09-29T14:31:04.410Z | 2023-10-24T19:51:09.627Z | {'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': 'n/a'} |
CVE-2023-5635 | Improper Protection for Outbound Error Messages and Alert Signals vulnerability in ArslanSoft Education Portal allows Account Footprinting.This issue affects Education Portal: before v1.1.
| https://www.usom.gov.tr/bildirim/tr-23-0670 | 2023-10-18T11:04:01.788Z | 2023-12-01T13:29:44.356Z | 2023-12-01T13:29:44.356Z | {'Vendor': 'ArslanSoft', 'Product': 'Education Portal', 'Versions': '0'} |
CVE-2023-5320 | Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18. | https://huntr.dev/bounties/3a2bc18b-5932-4fb5-a01e-24b2b0443b67 | 2023-09-30T00:00:37.900Z | 2023-09-30T00:00:42.559Z | 2023-09-30T00:00:42.559Z | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-5770 | Proofpoint Enterprise Protection contains a vulnerability in the email delivery agent that allows an unauthenticated attacker to inject improperly encoded HTML into the email body of a message through the email subject. The vulnerability is caused by inappropriate encoding when rewriting the email before delivery.This issue affects Proofpoint Enterprise Protection: from 8.20.2 before patch 4809, from 8.20.0 before patch 4805, from 8.18.6 before patch 4804 and all other prior versions.
| https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2023-0009 | 2023-10-25T17:57:53.751Z | 2024-01-09T22:02:03.839Z | 2024-01-09T22:02:03.839Z | {'Vendor': 'Proofpoint', 'Product': 'Proofpoint Enterprise Protection', 'Versions': '8.20.2, 8.20.0, 8.18.6, 8.0'} |
CVE-2023-5818 | The Amazonify plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.8.1. This is due to missing or incorrect nonce validation on the amazonifyOptionsPage() function. This makes it possible for unauthenticated attackers to update the plugins settings, including the Amazon Tracking ID, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/33f3c466-bdeb-402f-bf34-bc703f35e1e2?source=cve | 2023-10-26T22:40:15.553Z | 2023-11-07T19:31:33.680Z | 2023-11-07T19:31:33.680Z | {'Vendor': 'garykeorkunian', 'Product': 'Amazonify', 'Versions': '*'} |
CVE-2023-5662 | The Sponsors plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'sponsors' shortcode in all versions up to, and including, 3.5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/4af04219-26c5-401d-94ef-11d2321f98bf?source=cve | 2023-10-19T16:07:17.534Z | 2023-11-22T15:33:23.830Z | 2023-11-22T15:33:23.830Z | {'Vendor': 'ibenic', 'Product': 'Sponsors', 'Versions': '*'} |
CVE-2023-5232 | The Font Awesome More Icons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'icon' shortcode in versions up to, and including, 3.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/15947764-a070-4715-bd44-cb79b62ed59d?source=cve | 2023-09-27T15:50:23.159Z | 2023-09-28T04:31:34.717Z | 2023-09-28T04:31:34.717Z | {'Vendor': 'jr00ck', 'Product': 'Font Awesome More Icons', 'Versions': '*'} |
CVE-2023-5727 | The executable file warning was not presented when downloading .msix, .msixbundle, .appx, and .appxbundle files, which can run commands on a user's computer.
