CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-5496 | A vulnerability was found in Translator PoqDev Add-On 1.0.11 on Firefox. It has been rated as problematic. This issue affects some unknown processing of the component Select Text Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-241649 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.241649 | 2023-10-10T07:41:32.892Z | 2023-10-10T17:00:06.617Z | 2023-10-10T17:00:06.617Z | {'Vendor': 'Translator', 'Product': 'PoqDev Add-On', 'Versions': '1.0.11'} |
CVE-2023-5479 | Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html | 2023-10-10T00:12:40.591Z | 2023-10-11T22:28:53.425Z | 2023-10-11T22:28:53.425Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'} |
CVE-2023-5183 | Unsafe deserialization of untrusted JSON allows execution of arbitrary code on affected releases of the Illumio PCE. Authentication to the API is required to exploit this vulnerability. The flaw exists within the network_traffic API endpoint. An attacker can leverage this vulnerability to execute code in the context of the PCE’s operating system user.
| https://docs.illumio.com/Guides/security-advisories/september-2023/cve-2023-5183.htm | 2023-09-25T18:22:12.952Z | 2023-09-26T21:29:36.575Z | 2023-09-26T23:41:08.564Z | {'Vendor': 'Illumio', 'Product': 'Core PCE', 'Versions': '19.3.0, 21.2.0, 21.5.0, 22.2.0, 22.5.0, 23.2.0'} |
CVE-2023-5029 | A vulnerability, which was classified as critical, was found in mccms 2.6. This affects an unknown part of the file /category/order/hits/copyright/46/finish/1/list/1. The manipulation with the input '"1 leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-239871. | https://vuldb.com/?id.239871 | 2023-09-17T06:25:35.325Z | 2023-09-17T21:31:04.605Z | 2023-10-24T19:14:34.116Z | {'Vendor': 'n/a', 'Product': 'mccms', 'Versions': '2.6'} |
CVE-2023-5880 | When the Genie Company Aladdin Connect garage door opener (Retrofit-Kit Model ALDCM) is placed into configuration mode the web servers “Garage Door Control Module Setup” page is vulnerable to XSS via a broadcast SSID name containing malicious code with client side Java Script and/or HTML. This allows the attacker to inject malicious code with client side Java Script and/or HTML into the users' web browser.
| https://www.rapid7.com/blog/post/2024/01/03/genie-aladdin-connect-retrofit-garage-door-opener-multiple-vulnerabilities/ | 2023-10-31T13:56:12.783Z | 2024-01-03T19:16:44.618Z | 2024-01-03T19:16:44.618Z | {'Vendor': 'The Genie Company', 'Product': 'Aladdin Connect (Retrofit-Kit)', 'Versions': '0'} |
CVE-2023-5707 | The SEO Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'slider' shortcode and post meta in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/32bc88a7-93ed-4d67-9383-b6d935a0df4d?source=cve | 2023-10-22T17:39:52.258Z | 2023-11-03T12:31:28.345Z | 2023-11-03T12:31:28.345Z | {'Vendor': 'seothemes', 'Product': 'SEO Slider', 'Versions': '*'} |
CVE-2023-5357 | The Instagram for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 2.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/3991d8d0-57a8-42e7-a53c-97508f7e137f?source=cve | 2023-10-03T12:59:14.051Z | 2023-10-04T01:52:38.787Z | 2023-10-04T01:52:38.787Z | {'Vendor': 'esemono', 'Product': 'Instagram for WordPress', 'Versions': '*'} |
CVE-2023-5642 | Advantech R-SeeNet v2.4.23 allows an unauthenticated remote attacker to read from and write to the snmpmon.ini file, which contains sensitive information. | https://tenable.com/security/research/tra-2023-33 | 2023-10-18T15:01:11.330Z | 2023-10-18T15:04:29.588Z | 2023-10-18T15:04:29.588Z | {'Vendor': 'Advantech', 'Product': 'R-SeeNet', 'Versions': '0'} |
CVE-2023-5212 | The AI ChatBot plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to, and including, 4.8.9 as well as version 4.9.2. This makes it possible for authenticated attackers with subscriber privileges to delete arbitrary files on the server, which makes it possible to take over affected sites as well as others sharing the same hosting account. Version 4.9.1 originally addressed the issue, but it was reintroduced in 4.9.2 and fixed again in 4.9.3. | https://www.wordfence.com/threat-intel/vulnerabilities/id/5b3f4ccb-fcc6-42ec-8e9e-03d69ae7acf2?source=cve | 2023-09-26T21:05:50.529Z | 2023-10-19T05:34:11.570Z | 2023-10-23T13:01:38.076Z | {'Vendor': 'quantumcloud', 'Product': 'AI ChatBot', 'Versions': '*, 4.9.2'} |
CVE-2023-5091 | Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver allows a local non-privileged user to make improper GPU processing operations to gain access to already freed memory. This issue affects Valhall GPU Kernel Driver: from r37p0 through r40p0.
