CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-5496
A vulnerability was found in Translator PoqDev Add-On 1.0.11 on Firefox. It has been rated as problematic. This issue affects some unknown processing of the component Select Text Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-241649 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.241649
2023-10-10T07:41:32.892Z
2023-10-10T17:00:06.617Z
2023-10-10T17:00:06.617Z
{'Vendor': 'Translator', 'Product': 'PoqDev Add-On', 'Versions': '1.0.11'}
CVE-2023-5479
Inappropriate implementation in Extensions API in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass an enterprise policy via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
2023-10-10T00:12:40.591Z
2023-10-11T22:28:53.425Z
2023-10-11T22:28:53.425Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'}
CVE-2023-5183
Unsafe deserialization of untrusted JSON allows execution of arbitrary code on affected releases of the Illumio PCE. Authentication to the API is required to exploit this vulnerability. The flaw exists within the network_traffic API endpoint. An attacker can leverage this vulnerability to execute code in the context of the PCE’s operating system user.  
https://docs.illumio.com/Guides/security-advisories/september-2023/cve-2023-5183.htm
2023-09-25T18:22:12.952Z
2023-09-26T21:29:36.575Z
2023-09-26T23:41:08.564Z
{'Vendor': 'Illumio', 'Product': 'Core PCE', 'Versions': '19.3.0, 21.2.0, 21.5.0, 22.2.0, 22.5.0, 23.2.0'}
CVE-2023-5029
A vulnerability, which was classified as critical, was found in mccms 2.6. This affects an unknown part of the file /category/order/hits/copyright/46/finish/1/list/1. The manipulation with the input '"1 leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-239871.
https://vuldb.com/?id.239871
2023-09-17T06:25:35.325Z
2023-09-17T21:31:04.605Z
2023-10-24T19:14:34.116Z
{'Vendor': 'n/a', 'Product': 'mccms', 'Versions': '2.6'}
CVE-2023-5880
When the Genie Company Aladdin Connect garage door opener (Retrofit-Kit Model ALDCM) is placed into configuration mode the web servers “Garage Door Control Module Setup” page is vulnerable to XSS via a broadcast SSID name containing malicious code with client side Java Script and/or HTML. This allows the attacker to inject malicious code with client side Java Script and/or HTML into the users' web browser. 
https://www.rapid7.com/blog/post/2024/01/03/genie-aladdin-connect-retrofit-garage-door-opener-multiple-vulnerabilities/
2023-10-31T13:56:12.783Z
2024-01-03T19:16:44.618Z
2024-01-03T19:16:44.618Z
{'Vendor': 'The Genie Company', 'Product': 'Aladdin Connect (Retrofit-Kit)', 'Versions': '0'}
CVE-2023-5707
The SEO Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'slider' shortcode and post meta in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/32bc88a7-93ed-4d67-9383-b6d935a0df4d?source=cve
2023-10-22T17:39:52.258Z
2023-11-03T12:31:28.345Z
2023-11-03T12:31:28.345Z
{'Vendor': 'seothemes', 'Product': 'SEO Slider', 'Versions': '*'}
CVE-2023-5357
The Instagram for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 2.1.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/3991d8d0-57a8-42e7-a53c-97508f7e137f?source=cve
2023-10-03T12:59:14.051Z
2023-10-04T01:52:38.787Z
2023-10-04T01:52:38.787Z
{'Vendor': 'esemono', 'Product': 'Instagram for WordPress', 'Versions': '*'}
CVE-2023-5642
Advantech R-SeeNet v2.4.23 allows an unauthenticated remote attacker to read from and write to the snmpmon.ini file, which contains sensitive information.
https://tenable.com/security/research/tra-2023-33
2023-10-18T15:01:11.330Z
2023-10-18T15:04:29.588Z
2023-10-18T15:04:29.588Z
{'Vendor': 'Advantech', 'Product': 'R-SeeNet', 'Versions': '0'}
CVE-2023-5212
The AI ChatBot plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to, and including, 4.8.9 as well as version 4.9.2. This makes it possible for authenticated attackers with subscriber privileges to delete arbitrary files on the server, which makes it possible to take over affected sites as well as others sharing the same hosting account. Version 4.9.1 originally addressed the issue, but it was reintroduced in 4.9.2 and fixed again in 4.9.3.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5b3f4ccb-fcc6-42ec-8e9e-03d69ae7acf2?source=cve
2023-09-26T21:05:50.529Z
2023-10-19T05:34:11.570Z
2023-10-23T13:01:38.076Z
{'Vendor': 'quantumcloud', 'Product': 'AI ChatBot', 'Versions': '*, 4.9.2'}
CVE-2023-5091
Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver allows a local non-privileged user to make improper GPU processing operations to gain access to already freed memory. This issue affects Valhall GPU Kernel Driver: from r37p0 through r40p0.
https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities
2023-09-20T15:57:54.591Z
2024-01-08T09:23:35.019Z
2024-01-08T09:23:35.019Z
{'Vendor': 'Arm Ltd', 'Product': 'Valhall GPU Kernel Driver', 'Versions': 'r37p0'}
CVE-2023-5838
Insufficient Session Expiration in GitHub repository linkstackorg/linkstack prior to v4.2.9.
