CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-5106 | An issue has been discovered in Ultimate-licensed GitLab EE affecting all versions starting 13.12 prior to 16.2.8, 16.3.0 prior to 16.3.5, and 16.4.0 prior to 16.4.1 that could allow an attacker to impersonate users in CI pipelines through direct transfer group imports. | https://gitlab.com/gitlab-org/gitlab/-/commit/67039cfcae80b8fc0496f79be88714873cd169b3 | 2023-09-21T10:30:28.355Z | 2023-10-02T11:49:56.333Z | 2023-10-02T11:49:56.333Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '13.12, 16.3.0, 16.4.0'} |
CVE-2023-5556 | Cross-site Scripting (XSS) - Reflected in GitHub repository structurizr/onpremises prior to 3194. | https://huntr.dev/bounties/a3ee0f98-6898-41ae-b1bd-242a03a73d1b | 2023-10-12T10:32:16.949Z | 2023-10-12T10:32:21.114Z | 2023-10-12T10:32:21.114Z | {'Vendor': 'structurizr', 'Product': 'structurizr/onpremises', 'Versions': 'unspecified'} |
CVE-2023-5385 | The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_copy_posts function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to create copies of arbitrary posts. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e2719afc-e52c-4fcc-b030-2f6aaddb5ab9?source=cve | 2023-10-04T17:00:19.821Z | 2023-11-22T15:33:37.255Z | 2023-11-22T15:33:37.255Z | {'Vendor': 'funnelforms', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free', 'Versions': '*'} |
CVE-2023-5690 | Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.2.2. | https://huntr.com/bounties/980c75a5-d978-4b0e-9bcc-2b2682c97e01 | 2023-10-20T16:22:50.946Z | 2023-10-20T16:22:53.540Z | 2023-10-20T16:22:53.540Z | {'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'} |
CVE-2023-5055 | Possible variant of CVE-2021-3434 in function le_ecred_reconf_req. | https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-wr8r-7f8x-24jj | 2023-09-18T17:48:08.803Z | 2023-11-21T18:05:10.824Z | 2023-11-21T18:05:10.824Z | {'Vendor': 'zephyrproject-rtos', 'Product': 'Zephyr', 'Versions': '*'} |
CVE-2023-5540 | A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers. | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79409 | 2023-10-11T23:39:10.773Z | 2023-11-09T19:15:53.821Z | 2023-11-09T19:15:53.821Z | {'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'} |
CVE-2023-5110 | The BSK PDF Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'bsk-pdfm-category-dropdown' shortcode in versions up to, and including, 3.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/60de55c6-e4fa-453e-84bd-309f2887e3cb?source=cve | 2023-09-21T17:18:41.698Z | 2023-10-24T13:52:59.678Z | 2023-10-24T13:52:59.678Z | {'Vendor': 'bannersky', 'Product': 'BSK PDF Manager', 'Versions': '*'} |
CVE-2023-5813 | A vulnerability was found in SourceCodester Task Reminder System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /classes/Master.php?f=delete_reminder. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-243644. | https://vuldb.com/?id.243644 | 2023-10-26T18:21:09.422Z | 2023-10-27T01:31:06.415Z | 2023-10-27T01:31:06.415Z | {'Vendor': 'SourceCodester', 'Product': 'Task Reminder System', 'Versions': '1.0'} |
CVE-2023-5239 | The Security & Malware scan by CleanTalk WordPress plugin before 2.121 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate its value. This may be used to bypass bruteforce protection. | https://wpscan.com/vulnerability/1d748f91-773b-49d6-8f68-a27d397713c3 | 2023-09-27T17:21:24.474Z | 2023-11-27T16:22:00.577Z | 2023-11-27T16:22:00.577Z | {'Vendor': 'Unknown', 'Product': 'Security & Malware scan by CleanTalk', 'Versions': '0'} |
CVE-2023-5669 | The Featured Image Caption plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode and post meta in all versions up to, and including, 0.8.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/0c43a88c-6374-414f-97ae-26ba15d75cdc?source=cve | 2023-10-19T16:12:46.958Z | 2023-11-07T11:31:05.515Z | 2023-11-20T12:25:21.644Z | {'Vendor': 'cconover', 'Product': 'Featured Image Caption', 'Versions': '*'} |
CVE-2023-5686 | Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0. | https://huntr.com/bounties/bbfe1f76-8fa1-4a8c-909d-65b16e970be0 | 2023-10-20T16:22:30.397Z | 2023-10-20T16:22:42.339Z | 2023-10-20T16:22:42.339Z | {'Vendor': 'radareorg', 'Product': 'radareorg/radare2', 'Versions': 'unspecified'} |
CVE-2023-5002 | A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server. | https://bugzilla.redhat.com/show_bug.cgi?id=2239164 | 2023-09-15T16:22:28.547Z | 2023-09-22T13:31:43.124Z | 2023-09-22T13:31:43.124Z | {'Vendor': 'n/a', 'Product': 'pgadmin4', 'Versions': '7.7'} |
CVE-2023-5452 | Cross-site Scripting (XSS) - Stored in GitHub repository snipe/snipe-it prior to v6.2.2. | https://huntr.dev/bounties/d6ed5ac1-2ad6-45fd-9492-979820bf60c8 | 2023-10-06T19:27:11.788Z | 2023-10-06T19:27:24.872Z | 2023-10-06T19:27:24.872Z | {'Vendor': 'snipe', 'Product': 'snipe/snipe-it', 'Versions': 'unspecified'} |
CVE-2023-5901 | Cross-site Scripting in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
| https://huntr.com/bounties/8fb9b06b-cadd-469e-862d-5ce026019597 | 2023-11-01T00:00:37.952Z | 2023-11-01T00:00:42.521Z | 2023-11-16T21:10:09.782Z | {'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'} |
CVE-2023-5844 | Unverified Password Change in GitHub repository pimcore/admin-ui-classic-bundle prior to 1.2.0. | https://huntr.com/bounties/b031199d-192a-46e5-8c02-f7284ad74021 | 2023-10-30T10:08:38.059Z | 2023-10-30T10:08:49.782Z | 2023-10-30T10:08:49.782Z | {'Vendor': 'pimcore', 'Product': 'pimcore/admin-ui-classic-bundle', 'Versions': 'unspecified'} |
CVE-2023-5147 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 20151231. It has been classified as critical. This affects an unknown part of the file /sysmanage/updateos.php. The manipulation of the argument 1_file_upload leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240243. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. | https://vuldb.com/?id.240243 | 2023-09-24T15:56:16.920Z | 2023-09-25T00:31:05.290Z | 2023-10-24T19:27:59.266Z | {'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'} |
