CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-5106
An issue has been discovered in Ultimate-licensed GitLab EE affecting all versions starting 13.12 prior to 16.2.8, 16.3.0 prior to 16.3.5, and 16.4.0 prior to 16.4.1 that could allow an attacker to impersonate users in CI pipelines through direct transfer group imports.
https://gitlab.com/gitlab-org/gitlab/-/commit/67039cfcae80b8fc0496f79be88714873cd169b3
2023-09-21T10:30:28.355Z
2023-10-02T11:49:56.333Z
2023-10-02T11:49:56.333Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '13.12, 16.3.0, 16.4.0'}
CVE-2023-5556
Cross-site Scripting (XSS) - Reflected in GitHub repository structurizr/onpremises prior to 3194.
https://huntr.dev/bounties/a3ee0f98-6898-41ae-b1bd-242a03a73d1b
2023-10-12T10:32:16.949Z
2023-10-12T10:32:21.114Z
2023-10-12T10:32:21.114Z
{'Vendor': 'structurizr', 'Product': 'structurizr/onpremises', 'Versions': 'unspecified'}
CVE-2023-5385
The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_copy_posts function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to create copies of arbitrary posts.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e2719afc-e52c-4fcc-b030-2f6aaddb5ab9?source=cve
2023-10-04T17:00:19.821Z
2023-11-22T15:33:37.255Z
2023-11-22T15:33:37.255Z
{'Vendor': 'funnelforms', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free', 'Versions': '*'}
CVE-2023-5690
Cross-Site Request Forgery (CSRF) in GitHub repository modoboa/modoboa prior to 2.2.2.
https://huntr.com/bounties/980c75a5-d978-4b0e-9bcc-2b2682c97e01
2023-10-20T16:22:50.946Z
2023-10-20T16:22:53.540Z
2023-10-20T16:22:53.540Z
{'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'}
CVE-2023-5055
Possible variant of CVE-2021-3434 in function le_ecred_reconf_req.
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-wr8r-7f8x-24jj
2023-09-18T17:48:08.803Z
2023-11-21T18:05:10.824Z
2023-11-21T18:05:10.824Z
{'Vendor': 'zephyrproject-rtos', 'Product': 'Zephyr', 'Versions': '*'}
CVE-2023-5540
A remote code execution risk was identified in the IMSCP activity. By default this was only available to teachers and managers.
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79409
2023-10-11T23:39:10.773Z
2023-11-09T19:15:53.821Z
2023-11-09T19:15:53.821Z
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'}
CVE-2023-5110
The BSK PDF Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'bsk-pdfm-category-dropdown' shortcode in versions up to, and including, 3.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/60de55c6-e4fa-453e-84bd-309f2887e3cb?source=cve
2023-09-21T17:18:41.698Z
2023-10-24T13:52:59.678Z
2023-10-24T13:52:59.678Z
{'Vendor': 'bannersky', 'Product': 'BSK PDF Manager', 'Versions': '*'}
CVE-2023-5813
A vulnerability was found in SourceCodester Task Reminder System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /classes/Master.php?f=delete_reminder. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-243644.
https://vuldb.com/?id.243644
2023-10-26T18:21:09.422Z
2023-10-27T01:31:06.415Z
2023-10-27T01:31:06.415Z
{'Vendor': 'SourceCodester', 'Product': 'Task Reminder System', 'Versions': '1.0'}
CVE-2023-5239
The Security & Malware scan by CleanTalk WordPress plugin before 2.121 retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate its value. This may be used to bypass bruteforce protection.