| https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities | 2023-09-20T15:57:54.591Z | 2024-01-08T09:23:35.019Z | 2024-01-08T09:23:35.019Z | {'Vendor': 'Arm Ltd', 'Product': 'Valhall GPU Kernel Driver', 'Versions': 'r37p0'} |
CVE-2023-5838 | Insufficient Session Expiration in GitHub repository linkstackorg/linkstack prior to v4.2.9. | https://huntr.com/bounties/8f6feca3-386d-4897-801c-39b9e3e5eb03 | 2023-10-29T00:00:07.232Z | 2023-10-29T00:00:20.232Z | 2023-10-29T00:00:20.232Z | {'Vendor': 'linkstackorg', 'Product': 'linkstackorg/linkstack', 'Versions': 'unspecified'} |
CVE-2023-5639 | The Team Showcase plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tmfshortcode' shortcode in all versions up to, and including, 2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d3b26060-294e-4d4c-9295-0b08f533d5c4?source=cve | 2023-10-18T12:28:22.811Z | 2023-10-19T01:53:50.298Z | 2023-10-19T16:10:48.067Z | {'Vendor': 'themepoints', 'Product': 'Team Showcase', 'Versions': '*'} |
CVE-2023-5269 | A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as critical. Affected is an unknown function of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-240882 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.240882 | 2023-09-29T06:32:44.643Z | 2023-09-29T15:31:05.343Z | 2023-10-24T19:56:02.451Z | {'Vendor': 'SourceCodester', 'Product': 'Best Courier Management System', 'Versions': '1.0'} |
CVE-2023-5793 | A vulnerability was found in flusity CMS and classified as problematic. This issue affects the function loadCustomBlocCreateForm of the file /core/tools/customblock.php of the component Dashboard. The manipulation of the argument customblock_place leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 81252bc764e1de2422e79e36194bba1289e7a0a5. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-243599. | https://vuldb.com/?id.243599 | 2023-10-26T07:18:54.476Z | 2023-10-26T17:00:06.939Z | 2023-10-26T17:00:06.939Z | {'Vendor': 'flusity', 'Product': 'CMS', 'Versions': 'n/a'} |
CVE-2023-5286 | A vulnerability, which was classified as problematic, has been found in SourceCodester Expense Tracker App v1. Affected by this issue is some unknown functionality of the file add_category.php of the component Category Handler. The manipulation of the argument category_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240914 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.240914 | 2023-09-29T09:55:21.539Z | 2023-09-29T20:00:07.318Z | 2023-10-24T21:37:50.319Z | {'Vendor': 'SourceCodester', 'Product': 'Expense Tracker App', 'Versions': 'v1'} |
CVE-2023-5906 | The Job Manager & Career WordPress plugin before 1.4.4 contains a vulnerability in the Directory Listings system, which allows an unauthorized user to view and download private files of other users. This vulnerability poses a serious security threat because it allows an attacker to gain access to confidential data and files of other users without their permission. | https://wpscan.com/vulnerability/911d495c-3867-4259-a73a-572cd4fccdde | 2023-11-01T14:54:21.468Z | 2023-11-27T16:21:59.373Z | 2023-11-27T16:21:59.373Z | {'Vendor': 'Unknown', 'Product': 'Job Manager & Career', 'Versions': '0'} |
CVE-2023-5005 | The Autocomplete Location field Contact Form 7 WordPress plugin before 3.0, autocomplete-location-field-contact-form-7-pro WordPress plugin before 2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/bfb174d4-7658-4883-a682-d06bda89ec44 | 2023-09-15T20:36:30.114Z | 2023-12-18T20:07:55.051Z | 2023-12-18T20:07:55.051Z | {'Vendor': 'Unknown', 'Product': 'Autocomplete Location field Contact Form 7', 'Versions': '0'} |
CVE-2023-5455 | A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt. | https://access.redhat.com/errata/RHSA-2024:0137 | 2023-10-09T04:39:08.777Z | 2024-01-10T12:33:00.336Z | 2024-01-15T20:40:17.054Z | {'Vendor': 'n/a', 'Product': 'ipa', 'Versions': '4-11-1'} |
CVE-2023-5140 | The Bonus for Woo WordPress plugin before 5.8.3 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | https://wpscan.com/vulnerability/ee1824e8-09a6-4763-b65e-03701dc3e171 | 2023-09-23T11:50:03.352Z | 2023-11-20T18:55:02.911Z | 2023-11-20T18:55:02.911Z | {'Vendor': 'Unknown', 'Product': 'Bonus for Woo', 'Versions': '0'} |
CVE-2023-5843 | The Ads by datafeedr.com plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 1.1.3 via the 'dfads_ajax_load_ads' function. This allows unauthenticated attackers to execute code on the server. The parameters of the callable function are limited, they cannot be specified arbitrarily. | https://www.wordfence.com/threat-intel/vulnerabilities/id/5412fd87-49bc-445c-8d16-443e38933d1e?source=cve | 2023-10-30T00:58:44.287Z | 2023-10-30T13:48:58.150Z | 2023-10-30T13:48:58.150Z | {'Vendor': 'datafeedrcom', 'Product': 'Ads by datafeedr.com', 'Versions': '*'} |
CVE-2023-5681 | A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /admin/list_addr_fwresource_ip.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243057 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.243057 | 2023-10-20T15:07:21.975Z | 2023-10-20T20:31:05.363Z | 2023-10-20T20:31:05.363Z | {'Vendor': 'Netentsec', 'Product': 'NS-ASG Application Security Gateway', 'Versions': '6.3'} |
CVE-2023-5402 |
A CWE-269: Improper Privilege Management vulnerability exists that could cause a remote
code execution when the transfer command is used over the network.
| https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-283-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-283-01.pdf | 2023-10-04T17:50:52.167Z | 2023-10-04T17:59:59.273Z | 2023-10-11T08:14:27.514Z | {'Vendor': 'Schneider Electric', 'Product': 'C-Bus Toolkit', 'Versions': 'v1.16.3 and prior '} |
CVE-2023-5951 | The Welcart e-Commerce WordPress plugin before 2.9.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/81dc093a-545d-4bcd-ab85-ee9472d709e5 | 2023-11-03T12:42:31.280Z | 2023-12-04T21:28:42.287Z | 2023-12-04T21:28:42.287Z | {'Vendor': 'Unknown', 'Product': 'Welcart e-Commerce', 'Versions': '0'} |
CVE-2023-5814 | A vulnerability was found in SourceCodester Task Reminder System 1.0. It has been classified as critical. This affects an unknown part of the file /classes/Master.php?f=save_reminder. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-243645 was assigned to this vulnerability. | https://vuldb.com/?id.243645 | 2023-10-26T18:21:11.900Z | 2023-10-27T02:00:06.670Z | 2023-10-27T02:00:06.670Z | {'Vendor': 'SourceCodester', 'Product': 'Task Reminder System', 'Versions': '1.0'} |
CVE-2023-5547 | The course upload preview contained an XSS risk for users uploading unsafe data. | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79455 | 2023-10-12T00:30:28.296Z | 2023-11-09T19:35:24.575Z | 2023-11-09T19:35:24.575Z | {'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'} |
CVE-2023-5678 | Issue summary: Generating excessively long X9.42 DH keys or checking
excessively long X9.42 DH keys or parameters may be very slow.