https://huntr.com/bounties/8f6feca3-386d-4897-801c-39b9e3e5eb03
2023-10-29T00:00:07.232Z
2023-10-29T00:00:20.232Z
2023-10-29T00:00:20.232Z
{'Vendor': 'linkstackorg', 'Product': 'linkstackorg/linkstack', 'Versions': 'unspecified'}
CVE-2023-5639
The Team Showcase plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tmfshortcode' shortcode in all versions up to, and including, 2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d3b26060-294e-4d4c-9295-0b08f533d5c4?source=cve
2023-10-18T12:28:22.811Z
2023-10-19T01:53:50.298Z
2023-10-19T16:10:48.067Z
{'Vendor': 'themepoints', 'Product': 'Team Showcase', 'Versions': '*'}
CVE-2023-5269
A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been classified as critical. Affected is an unknown function of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument s leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-240882 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.240882
2023-09-29T06:32:44.643Z
2023-09-29T15:31:05.343Z
2023-10-24T19:56:02.451Z
{'Vendor': 'SourceCodester', 'Product': 'Best Courier Management System', 'Versions': '1.0'}
CVE-2023-5793
A vulnerability was found in flusity CMS and classified as problematic. This issue affects the function loadCustomBlocCreateForm of the file /core/tools/customblock.php of the component Dashboard. The manipulation of the argument customblock_place leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The patch is named 81252bc764e1de2422e79e36194bba1289e7a0a5. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-243599.
https://vuldb.com/?id.243599
2023-10-26T07:18:54.476Z
2023-10-26T17:00:06.939Z
2023-10-26T17:00:06.939Z
{'Vendor': 'flusity', 'Product': 'CMS', 'Versions': 'n/a'}
CVE-2023-5286
A vulnerability, which was classified as problematic, has been found in SourceCodester Expense Tracker App v1. Affected by this issue is some unknown functionality of the file add_category.php of the component Category Handler. The manipulation of the argument category_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240914 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.240914
2023-09-29T09:55:21.539Z
2023-09-29T20:00:07.318Z
2023-10-24T21:37:50.319Z
{'Vendor': 'SourceCodester', 'Product': 'Expense Tracker App', 'Versions': 'v1'}
CVE-2023-5906
The Job Manager & Career WordPress plugin before 1.4.4 contains a vulnerability in the Directory Listings system, which allows an unauthorized user to view and download private files of other users. This vulnerability poses a serious security threat because it allows an attacker to gain access to confidential data and files of other users without their permission.
https://wpscan.com/vulnerability/911d495c-3867-4259-a73a-572cd4fccdde
2023-11-01T14:54:21.468Z
2023-11-27T16:21:59.373Z
2023-11-27T16:21:59.373Z
{'Vendor': 'Unknown', 'Product': 'Job Manager & Career', 'Versions': '0'}
CVE-2023-5005
The Autocomplete Location field Contact Form 7 WordPress plugin before 3.0, autocomplete-location-field-contact-form-7-pro WordPress plugin before 2.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/bfb174d4-7658-4883-a682-d06bda89ec44
2023-09-15T20:36:30.114Z
2023-12-18T20:07:55.051Z
2023-12-18T20:07:55.051Z
{'Vendor': 'Unknown', 'Product': 'Autocomplete Location field Contact Form 7', 'Versions': '0'}
CVE-2023-5455
A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.
https://access.redhat.com/errata/RHSA-2024:0137
2023-10-09T04:39:08.777Z
2024-01-10T12:33:00.336Z
2024-01-15T20:40:17.054Z
{'Vendor': 'n/a', 'Product': 'ipa', 'Versions': '4-11-1'}
CVE-2023-5140
The Bonus for Woo WordPress plugin before 5.8.3 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
https://wpscan.com/vulnerability/ee1824e8-09a6-4763-b65e-03701dc3e171
2023-09-23T11:50:03.352Z
2023-11-20T18:55:02.911Z
2023-11-20T18:55:02.911Z
{'Vendor': 'Unknown', 'Product': 'Bonus for Woo', 'Versions': '0'}
CVE-2023-5843
The Ads by datafeedr.com plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 1.1.3 via the 'dfads_ajax_load_ads' function. This allows unauthenticated attackers to execute code on the server. The parameters of the callable function are limited, they cannot be specified arbitrarily.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5412fd87-49bc-445c-8d16-443e38933d1e?source=cve
2023-10-30T00:58:44.287Z
2023-10-30T13:48:58.150Z
2023-10-30T13:48:58.150Z
{'Vendor': 'datafeedrcom', 'Product': 'Ads by datafeedr.com', 'Versions': '*'}
CVE-2023-5681
A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /admin/list_addr_fwresource_ip.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243057 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.243057
2023-10-20T15:07:21.975Z
2023-10-20T20:31:05.363Z
2023-10-20T20:31:05.363Z
{'Vendor': 'Netentsec', 'Product': 'NS-ASG Application Security Gateway', 'Versions': '6.3'}
CVE-2023-5402
A CWE-269: Improper Privilege Management vulnerability exists that could cause a remote code execution when the transfer command is used over the network.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-283-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-283-01.pdf
2023-10-04T17:50:52.167Z
2023-10-04T17:59:59.273Z
2023-10-11T08:14:27.514Z
{'Vendor': 'Schneider Electric', 'Product': 'C-Bus Toolkit', 'Versions': 'v1.16.3 and prior '}
CVE-2023-5951
The Welcart e-Commerce WordPress plugin before 2.9.5 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/81dc093a-545d-4bcd-ab85-ee9472d709e5
2023-11-03T12:42:31.280Z
2023-12-04T21:28:42.287Z
2023-12-04T21:28:42.287Z
{'Vendor': 'Unknown', 'Product': 'Welcart e-Commerce', 'Versions': '0'}
CVE-2023-5814
A vulnerability was found in SourceCodester Task Reminder System 1.0. It has been classified as critical. This affects an unknown part of the file /classes/Master.php?f=save_reminder. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-243645 was assigned to this vulnerability.
https://vuldb.com/?id.243645
2023-10-26T18:21:11.900Z
2023-10-27T02:00:06.670Z
2023-10-27T02:00:06.670Z
{'Vendor': 'SourceCodester', 'Product': 'Task Reminder System', 'Versions': '1.0'}
CVE-2023-5547
The course upload preview contained an XSS risk for users uploading unsafe data.