https://wpscan.com/vulnerability/1d748f91-773b-49d6-8f68-a27d397713c3
2023-09-27T17:21:24.474Z
2023-11-27T16:22:00.577Z
2023-11-27T16:22:00.577Z
{'Vendor': 'Unknown', 'Product': 'Security & Malware scan by CleanTalk', 'Versions': '0'}
CVE-2023-5669
The Featured Image Caption plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode and post meta in all versions up to, and including, 0.8.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/0c43a88c-6374-414f-97ae-26ba15d75cdc?source=cve
2023-10-19T16:12:46.958Z
2023-11-07T11:31:05.515Z
2023-11-20T12:25:21.644Z
{'Vendor': 'cconover', 'Product': 'Featured Image Caption', 'Versions': '*'}
CVE-2023-5686
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0.
https://huntr.com/bounties/bbfe1f76-8fa1-4a8c-909d-65b16e970be0
2023-10-20T16:22:30.397Z
2023-10-20T16:22:42.339Z
2023-10-20T16:22:42.339Z
{'Vendor': 'radareorg', 'Product': 'radareorg/radare2', 'Versions': 'unspecified'}
CVE-2023-5002
A flaw was found in pgAdmin. This issue occurs when the pgAdmin server HTTP API validates the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. Versions of pgAdmin prior to 7.6 failed to properly control the server code executed on this API, allowing an authenticated user to run arbitrary commands on the server.
https://bugzilla.redhat.com/show_bug.cgi?id=2239164
2023-09-15T16:22:28.547Z
2023-09-22T13:31:43.124Z
2023-09-22T13:31:43.124Z
{'Vendor': 'n/a', 'Product': 'pgadmin4', 'Versions': '7.7'}
CVE-2023-5452
Cross-site Scripting (XSS) - Stored in GitHub repository snipe/snipe-it prior to v6.2.2.
https://huntr.dev/bounties/d6ed5ac1-2ad6-45fd-9492-979820bf60c8
2023-10-06T19:27:11.788Z
2023-10-06T19:27:24.872Z
2023-10-06T19:27:24.872Z
{'Vendor': 'snipe', 'Product': 'snipe/snipe-it', 'Versions': 'unspecified'}
CVE-2023-5901
Cross-site Scripting in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
https://huntr.com/bounties/8fb9b06b-cadd-469e-862d-5ce026019597
2023-11-01T00:00:37.952Z
2023-11-01T00:00:42.521Z
2023-11-16T21:10:09.782Z
{'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'}
CVE-2023-5844
Unverified Password Change in GitHub repository pimcore/admin-ui-classic-bundle prior to 1.2.0.
https://huntr.com/bounties/b031199d-192a-46e5-8c02-f7284ad74021
2023-10-30T10:08:38.059Z
2023-10-30T10:08:49.782Z
2023-10-30T10:08:49.782Z
{'Vendor': 'pimcore', 'Product': 'pimcore/admin-ui-classic-bundle', 'Versions': 'unspecified'}
CVE-2023-5147
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 20151231. It has been classified as critical. This affects an unknown part of the file /sysmanage/updateos.php. The manipulation of the argument 1_file_upload leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240243. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
https://vuldb.com/?id.240243
2023-09-24T15:56:16.920Z
2023-09-25T00:31:05.290Z
2023-10-24T19:27:59.266Z
{'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'}
CVE-2023-5794
A vulnerability was found in PHPGurukul Online Railway Catering System 1.0. It has been classified as critical. Affected is an unknown function of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-243600.
https://vuldb.com/?id.243600
2023-10-26T07:23:32.719Z
2023-10-26T17:00:08.188Z
2023-10-26T17:00:08.188Z
{'Vendor': 'PHPGurukul', 'Product': 'Online Railway Catering System', 'Versions': '1.0'}
CVE-2023-5281
A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been classified as critical. This affects an unknown part of the file remove_inbox_message.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240909 was assigned to this vulnerability.
https://vuldb.com/?id.240909
2023-09-29T09:49:15.531Z
2023-09-29T18:31:04.881Z
2023-10-24T21:31:44.445Z
{'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'}
CVE-2023-5995
An issue has been discovered in GitLab EE affecting all versions starting from 16.2 before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. It was possible for an attacker to abuse the policy bot to gain access to internal projects.