CVE-2023-5794 | A vulnerability was found in PHPGurukul Online Railway Catering System 1.0. It has been classified as critical. Affected is an unknown function of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-243600. | https://vuldb.com/?id.243600 | 2023-10-26T07:23:32.719Z | 2023-10-26T17:00:08.188Z | 2023-10-26T17:00:08.188Z | {'Vendor': 'PHPGurukul', 'Product': 'Online Railway Catering System', 'Versions': '1.0'} |
CVE-2023-5281 | A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been classified as critical. This affects an unknown part of the file remove_inbox_message.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240909 was assigned to this vulnerability. | https://vuldb.com/?id.240909 | 2023-09-29T09:49:15.531Z | 2023-09-29T18:31:04.881Z | 2023-10-24T21:31:44.445Z | {'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'} |
CVE-2023-5995 | An issue has been discovered in GitLab EE affecting all versions starting from 16.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for an attacker to abuse the policy bot to gain access to internal projects. | https://gitlab.com/gitlab-org/gitlab/-/issues/425361 | 2023-11-07T17:30:43.042Z | 2023-12-01T07:01:28.253Z | 2023-12-01T07:01:28.253Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.2, 16.5, 16.6'} |
CVE-2023-5096 | The HTML filter and csv-file search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'csvsearch' shortcode in versions up to, and including, 2.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/157eddd4-67f0-4a07-b3ab-11dbfb9f12aa?source=cve | 2023-09-20T17:57:56.128Z | 2023-11-22T15:33:20.626Z | 2023-11-22T15:33:20.626Z | {'Vendor': 'jonashjalmarsson', 'Product': 'HTML filter and csv-file search', 'Versions': '*'} |
CVE-2023-5079 | Lenovo LeCloud App improper input validation allows attackers to access arbitrary components and arbitrary file downloads, which could result in information disclosure.
| https://iknow.lenovo.com.cn/detail/418253? | 2023-09-19T20:56:43.942Z | 2023-11-08T22:03:43.746Z | 2023-11-08T22:03:43.746Z | {'Vendor': 'Lenovo', 'Product': 'LeCloud Application', 'Versions': 'Versions prior to 7.0.25.99 '} |
CVE-2023-5583 | The WP Simple Galleries plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.34 via deserialization of untrusted input from the 'wpsimplegallery_gallery' post meta via 'wpsgallery' shortcode. This allows authenticated attackers, with contributor-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | https://www.wordfence.com/threat-intel/vulnerabilities/id/0dc8f7cf-d8be-4229-b823-3bd9bc9f6eda?source=cve | 2023-10-13T22:35:07.689Z | 2023-10-30T13:48:45.699Z | 2023-10-30T13:48:45.699Z | {'Vendor': 'maca134', 'Product': 'WP Simple Galleries', 'Versions': '*'} |
CVE-2023-5429 | The Information Reel plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/64db63e5-ff76-494a-be4f-d820f0cc9ab0?source=cve | 2023-10-05T19:15:27.010Z | 2023-10-31T08:32:51.272Z | 2023-10-31T08:32:51.272Z | {'Vendor': 'gopiplus', 'Product': 'Information Reel', 'Versions': '*'} |
CVE-2023-5700 | A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. Affected is an unknown function of the file /protocol/iscgwtunnel/uploadiscgwrouteconf.php. The manipulation of the argument GWLinkId leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-243138 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.243138 | 2023-10-22T09:30:08.575Z | 2023-10-22T23:31:06.212Z | 2023-10-22T23:31:06.212Z | {'Vendor': 'Netentsec', 'Product': 'NS-ASG Application Security Gateway', 'Versions': '6.3'} |
CVE-2023-5350 | SQL Injection in GitHub repository salesagility/suitecrm prior to 7.14.1. | https://huntr.dev/bounties/c56563cb-b74e-4174-a09a-cd07689d6736 | 2023-10-03T11:45:30.368Z | 2023-10-03T11:45:41.765Z | 2023-10-03T11:45:41.765Z | {'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm', 'Versions': 'unspecified'} |
CVE-2023-5645 | The WP Mail Log WordPress plugin before 1.1.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Contributor. | https://wpscan.com/vulnerability/e392fb53-66e9-4c43-9e4f-f4ea7c561551 | 2023-10-18T18:46:53.148Z | 2023-12-26T18:33:05.509Z | 2023-12-26T18:33:05.509Z | {'Vendor': 'Unknown', 'Product': 'WP Mail Log', 'Versions': '0'} |
CVE-2023-5215 | A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly. | https://access.redhat.com/security/cve/CVE-2023-5215 | 2023-09-26T21:54:47.184Z | 2023-09-28T13:55:32.462Z | 2024-01-23T01:08:24.024Z | {'Vendor': 'n/a', 'Product': 'libnbd', 'Versions': '1.18.0'} |
CVE-2023-5491 | A vulnerability, which was classified as critical, has been found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928. This issue affects some unknown processing of the file /sysmanage/updatelib.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241643. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.241643 | 2023-10-10T07:19:18.758Z | 2023-10-10T15:00:08.080Z | 2023-10-10T15:00:08.080Z | {'Vendor': 'Beijing Baichuo', 'Product': 'Smart S45F Multi-Service Secure Gateway Intelligent Management Platform', 'Versions': '20230928'} |
CVE-2023-5868 | A memory disclosure vulnerability was found in PostgreSQL that allows remote users to access sensitive information by exploiting certain aggregate function calls with 'unknown'-type arguments. Handling 'unknown'-type values from string literals without type designation can disclose bytes, potentially revealing notable and confidential information. This issue exists due to excessive data output in aggregate function calls, enabling remote users to read some portion of system memory. | https://access.redhat.com/errata/RHSA-2023:7545 | 2023-10-31T03:56:17.314Z | 2023-12-10T17:56:57.176Z | 2024-01-25T20:06:50.163Z | {'Vendor': 'n/a', 'Product': 'PostgreSQL', 'Versions': '16.1, 15.5, 14.10, 13.13, 12.17, 11.22'} |
CVE-2023-5184 | Two potential signed to unsigned conversion errors and buffer overflow vulnerabilities at the following locations in the Zephyr IPM drivers.