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79455
2023-10-12T00:30:28.296Z
2023-11-09T19:35:24.575Z
2023-11-09T19:35:24.575Z
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'}
CVE-2023-5678
Issue summary: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_generate_key() to generate an X9.42 DH key may experience long delays. Likewise, applications that use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check() to check an X9.42 DH key or X9.42 DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. While DH_check() performs all the necessary checks (as of CVE-2023-3817), DH_check_pub_key() doesn't make any of these checks, and is therefore vulnerable for excessively large P and Q parameters. Likewise, while DH_generate_key() performs a check for an excessively large P, it doesn't check for an excessively large Q. An application that calls DH_generate_key() or DH_check_pub_key() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. DH_generate_key() and DH_check_pub_key() are also called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate(). Also vulnerable are the OpenSSL pkey command line application when using the "-pubcheck" option, as well as the OpenSSL genpkey command line application. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
https://www.openssl.org/news/secadv/20231106.txt
2023-10-20T09:38:43.518Z
2023-11-06T15:47:30.795Z
2023-11-07T13:51:56.427Z
{'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '1.0.2, 1.1.1, 3.0.0, 3.1.0'}
CVE-2023-5382
The Funnelforms Free plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.4. This is due to missing or incorrect nonce validation on the fnsf_delete_posts function. This makes it possible for unauthenticated attackers to delete arbitrary posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/72e4428b-d2cd-471f-9821-947f4601fd64?source=cve
2023-10-04T15:21:53.594Z
2023-11-22T15:33:27.505Z
2023-11-22T15:33:27.505Z
{'Vendor': 'funnelforms', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free', 'Versions': '*'}
CVE-2023-5228
The User Registration WordPress plugin before 3.0.4.2 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/50ae7008-46f0-4f89-ae98-65dcabe4ef09
2023-09-27T15:08:03.920Z
2023-11-06T20:40:45.628Z
2023-11-06T20:40:45.628Z
{'Vendor': 'Unknown', 'Product': 'User Registration', 'Versions': '0'}
CVE-2023-5697
A vulnerability classified as problematic has been found in CodeAstro Internet Banking System 1.0. This affects an unknown part of the file pages_withdraw_money.php. The manipulation of the argument account_number with the input 287359614--><ScRiPt%20>alert(1234)</ScRiPt><!-- leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243135.
https://vuldb.com/?id.243135
2023-10-22T09:29:56.106Z
2023-10-22T23:00:07.339Z
2023-10-22T23:00:07.339Z
{'Vendor': 'CodeAstro', 'Product': 'Internet Banking System', 'Versions': '1.0'}
CVE-2023-5044
Code injection via nginx.ingress.kubernetes.io/permanent-redirect annotation.
https://github.com/kubernetes/ingress-nginx/issues/10572
2023-09-18T13:11:51.554Z
2023-10-25T19:19:08.139Z
2023-10-25T19:19:08.139Z
{'Vendor': 'Kubernetes', 'Product': 'ingress-nginx', 'Versions': '0, 1.9.0'}
CVE-2023-5414
The Icegram Express plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 5.6.23 via the show_es_logs function. This allows administrator-level attackers to read the contents of arbitrary files on the server, which can contain sensitive information including those belonging to other sites, for example in shared hosting environments.
https://www.wordfence.com/threat-intel/vulnerabilities/id/417186ba-36ef-4d06-bbcd-e85eb9219689?source=cve
2023-10-04T20:18:55.301Z
2023-10-20T06:35:19.665Z
2023-10-20T06:35:19.665Z
{'Vendor': 'icegram', 'Product': 'Icegram Express – Email Marketing, Newsletters and Automation for WordPress & WooCommerce', 'Versions': '*'}
CVE-2023-5101
Files or Directories Accessible to External Parties in RDT400 in SICK APU allows an unprivileged remote attacker to download various files from the server via HTTP requests.
https://sick.com/psirt
2023-09-21T07:10:37.521Z
2023-10-09T12:07:13.545Z
2023-10-09T12:07:13.545Z
{'Vendor': 'SICK AG', 'Product': 'APU0200', 'Versions': 'all versions'}
CVE-2023-5551
Separate Groups mode restrictions were not honoured in the forum summary report, which would display users from other groups.
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79310
2023-10-12T00:54:22.507Z
2023-11-09T19:39:11.940Z
2023-11-09T19:39:11.940Z
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'}
CVE-2023-5802
Cross-Site Request Forgery (CSRF) vulnerability in Mihai Iova WordPress Knowledge base & Documentation Plugin – WP Knowledgebase plugin <= 1.3.4 versions.
https://patchstack.com/database/vulnerability/wp-knowledgebase/wordpress-wp-knowledgebase-plugin-1-3-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-10-26T11:40:46.110Z
2023-10-26T11:47:49.745Z
2023-10-26T11:47:49.745Z
{'Vendor': 'Mihai Iova', 'Product': 'WordPress Knowledge base & Documentation Plugin – WP Knowledgebase', 'Versions': 'n/a'}
CVE-2023-5785
A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been classified as critical. This affects an unknown part of the file /protocol/firewall/addaddress_interpret.php. The manipulation of the argument messagecontent leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243591. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.243591
2023-10-26T05:33:31.429Z
2023-10-26T15:00:05.916Z
2023-10-26T15:00:05.916Z
{'Vendor': 'Netentsec', 'Product': 'NS-ASG Application Security Gateway', 'Versions': '6.3'}
CVE-2023-5290
null
null
2023-09-29T13:59:38.870Z
null
2023-10-02T14:16:30.992809Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-5443
Improper Protection for Outbound Error Messages and Alert Signals vulnerability in EDM Informatics E-invoice allows Account Footprinting.This issue affects E-invoice: before 2.1.