https://gitlab.com/gitlab-org/gitlab/-/issues/425361
2023-11-07T17:30:43.042Z
2023-12-01T07:01:28.253Z
2023-12-01T07:01:28.253Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.2, 16.5, 16.6'}
CVE-2023-5096
The HTML filter and csv-file search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'csvsearch' shortcode in versions up to, and including, 2.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/157eddd4-67f0-4a07-b3ab-11dbfb9f12aa?source=cve
2023-09-20T17:57:56.128Z
2023-11-22T15:33:20.626Z
2023-11-22T15:33:20.626Z
{'Vendor': 'jonashjalmarsson', 'Product': 'HTML filter and csv-file search', 'Versions': '*'}
CVE-2023-5079
Lenovo LeCloud App improper input validation allows attackers to access arbitrary components and arbitrary file downloads, which could result in information disclosure.
https://iknow.lenovo.com.cn/detail/418253?
2023-09-19T20:56:43.942Z
2023-11-08T22:03:43.746Z
2023-11-08T22:03:43.746Z
{'Vendor': 'Lenovo', 'Product': 'LeCloud Application', 'Versions': 'Versions prior to 7.0.25.99 '}
CVE-2023-5583
The WP Simple Galleries plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.34 via deserialization of untrusted input from the 'wpsimplegallery_gallery' post meta via 'wpsgallery' shortcode. This allows authenticated attackers, with contributor-level permissions and above, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
https://www.wordfence.com/threat-intel/vulnerabilities/id/0dc8f7cf-d8be-4229-b823-3bd9bc9f6eda?source=cve
2023-10-13T22:35:07.689Z
2023-10-30T13:48:45.699Z
2023-10-30T13:48:45.699Z
{'Vendor': 'maca134', 'Product': 'WP Simple Galleries', 'Versions': '*'}
CVE-2023-5429
The Information Reel plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/64db63e5-ff76-494a-be4f-d820f0cc9ab0?source=cve
2023-10-05T19:15:27.010Z
2023-10-31T08:32:51.272Z
2023-10-31T08:32:51.272Z
{'Vendor': 'gopiplus', 'Product': 'Information Reel', 'Versions': '*'}
CVE-2023-5700
A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. Affected is an unknown function of the file /protocol/iscgwtunnel/uploadiscgwrouteconf.php. The manipulation of the argument GWLinkId leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-243138 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.243138
2023-10-22T09:30:08.575Z
2023-10-22T23:31:06.212Z
2023-10-22T23:31:06.212Z
{'Vendor': 'Netentsec', 'Product': 'NS-ASG Application Security Gateway', 'Versions': '6.3'}
CVE-2023-5350
SQL Injection in GitHub repository salesagility/suitecrm prior to 7.14.1.
https://huntr.dev/bounties/c56563cb-b74e-4174-a09a-cd07689d6736
2023-10-03T11:45:30.368Z
2023-10-03T11:45:41.765Z
2023-10-03T11:45:41.765Z
{'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm', 'Versions': 'unspecified'}
CVE-2023-5645
The WP Mail Log WordPress plugin before 1.1.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Contributor.
https://wpscan.com/vulnerability/e392fb53-66e9-4c43-9e4f-f4ea7c561551
2023-10-18T18:46:53.148Z
2023-12-26T18:33:05.509Z
2023-12-26T18:33:05.509Z
{'Vendor': 'Unknown', 'Product': 'WP Mail Log', 'Versions': '0'}
CVE-2023-5215
A flaw was found in libnbd. A server can reply with a block size larger than 2^63 (the NBD spec states the size is a 64-bit unsigned value). This issue could lead to an application crash or other unintended behavior for NBD clients that doesn't treat the return value of the nbd_get_size() function correctly.