| https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8x3p-q3r5-xh9g | 2023-09-25T19:53:12.084Z | 2023-09-27T17:26:51.660Z | 2023-09-27T17:26:51.660Z | {'Vendor': 'zephyrproject-rtos', 'Product': 'Zephyr', 'Versions': '*'} |
CVE-2023-5307 | The Photos and Files Contest Gallery WordPress plugin before 21.2.8.1 does not sanitise and escape some parameters, which could allow unauthenticated users to perform Cross-Site Scripting attacks via certain headers. | https://wpscan.com/vulnerability/6fac1e09-21ab-430d-b56d-195e7238c08c | 2023-09-29T16:46:14.641Z | 2023-10-31T13:54:43.166Z | 2023-10-31T13:54:43.166Z | {'Vendor': 'Unknown', 'Product': 'Photos and Files Contest Gallery', 'Versions': '0'} |
CVE-2023-5757 | The WP Crowdfunding WordPress plugin before 2.1.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/2adc5995-03a9-4860-b00b-7f8d7fe18058 | 2023-10-24T18:47:20.600Z | 2023-12-11T19:22:40.578Z | 2023-12-26T18:33:07.013Z | {'Vendor': 'Unknown', 'Product': 'WP Crowdfunding', 'Versions': '0'} |
CVE-2023-5612 | An issue has been discovered in GitLab affecting all versions before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. It was possible to read the user email address via tags feed although the visibility in the user profile has been disabled. | https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16-8-1-released/ | 2023-10-17T11:30:31.181Z | 2024-01-26T02:02:39.783Z | 2024-01-26T02:02:39.783Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '0, 16.7, 16.8'} |
CVE-2023-5487 | Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html | 2023-10-10T04:35:38.785Z | 2023-10-11T22:28:51.928Z | 2023-10-11T22:28:51.928Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'} |
CVE-2023-5468 | The Slick Contact Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'dcscf-link' shortcode in versions up to, and including, 1.3.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/22c63226-2bc6-40be-a5d1-1bd169fc78b8?source=cve | 2023-10-09T15:56:45.370Z | 2023-10-10T04:29:38.087Z | 2023-10-10T04:29:38.087Z | {'Vendor': 'remix4', 'Product': 'Slick Contact Forms', 'Versions': '*'} |
CVE-2023-5192 | Excessive Data Query Operations in a Large Data Table in GitHub repository pimcore/demo prior to 10.3.0. | https://huntr.dev/bounties/65c954f2-79c3-4672-8846-a3035e7a1db7 | 2023-09-26T07:34:14.104Z | 2023-09-26T07:34:27.103Z | 2023-09-26T07:34:27.103Z | {'Vendor': 'pimcore', 'Product': 'pimcore/demo', 'Versions': 'unspecified'} |
CVE-2023-5891 | Cross-site Scripting (XSS) - Reflected in GitHub repository pkp/pkp-lib prior to 3.3.0-16. | https://huntr.com/bounties/ce4956e4-9ef5-4e0e-bfb2-481ec5cfb0a5 | 2023-11-01T00:00:06.555Z | 2023-11-01T00:00:18.684Z | 2023-11-01T00:00:18.684Z | {'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'} |
CVE-2023-5741 | The POWR plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'powr-powr-pack' shortcode in all versions up to, and including, 2.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c2967eae-82bb-4556-a21a-c5bb6b905c62?source=cve | 2023-10-24T01:31:06.094Z | 2023-11-13T07:31:16.052Z | 2023-11-13T07:31:16.052Z | {'Vendor': 'powr', 'Product': 'Contact Form – Custom Builder, Payment Form, and More', 'Versions': '*'} |
CVE-2023-5311 | The WP EXtra plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the register() function in versions up to, and including, 6.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to modify the contents of the .htaccess files located in a site's root directory or /wp-content and /wp-includes folders and achieve remote code execution. | https://www.wordfence.com/threat-intel/vulnerabilities/id/87e3dd5e-0d77-4d78-8171-0beaf9482699?source=cve | 2023-09-29T18:45:02.146Z | 2023-10-25T07:36:02.737Z | 2023-10-25T07:36:02.737Z | {'Vendor': 'wpvncom', 'Product': 'WP EXtra', 'Versions': '*'} |
CVE-2023-5604 | The Asgaros Forum WordPress plugin before 2.7.1 allows forum administrators, who may not be WordPress (super-)administrators, to set insecure configuration that allows unauthenticated users to upload dangerous files (e.g. .php, .phtml), potentially leading to remote code execution. | https://wpscan.com/vulnerability/4ce69d71-87bf-4d95-90f2-63d558c78b69 | 2023-10-16T18:22:09.384Z | 2023-11-27T16:22:00.940Z | 2023-11-27T16:22:00.940Z | {'Vendor': 'Unknown', 'Product': 'Asgaros Forum', 'Versions': '0'} |
CVE-2023-5254 | The ChatBot plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.8.9 via the qcld_wb_chatbot_check_user function. This can allow unauthenticated attackers to extract sensitive data including confirmation as to whether a user name exists on the site as well as order information for existing users. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d897daf8-5320-4546-9a63-1d34a15b2a58?source=cve | 2023-09-28T13:51:14.299Z | 2023-10-19T05:34:12.026Z | 2023-10-23T13:02:06.354Z | {'Vendor': 'quantumcloud', 'Product': 'AI ChatBot', 'Versions': '*'} |
CVE-2023-5080 | A privilege escalation vulnerability was reported in some Lenovo tablet products that could allow local applications access to device identifiers and system commands. | https://support.lenovo.com/us/en/product_security/LEN-142135 | 2023-09-19T21:01:57.900Z | 2024-01-19T20:06:30.375Z | 2024-01-19T20:06:30.375Z | {'Vendor': 'Lenovo', 'Product': 'Tablet', 'Versions': 'various'} |
CVE-2023-5983 | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Botanik Software Pharmacy Automation allows Retrieve Embedded Sensitive Data.This issue affects Pharmacy Automation: before 2.1.133.0.