*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1. | https://bugzilla.mozilla.org/show_bug.cgi?id=1847180 | 2023-10-23T17:22:05.928Z | 2023-10-24T12:47:13.501Z | 2023-10-24T21:06:50.044Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-5377 | Out-of-bounds Read in GitHub repository gpac/gpac prior to v2.2.2-DEV. | https://huntr.dev/bounties/fe778df4-3867-41d6-954b-211c81bccbbf | 2023-10-04T09:53:41.329Z | 2023-10-04T09:53:52.991Z | 2023-10-04T09:53:52.991Z | {'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'} |
CVE-2023-5048 | The WDContactFormBuilder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Contact_Form_Builder' shortcode in versions up to, and including, 1.0.72 due to insufficient input sanitization and output escaping on 'id' user supplied attribute. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/7152253a-7bb8-4b5c-bffd-86e46df54b7e?source=cve | 2023-09-18T13:59:24.321Z | 2023-11-22T15:33:27.053Z | 2023-11-22T15:33:27.053Z | {'Vendor': '10web', 'Product': 'WDContactFormBuilder', 'Versions': '*'} |
CVE-2023-5674 | The WP Mail Log WordPress plugin before 1.1.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Contributor. | https://wpscan.com/vulnerability/32a23d0d-7ece-4870-a99d-f3f344be2d67 | 2023-10-20T00:26:27.145Z | 2023-12-26T18:33:03.106Z | 2023-12-26T18:33:03.106Z | {'Vendor': 'Unknown', 'Product': 'WP Mail Log', 'Versions': '0'} |
CVE-2023-5731 | Memory safety bugs present in Firefox 118. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 119. | https://bugzilla.mozilla.org/buglist.cgi?bug_id=1690111%2C1721904%2C1851803%2C1854068 | 2023-10-23T17:22:07.179Z | 2023-10-24T12:47:16.806Z | 2023-10-24T12:47:16.806Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-5859 | Incorrect security UI in Picture In Picture in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain spoofing via a crafted local HTML page. (Chromium security severity: Low) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html | 2023-10-30T22:11:17.575Z | 2023-11-01T17:14:03.270Z | 2023-11-01T17:14:03.270Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'} |
CVE-2023-5623 |
NNM failed to properly set ACLs on its installation directory, which could allow a low privileged user to run arbitrary code with SYSTEM privileges where NNM is installed to a non-standard location
| https://www.tenable.com/security/tns-2023-34 | 2023-10-17T19:03:43.341Z | 2023-10-26T16:25:17.792Z | 2023-10-26T16:25:17.792Z | {'Vendor': 'Tenable', 'Product': 'Nessus Network Monitor', 'Versions': '0'} |
CVE-2023-5273 | A vulnerability classified as problematic was found in SourceCodester Best Courier Management System 1.0. This vulnerability affects unknown code of the file manage_parcel_status.php. The manipulation of the argument id leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-240886 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.240886 | 2023-09-29T06:33:12.045Z | 2023-09-29T16:31:06.144Z | 2023-10-24T21:24:25.352Z | {'Vendor': 'SourceCodester', 'Product': 'Best Courier Management System', 'Versions': '1.0'} |
CVE-2023-5789 | A vulnerability classified as problematic has been found in Dragon Path 707GR1 up to 20231022. Affected is an unknown function of the component Ping Diagnostics. The manipulation of the argument Host Address with the input >><img/src/onerror=alert(1)> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-243594 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.243594 | 2023-10-26T06:32:40.381Z | 2023-10-26T16:00:08.217Z | 2023-10-26T16:00:08.217Z | {'Vendor': 'Dragon Path', 'Product': '707GR1', 'Versions': '20231022'} |
CVE-2023-5766 |
A remote code execution vulnerability in Remote Desktop Manager 2023.2.33 and earlier on Windows allows an attacker to remotely execute code from another windows user session on the same host via a specially crafted TCP packet.
| https://devolutions.net/security/advisories/DEVO-2023-0019/ | 2023-10-25T13:48:08.445Z | 2023-11-01T17:08:03.162Z | 2023-11-01T17:08:03.162Z | {'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'} |
CVE-2023-5336 | The iPanorama 360 – WordPress Virtual Tour Builder plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 1.8.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with contributor-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/3566b602-c991-488f-9de2-57236c4735b5?source=cve | 2023-10-02T12:34:55.719Z | 2023-10-19T01:53:48.713Z | 2023-10-19T01:53:48.713Z | {'Vendor': 'avirtum', 'Product': 'iPanorama 360 – WordPress Virtual Tour Builder', 'Versions': '*'} |
CVE-2023-5341 | A heap use-after-free flaw was found in coders/bmp.c in ImageMagick. | https://access.redhat.com/security/cve/CVE-2023-5341 | 2023-10-02T15:57:15.547Z | 2023-11-19T09:20:12.642Z | 2024-01-25T04:02:14.019Z | {'Vendor': 'n/a', 'Product': 'ImageMagick', 'Versions': '7.1.2'} |