https://access.redhat.com/security/cve/CVE-2023-5215
2023-09-26T21:54:47.184Z
2023-09-28T13:55:32.462Z
2024-01-23T01:08:24.024Z
{'Vendor': 'n/a', 'Product': 'libnbd', 'Versions': '1.18.0'}
CVE-2023-5491
A vulnerability, which was classified as critical, has been found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928. This issue affects some unknown processing of the file /sysmanage/updatelib.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241643. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.241643
2023-10-10T07:19:18.758Z
2023-10-10T15:00:08.080Z
2023-10-10T15:00:08.080Z
{'Vendor': 'Beijing Baichuo', 'Product': 'Smart S45F Multi-Service Secure Gateway Intelligent Management Platform', 'Versions': '20230928'}
CVE-2023-5868
A memory disclosure vulnerability was found in PostgreSQL that allows remote users to access sensitive information by exploiting certain aggregate function calls with 'unknown'-type arguments. Handling 'unknown'-type values from string literals without type designation can disclose bytes, potentially revealing notable and confidential information. This issue exists due to excessive data output in aggregate function calls, enabling remote users to read some portion of system memory.
https://access.redhat.com/errata/RHSA-2023:7545
2023-10-31T03:56:17.314Z
2023-12-10T17:56:57.176Z
2024-01-25T20:06:50.163Z
{'Vendor': 'n/a', 'Product': 'PostgreSQL', 'Versions': '16.1, 15.5, 14.10, 13.13, 12.17, 11.22'}
CVE-2023-5184
 Two potential signed to unsigned conversion errors and buffer overflow vulnerabilities at the following locations in the Zephyr IPM drivers.
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-8x3p-q3r5-xh9g
2023-09-25T19:53:12.084Z
2023-09-27T17:26:51.660Z
2023-09-27T17:26:51.660Z
{'Vendor': 'zephyrproject-rtos', 'Product': 'Zephyr', 'Versions': '*'}
CVE-2023-5307
The Photos and Files Contest Gallery WordPress plugin before 21.2.8.1 does not sanitise and escape some parameters, which could allow unauthenticated users to perform Cross-Site Scripting attacks via certain headers.
https://wpscan.com/vulnerability/6fac1e09-21ab-430d-b56d-195e7238c08c
2023-09-29T16:46:14.641Z
2023-10-31T13:54:43.166Z
2023-10-31T13:54:43.166Z
{'Vendor': 'Unknown', 'Product': 'Photos and Files Contest Gallery', 'Versions': '0'}
CVE-2023-5757
The WP Crowdfunding WordPress plugin before 2.1.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/2adc5995-03a9-4860-b00b-7f8d7fe18058
2023-10-24T18:47:20.600Z
2023-12-11T19:22:40.578Z
2023-12-26T18:33:07.013Z
{'Vendor': 'Unknown', 'Product': 'WP Crowdfunding', 'Versions': '0'}
CVE-2023-5612
An issue has been discovered in GitLab affecting all versions before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. It was possible to read the user email address via tags feed although the visibility in the user profile has been disabled.
https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16-8-1-released/
2023-10-17T11:30:31.181Z
2024-01-26T02:02:39.783Z
2024-01-26T02:02:39.783Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '0, 16.7, 16.8'}
CVE-2023-5487
Inappropriate implementation in Fullscreen in Google Chrome prior to 118.0.5993.70 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
2023-10-10T04:35:38.785Z
2023-10-11T22:28:51.928Z
2023-10-11T22:28:51.928Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'}
CVE-2023-5468
The Slick Contact Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'dcscf-link' shortcode in versions up to, and including, 1.3.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/22c63226-2bc6-40be-a5d1-1bd169fc78b8?source=cve
2023-10-09T15:56:45.370Z
2023-10-10T04:29:38.087Z
2023-10-10T04:29:38.087Z
{'Vendor': 'remix4', 'Product': 'Slick Contact Forms', 'Versions': '*'}
CVE-2023-5192
Excessive Data Query Operations in a Large Data Table in GitHub repository pimcore/demo prior to 10.3.0.