https://www.usom.gov.tr/bildirim/tr-23-0610
2023-10-06T07:57:12.979Z
2023-10-27T13:00:11.166Z
2023-10-27T13:00:11.166Z
{'Vendor': 'EDM Informatics', 'Product': 'E-invoice', 'Versions': '0'}
CVE-2023-5013
A vulnerability has been found in Pluck CMS 4.7.18 and classified as problematic. This vulnerability affects unknown code of the file install.php of the component Installation Handler. The manipulation of the argument contents with the input <script>alert('xss')</script> leads to cross site scripting. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-239854 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.239854
2023-09-16T06:34:06.273Z
2023-09-16T23:00:07.544Z
2023-10-24T16:30:26.526Z
{'Vendor': 'Pluck', 'Product': 'CMS', 'Versions': '4.7.18'}
CVE-2023-5910
A vulnerability was found in PopojiCMS 2.0.1 and classified as problematic. This issue affects some unknown processing of the file install.php of the component Web Config. The manipulation of the argument Site Title with the input <script>alert(1)</script> leads to cross site scripting. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-244229 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.244229
2023-11-01T16:53:57.077Z
2023-11-01T23:31:05.269Z
2023-11-01T23:31:05.269Z
{'Vendor': 'n/a', 'Product': 'PopojiCMS', 'Versions': '2.0.1'}
CVE-2023-5855
Use after free in Reading Mode in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
2023-10-30T22:11:17.039Z
2023-11-01T17:14:02.193Z
2023-11-01T17:14:02.193Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'}
CVE-2023-5506
The ImageMapper plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'imgmap_delete_area_ajax' function in versions up to, and including, 1.2.6. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete arbitrary posts and pages.
https://www.wordfence.com/threat-intel/vulnerabilities/id/31dff395-c3ce-4ebe-8d38-5243fc4510d6?source=cve
2023-10-10T19:48:43.176Z
2023-11-07T11:01:44.102Z
2023-11-07T11:01:44.102Z
{'Vendor': 'spikefinned', 'Product': 'ImageMapper', 'Versions': '*'}
CVE-2023-5156
A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.
http://www.openwall.com/lists/oss-security/2023/10/03/4
2023-09-25T07:15:13.621Z
2023-09-25T15:55:15.558Z
2024-01-23T01:02:02.107Z
{'Vendor': 'n/a', 'Product': 'glibc', 'Versions': '2.39'}
CVE-2023-5624
Under certain conditions, Nessus Network Monitor was found to not properly enforce input validation. This could allow an admin user to alter parameters that could potentially allow a blindSQL injection.
https://www.tenable.com/security/tns-2023-34
2023-10-17T19:10:31.208Z
2023-10-26T16:36:32.251Z
2023-10-26T16:36:32.251Z
{'Vendor': 'Tenable', 'Product': 'Nessus Network Monitor', 'Versions': '0'}
CVE-2023-5274
Improper Input Validation vulnerability in simulation function of GX Works2 allows an attacker to cause a denial-of-service (DoS) condition on the function by sending specially crafted packets. However, the attacker would need to send the packets from within the same personal computer where the function is running.
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-015_en.pdf
2023-09-29T07:37:18.117Z
2023-11-21T03:46:45.978Z
2023-11-30T04:13:06.651Z
{'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'GX Works2', 'Versions': 'all versions'}
CVE-2023-5761
The Burst Statistics – Privacy-Friendly Analytics for WordPress plugin for WordPress is vulnerable to SQL Injection via the 'url' parameter in versions 1.4.0 to 1.4.6.1 (free) and versions 1.4.0 to 1.5.0 (pro) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/30f8419c-c7b9-4c68-a845-26c0308d76f3?source=cve
2023-10-25T01:23:09.948Z
2023-12-07T02:00:05.488Z
2023-12-07T02:00:05.488Z
{'Vendor': 'rogierlankhorst', 'Product': 'Burst Statistics – Privacy-Friendly Analytics for WordPress', 'Versions': '1.4.0'}
CVE-2023-5331
Mattermost fails to properly check the creator of an attached file when adding the file to a draft post, potentially exposing unauthorized file information.
https://mattermost.com/security-updates
2023-10-02T11:06:18.494Z
2023-10-09T10:40:26.436Z
2023-10-09T10:40:26.436Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.11, 8.0.3, 8.1.2'}
CVE-2023-5018
A vulnerability classified as critical has been found in SourceCodester Lost and Found Information System 1.0. This affects an unknown part of the file /classes/Master.php?f=save_category of the component POST Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The associated identifier of this vulnerability is VDB-239859.
https://vuldb.com/?id.239859
2023-09-16T07:01:48.882Z
2023-09-17T03:31:04.553Z
2023-10-24T16:36:32.432Z
{'Vendor': 'SourceCodester', 'Product': 'Lost and Found Information System', 'Versions': '1.0'}
CVE-2023-5448
The WP Register Profile With Shortcode plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.5.9. This is due to missing or incorrect nonce validation on the update_password_validate function. This makes it possible for unauthenticated attackers to reset a user's password via a forged request granted they can trick the user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ca564941-4780-4da2-b937-c9bd45966d81?source=cve
2023-10-06T15:45:49.295Z
2024-01-11T03:31:26.169Z
2024-01-11T03:31:26.169Z
{'Vendor': 'avimegladon', 'Product': 'WP Register Profile With Shortcode', 'Versions': '*'}
CVE-2023-5223
A vulnerability, which was classified as critical, has been found in HimitZH HOJ up to 4.6-9a65e3f. This issue affects some unknown processing of the component Topic Handler. The manipulation leads to sandbox issue. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240365 was assigned to this vulnerability.
https://vuldb.com/?id.240365
2023-09-27T08:07:22.608Z
2023-09-27T14:00:06.947Z
2023-10-24T19:40:10.994Z
{'Vendor': 'HimitZH', 'Product': 'HOJ', 'Versions': '4.6-9a65e3f'}
CVE-2023-5673
The WP Mail Log WordPress plugin before 1.1.3 does not properly validate file extensions uploading files to attach to emails, allowing attackers to upload PHP files, leading to remote code execution.