CVE-2023-5711 | The System Dashboard plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the sd_php_info() function hooked via an AJAX action in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve sensitive information provided by PHP info. | https://www.wordfence.com/threat-intel/vulnerabilities/id/17bc3a9f-2bf9-44e3-81ef-bfa932085da9?source=cve | 2023-10-23T00:40:16.409Z | 2023-12-07T02:00:04.709Z | 2023-12-07T02:00:04.709Z | {'Vendor': 'qriouslad', 'Product': 'System Dashboard', 'Versions': '*'} |
CVE-2023-5204 | The ChatBot plugin for WordPress is vulnerable to SQL Injection via the $strid parameter in versions up to, and including, 4.8.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/5ad12146-200b-48e5-82de-7572541edcc4?source=cve | 2023-09-26T14:40:58.132Z | 2023-10-19T05:34:11.125Z | 2023-10-19T05:34:11.125Z | {'Vendor': 'quantumcloud', 'Product': 'AI ChatBot', 'Versions': '*'} |
CVE-2023-5654 | The React Developer Tools extension registers a message listener with window.addEventListener('message', <listener>) in a content script that is accessible to any webpage that is active in the browser. Within the listener is code that requests a URL derived from the received message via fetch(). The URL is not validated or sanitised before it is fetched, thus allowing a malicious web page to arbitrarily fetch URL’s via the victim's browser. | https://gist.github.com/CalumHutton/1fb89b64409570a43f89d1fd3274b231 | 2023-10-19T12:33:43.948Z | 2023-10-19T14:28:23.769Z | 2023-10-19T14:28:23.769Z | {'Vendor': 'Meta', 'Product': 'React Developer Tools Extension', 'Versions': '< 4.28.4'} |
CVE-2023-5984 |
A CWE-494 Download of Code Without Integrity Check vulnerability exists that could allow
modified firmware to be uploaded when an authorized admin user begins a firmware update
procedure which could result in full control over the device.
| https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-318-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-318-01.pdf | 2023-11-07T10:54:44.542Z | 2023-11-15T03:30:09.897Z | 2023-12-14T05:04:52.005Z | {'Vendor': 'Schneider Electric', 'Product': 'ION8650', 'Versions': 'All versions'} |
CVE-2023-5087 | The Page Builder: Pagelayer WordPress plugin before 1.7.8 doesn't prevent attackers with author privileges and higher from inserting malicious JavaScript inside a post's header or footer code. | https://wpscan.com/vulnerability/3b45cc0b-7378-49f3-900e-d0e18cd4b878 | 2023-09-20T14:21:15.301Z | 2023-10-16T19:38:57.172Z | 2023-10-16T19:38:57.172Z | {'Vendor': 'Unknown', 'Product': 'Page Builder: Pagelayer', 'Versions': '1.3.2'} |
CVE-2023-5438 | The wp image slideshow plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/7e24383b-5b0f-4114-908b-4c2778632f73?source=cve | 2023-10-05T19:17:51.543Z | 2023-10-31T08:32:52.175Z | 2023-10-31T08:32:52.175Z | {'Vendor': 'gopiplus', 'Product': 'wp image slideshow', 'Versions': '*'} |
CVE-2023-5068 | Delta Electronics DIAScreen may write past the end of an allocated
buffer while parsing a specially crafted input file. This could allow an
attacker to execute code in the context of the current process.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-264-03 | 2023-09-19T16:03:45.129Z | 2023-09-21T22:01:07.522Z | 2023-09-21T22:01:07.522Z | {'Vendor': 'Delta Electronics', 'Product': 'DIAScreen', 'Versions': '0'} |
CVE-2023-5592 | Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to download and execute applications without integrity checks on the device which may result in a complete loss of integrity. | https://cert.vde.com/en/advisories/VDE-2023-054/ | 2023-10-16T05:31:39.868Z | 2023-12-14T14:04:41.083Z | 2023-12-14T14:04:41.083Z | {'Vendor': 'PHOENIX CONTACT', 'Product': 'MULTIPROG', 'Versions': 'all'} |
CVE-2023-5746 | A vulnerability regarding use of externally-controlled format string is found in the cgi component. This allows remote attackers to execute arbitrary code via unspecified vectors. The following models with Synology Camera Firmware versions before 1.0.5-0185 may be affected: BC500 and TC500. | https://www.synology.com/en-global/security/advisory/Synology_SA_23_11 | 2023-10-24T02:48:16.801Z | 2023-10-24T07:32:14.184Z | 2023-10-24T10:24:05.921Z | {'Vendor': 'Synology', 'Product': 'Camera Firmware', 'Versions': '1.0'} |
CVE-2023-5316 | Cross-site Scripting (XSS) - DOM in GitHub repository thorsten/phpmyfaq prior to 3.1.18. | https://huntr.dev/bounties/f877e65a-e647-457b-b105-7e5c9f58fb43 | 2023-09-30T00:00:06.478Z | 2023-09-30T00:00:17.191Z | 2023-09-30T00:00:17.191Z | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-5253 | A missing authentication check in the WebSocket channel used for the Check Point IoT integration in Nozomi Networks Guardian and CMC, may allow an unauthenticated attacker to obtain assets data without authentication.