https://huntr.dev/bounties/65c954f2-79c3-4672-8846-a3035e7a1db7
2023-09-26T07:34:14.104Z
2023-09-26T07:34:27.103Z
2023-09-26T07:34:27.103Z
{'Vendor': 'pimcore', 'Product': 'pimcore/demo', 'Versions': 'unspecified'}
CVE-2023-5891
Cross-site Scripting (XSS) - Reflected in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
https://huntr.com/bounties/ce4956e4-9ef5-4e0e-bfb2-481ec5cfb0a5
2023-11-01T00:00:06.555Z
2023-11-01T00:00:18.684Z
2023-11-01T00:00:18.684Z
{'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'}
CVE-2023-5741
The POWR plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'powr-powr-pack' shortcode in all versions up to, and including, 2.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c2967eae-82bb-4556-a21a-c5bb6b905c62?source=cve
2023-10-24T01:31:06.094Z
2023-11-13T07:31:16.052Z
2023-11-13T07:31:16.052Z
{'Vendor': 'powr', 'Product': 'Contact Form – Custom Builder, Payment Form, and More', 'Versions': '*'}
CVE-2023-5311
The WP EXtra plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the register() function in versions up to, and including, 6.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to modify the contents of the .htaccess files located in a site's root directory or /wp-content and /wp-includes folders and achieve remote code execution.
https://www.wordfence.com/threat-intel/vulnerabilities/id/87e3dd5e-0d77-4d78-8171-0beaf9482699?source=cve
2023-09-29T18:45:02.146Z
2023-10-25T07:36:02.737Z
2023-10-25T07:36:02.737Z
{'Vendor': 'wpvncom', 'Product': 'WP EXtra', 'Versions': '*'}
CVE-2023-5604
The Asgaros Forum WordPress plugin before 2.7.1 allows forum administrators, who may not be WordPress (super-)administrators, to set insecure configuration that allows unauthenticated users to upload dangerous files (e.g. .php, .phtml), potentially leading to remote code execution.
https://wpscan.com/vulnerability/4ce69d71-87bf-4d95-90f2-63d558c78b69
2023-10-16T18:22:09.384Z
2023-11-27T16:22:00.940Z
2023-11-27T16:22:00.940Z
{'Vendor': 'Unknown', 'Product': 'Asgaros Forum', 'Versions': '0'}
CVE-2023-5254
The ChatBot plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.8.9 via the qcld_wb_chatbot_check_user function. This can allow unauthenticated attackers to extract sensitive data including confirmation as to whether a user name exists on the site as well as order information for existing users.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d897daf8-5320-4546-9a63-1d34a15b2a58?source=cve
2023-09-28T13:51:14.299Z
2023-10-19T05:34:12.026Z
2023-10-23T13:02:06.354Z
{'Vendor': 'quantumcloud', 'Product': 'AI ChatBot', 'Versions': '*'}
CVE-2023-5080
A privilege escalation vulnerability was reported in some Lenovo tablet products that could allow local applications access to device identifiers and system commands.
https://support.lenovo.com/us/en/product_security/LEN-142135
2023-09-19T21:01:57.900Z
2024-01-19T20:06:30.375Z
2024-01-19T20:06:30.375Z
{'Vendor': 'Lenovo', 'Product': 'Tablet', 'Versions': 'various'}
CVE-2023-5983
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Botanik Software Pharmacy Automation allows Retrieve Embedded Sensitive Data.This issue affects Pharmacy Automation: before 2.1.133.0.
https://www.usom.gov.tr/bildirim/tr-23-0652
2023-11-07T08:15:41.318Z
2023-11-22T11:54:04.318Z
2023-12-05T06:17:52.579Z
{'Vendor': 'Botanik Software', 'Product': 'Pharmacy Automation', 'Versions': '0'}
CVE-2023-5829
A vulnerability was found in code-projects Admission Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file student_avatar.php. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243728.