| https://www.usom.gov.tr/bildirim/tr-23-0652 | 2023-11-07T08:15:41.318Z | 2023-11-22T11:54:04.318Z | 2023-12-05T06:17:52.579Z | {'Vendor': 'Botanik Software', 'Product': 'Pharmacy Automation', 'Versions': '0'} |
CVE-2023-5829 | A vulnerability was found in code-projects Admission Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file student_avatar.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243728. | https://vuldb.com/?id.243728 | 2023-10-27T13:50:36.068Z | 2023-10-27T20:00:07.256Z | 2023-10-27T20:00:07.256Z | {'Vendor': 'code-projects', 'Product': 'Admission Management System', 'Versions': '1.0'} |
CVE-2023-5595 | Denial of Service in GitHub repository gpac/gpac prior to 2.3.0-DEV. | https://huntr.dev/bounties/0064cf76-ece1-495d-82b4-e4a1bebeb28e | 2023-10-16T08:24:48.287Z | 2023-10-16T08:25:00.327Z | 2023-10-16T08:25:00.327Z | {'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'} |
CVE-2023-5346 | Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop.html | 2023-10-03T04:18:55.312Z | 2023-10-05T17:13:03.435Z | 2023-10-05T17:13:03.435Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '117.0.5938.149'} |
CVE-2023-5716 | ASUS Armoury Crate has a vulnerability in arbitrary file write and allows remote attackers to access or modify arbitrary files by sending specific HTTP requests without permission. | https://www.twcert.org.tw/tw/cp-132-7666-fffce-1.html | 2023-10-23T09:44:01.105Z | 2024-01-19T03:07:46.663Z | 2024-01-19T07:09:54.691Z | {'Vendor': 'ASUS', 'Product': 'Armoury Crate', 'Versions': 'V4.0.1.3'} |
CVE-2023-5203 | The WP Sessions Time Monitoring Full Automatic WordPress plugin before 1.0.9 does not sanitize the request URL or query parameters before using them in an SQL query, allowing unauthenticated attackers to extract sensitive data from the database via blind time based SQL injection techniques, or in some cases an error/union based technique. | https://wpscan.com/vulnerability/7f4f505b-2667-4e0f-9841-9c1cd0831932 | 2023-09-26T14:08:40.974Z | 2023-12-26T18:33:07.808Z | 2023-12-26T18:33:07.808Z | {'Vendor': 'Unknown', 'Product': 'WP Sessions Time Monitoring Full Automatic', 'Versions': '0'} |
CVE-2023-5653 | The WassUp Real Time Analytics WordPress plugin through 1.9.4.5 does not escape IP address provided via some headers before outputting them back in an admin page, allowing unauthenticated users to perform Stored XSS attacks against logged in admins | https://wpscan.com/vulnerability/76316621-1987-44ea-83e5-6ca884bdd1c0 | 2023-10-19T11:49:37.990Z | 2023-11-27T16:22:01.293Z | 2023-11-27T16:22:01.293Z | {'Vendor': 'Unknown', 'Product': 'WassUp Real Time Analytics', 'Versions': '0'} |
CVE-2023-5347 | An Improper Verification of Cryptographic Signature vulnerability in the update process of Korenix JetNet Series allows replacing the whole operating system including Trusted Executables. This issue affects JetNet devices older than firmware version 2024/01. | https://www.beijerelectronics.com/en/support/Help___online?docId=69947 | 2023-10-03T08:11:00.343Z | 2024-01-09T09:54:59.664Z | 2024-01-09T10:02:52.603Z | {'Vendor': 'Korenix', 'Product': 'JetNet Series', 'Versions': 'firmware older than 2024/01'} |
CVE-2023-5717 | A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation.
If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer.