Impact summary: Applications that use the functions DH_generate_key() to
generate an X9.42 DH key may experience long delays. Likewise, applications
that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()
to check an X9.42 DH key or X9.42 DH parameters may experience long delays.
Where the key or parameters that are being checked have been obtained from
an untrusted source this may lead to a Denial of Service.
While DH_check() performs all the necessary checks (as of CVE-2023-3817),
DH_check_pub_key() doesn't make any of these checks, and is therefore
vulnerable for excessively large P and Q parameters.
Likewise, while DH_generate_key() performs a check for an excessively large
P, it doesn't check for an excessively large Q.
An application that calls DH_generate_key() or DH_check_pub_key() and
supplies a key or parameters obtained from an untrusted source could be
vulnerable to a Denial of Service attack.
DH_generate_key() and DH_check_pub_key() are also called by a number of
other OpenSSL functions. An application calling any of those other
functions may similarly be affected. The other functions affected by this
are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().
Also vulnerable are the OpenSSL pkey command line application when using the
"-pubcheck" option, as well as the OpenSSL genpkey command line application.
The OpenSSL SSL/TLS implementation is not affected by this issue.
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
| https://www.openssl.org/news/secadv/20231106.txt | 2023-10-20T09:38:43.518Z | 2023-11-06T15:47:30.795Z | 2023-11-07T13:51:56.427Z | {'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '1.0.2, 1.1.1, 3.0.0, 3.1.0'} |
CVE-2023-5382 | The Funnelforms Free plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.4. This is due to missing or incorrect nonce validation on the fnsf_delete_posts function. This makes it possible for unauthenticated attackers to delete arbitrary posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/72e4428b-d2cd-471f-9821-947f4601fd64?source=cve | 2023-10-04T15:21:53.594Z | 2023-11-22T15:33:27.505Z | 2023-11-22T15:33:27.505Z | {'Vendor': 'funnelforms', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free', 'Versions': '*'} |
CVE-2023-5228 | The User Registration WordPress plugin before 3.0.4.2 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/50ae7008-46f0-4f89-ae98-65dcabe4ef09 | 2023-09-27T15:08:03.920Z | 2023-11-06T20:40:45.628Z | 2023-11-06T20:40:45.628Z | {'Vendor': 'Unknown', 'Product': 'User Registration', 'Versions': '0'} |
CVE-2023-5697 | A vulnerability classified as problematic has been found in CodeAstro Internet Banking System 1.0. This affects an unknown part of the file pages_withdraw_money.php. The manipulation of the argument account_number with the input 287359614--><ScRiPt%20>alert(1234)</ScRiPt><!-- leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243135. | https://vuldb.com/?id.243135 | 2023-10-22T09:29:56.106Z | 2023-10-22T23:00:07.339Z | 2023-10-22T23:00:07.339Z | {'Vendor': 'CodeAstro', 'Product': 'Internet Banking System', 'Versions': '1.0'} |
CVE-2023-5044 | Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation.
| https://github.com/kubernetes/ingress-nginx/issues/10572 | 2023-09-18T13:11:51.554Z | 2023-10-25T19:19:08.139Z | 2023-10-25T19:19:08.139Z | {'Vendor': 'Kubernetes', 'Product': 'ingress-nginx', 'Versions': '0, 1.9.0'} |
CVE-2023-5414 | The Icegram Express plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 5.6.23 via the show_es_logs function. This allows administrator-level attackers to read the contents of arbitrary files on the server, which can contain sensitive information including those belonging to other sites, for example in shared hosting environments. | https://www.wordfence.com/threat-intel/vulnerabilities/id/417186ba-36ef-4d06-bbcd-e85eb9219689?source=cve | 2023-10-04T20:18:55.301Z | 2023-10-20T06:35:19.665Z | 2023-10-20T06:35:19.665Z | {'Vendor': 'icegram', 'Product': 'Icegram Express – Email Marketing, Newsletters and Automation for WordPress & WooCommerce', 'Versions': '*'} |
CVE-2023-5101 |
Files or Directories Accessible to External Parties in RDT400 in SICK APU allows an
unprivileged remote attacker to download various files from the server via HTTP requests.
| https://sick.com/psirt | 2023-09-21T07:10:37.521Z | 2023-10-09T12:07:13.545Z | 2023-10-09T12:07:13.545Z | {'Vendor': 'SICK AG', 'Product': 'APU0200', 'Versions': 'all versions'} |
CVE-2023-5551 | Separate Groups mode restrictions were not honoured in the forum summary report, which would display users from other groups. | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79310 | 2023-10-12T00:54:22.507Z | 2023-11-09T19:39:11.940Z | 2023-11-09T19:39:11.940Z | {'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'} |
CVE-2023-5802 | Cross-Site Request Forgery (CSRF) vulnerability in Mihai Iova WordPress Knowledge base & Documentation Plugin – WP Knowledgebase plugin <= 1.3.4 versions. | https://patchstack.com/database/vulnerability/wp-knowledgebase/wordpress-wp-knowledgebase-plugin-1-3-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-10-26T11:40:46.110Z | 2023-10-26T11:47:49.745Z | 2023-10-26T11:47:49.745Z | {'Vendor': 'Mihai Iova', 'Product': 'WordPress Knowledge base & Documentation Plugin – WP Knowledgebase', 'Versions': 'n/a'} |
CVE-2023-5785 | A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been classified as critical. This affects an unknown part of the file /protocol/firewall/addaddress_interpret.php. The manipulation of the argument messagecontent leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243591. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.243591 | 2023-10-26T05:33:31.429Z | 2023-10-26T15:00:05.916Z | 2023-10-26T15:00:05.916Z | {'Vendor': 'Netentsec', 'Product': 'NS-ASG Application Security Gateway', 'Versions': '6.3'} |
CVE-2023-5290 | null | null | 2023-09-29T13:59:38.870Z | null | 2023-10-02T14:16:30.992809Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-5443 | Improper Protection for Outbound Error Messages and Alert Signals vulnerability in EDM Informatics E-invoice allows Account Footprinting.This issue affects E-invoice: before 2.1.