https://wpscan.com/vulnerability/231f72bf-9ad0-417e-b7a0-3555875749e9
2023-10-20T00:25:39.997Z
2023-12-26T18:33:03.911Z
2023-12-26T18:33:03.911Z
{'Vendor': 'Unknown', 'Product': 'WP Mail Log', 'Versions': '0'}
CVE-2023-5366
A flaw was found in Open vSwitch that allows ICMPv6 Neighbor Advertisement packets between virtual machines to bypass OpenFlow rules. This issue may allow a local attacker to create specially crafted packets with a modified or spoofed target IP address field that can redirect ICMPv6 traffic to arbitrary IP addresses.
https://access.redhat.com/security/cve/CVE-2023-5366
2023-10-03T19:14:58.793Z
2023-10-06T17:43:34.376Z
2023-10-06T17:43:34.376Z
{'Vendor': 'n/a', 'Product': 'openvswitch', 'Versions': ''}
CVE-2023-5809
The Popup box WordPress plugin before 3.8.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/f1eb05e8-1b7c-45b1-912d-f668bd68e265
2023-10-26T17:54:38.396Z
2023-12-04T21:29:58.534Z
2023-12-04T21:29:58.534Z
{'Vendor': 'Unknown', 'Product': 'Popup box', 'Versions': '0'}
CVE-2023-5235
The Ovic Responsive WPBakery WordPress plugin before 1.2.9 does not limit which options can be updated via some of its AJAX actions, which may allow attackers with a subscriber+ account to update blog options, such as 'users_can_register' and 'default_role'. It also unserializes user input in the process, which may lead to Object Injection attacks.
https://wpscan.com/vulnerability/35c9a954-37fc-4818-a71f-34aaaa0fa3db
2023-09-27T16:10:04.196Z
2024-01-08T19:00:36.131Z
2024-01-08T19:00:36.131Z
{'Vendor': 'Unknown', 'Product': 'Ovic Responsive WPBakery', 'Versions': '0'}
CVE-2023-5720
A flaw was found in Quarkus, where it does not properly sanitize artifacts created using the Gradle plugin, allowing certain build system information to remain. This flaw allows an attacker to access potentially sensitive information from the build system within the application.
https://access.redhat.com/security/cve/CVE-2023-5720
2023-10-23T16:39:58.066Z
2023-11-15T13:57:52.295Z
2024-01-23T01:30:30.953Z
{'Vendor': 'n/a', 'Product': 'gradle-plugin', 'Versions': ''}
CVE-2023-5370
On CPU 0 the check for the SMCCC workaround is called before SMCCC support has been initialized. This resulted in no speculative execution workarounds being installed on CPU 0.
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:14.smccc.asc
2023-10-03T21:26:17.789Z
2023-10-04T03:59:45.199Z
2023-10-04T03:59:45.199Z
{'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '13.2-RELEASE'}
CVE-2023-5059
Santesoft Sante FFT Imaging lacks proper validation of user-supplied data when parsing DICOM files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process.
https://www.cisa.gov/news-events/ics-medical-advisories/icsma-23-285-02
2023-09-18T22:39:02.791Z
2023-10-19T17:27:16.081Z
2023-10-19T17:27:16.081Z
{'Vendor': 'Santesoft', 'Product': 'Sante FFT Imaging', 'Versions': '0'}
CVE-2023-5409
HP is aware of a potential security vulnerability in HP t430 and t638 Thin Client PCs. These models may be susceptible to a physical attack, allowing an untrusted source to tamper with the system firmware using a publicly disclosed private key. HP is providing recommended guidance for customers to reduce exposure to the potential vulnerability.
https://support.hp.com/us-en/document/ish_9441200-9441233-16
2023-10-04T18:09:07.324Z
2023-10-13T16:15:34.743Z
2023-10-13T16:15:34.743Z
{'Vendor': 'HP Inc.', 'Product': 'HP t430 and t638 Thin Clients', 'Versions': 'See HP Security Bulletin for affected products.'}
CVE-2023-5262
A vulnerability has been found in OpenRapid RapidCMS 1.3.1 and classified as critical. Affected by this vulnerability is the function isImg of the file /admin/config/uploadicon.php. The manipulation of the argument fileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240871.
https://vuldb.com/?id.240871
2023-09-29T05:22:28.174Z
2023-09-29T13:31:05.044Z
2023-10-24T19:47:30.214Z
{'Vendor': 'OpenRapid', 'Product': 'RapidCMS', 'Versions': '1.3.1'}
CVE-2023-5798
The Assistant WordPress plugin before 1.4.4 does not validate a parameter before making a request to it via wp_remote_get(), which could allow users with a role as low as Editor to perform SSRF attacks
https://wpscan.com/vulnerability/bbb4c98c-4dd7-421e-9666-98f15acde761
2023-10-26T09:04:00.410Z
2023-10-26T09:08:53.640Z
2023-10-26T09:08:53.640Z
{'Vendor': 'Unknown', 'Product': 'Assistant', 'Versions': '0'}
CVE-2023-5632
In Eclipse Mosquito before and including 2.0.5, establishing a connection to the mosquitto server without sending data causes the EPOLLOUT event to be added, which results excessive CPU consumption. This could be used by a malicious actor to perform denial of service type attack. This issue is fixed in 2.0.6
https://github.com/eclipse/mosquitto/pull/2053
2023-10-18T08:17:55.102Z
2023-10-18T08:34:34.788Z
2023-10-18T08:34:34.788Z
{'Vendor': 'Eclipse', 'Product': 'Mosquitto', 'Versions': '0'}
CVE-2023-5327
A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /rest/dir/. The manipulation of the argument full leads to path traversal. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241028.