We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06 | 2023-10-23T10:49:09.250Z | 2023-10-25T12:55:06.871Z | 2023-10-25T12:55:06.871Z | {'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '4.4'} |
CVE-2023-5652 | The WP Hotel Booking WordPress plugin before 2.0.8 does not have authorisation and CSRF checks, as well as does not escape user input before using it in a SQL statement of a function hooked to admin_init, allowing unauthenticated users to perform SQL injections | https://wpscan.com/vulnerability/8ea46b9a-5239-476b-949d-49546371eac1 | 2023-10-19T09:03:10.343Z | 2023-11-20T18:55:06.152Z | 2023-11-20T18:55:06.152Z | {'Vendor': 'Unknown', 'Product': 'WP Hotel Booking', 'Versions': '0'} |
CVE-2023-5081 | An information disclosure vulnerability was reported in the Lenovo Tab M8 HD that could allow a local application to gather a non-resettable device identifier. | https://support.lenovo.com/us/en/product_security/LEN-142135 | 2023-09-19T21:01:59.167Z | 2024-01-19T20:07:36.051Z | 2024-01-19T20:07:36.051Z | {'Vendor': 'Lenovo', 'Product': 'Tablet', 'Versions': 'various'} |
CVE-2023-5982 | The UpdraftPlus: WordPress Backup & Migration Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.23.10. This is due to a lack of nonce validation and insufficient validation of the instance_id on the 'updraftmethod-googledrive-auth' action used to update Google Drive remote storage location. This makes it possible for unauthenticated attackers to modify the Google Drive location that backups are sent to via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can make it possible for attackers to receive backups for a site which may contain sensitive information. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e1be11c5-0a44-4816-b6bf-d330cb51dbf3?source=cve | 2023-11-07T08:09:50.451Z | 2023-11-07T20:31:56.550Z | 2023-11-07T20:31:56.550Z | {'Vendor': 'davidanderson', 'Product': 'UpdraftPlus: WordPress Backup & Migration Plugin', 'Versions': '*'} |
CVE-2023-5828 | A vulnerability was found in Nanning Ontall Longxing Industrial Development Zone Project Construction and Installation Management System up to 20231026. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file login.aspx. The manipulation of the argument tbxUserName leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243727. | https://vuldb.com/?id.243727 | 2023-10-27T13:44:53.912Z | 2023-10-27T19:31:04.802Z | 2023-10-27T19:31:04.802Z | {'Vendor': 'Nanning Ontall', 'Product': 'Longxing Industrial Development Zone Project Construction and Installation Management System', 'Versions': '20231026'} |
CVE-2023-5594 | Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted. | https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed | 2023-10-16T08:12:50.985Z | 2023-12-21T11:30:41.256Z | 2023-12-21T11:30:41.256Z | {'Vendor': 'ESET, spol. s r.o.', 'Product': 'ESET NOD32 Antivirus', 'Versions': '1464'} |
CVE-2023-5740 | The Live Chat with Facebook Messenger plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'messenger' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/aa32a790-242f-4142-9f4d-e1b2a07045bb?source=cve | 2023-10-24T01:30:17.674Z | 2023-10-24T13:53:00.649Z | 2023-10-24T13:53:00.649Z | {'Vendor': 'ninjateam', 'Product': 'Live Chat with Facebook Messenger', 'Versions': '*'} |
CVE-2023-5310 |
A denial of service vulnerability exists in all Silicon Labs Z-Wave controller and endpoint devices running Z-Wave SDK v7.20.3 (Gecko SDK v4.3.3) and earlier. This attack can be carried out only by devices on the network sending a stream of packets to the device.
| https://github.com/SiliconLabs/gecko_sdk/releases | 2023-09-29T18:44:41.563Z | 2023-12-15T16:05:15.120Z | 2023-12-15T16:05:15.120Z | {'Vendor': 'silabs.com', 'Product': 'Gecko SDK', 'Versions': '0'} |
CVE-2023-5605 | The URL Shortify WordPress plugin before 1.7.9.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/9ec03ef0-0c04-4517-b761-df87af722a64 | 2023-10-16T19:11:36.064Z | 2023-11-06T20:42:09.334Z | 2023-12-04T10:18:13.608Z | {'Vendor': 'Unknown', 'Product': 'URL Shortify', 'Versions': '0'} |
CVE-2023-5255 | For certificates that utilize the auto-renew feature in Puppet Server, a flaw exists which prevents the certificates from being revoked. | https://www.puppet.com/security/cve/cve-2023-5255-denial-service-revocation-auto-renewed-certificates | 2023-09-28T17:42:16.370Z | 2023-10-03T17:54:55.177Z | 2023-10-03T22:38:41.221Z | {'Vendor': 'Puppet', 'Product': 'Puppet Enterprise', 'Versions': 'Puppet Enterprise 2023.3, Puppet Server 8.2.0'} |
CVE-2023-5486 | Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html | 2023-10-10T00:12:41.317Z | 2023-10-11T22:28:54.163Z | 2023-10-11T22:28:54.163Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'} |
CVE-2023-5469 | The Drop Shadow Boxes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'dropshadowbox' shortcode in versions up to, and including, 1.7.13 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c0b3911c-a960-4f28-b289-389b26282741?source=cve | 2023-10-09T15:58:12.138Z | 2023-11-22T15:33:33.538Z | 2023-11-22T15:33:33.538Z | {'Vendor': 'stevehenty', 'Product': 'Drop Shadow Boxes', 'Versions': '*'} |
CVE-2023-5193 | Mattermost fails to properly check permissions when retrieving a post allowing for a System Role with the permission to manage channels to read the posts of a DM conversation.