| https://www.usom.gov.tr/bildirim/tr-23-0610 | 2023-10-06T07:57:12.979Z | 2023-10-27T13:00:11.166Z | 2023-10-27T13:00:11.166Z | {'Vendor': 'EDM Informatics', 'Product': 'E-invoice', 'Versions': '0'} |
CVE-2023-5013 | A vulnerability has been found in Pluck CMS 4.7.18 and classified as problematic. This vulnerability affects unknown code of the file install.php of the component Installation Handler. The manipulation of the argument contents with the input <script>alert('xss')</script> leads to cross site scripting. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-239854 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.239854 | 2023-09-16T06:34:06.273Z | 2023-09-16T23:00:07.544Z | 2023-10-24T16:30:26.526Z | {'Vendor': 'Pluck', 'Product': 'CMS', 'Versions': '4.7.18'} |
CVE-2023-5910 | A vulnerability was found in PopojiCMS 2.0.1 and classified as problematic. This issue affects some unknown processing of the file install.php of the component Web Config. The manipulation of the argument Site Title with the input <script>alert(1)</script> leads to cross site scripting. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-244229 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.244229 | 2023-11-01T16:53:57.077Z | 2023-11-01T23:31:05.269Z | 2023-11-01T23:31:05.269Z | {'Vendor': 'n/a', 'Product': 'PopojiCMS', 'Versions': '2.0.1'} |
CVE-2023-5855 | Use after free in Reading Mode in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html | 2023-10-30T22:11:17.039Z | 2023-11-01T17:14:02.193Z | 2023-11-01T17:14:02.193Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'} |
CVE-2023-5506 | The ImageMapper plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'imgmap_delete_area_ajax' function in versions up to, and including, 1.2.6. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete arbitrary posts and pages. | https://www.wordfence.com/threat-intel/vulnerabilities/id/31dff395-c3ce-4ebe-8d38-5243fc4510d6?source=cve | 2023-10-10T19:48:43.176Z | 2023-11-07T11:01:44.102Z | 2023-11-07T11:01:44.102Z | {'Vendor': 'spikefinned', 'Product': 'ImageMapper', 'Versions': '*'} |
CVE-2023-5156 | A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash. | http://www.openwall.com/lists/oss-security/2023/10/03/4 | 2023-09-25T07:15:13.621Z | 2023-09-25T15:55:15.558Z | 2024-01-23T01:02:02.107Z | {'Vendor': 'n/a', 'Product': 'glibc', 'Versions': '2.39'} |
CVE-2023-5624 |
Under certain conditions, Nessus Network Monitor was found to not properly enforce input validation. This could allow an admin user to alter parameters that could potentially allow a blindSQL injection.
| https://www.tenable.com/security/tns-2023-34 | 2023-10-17T19:10:31.208Z | 2023-10-26T16:36:32.251Z | 2023-10-26T16:36:32.251Z | {'Vendor': 'Tenable', 'Product': 'Nessus Network Monitor', 'Versions': '0'} |
CVE-2023-5274 | Improper Input Validation vulnerability in simulation function of GX Works2 allows an attacker to cause a denial-of-service (DoS) condition on the function by sending specially crafted packets. However, the attacker would need to send the packets from within the same personal computer where the function is running.
| https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-015_en.pdf | 2023-09-29T07:37:18.117Z | 2023-11-21T03:46:45.978Z | 2023-11-30T04:13:06.651Z | {'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'GX Works2', 'Versions': 'all versions'} |
CVE-2023-5761 | The Burst Statistics – Privacy-Friendly Analytics for WordPress plugin for WordPress is vulnerable to SQL Injection via the 'url' parameter in versions 1.4.0 to 1.4.6.1 (free) and versions 1.4.0 to 1.5.0 (pro) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/30f8419c-c7b9-4c68-a845-26c0308d76f3?source=cve | 2023-10-25T01:23:09.948Z | 2023-12-07T02:00:05.488Z | 2023-12-07T02:00:05.488Z | {'Vendor': 'rogierlankhorst', 'Product': 'Burst Statistics – Privacy-Friendly Analytics for WordPress', 'Versions': '1.4.0'} |
CVE-2023-5331 | Mattermost fails to properly check the creator of an attached file when adding the file to a draft post, potentially exposing unauthorized file information.