https://vuldb.com/?id.243728
2023-10-27T13:50:36.068Z
2023-10-27T20:00:07.256Z
2023-10-27T20:00:07.256Z
{'Vendor': 'code-projects', 'Product': 'Admission Management System', 'Versions': '1.0'}
CVE-2023-5595
Denial of Service in GitHub repository gpac/gpac prior to 2.3.0-DEV.
https://huntr.dev/bounties/0064cf76-ece1-495d-82b4-e4a1bebeb28e
2023-10-16T08:24:48.287Z
2023-10-16T08:25:00.327Z
2023-10-16T08:25:00.327Z
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
CVE-2023-5346
Type confusion in V8 in Google Chrome prior to 117.0.5938.149 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop.html
2023-10-03T04:18:55.312Z
2023-10-05T17:13:03.435Z
2023-10-05T17:13:03.435Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '117.0.5938.149'}
CVE-2023-5716
ASUS Armoury Crate has a vulnerability in arbitrary file write and allows remote attackers to access or modify arbitrary files by sending specific HTTP requests without permission.
https://www.twcert.org.tw/tw/cp-132-7666-fffce-1.html
2023-10-23T09:44:01.105Z
2024-01-19T03:07:46.663Z
2024-01-19T07:09:54.691Z
{'Vendor': 'ASUS', 'Product': 'Armoury Crate', 'Versions': 'V4.0.1.3'}
CVE-2023-5203
The WP Sessions Time Monitoring Full Automatic WordPress plugin before 1.0.9 does not sanitize the request URL or query parameters before using them in an SQL query, allowing unauthenticated attackers to extract sensitive data from the database via blind time based SQL injection techniques, or in some cases an error/union based technique.
https://wpscan.com/vulnerability/7f4f505b-2667-4e0f-9841-9c1cd0831932
2023-09-26T14:08:40.974Z
2023-12-26T18:33:07.808Z
2023-12-26T18:33:07.808Z
{'Vendor': 'Unknown', 'Product': 'WP Sessions Time Monitoring Full Automatic', 'Versions': '0'}
CVE-2023-5653
The WassUp Real Time Analytics WordPress plugin through 1.9.4.5 does not escape IP address provided via some headers before outputting them back in an admin page, allowing unauthenticated users to perform Stored XSS attacks against logged in admins
https://wpscan.com/vulnerability/76316621-1987-44ea-83e5-6ca884bdd1c0
2023-10-19T11:49:37.990Z
2023-11-27T16:22:01.293Z
2023-11-27T16:22:01.293Z
{'Vendor': 'Unknown', 'Product': 'WassUp Real Time Analytics', 'Versions': '0'}
CVE-2023-5347
An Improper Verification of Cryptographic Signature vulnerability in the update process of Korenix JetNet Series allows replacing the whole operating system including Trusted Executables. This issue affects JetNet devices older than firmware version 2024/01.
https://www.beijerelectronics.com/en/support/Help___online?docId=69947
2023-10-03T08:11:00.343Z
2024-01-09T09:54:59.664Z
2024-01-09T10:02:52.603Z
{'Vendor': 'Korenix', 'Product': 'JetNet Series', 'Versions': 'firmware older than 2024/01'}
CVE-2023-5717
A heap out-of-bounds write vulnerability in the Linux kernel's Linux Kernel Performance Events (perf) component can be exploited to achieve local privilege escalation. If perf_read_group() is called while an event's sibling_list is smaller than its child's sibling_list, it can increment or write to memory locations outside of the allocated buffer. We recommend upgrading past commit 32671e3799ca2e4590773fd0e63aaa4229e50c06.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06
2023-10-23T10:49:09.250Z
2023-10-25T12:55:06.871Z
2023-10-25T12:55:06.871Z
{'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '4.4'}
CVE-2023-5652
The WP Hotel Booking WordPress plugin before 2.0.8 does not have authorisation and CSRF checks, as well as does not escape user input before using it in a SQL statement of a function hooked to admin_init, allowing unauthenticated users to perform SQL injections
https://wpscan.com/vulnerability/8ea46b9a-5239-476b-949d-49546371eac1
2023-10-19T09:03:10.343Z
2023-11-20T18:55:06.152Z
2023-11-20T18:55:06.152Z
{'Vendor': 'Unknown', 'Product': 'WP Hotel Booking', 'Versions': '0'}
CVE-2023-5081
An information disclosure vulnerability was reported in the Lenovo Tab M8 HD that could allow a local application to gather a non-resettable device identifier.