| https://mattermost.com/security-updates | 2023-09-26T08:44:07.420Z | 2023-09-29T09:23:47.082Z | 2023-09-29T09:23:47.082Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 8.1.0, 8.0.2, 8.1.1, 7.8.10'} |
CVE-2023-5890 | Cross-site Scripting (XSS) - Stored in GitHub repository pkp/pkp-lib prior to 3.3.0-16. | https://huntr.com/bounties/b60e6e1f-e44d-4b11-acf8-b0548b915686 | 2023-11-01T00:00:06.498Z | 2023-11-01T00:00:18.404Z | 2023-11-01T00:00:18.404Z | {'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'} |
CVE-2023-5306 | null | null | 2023-09-29T16:43:58.192Z | 2023-10-31T21:21:13.541Z | 2024-01-02T15:08:46.922Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-5756 | The Digital Publications by Supsystic plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.6. This is due to missing or incorrect nonce validation on the AJAX action handler. This makes it possible for unauthenticated attackers to execute AJAX actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/2304e4dc-0dc6-4ded-b8e6-8d76d70f63d7?source=cve | 2023-10-24T17:43:25.311Z | 2023-12-09T06:51:59.433Z | 2023-12-09T06:51:59.433Z | {'Vendor': 'supsysticcom', 'Product': 'Digital Publications by Supsystic', 'Versions': '*'} |
CVE-2023-5243 | The Login Screen Manager WordPress plugin through 3.5.2 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/ad895200-a03a-4e92-b256-d6991547d38a | 2023-09-27T20:29:51.225Z | 2023-10-31T13:54:43.491Z | 2023-10-31T13:54:43.491Z | {'Vendor': 'Unknown', 'Product': 'Login Screen Manager', 'Versions': '0'} |
CVE-2023-5613 | The Super Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tpsscode' shortcode in all versions up to, and including, 2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/52659f1c-642e-4c88-b3d0-d5c5a206b11c?source=cve | 2023-10-17T13:36:52.724Z | 2023-10-20T04:30:32.364Z | 2023-10-20T04:30:32.364Z | {'Vendor': 'themepoints', 'Product': 'Super Testimonials', 'Versions': '*'} |
CVE-2023-5490 | A vulnerability classified as critical was found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928. This vulnerability affects unknown code of the file /useratte/userattestation.php. The manipulation of the argument web_img leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-241642 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.241642 | 2023-10-10T07:19:15.350Z | 2023-10-10T15:00:06.541Z | 2023-10-10T15:00:06.541Z | {'Vendor': 'Beijing Baichuo', 'Product': 'Smart S45F Multi-Service Secure Gateway Intelligent Management Platform', 'Versions': '20230928'} |
CVE-2023-5869 | A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remote user can trigger the overflow by providing specially crafted data. This enables the execution of arbitrary code on the target system, allowing users to write arbitrary bytes to memory and extensively read the server's memory. | https://access.redhat.com/errata/RHSA-2023:7545 | 2023-10-31T03:56:42.638Z | 2023-12-10T17:56:57.131Z | 2024-01-25T20:06:52.056Z | {'Vendor': 'n/a', 'Product': 'PostgreSQL', 'Versions': '16.1, 15.5, 14.10, 13.13, 12.17, 11.22'} |
CVE-2023-5886 | The Export any WordPress data to XML/CSV WordPress plugin before 1.4.0, WP All Export Pro WordPress plugin before 1.8.6 does not check nonce tokens early enough in the request lifecycle, allowing attackers with the ability to upload files to make logged in users perform unwanted actions leading to PHAR deserialization, which may lead to remote code execution. | https://wpscan.com/vulnerability/0a08e49d-d34e-4140-a15d-ad64444665a3 | 2023-10-31T18:39:06.473Z | 2023-12-18T20:07:57.546Z | 2023-12-18T20:07:57.546Z | {'Vendor': 'Unknown', 'Product': 'Export any WordPress data to XML/CSV', 'Versions': '0'} |
CVE-2023-5185 | Gym Management System Project v1.0 is vulnerable to
an Insecure File Upload vulnerability on the 'file'
parameter of profile/i.php page, allowing an
authenticated attacker to obtain Remote Code Execution
on the server hosting the application.
| https://fluidattacks.com/advisories/orion | 2023-09-25T22:29:10.371Z | 2023-09-28T20:52:35.938Z | 2023-09-28T20:52:35.938Z | {'Vendor': 'Gym Management System Project', 'Product': 'Gym Management System Project', 'Versions': '1.0'} |
CVE-2023-5701 | A vulnerability has been found in vnotex vnote up to 3.17.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Markdown File Handler. The manipulation with the input <xss onclick="alert(1)" style=display:block>Click here</xss> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243139. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.243139 | 2023-10-22T16:04:48.859Z | 2023-10-23T00:00:07.895Z | 2023-10-23T00:00:07.895Z | {'Vendor': 'vnotex', 'Product': 'vnote', 'Versions': '3.0, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 3.15, 3.16, 3.17'} |
CVE-2023-5351 | Cross-site Scripting (XSS) - Stored in GitHub repository salesagility/suitecrm prior to 7.14.1. | https://huntr.dev/bounties/f7c7fcbc-5421-4a29-9385-346a1caa485b | 2023-10-03T11:57:49.759Z | 2023-10-03T11:58:01.156Z | 2023-10-03T11:58:01.156Z | {'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm', 'Versions': 'unspecified'} |
CVE-2023-5644 | The WP Mail Log WordPress plugin before 1.1.3 does not correctly authorize its REST API endpoints, allowing users with the Contributor role to view and delete data that should only be accessible to Admin users. | https://wpscan.com/vulnerability/08f1d623-0453-4103-a9aa-2d0ddb6eb69e | 2023-10-18T18:10:57.430Z | 2023-12-26T18:33:08.615Z | 2023-12-26T18:33:08.615Z | {'Vendor': 'Unknown', 'Product': 'WP Mail Log', 'Versions': '0'} |
CVE-2023-5214 | In Puppet Bolt versions prior to 3.27.4, a path to escalate privileges was identified.
| https://www.puppet.com/security/cve/cve-2023-5214-privilege-escalation-puppet-bolt | 2023-09-26T21:53:09.685Z | 2023-10-06T17:22:49.431Z | 2023-10-17T16:09:45.913Z | {'Vendor': 'Puppet', 'Product': 'Bolt', 'Versions': 'prior to 3.27.4'} |
CVE-2023-5097 | Improper Input Validation vulnerability in HYPR Workforce Access on Windows allows Path Traversal.This issue affects Workforce Access: before 8.7.