| https://mattermost.com/security-updates | 2023-10-02T11:06:18.494Z | 2023-10-09T10:40:26.436Z | 2023-10-09T10:40:26.436Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.11, 8.0.3, 8.1.2'} |
CVE-2023-5018 | A vulnerability classified as critical has been found in SourceCodester Lost and Found Information System 1.0. This affects an unknown part of the file /classes/Master.php?f=save_category of the component POST Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-239859. | https://vuldb.com/?id.239859 | 2023-09-16T07:01:48.882Z | 2023-09-17T03:31:04.553Z | 2023-10-24T16:36:32.432Z | {'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'} |
CVE-2023-5448 | The WP Register Profile With Shortcode plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.5.9. This is due to missing or incorrect nonce validation on the update_password_validate function. This makes it possible for unauthenticated attackers to reset a user's password via a forged request granted they can trick the user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ca564941-4780-4da2-b937-c9bd45966d81?source=cve | 2023-10-06T15:45:49.295Z | 2024-01-11T03:31:26.169Z | 2024-01-11T03:31:26.169Z | {'Vendor': 'avimegladon', 'Product': 'WP Register Profile With Shortcode', 'Versions': '*'} |
CVE-2023-5223 | A vulnerability, which was classified as critical, has been found in HimitZH HOJ up to 4.6-9a65e3f. This issue affects some unknown processing of the component Topic Handler. The manipulation leads to sandbox issue. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240365 was assigned to this vulnerability. | https://vuldb.com/?id.240365 | 2023-09-27T08:07:22.608Z | 2023-09-27T14:00:06.947Z | 2023-10-24T19:40:10.994Z | {'Vendor': 'HimitZH', 'Product': 'HOJ', 'Versions': '4.6-9a65e3f'} |
CVE-2023-5673 | The WP Mail Log WordPress plugin before 1.1.3 does not properly validate file extensions uploading files to attach to emails, allowing attackers to upload PHP files, leading to remote code execution. | https://wpscan.com/vulnerability/231f72bf-9ad0-417e-b7a0-3555875749e9 | 2023-10-20T00:25:39.997Z | 2023-12-26T18:33:03.911Z | 2023-12-26T18:33:03.911Z | {'Vendor': 'Unknown', 'Product': 'WP Mail Log', 'Versions': '0'} |
CVE-2023-5366 | A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses. | https://access.redhat.com/security/cve/CVE-2023-5366 | 2023-10-03T19:14:58.793Z | 2023-10-06T17:43:34.376Z | 2023-10-06T17:43:34.376Z | {'Vendor': 'n/a', 'Product': 'openvswitch', 'Versions': ''} |
CVE-2023-5809 | The Popup box WordPress plugin before 3.8.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/f1eb05e8-1b7c-45b1-912d-f668bd68e265 | 2023-10-26T17:54:38.396Z | 2023-12-04T21:29:58.534Z | 2023-12-04T21:29:58.534Z | {'Vendor': 'Unknown', 'Product': 'Popup box', 'Versions': '0'} |
CVE-2023-5235 | The Ovic Responsive WPBakery WordPress plugin before 1.2.9 does not limit which options can be updated via some of its AJAX actions, which may allow attackers with a subscriber+ account to update blog options, such as 'users_can_register' and 'default_role'. It also unserializes user input in the process, which may lead to Object Injection attacks. | https://wpscan.com/vulnerability/35c9a954-37fc-4818-a71f-34aaaa0fa3db | 2023-09-27T16:10:04.196Z | 2024-01-08T19:00:36.131Z | 2024-01-08T19:00:36.131Z | {'Vendor': 'Unknown', 'Product': 'Ovic Responsive WPBakery', 'Versions': '0'} |
CVE-2023-5720 | A flaw was found in Quarkus, where it does not properly sanitize artifacts created using the Gradle plugin, allowing certain build system information to remain. This flaw allows an attacker to access potentially sensitive information from the build system within the application. | https://access.redhat.com/security/cve/CVE-2023-5720 | 2023-10-23T16:39:58.066Z | 2023-11-15T13:57:52.295Z | 2024-01-23T01:30:30.953Z | {'Vendor': 'n/a', 'Product': 'gradle-plugin', 'Versions': ''} |
CVE-2023-5370 | On CPU 0 the check for the SMCCC workaround is called before SMCCC support has been initialized. This resulted in no speculative execution workarounds being installed on CPU 0. | https://security.FreeBSD.org/advisories/FreeBSD-SA-23:14.smccc.asc | 2023-10-03T21:26:17.789Z | 2023-10-04T03:59:45.199Z | 2023-10-04T03:59:45.199Z | {'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '13.2-RELEASE'} |
CVE-2023-5059 |
Santesoft Sante FFT Imaging lacks proper validation of user-supplied data when parsing DICOM files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process. | https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-285-02 | 2023-09-18T22:39:02.791Z | 2023-10-19T17:27:16.081Z | 2023-10-19T17:27:16.081Z | {'Vendor': 'Santesoft', 'Product': 'Sante FFT Imaging', 'Versions': '0'} |
CVE-2023-5409 | HP is aware of a potential security vulnerability in HP t430 and t638 Thin Client PCs. These models may be susceptible to a physical attack, allowing an untrusted source to tamper with the system firmware using a publicly disclosed private key. HP is providing recommended guidance for customers to reduce exposure to the potential vulnerability. | https://support.hp.com/us-en/document/ish_9441200-9441233-16 | 2023-10-04T18:09:07.324Z | 2023-10-13T16:15:34.743Z | 2023-10-13T16:15:34.743Z | {'Vendor': 'HP Inc.', 'Product': 'HP t430 and t638 Thin Clients', 'Versions': 'See HP Security Bulletin for affected products.'} |
CVE-2023-5262 | A vulnerability has been found in OpenRapid RapidCMS 1.3.1 and classified as critical. Affected by this vulnerability is the function isImg of the file /admin/config/uploadicon.php. The manipulation of the argument fileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240871. | https://vuldb.com/?id.240871 | 2023-09-29T05:22:28.174Z | 2023-09-29T13:31:05.044Z | 2023-10-24T19:47:30.214Z | {'Vendor': 'OpenRapid', 'Product': 'RapidCMS', 'Versions': '1.3.1'} |
CVE-2023-5798 | The Assistant WordPress plugin before 1.4.4 does not validate a parameter before making a request to it via wp_remote_get(), which could allow users with a role as low as Editor to perform SSRF attacks | https://wpscan.com/vulnerability/bbb4c98c-4dd7-421e-9666-98f15acde761 | 2023-10-26T09:04:00.410Z | 2023-10-26T09:08:53.640Z | 2023-10-26T09:08:53.640Z | {'Vendor': 'Unknown', 'Product': 'Assistant', 'Versions': '0'} |
CVE-2023-5632 | In Eclipse Mosquito before and including 2.0.5, establishing a connection to the mosquitto server without sending data causes the EPOLLOUT event to be added, which results excessive CPU consumption. This could be used by a malicious actor to perform denial of service type attack. This issue is fixed in 2.0.6
| https://github.com/eclipse/mosquitto/pull/2053 | 2023-10-18T08:17:55.102Z | 2023-10-18T08:34:34.788Z | 2023-10-18T08:34:34.788Z | {'Vendor': 'Eclipse', 'Product': 'Mosquitto', 'Versions': '0'} |
CVE-2023-5327 | A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /rest/dir/. The manipulation of the argument full leads to path traversal. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241028. | https://vuldb.com/?id.241028 | 2023-10-01T12:10:16.071Z | 2023-10-01T23:00:06.319Z | 2023-10-25T05:10:22.909Z | {'Vendor': 'SATO', 'Product': 'CL4NX-J Plus', 'Versions': '1.13.2-u455_r2'} |
CVE-2023-5777 |
Weintek EasyBuilder Pro contains a vulnerability that, even when the private key is immediately deleted after the crash report transmission is finished, the private key is exposed to the public, which could result in obtaining remote control of the crash report server.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-05 | 2023-10-25T22:32:36.999Z | 2023-11-06T19:26:09.044Z | 2023-11-06T19:26:09.044Z | {'Vendor': 'Weintek', 'Product': 'EasyBuilder Pro', 'Versions': '0, 0, 0'} |
CVE-2023-5560 | The WP-UserOnline WordPress plugin before 2.88.3 does not sanitise and escape the X-Forwarded-For header before outputting its content on the page, which allows unauthenticated users to perform Cross-Site Scripting attacks. | https://wpscan.com/vulnerability/55d23184-fc5a-4090-b079-142407b59b05 | 2023-10-12T15:08:01.136Z | 2023-11-27T16:22:00.142Z | 2023-11-27T16:22:00.142Z | {'Vendor': 'Unknown', 'Product': 'WP-UserOnline', 'Versions': '0'} |
CVE-2023-5130 | A buffer overflow vulnerability exists in Delta Electronics WPLSoft. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DVP file to achieve code execution.