https://vuldb.com/?id.241028
2023-10-01T12:10:16.071Z
2023-10-01T23:00:06.319Z
2023-10-25T05:10:22.909Z
{'Vendor': 'SATO', 'Product': 'CL4NX-J Plus', 'Versions': '1.13.2-u455_r2'}
CVE-2023-5777
Weintek EasyBuilder Pro contains a vulnerability that, even when the private key is immediately deleted after the crash report transmission is finished, the private key is exposed to the public, which could result in obtaining remote control of the crash report server.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-05
2023-10-25T22:32:36.999Z
2023-11-06T19:26:09.044Z
2023-11-06T19:26:09.044Z
{'Vendor': 'Weintek', 'Product': 'EasyBuilder Pro', 'Versions': '0, 0, 0'}
CVE-2023-5560
The WP-UserOnline WordPress plugin before 2.88.3 does not sanitise and escape the X-Forwarded-For header before outputting its content on the page, which allows unauthenticated users to perform Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/55d23184-fc5a-4090-b079-142407b59b05
2023-10-12T15:08:01.136Z
2023-11-27T16:22:00.142Z
2023-11-27T16:22:00.142Z
{'Vendor': 'Unknown', 'Product': 'WP-UserOnline', 'Versions': '0'}
CVE-2023-5130
A buffer overflow vulnerability exists in Delta Electronics WPLSoft. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DVP file to achieve code execution.
https://blog.exodusintel.com/2024/01/18/delta-electronics-wplsoft-buffer-overflow/
2023-09-22T16:18:18.191Z
2024-01-18T21:14:26.662Z
2024-01-18T21:14:26.662Z
{'Vendor': 'Delta Electronics', 'Product': 'WPLSoft', 'Versions': '2.42.11'}
CVE-2023-5999
null
null
2023-11-07T19:52:00.258Z
null
2023-11-13T20:27:00.000Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-5833
Improper Access Control in GitHub repository mintplex-labs/anything-llm prior to 0.1.0.
https://huntr.com/bounties/00ec6847-125b-43e9-9658-d3cace1751d6
2023-10-27T18:46:20.863Z
2023-10-30T12:24:14.973Z
2023-10-30T12:24:14.973Z
{'Vendor': 'mintplex-labs', 'Product': 'mintplex-labs/anything-llm', 'Versions': 'unspecified'}
CVE-2023-5976
Improper Access Control in GitHub repository microweber/microweber prior to 2.0.
https://huntr.com/bounties/2004e4a9-c5f6-406a-89b0-571f808882fa
2023-11-07T00:00:11.701Z
2023-11-07T00:00:32.825Z
2023-11-07T00:00:32.825Z
{'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'}
CVE-2023-5425
The Post Meta Data Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the pmdm_wp_change_user_meta and pmdm_wp_change_post_meta functions in versions up to, and including, 1.2.0. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to gain elevated (e.g., administrator) privileges.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d7f4e710-99a2-49df-a513-725e1daaa18a?source=cve
2023-10-05T18:13:18.590Z
2023-10-28T11:06:04.112Z
2023-10-28T11:06:04.112Z
{'Vendor': 'gandhihitesh9', 'Product': 'Post Meta Data Manager', 'Versions': '*'}
CVE-2023-5075
A buffer overflow was reported in the FmpSipoCapsuleDriver driver in the IdeaPad Duet 3-10IGL5 that may allow a local attacker with elevated privileges to execute arbitrary code.
https://support.lenovo.com/us/en/product_security/LEN-141775
2023-09-19T20:38:26.386Z
2023-11-08T22:01:34.869Z
2023-11-08T22:01:34.869Z
{'Vendor': 'Lenovo', 'Product': 'IdeaPad Duet 3-10IGL5', 'Versions': 'BIOS versions prior to EQCN39WW'}
CVE-2023-5864
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.2.1.
https://huntr.com/bounties/e4b0e8f4-5e06-49d1-832f-5756573623ad
2023-10-31T00:00:07.416Z
2023-10-31T00:00:19.789Z
2023-10-31T00:00:19.789Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-5167
The User Activity Log Pro WordPress plugin before 2.3.4 does not properly escape recorded User-Agents in the user activity logs dashboard, which may allow visitors to conduct Stored Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/78ea6fe0-5fac-4923-949c-023c85fe2437
2023-09-25T14:47:01.042Z
2023-10-16T19:39:00.682Z
2023-10-16T19:39:00.682Z
{'Vendor': 'Unknown', 'Product': 'user-activity-log-pro', 'Versions': '0'}
CVE-2023-5537
The Delete Usermeta plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.2. This is due to missing nonce validation on the delumet_options_page() function. This makes it possible for unauthenticated attackers to remove user meta for arbitrary users via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/23b46e5b-ce1e-4215-921c-edea7fd6c56a?source=cve
2023-10-11T22:24:37.762Z
2023-11-22T15:33:21.567Z
2023-11-22T15:33:21.567Z
{'Vendor': 'jose-lazo', 'Product': 'Delete Usermetas', 'Versions': '*'}
CVE-2023-5022
A vulnerability has been found in DedeCMS up to 5.7.100 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /include/dialog/select_templets_post.php. The manipulation of the argument activepath leads to absolute path traversal. The associated identifier of this vulnerability is VDB-239863.
https://vuldb.com/?id.239863
2023-09-16T07:52:05.094Z
2023-09-17T05:31:04.908Z
2023-10-24T16:41:25.192Z
{'Vendor': 'n/a', 'Product': 'DedeCMS', 'Versions': '5.0, 5.1, 5.2, 5.3, 5.4, 5.5, 5.6, 5.7'}
CVE-2023-5472
Use after free in Profiles in Google Chrome prior to 118.0.5993.117 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_24.html
2023-10-10T00:12:39.710Z
2023-10-25T16:14:06.595Z
2023-10-25T16:14:06.595Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.117'}
CVE-2023-5188
The MMS Interpreter of WagoAppRTU in versions below 1.4.6.0 which is used by the WAGO Telecontrol Configurator is vulnerable to malformed packets. An remote unauthenticated attacker could send specifically crafted packets that lead to a denial-of-service condition until restart of the affected device.