| https://www.hypr.com/security-advisories | 2023-09-20T18:19:39.334Z | 2024-01-16T19:40:57.869Z | 2024-01-16T19:40:57.869Z | {'Vendor': 'HYPR', 'Product': 'Workforce Access', 'Versions': '0'} |
CVE-2023-5078 | A vulnerability was reported in some ThinkPad BIOS that could allow a physical or local attacker with elevated privileges to tamper with BIOS firmware. | https://support.lenovo.com/us/en/product_security/LEN-141775 | 2023-09-19T20:53:37.522Z | 2023-11-08T22:02:49.076Z | 2023-11-08T22:02:49.076Z | {'Vendor': 'Lenovo', 'Product': 'ThinkPad BIOS', 'Versions': 'various'} |
CVE-2023-5582 | A vulnerability, which was classified as problematic, has been found in ZZZCMS 2.2.0. This issue affects some unknown processing of the component Personal Profile Page. The manipulation leads to basic cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-242147. | https://vuldb.com/?id.242147 | 2023-10-13T19:11:08.508Z | 2023-10-14T14:00:06.426Z | 2023-10-14T14:00:06.426Z | {'Vendor': 'n/a', 'Product': 'ZZZCMS', 'Versions': '2.2.0'} |
CVE-2023-5428 | The Image vertical reel scroll slideshow plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 9.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/01d31d8a-4459-488a-9cbe-92761faa58b4?source=cve | 2023-10-05T19:15:11.167Z | 2023-10-31T08:32:47.779Z | 2023-10-31T08:32:47.779Z | {'Vendor': 'gopiplus', 'Product': 'Image vertical reel scroll slideshow', 'Versions': '*'} |
CVE-2023-5795 | A vulnerability was found in CodeAstro POS System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /profil of the component Profile Picture Handler. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243601 was assigned to this vulnerability. | https://vuldb.com/?id.243601 | 2023-10-26T07:30:17.060Z | 2023-10-26T17:31:03.942Z | 2023-10-26T17:31:03.942Z | {'Vendor': 'CodeAstro', 'Product': 'POS System', 'Versions': '1.0'} |
CVE-2023-5280 | A vulnerability was found in SourceCodester Engineers Online Portal 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file my_students.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240908. | https://vuldb.com/?id.240908 | 2023-09-29T09:49:11.930Z | 2023-09-29T18:00:07.099Z | 2023-10-24T21:30:31.303Z | {'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'} |
CVE-2023-5003 | The Active Directory Integration / LDAP Integration WordPress plugin before 4.1.10 stores sensitive LDAP logs in a buffer file when an administrator wants to export said logs. Unfortunately, this log file is never removed, and remains accessible to any users knowing the URL to do so. | https://wpscan.com/vulnerability/91f4e500-71f3-4ef6-9cc7-24a7c12a5748 | 2023-09-15T19:38:39.194Z | 2023-10-16T19:39:08.657Z | 2023-10-16T19:39:08.657Z | {'Vendor': 'Unknown', 'Product': 'Active Directory Integration / LDAP Integration', 'Versions': '0'} |
CVE-2023-5900 | Cross-Site Request Forgery in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
| https://huntr.com/bounties/c3f011d4-9f76-4b2b-b3d4-a5e2ecd2e354 | 2023-11-01T00:00:37.641Z | 2023-11-01T00:00:42.738Z | 2023-11-16T21:09:35.708Z | {'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'} |
CVE-2023-5845 | The Simple Social Media Share Buttons WordPress plugin before 5.1.1 leaks password-protected post content to unauthenticated visitors in some meta tags | https://wpscan.com/vulnerability/d5b59e9e-85e5-4d26-aebe-64757c8495fa | 2023-10-30T13:07:08.285Z | 2023-11-27T16:22:02.151Z | 2023-11-27T16:22:02.151Z | {'Vendor': 'Unknown', 'Product': 'Simple Social Media Share Buttons', 'Versions': '0'} |
CVE-2023-5146 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 and DAR-8000 up to 20151231 and classified as critical. Affected by this issue is some unknown functionality of the file /sysmanage/updatelib.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240242 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. | https://vuldb.com/?id.240242 | 2023-09-24T15:56:13.356Z | 2023-09-25T00:00:09.044Z | 2023-10-24T19:26:46.111Z | {'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'} |
CVE-2023-5516 |
Poorly constructed webap requests and URI components with special characters trigger unhandled errors and exceptions, disclosing
information about the underlying technology and other sensitive information details. The website unintentionally reveals sensitive information including technical details like version Info, endpoints,
backend server, Internal IP. etc., which can potentially expose additional attack surface containing other interesting vulnerabilities.