| https://blog.exodusintel.com/2024/01/18/delta-electronics-wplsoft-buffer-overflow/ | 2023-09-22T16:18:18.191Z | 2024-01-18T21:14:26.662Z | 2024-01-18T21:14:26.662Z | {'Vendor': 'Delta Electronics', 'Product': 'WPLSoft', 'Versions': '2.42.11'} |
CVE-2023-5999 | null | null | 2023-11-07T19:52:00.258Z | null | 2023-11-13T20:27:00.000Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-5833 | Improper Access Control in GitHub repository mintplex-labs/anything-llm prior to 0.1.0. | https://huntr.com/bounties/00ec6847-125b-43e9-9658-d3cace1751d6 | 2023-10-27T18:46:20.863Z | 2023-10-30T12:24:14.973Z | 2023-10-30T12:24:14.973Z | {'Vendor': 'mintplex-labs', 'Product': 'mintplex-labs/anything-llm', 'Versions': 'unspecified'} |
CVE-2023-5976 | Improper Access Control in GitHub repository microweber/microweber prior to 2.0. | https://huntr.com/bounties/2004e4a9-c5f6-406a-89b0-571f808882fa | 2023-11-07T00:00:11.701Z | 2023-11-07T00:00:32.825Z | 2023-11-07T00:00:32.825Z | {'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'} |
CVE-2023-5425 | The Post Meta Data Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the pmdm_wp_change_user_meta and pmdm_wp_change_post_meta functions in versions up to, and including, 1.2.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to gain elevated (e.g., administrator) privileges. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d7f4e710-99a2-49df-a513-725e1daaa18a?source=cve | 2023-10-05T18:13:18.590Z | 2023-10-28T11:06:04.112Z | 2023-10-28T11:06:04.112Z | {'Vendor': 'gandhihitesh9', 'Product': 'Post Meta Data Manager', 'Versions': '*'} |
CVE-2023-5075 | A buffer overflow was reported in the FmpSipoCapsuleDriver driver in the IdeaPad Duet 3-10IGL5 that may allow a local attacker with elevated privileges to execute arbitrary code. | https://support.lenovo.com/us/en/product_security/LEN-141775 | 2023-09-19T20:38:26.386Z | 2023-11-08T22:01:34.869Z | 2023-11-08T22:01:34.869Z | {'Vendor': 'Lenovo', 'Product': 'IdeaPad Duet 3-10IGL5', 'Versions': 'BIOS versions prior to EQCN39WW'} |
CVE-2023-5864 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.1. | https://huntr.com/bounties/e4b0e8f4-5e06-49d1-832f-5756573623ad | 2023-10-31T00:00:07.416Z | 2023-10-31T00:00:19.789Z | 2023-10-31T00:00:19.789Z | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-5167 | The User Activity Log Pro WordPress plugin before 2.3.4 does not properly escape recorded User-Agents in the user activity logs dashboard, which may allow visitors to conduct Stored Cross-Site Scripting attacks. | https://wpscan.com/vulnerability/78ea6fe0-5fac-4923-949c-023c85fe2437 | 2023-09-25T14:47:01.042Z | 2023-10-16T19:39:00.682Z | 2023-10-16T19:39:00.682Z | {'Vendor': 'Unknown', 'Product': 'user-activity-log-pro', 'Versions': '0'} |
CVE-2023-5537 | The Delete Usermeta plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing nonce validation on the delumet_options_page() function. This makes it possible for unauthenticated attackers to remove user meta for arbitrary users via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/23b46e5b-ce1e-4215-921c-edea7fd6c56a?source=cve | 2023-10-11T22:24:37.762Z | 2023-11-22T15:33:21.567Z | 2023-11-22T15:33:21.567Z | {'Vendor': 'jose-lazo', 'Product': 'Delete Usermetas', 'Versions': '*'} |
CVE-2023-5022 | A vulnerability has been found in DedeCMS up to 5.7.100 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /include/dialog/select_templets_post.php. The manipulation of the argument activepath leads to absolute path traversal. The associated identifier of this vulnerability is VDB-239863. | https://vuldb.com/?id.239863 | 2023-09-16T07:52:05.094Z | 2023-09-17T05:31:04.908Z | 2023-10-24T16:41:25.192Z | {'Vendor': 'n/a', 'Product': 'DedeCMS', 'Versions': '5.0, 5.1, 5.2, 5.3, 5.4, 5.5, 5.6, 5.7'} |
CVE-2023-5472 | Use after free in Profiles in Google Chrome prior to 118.0.5993.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_24.html | 2023-10-10T00:12:39.710Z | 2023-10-25T16:14:06.595Z | 2023-10-25T16:14:06.595Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.117'} |
CVE-2023-5188 | The MMS Interpreter of WagoAppRTU in versions below 1.4.6.0 which is used by the WAGO Telecontrol Configurator is vulnerable to malformed packets. An remote unauthenticated attacker could send specifically crafted packets that lead to a denial-of-service condition until restart of the affected device. | https://cert.vde.com/en/advisories/VDE-2023-044/ | 2023-09-26T05:25:11.663Z | 2023-12-05T07:19:08.528Z | 2023-12-14T14:09:31.201Z | {'Vendor': 'WAGO', 'Product': 'Telecontrol Configurator', 'Versions': '*'} |
CVE-2023-5921 | Improper Enforcement of Behavioral Workflow vulnerability in DECE Software Geodi allows Functionality Bypass.This issue affects Geodi: before 8.0.0.27396.