https://cert.vde.com/en/advisories/VDE-2023-044/
2023-09-26T05:25:11.663Z
2023-12-05T07:19:08.528Z
2023-12-14T14:09:31.201Z
{'Vendor': 'WAGO', 'Product': 'Telecontrol Configurator', 'Versions': '*'}
CVE-2023-5921
Improper Enforcement of Behavioral Workflow vulnerability in DECE Software Geodi allows Functionality Bypass.This issue affects Geodi: before 8.0.0.27396.
https://www.usom.gov.tr/bildirim/tr-23-0650
2023-11-02T12:24:45.181Z
2023-11-22T09:03:14.924Z
2023-12-05T06:17:25.698Z
{'Vendor': 'DECE Software', 'Product': 'Geodi', 'Versions': '0'}
CVE-2023-5258
A vulnerability classified as critical has been found in OpenRapid RapidCMS 1.3.1. This affects an unknown part of the file /resource/addgood.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240867.
https://vuldb.com/?id.240867
2023-09-29T05:07:38.308Z
2023-09-29T11:31:04.769Z
2023-10-24T19:42:37.364Z
{'Vendor': 'OpenRapid', 'Product': 'RapidCMS', 'Versions': '1.3.1'}
CVE-2023-5521
Incorrect Authorization in GitHub repository tiann/kernelsu prior to v0.6.9.
https://huntr.dev/bounties/d438eff7-4e24-45e0-bc75-d3a5b3ab2ea1
2023-10-11T11:59:56.636Z
2023-10-11T12:00:01.900Z
2023-10-11T12:00:01.900Z
{'Vendor': 'tiann', 'Product': 'tiann/kernelsu', 'Versions': 'unspecified'}
CVE-2023-5171
During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.
https://bugzilla.mozilla.org/show_bug.cgi?id=1851599
2023-09-25T15:03:42.289Z
2023-09-27T14:13:12.642Z
2023-09-27T14:13:12.642Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5464
The Jquery accordion slideshow plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 8.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/0531ca34-5d7b-4071-a1aa-934f14b87728?source=cve
2023-10-09T15:46:44.853Z
2023-10-31T08:32:48.492Z
2023-10-31T08:32:48.492Z
{'Vendor': 'gopi_plus', 'Product': 'Jquery accordion slideshow', 'Versions': '*'}
CVE-2023-5034
A vulnerability classified as problematic was found in SourceCodester My Food Recipe 1.0. This vulnerability affects unknown code of the file index.php of the component Image Upload Handler. The manipulation leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-239878 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.239878
2023-09-17T17:42:42.664Z
2023-09-18T05:00:07.127Z
2023-10-24T19:20:40.084Z
{'Vendor': 'SourceCodester', 'Product': 'My Food Recipe', 'Versions': '1.0'}
CVE-2023-5825
An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.2 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. A low-privileged attacker can point a CI/CD Component to an incorrect path and cause the server to exhaust all available memory through an infinite loop and cause Denial of Service.
https://gitlab.com/gitlab-org/gitlab/-/issues/428984
2023-10-27T10:01:45.672Z
2023-11-06T10:30:38.334Z
2023-11-06T10:30:38.334Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.2, 16.4, 16.5'}
CVE-2023-5126
The Delete Me plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'plugin_delete_me' shortcode in versions up to, and including, 3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The shortcode is not displayed to administrators, so it cannot be used against administrator users.
https://www.wordfence.com/threat-intel/vulnerabilities/id/7a5123a7-8eb4-481e-88fe-6310be37a077?source=cve
2023-09-22T15:43:01.078Z
2023-10-24T13:53:00.181Z
2023-10-24T13:53:00.181Z
{'Vendor': 'cmc3215', 'Product': 'Delete Me', 'Versions': '*'}
CVE-2023-5576
The Migration, Backup, Staging - WPvivid plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 0.9.91 via Google Drive API secrets stored in plaintext in the publicly visible plugin source. This could allow unauthenticated attackers to impersonate the WPVivid Google Drive account via the API if they can trick a user into reauthenticating via another vulnerability or social engineering.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4658109d-295c-4a1b-b219-ca1f4664ff1d?source=cve
2023-10-13T15:42:14.873Z
2023-10-20T06:35:20.189Z
2023-10-20T06:35:20.189Z
{'Vendor': 'wpvividplugins', 'Product': 'Migration, Backup, Staging – WPvivid', 'Versions': '*'}
CVE-2023-5063
The Widget Responsive for Youtube plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'youtube' shortcode in versions up to, and including, 1.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/72daa533-8b17-420c-9b51-b5f72da2726c?source=cve
2023-09-19T14:24:32.894Z
2023-09-20T02:31:41.738Z
2023-09-20T02:31:41.738Z
{'Vendor': 'stefanoai', 'Product': 'Widget Responsive for Youtube', 'Versions': '*'}
CVE-2023-5599
A stored Cross-site Scripting (XSS) vulnerability affecting 3DDashboard in 3DSwymer from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2023x allows an attacker to execute arbitrary script code.
https://www.3ds.com/vulnerability/advisories
2023-10-16T08:52:33.048Z
2023-11-21T09:28:35.458Z
2023-11-21T09:34:11.658Z
{'Vendor': 'Dassault Systèmes', 'Product': '3DSwymer', 'Versions': 'Release 3DEXPERIENCE R2022x Golden, Release 3DEXPERIENCE R2023x Golden'}
CVE-2023-5433
The Message ticker plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 9.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d0b1fa88-2fc6-41af-bd39-12af92dc6533?source=cve
2023-10-05T19:16:38.166Z
2023-10-31T08:32:53.529Z
2023-10-31T08:32:53.529Z
{'Vendor': 'gopiplus', 'Product': 'Message ticker', 'Versions': '*'}
CVE-2023-5960
An improper privilege management vulnerability in the hotspot feature of the Zyxel USG FLEX series firmware versions 4.50 through 5.37 and VPN series firmware versions 4.30 through 5.37 could allow an authenticated local attacker to access the system files on an affected device.