| https://publisher.hitachienergy.com/preview?DocumentId=8DBD000175&languageCode=en&Preview=true | 2023-10-11T01:30:14.840Z | 2023-11-01T02:54:21.225Z | 2023-11-01T02:54:21.225Z | {'Vendor': 'Hitachi Energy', 'Product': 'eSOMS', 'Versions': '6.0'} |
CVE-2023-5238 | The EventPrime WordPress plugin before 3.2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to an HTML Injection on the plugin in the search area of the website. | https://wpscan.com/vulnerability/47a5fbfd-f47c-4356-8567-b29dadb48423 | 2023-09-27T16:42:14.824Z | 2023-10-31T13:54:43.838Z | 2023-10-31T13:54:43.838Z | {'Vendor': 'Unknown', 'Product': 'EventPrime', 'Versions': '0'} |
CVE-2023-5668 | The WhatsApp Share Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'whatsapp' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/77911b0f-c028-49ae-b85e-15909d806e30?source=cve | 2023-10-19T16:12:21.360Z | 2023-10-20T04:30:32.830Z | 2023-10-20T04:30:32.830Z | {'Vendor': 'alexmoss', 'Product': 'WhatsApp Share Button', 'Versions': '*'} |
CVE-2023-5687 | Cross-Site Request Forgery (CSRF) in GitHub repository mosparo/mosparo prior to 1.0.3. | https://huntr.com/bounties/33f95510-cdee-460e-8e61-107874962f2d | 2023-10-20T16:22:40.571Z | 2023-10-20T16:22:43.785Z | 2023-10-20T16:22:43.785Z | {'Vendor': 'mosparo', 'Product': 'mosparo/mosparo', 'Versions': 'unspecified'} |
CVE-2023-5957 | The Ni Purchase Order(PO) For WooCommerce WordPress plugin through 1.2.1 does not validate logo and signature image files uploaded in the settings, allowing high privileged user to upload arbitrary files to the web server, triggering an RCE vulnerability by uploading a web shell. | https://wpscan.com/vulnerability/70f823ff-64ad-4f05-9eb3-b69b3b79dc12 | 2023-11-03T17:40:53.323Z | 2024-01-08T19:00:32.181Z | 2024-01-08T19:00:32.181Z | {'Vendor': 'Unknown', 'Product': 'Ni Purchase Order(PO) For WooCommerce', 'Versions': '0'} |
CVE-2023-5054 | The Super Store Finder plugin for WordPress is vulnerable to unauthenticated arbitrary email creation and relay in versions up to, and including, 6.9.3. This is due to insufficient restrictions on the sendMail.php file that allows direct access. This makes it possible for unauthenticated attackers to send emails utilizing the vulnerable site's server, with arbitrary content. Please note that this vulnerability has already been publicly disclosed with an exploit which is why we are publishing the details without a patch available, we are attempting to initiate contact with the developer. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d31d0553-9378-4c7e-a258-12562aa6b388?source=cve | 2023-09-18T16:35:41.554Z | 2023-09-19T06:38:44.229Z | 2023-10-13T00:51:30.084Z | {'Vendor': 'Super Store Finder', 'Product': 'Super Store Finder', 'Versions': '*'} |
CVE-2023-5541 | The CSV grade import method contained an XSS risk for users importing the spreadsheet, if it contained unsafe content. | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79426 | 2023-10-11T23:48:36.508Z | 2023-11-09T19:18:22.119Z | 2023-11-09T19:18:22.119Z | {'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'} |
CVE-2023-5111 | Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.
This vulnerability allows attackers to inject JS through the "featured_type_name[1]" parameter,
potentially leading to unauthorized execution of scripts within a user's web browser. | https://fluidattacks.com/advisories/bts/ | 2023-09-21T18:57:26.464Z | 2023-09-30T22:08:52.218Z | 2023-10-03T23:12:48.211Z | {'Vendor': 'Os Commerce', 'Product': 'Os Commerce', 'Versions': '4.12.56860'} |
CVE-2023-5812 | A vulnerability has been found in flusity CMS and classified as critical. Affected by this vulnerability is the function handleFileUpload of the file core/tools/upload.php. The manipulation of the argument uploaded_file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-243643. | https://vuldb.com/?id.243643 | 2023-10-26T18:14:01.706Z | 2023-10-27T01:31:05.296Z | 2023-10-27T01:31:05.296Z | {'Vendor': 'flusity', 'Product': 'CMS', 'Versions': 'n/a'} |
CVE-2023-5384 | A flaw was found in Infinispan. When serializing the configuration for a cache to XML/JSON/YAML, which contains credentials (JDBC store with connection pooling, remote store), the credentials are returned in clear text as part of the configuration. | https://access.redhat.com/errata/RHSA-2023:7676 | 2023-10-04T16:12:42.727Z | 2023-12-18T13:43:08.728Z | 2023-12-18T13:43:08.728Z | {'Vendor': 'n/a', 'Product': 'infinispan', 'Versions': ''} |
CVE-2023-5691 | The Chatbot for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in version 2.3.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | https://www.wordfence.com/threat-intel/vulnerabilities/id/dfd67329-11b1-4f00-a422-bb4833a3181d?source=cve | 2023-10-20T19:07:22.844Z | 2024-01-11T08:33:04.545Z | 2024-01-11T08:33:04.545Z | {'Vendor': 'collectchat', 'Product': 'Collect.chat Chatbot ⚡️', 'Versions': '2.3.9'} |
CVE-2023-5042 | Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40713. | https://security-advisory.acronis.com/advisories/SEC-5330 | 2023-09-18T12:18:29.150Z | 2023-09-20T11:03:34.796Z | 2023-09-20T11:03:34.796Z | {'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect Home Office', 'Versions': 'unspecified'} |
CVE-2023-5412 | The Image horizontal reel scroll slideshow plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 13.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/08fb698f-c87c-4200-85fe-3fe72745633e?source=cve | 2023-10-04T20:02:01.581Z | 2023-10-31T08:32:48.974Z | 2023-10-31T08:32:48.974Z | {'Vendor': 'gopiplus', 'Product': 'Image horizontal reel scroll slideshow', 'Versions': '*'} |
CVE-2023-5941 | In versions of FreeBSD 12.4-RELEASE prior to 12.4-RELEASE-p7 and FreeBSD 13.2-RELEASE prior to 13.2-RELEASE-p5 the __sflush() stdio function in libc does not correctly update FILE objects' write space members for write-buffered streams when the write(2) system call returns an error. Depending on the nature of an application that calls libc's stdio functions and the presence of errors returned from the write(2) system call (or an overridden stdio write routine) a heap buffer overflow may occur. Such overflows may lead to data corruption or the execution of arbitrary code at the privilege level of the calling program. | https://security.freebsd.org/advisories/FreeBSD-SA-23:15.stdio.asc | 2023-11-02T18:54:11.312Z | 2023-11-08T08:52:26.564Z | 2023-11-08T08:52:26.564Z | {'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '12.4-RELEASE, 13.2-RELEASE'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.