| https://www.usom.gov.tr/bildirim/tr-23-0650 | 2023-11-02T12:24:45.181Z | 2023-11-22T09:03:14.924Z | 2023-12-05T06:17:25.698Z | {'Vendor': 'DECE Software', 'Product': 'Geodi', 'Versions': '0'} |
CVE-2023-5258 | A vulnerability classified as critical has been found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file /resource/addgood.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240867. | https://vuldb.com/?id.240867 | 2023-09-29T05:07:38.308Z | 2023-09-29T11:31:04.769Z | 2023-10-24T19:42:37.364Z | {'Vendor': 'OpenRapid', 'Product': 'RapidCMS', 'Versions': '1.3.1'} |
CVE-2023-5521 | Incorrect Authorization in GitHub repository tiann/kernelsu prior to v0.6.9. | https://huntr.dev/bounties/d438eff7-4e24-45e0-bc75-d3a5b3ab2ea1 | 2023-10-11T11:59:56.636Z | 2023-10-11T12:00:01.900Z | 2023-10-11T12:00:01.900Z | {'Vendor': 'tiann', 'Product': 'tiann/kernelsu', 'Versions': 'unspecified'} |
CVE-2023-5171 | During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3. | https://bugzilla.mozilla.org/show_bug.cgi?id=1851599 | 2023-09-25T15:03:42.289Z | 2023-09-27T14:13:12.642Z | 2023-09-27T14:13:12.642Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-5464 | The Jquery accordion slideshow plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 8.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/0531ca34-5d7b-4071-a1aa-934f14b87728?source=cve | 2023-10-09T15:46:44.853Z | 2023-10-31T08:32:48.492Z | 2023-10-31T08:32:48.492Z | {'Vendor': 'gopi_plus', 'Product': 'Jquery accordion slideshow', 'Versions': '*'} |
CVE-2023-5034 | A vulnerability classified as problematic was found in SourceCodester My Food Recipe 1.0. This vulnerability affects unknown code of the file index.php of the component Image Upload Handler. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-239878 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.239878 | 2023-09-17T17:42:42.664Z | 2023-09-18T05:00:07.127Z | 2023-10-24T19:20:40.084Z | {'Vendor': 'SourceCodester', 'Product': 'My Food Recipe', 'Versions': '1.0'} |
CVE-2023-5825 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.2 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. A low-privileged attacker can point a CI/CD Component to an incorrect path and cause the server to exhaust all available memory through an infinite loop and cause Denial of Service. | https://gitlab.com/gitlab-org/gitlab/-/issues/428984 | 2023-10-27T10:01:45.672Z | 2023-11-06T10:30:38.334Z | 2023-11-06T10:30:38.334Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.2, 16.4, 16.5'} |
CVE-2023-5126 | The Delete Me plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'plugin_delete_me' shortcode in versions up to, and including, 3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The shortcode is not displayed to administrators, so it cannot be used against administrator users. | https://www.wordfence.com/threat-intel/vulnerabilities/id/7a5123a7-8eb4-481e-88fe-6310be37a077?source=cve | 2023-09-22T15:43:01.078Z | 2023-10-24T13:53:00.181Z | 2023-10-24T13:53:00.181Z | {'Vendor': 'cmc3215', 'Product': 'Delete Me', 'Versions': '*'} |
CVE-2023-5576 | The Migration, Backup, Staging - WPvivid plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 0.9.91 via Google Drive API secrets stored in plaintext in the publicly visible plugin source. This could allow unauthenticated attackers to impersonate the WPVivid Google Drive account via the API if they can trick a user into reauthenticating via another vulnerability or social engineering. | https://www.wordfence.com/threat-intel/vulnerabilities/id/4658109d-295c-4a1b-b219-ca1f4664ff1d?source=cve | 2023-10-13T15:42:14.873Z | 2023-10-20T06:35:20.189Z | 2023-10-20T06:35:20.189Z | {'Vendor': 'wpvividplugins', 'Product': 'Migration, Backup, Staging – WPvivid', 'Versions': '*'} |
CVE-2023-5063 | The Widget Responsive for Youtube plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'youtube' shortcode in versions up to, and including, 1.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/72daa533-8b17-420c-9b51-b5f72da2726c?source=cve | 2023-09-19T14:24:32.894Z | 2023-09-20T02:31:41.738Z | 2023-09-20T02:31:41.738Z | {'Vendor': 'stefanoai', 'Product': 'Widget Responsive for Youtube', 'Versions': '*'} |
CVE-2023-5599 | A stored Cross-site Scripting (XSS) vulnerability affecting 3DDashboard in 3DSwymer from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2023x allows an attacker to execute arbitrary script code. | https://www.3ds.com/vulnerability/advisories | 2023-10-16T08:52:33.048Z | 2023-11-21T09:28:35.458Z | 2023-11-21T09:34:11.658Z | {'Vendor': 'Dassault Systèmes', 'Product': '3DSwymer', 'Versions': 'Release 3DEXPERIENCE R2022x Golden, Release 3DEXPERIENCE R2023x Golden'} |
CVE-2023-5433 | The Message ticker plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 9.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d0b1fa88-2fc6-41af-bd39-12af92dc6533?source=cve | 2023-10-05T19:16:38.166Z | 2023-10-31T08:32:53.529Z | 2023-10-31T08:32:53.529Z | {'Vendor': 'gopiplus', 'Product': 'Message ticker', 'Versions': '*'} |
CVE-2023-5960 | An improper privilege management vulnerability in the hotspot feature of the Zyxel USG FLEX series firmware versions 4.50 through 5.37 and VPN series firmware versions 4.30 through 5.37 could allow an authenticated local attacker to access the system files on an affected device. | https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps | 2023-11-06T01:35:33.602Z | 2023-11-28T02:05:45.830Z | 2023-11-28T02:05:45.830Z | {'Vendor': 'Zyxel', 'Product': 'USG FLEX series firmware', 'Versions': 'versions 4.50 through 5.37'} |
CVE-2023-5917 | A vulnerability, which was classified as problematic, has been found in phpBB up to 3.3.10. This issue affects the function main of the file phpBB/includes/acp/acp_icons.php of the component Smiley Pack Handler. The manipulation of the argument pak leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.3.11 is able to address this issue. The patch is named ccf6e6c255d38692d72fcb613b113e6eaa240aac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-244307. | https://vuldb.com/?id.244307 | 2023-11-02T05:56:46.346Z | 2023-11-02T10:31:07.376Z | 2023-11-02T10:31:07.376Z | {'Vendor': 'n/a', 'Product': 'phpBB', 'Versions': '3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7, 3.3.8, 3.3.9, 3.3.10'} |
CVE-2023-5444 |
A Cross Site Request Forgery vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2 allows a remote low privilege user to successfully add a new user with administrator privileges to the ePO server. This impacts the dashboard area of the user interface. To exploit this the attacker must change the HTTP payload post submission, prior to it reaching the ePO server.