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps
2023-11-06T01:35:33.602Z
2023-11-28T02:05:45.830Z
2023-11-28T02:05:45.830Z
{'Vendor': 'Zyxel', 'Product': 'USG FLEX series firmware', 'Versions': 'versions 4.50 through 5.37'}
CVE-2023-5917
A vulnerability, which was classified as problematic, has been found in phpBB up to 3.3.10. This issue affects the function main of the file phpBB/includes/acp/acp_icons.php of the component Smiley Pack Handler. The manipulation of the argument pak leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 3.3.11 is able to address this issue. The patch is named ccf6e6c255d38692d72fcb613b113e6eaa240aac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-244307.
https://vuldb.com/?id.244307
2023-11-02T05:56:46.346Z
2023-11-02T10:31:07.376Z
2023-11-02T10:31:07.376Z
{'Vendor': 'n/a', 'Product': 'phpBB', 'Versions': '3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6, 3.3.7, 3.3.8, 3.3.9, 3.3.10'}
CVE-2023-5444
A Cross Site Request Forgery vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2 allows a remote low privilege user to successfully add a new user with administrator privileges to the ePO server. This impacts the dashboard area of the user interface. To exploit this the attacker must change the HTTP payload post submission, prior to it reaching the ePO server.
https://kcm.trellix.com/agent/index?page=content&id=SB10410
2023-10-06T07:58:13.097Z
2023-11-17T09:47:20.014Z
2023-11-17T09:59:39.706Z
{'Vendor': 'Trellix', 'Product': 'ePolicy Orchestrator', 'Versions': 'Prior to 5.10.0 SP1 UP2'}
CVE-2023-5014
A vulnerability was found in Sakshi2610 Food Ordering Website 1.0 and classified as critical. This issue affects some unknown processing of the file categoryfood.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-239855.
https://vuldb.com/?id.239855
2023-09-16T06:36:50.662Z
2023-09-17T01:00:08.398Z
2023-10-24T16:31:39.731Z
{'Vendor': 'Sakshi2610', 'Product': 'Food Ordering Website', 'Versions': '1.0'}
CVE-2023-5151
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical was found in D-Link DAR-8000 up to 20151231. Affected by this vulnerability is an unknown functionality of the file /autheditpwd.php. The manipulation of the argument hid_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240247. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
https://vuldb.com/?id.240247
2023-09-24T15:56:32.258Z
2023-09-25T01:31:05.778Z
2023-10-24T19:32:52.011Z
{'Vendor': 'D-Link', 'Product': 'DAR-8000', 'Versions': '20151231'}
CVE-2023-5852
Use after free in Printing in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via specific UI gestures. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
2023-10-30T22:11:16.422Z
2023-11-01T17:14:01.159Z
2023-11-01T17:14:01.159Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'}
CVE-2023-5278
A vulnerability, which was classified as critical, was found in SourceCodester Engineers Online Portal 1.0. Affected is an unknown function of the file login.php. The manipulation of the argument username/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-240906 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.240906
2023-09-29T09:49:04.540Z
2023-09-29T17:31:05.961Z
2023-10-24T21:28:04.966Z
{'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'}
CVE-2023-5782
A vulnerability, which was classified as critical, was found in Tongda OA 2017 up to 11.10. Affected is an unknown function of the file /manage/delete_query.php of the component General News. The manipulation of the argument NEWS_ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243588. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.243588
2023-10-26T05:28:11.806Z
2023-10-26T13:31:04.119Z
2023-10-26T13:31:04.119Z
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9, 11.10'}
CVE-2023-5297
A vulnerability was found in Xinhu RockOA 2.3.2. It has been classified as problematic. This affects the function start of the file task.php?m=sys|runt&a=beifen. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240927.
https://vuldb.com/?id.240927
2023-09-29T14:27:38.367Z
2023-09-29T21:31:05.504Z
2023-10-25T04:55:44.628Z
{'Vendor': 'Xinhu', 'Product': 'RockOA', 'Versions': '2.3.2'}
CVE-2023-5043
Ingress nginx annotation injection causes arbitrary command execution.
https://github.com/kubernetes/ingress-nginx/issues/10571
2023-09-18T13:11:42.508Z
2023-10-25T19:18:57.704Z
2023-10-25T19:18:57.704Z
{'Vendor': 'Kubernetes', 'Product': 'ingress-nginx', 'Versions': '0, 1.9.0'}
CVE-2023-5413
The Image horizontal reel scroll slideshow plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'ihrss-gallery' shortcode in versions up to, and including, 13.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/28ba6f91-c696-4019-ae87-28ebfbe464cf?source=cve
2023-10-04T20:02:20.589Z
2023-12-19T03:09:40.040Z
2023-12-19T03:09:40.040Z
{'Vendor': 'gopiplus', 'Product': 'Image horizontal reel scroll slideshow', 'Versions': '*'}
CVE-2023-5940
The WP Not Login Hide (WPNLH) WordPress plugin through 1.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/d594c00d-2905-449b-80cd-95965a96cd4b
2023-11-02T17:38:14.180Z
2023-12-11T19:22:39.568Z
2023-12-11T19:22:39.568Z
{'Vendor': 'Unknown', 'Product': 'WP Not Login Hide (WPNLH)', 'Versions': '0'}
CVE-2023-5805
A vulnerability was found in SourceCodester Simple Real Estate Portal System 1.0. It has been classified as critical. Affected is an unknown function of the file view_estate.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-243618 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.243618
2023-10-26T13:57:53.169Z
2023-10-26T21:00:07.515Z
2023-10-26T21:00:07.515Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Real Estate Portal System', 'Versions': '1.0'}