Malicious unauthenticated users with knowledge on the underlying system may be able to extract asset information.
| https://security.nozominetworks.com/NN-2023:12-01 | 2023-09-28T12:41:27.922Z | 2024-01-15T10:53:56.305Z | 2024-01-15T10:53:56.305Z | {'Vendor': 'Nozomi Networks', 'Product': 'Guardian', 'Versions': '0'} |
CVE-2023-5480 | Inappropriate implementation in Payments in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to bypass XSS preventions via a malicious file. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html | 2023-10-10T00:12:40.725Z | 2023-11-01T17:13:59.444Z | 2023-11-01T17:13:59.444Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'} |
CVE-2023-5879 | Users’ product account authentication data was stored in clear text in The Genie Company Aladdin Connect Mobile Application Version 5.65 Build 2075 (and below) on Android Devices. This allows the attacker, with access to the android device, to potentially retrieve users' clear text authentication credentials.
| https://www.rapid7.com/blog/post/2024/01/03/genie-aladdin-connect-retrofit-garage-door-opener-multiple-vulnerabilities/ | 2023-10-31T13:34:45.000Z | 2024-01-03T19:15:59.436Z | 2024-01-03T19:16:06.190Z | {'Vendor': 'The Genie Company', 'Product': 'Aladdin Connect Mobile Application', 'Versions': '0'} |
CVE-2023-5896 | Cross-site Scripting (XSS) - Stored in GitHub repository pkp/pkp-lib prior to 3.4.0-4. | https://huntr.com/bounties/a1f05be5-24ed-4ec5-9858-fce4233f7bb1 | 2023-11-01T00:00:37.367Z | 2023-11-01T00:00:41.580Z | 2023-11-01T00:00:41.580Z | {'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'} |
CVE-2023-5195 | Mattermost fails to properly validate the permissions when soft deleting a team allowing a team member to soft delete other teams that they are not part of
| https://mattermost.com/security-updates | 2023-09-26T09:27:01.462Z | 2023-09-29T09:25:58.963Z | 2023-09-29T09:25:58.963Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.10, 8.0.2, 8.1.1'} |
CVE-2023-5300 | A vulnerability classified as critical has been found in TTSPlanning up to 20230925. This affects an unknown part. The manipulation of the argument uid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240939. | https://vuldb.com/?id.240939 | 2023-09-29T16:01:21.926Z | 2023-09-30T10:00:05.991Z | 2023-10-25T04:58:10.913Z | {'Vendor': 'n/a', 'Product': 'TTSPlanning', 'Versions': '20230925'} |
CVE-2023-5750 | The EmbedPress WordPress plugin before 3.9.2 does not sanitise and escape a parameter before outputting it back in the page containing a specific content, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/cf323f72-8374-40fe-9e2e-810e46de1ec8 | 2023-10-24T09:39:27.034Z | 2023-12-11T19:22:38.813Z | 2023-12-11T19:22:38.813Z | {'Vendor': 'Unknown', 'Product': 'EmbedPress', 'Versions': '0'} |
CVE-2023-5245 | FileUtil.extract() enumerates all zip file entries and extracts each file without validating whether file paths in the archive are outside the intended directory.
When creating an instance of TensorflowModel using the saved_model format and an exported tensorflow model, the apply() function invokes the vulnerable implementation of FileUtil.extract().
Arbitrary file creation can directly lead to code execution
| https://github.com/combust/mleap/pull/866#issuecomment-1738032225 | 2023-09-28T06:08:57.423Z | 2023-11-15T12:52:18.656Z | 2023-11-15T12:52:18.656Z | {'Vendor': '', 'Product': '', 'Versions': '0.18.0'} |
CVE-2023-5615 | The Skype Legacy Buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'skype-status' shortcode in all versions up to, and including, 3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/914bcc8f-fecd-450e-b2a7-0989b7a0dd4c?source=cve | 2023-10-17T15:17:51.151Z | 2023-10-20T07:29:23.396Z | 2023-10-20T07:29:23.396Z | {'Vendor': 'ravanh', 'Product': 'Skype Legacy Buttons', 'Versions': '*'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.