| https://kcm.trellix.com/agent/index?page=content&id=SB10410 | 2023-10-06T07:58:13.097Z | 2023-11-17T09:47:20.014Z | 2023-11-17T09:59:39.706Z | {'Vendor': 'Trellix', 'Product': 'ePolicy Orchestrator', 'Versions': 'Prior to 5.10.0 SP1 UP2'} |
CVE-2023-5014 | A vulnerability was found in Sakshi2610 Food Ordering Website 1.0 and classified as critical. This issue affects some unknown processing of the file categoryfood.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-239855. | https://vuldb.com/?id.239855 | 2023-09-16T06:36:50.662Z | 2023-09-17T01:00:08.398Z | 2023-10-24T16:31:39.731Z | {'Vendor': 'Sakshi2610', 'Product': 'Food Ordering Website', 'Versions': '1.0'} |
CVE-2023-5151 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in D-Link DAR-8000 up to 20151231. Affected by this vulnerability is an unknown functionality of the file /autheditpwd.php. The manipulation of the argument hid_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240247. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. | https://vuldb.com/?id.240247 | 2023-09-24T15:56:32.258Z | 2023-09-25T01:31:05.778Z | 2023-10-24T19:32:52.011Z | {'Vendor': 'D-Link', 'Product': 'DAR-8000', 'Versions': '20151231'} |
CVE-2023-5852 | Use after free in Printing in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html | 2023-10-30T22:11:16.422Z | 2023-11-01T17:14:01.159Z | 2023-11-01T17:14:01.159Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'} |
CVE-2023-5278 | A vulnerability, which was classified as critical, was found in SourceCodester Engineers Online Portal 1.0. Affected is an unknown function of the file login.php. The manipulation of the argument username/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-240906 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.240906 | 2023-09-29T09:49:04.540Z | 2023-09-29T17:31:05.961Z | 2023-10-24T21:28:04.966Z | {'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'} |
CVE-2023-5782 | A vulnerability, which was classified as critical, was found in Tongda OA 2017 up to 11.10. Affected is an unknown function of the file /manage/delete_query.php of the component General News. The manipulation of the argument NEWS_ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243588. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.243588 | 2023-10-26T05:28:11.806Z | 2023-10-26T13:31:04.119Z | 2023-10-26T13:31:04.119Z | {'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9, 11.10'} |
CVE-2023-5297 | A vulnerability was found in Xinhu RockOA 2.3.2. It has been classified as problematic. This affects the function start of the file task.php?m=sys|runt&a=beifen. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240927. | https://vuldb.com/?id.240927 | 2023-09-29T14:27:38.367Z | 2023-09-29T21:31:05.504Z | 2023-10-25T04:55:44.628Z | {'Vendor': 'Xinhu', 'Product': 'RockOA', 'Versions': '2.3.2'} |
CVE-2023-5043 | Ingress nginx annotation injection causes arbitrary command execution.
| https://github.com/kubernetes/ingress-nginx/issues/10571 | 2023-09-18T13:11:42.508Z | 2023-10-25T19:18:57.704Z | 2023-10-25T19:18:57.704Z | {'Vendor': 'Kubernetes', 'Product': 'ingress-nginx', 'Versions': '0, 1.9.0'} |
CVE-2023-5413 | The Image horizontal reel scroll slideshow plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'ihrss-gallery' shortcode in versions up to, and including, 13.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/28ba6f91-c696-4019-ae87-28ebfbe464cf?source=cve | 2023-10-04T20:02:20.589Z | 2023-12-19T03:09:40.040Z | 2023-12-19T03:09:40.040Z | {'Vendor': 'gopiplus', 'Product': 'Image horizontal reel scroll slideshow', 'Versions': '*'} |
CVE-2023-5940 | The WP Not Login Hide (WPNLH) WordPress plugin through 1.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/d594c00d-2905-449b-80cd-95965a96cd4b | 2023-11-02T17:38:14.180Z | 2023-12-11T19:22:39.568Z | 2023-12-11T19:22:39.568Z | {'Vendor': 'Unknown', 'Product': 'WP Not Login Hide (WPNLH)', 'Versions': '0'} |
CVE-2023-5805 | A vulnerability was found in SourceCodester Simple Real Estate Portal System 1.0. It has been classified as critical. Affected is an unknown function of the file view_estate.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-243618 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.243618 | 2023-10-26T13:57:53.169Z | 2023-10-26T21:00:07.515Z | 2023-10-26T21:00:07.515Z | {'Vendor': 'SourceCodester', 'Product': 'Simple Real Estate Portal System', 'Versions': '1.0'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.