https://support.lenovo.com/us/en/product_security/LEN-142135
2023-09-19T21:01:59.167Z
2024-01-19T20:07:36.051Z
2024-01-19T20:07:36.051Z
{'Vendor': 'Lenovo', 'Product': 'Tablet', 'Versions': 'various'}
CVE-2023-5982
The UpdraftPlus: WordPress Backup & Migration Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.23.10. This is due to a lack of nonce validation and insufficient validation of the instance_id on the 'updraftmethod-googledrive-auth' action used to update Google Drive remote storage location. This makes it possible for unauthenticated attackers to modify the Google Drive location that backups are sent to via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can make it possible for attackers to receive backups for a site which may contain sensitive information.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e1be11c5-0a44-4816-b6bf-d330cb51dbf3?source=cve
2023-11-07T08:09:50.451Z
2023-11-07T20:31:56.550Z
2023-11-07T20:31:56.550Z
{'Vendor': 'davidanderson', 'Product': 'UpdraftPlus: WordPress Backup & Migration Plugin', 'Versions': '*'}
CVE-2023-5828
A vulnerability was found in Nanning Ontall Longxing Industrial Development Zone Project Construction and Installation Management System up to 20231026. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file login.aspx. The manipulation of the argument tbxUserName leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243727.
https://vuldb.com/?id.243727
2023-10-27T13:44:53.912Z
2023-10-27T19:31:04.802Z
2023-10-27T19:31:04.802Z
{'Vendor': 'Nanning Ontall', 'Product': 'Longxing Industrial Development Zone Project Construction and Installation Management System', 'Versions': '20231026'}
CVE-2023-5594
Improper validation of the server’s certificate chain in secure traffic scanning feature considered intermediate certificate signed using the MD5 or SHA1 algorithm as trusted.
https://support.eset.com/en/ca8562-eset-customer-advisory-improper-following-of-a-certificates-chain-of-trust-in-eset-security-products-fixed
2023-10-16T08:12:50.985Z
2023-12-21T11:30:41.256Z
2023-12-21T11:30:41.256Z
{'Vendor': 'ESET, spol. s r.o.', 'Product': 'ESET NOD32 Antivirus', 'Versions': '1464'}
CVE-2023-5740
The Live Chat with Facebook Messenger plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'messenger' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/aa32a790-242f-4142-9f4d-e1b2a07045bb?source=cve
2023-10-24T01:30:17.674Z
2023-10-24T13:53:00.649Z
2023-10-24T13:53:00.649Z
{'Vendor': 'ninjateam', 'Product': 'Live Chat with Facebook Messenger', 'Versions': '*'}
CVE-2023-5310
A denial of service vulnerability exists in all Silicon Labs Z-Wave controller and endpoint devices running Z-Wave SDK v7.20.3 (Gecko SDK v4.3.3) and earlier. This attack can be carried out only by devices on the network sending a stream of packets to the device.
https://github.com/SiliconLabs/gecko_sdk/releases
2023-09-29T18:44:41.563Z
2023-12-15T16:05:15.120Z
2023-12-15T16:05:15.120Z
{'Vendor': 'silabs.com', 'Product': 'Gecko SDK', 'Versions': '0'}
CVE-2023-5605
The URL Shortify WordPress plugin before 1.7.9.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/9ec03ef0-0c04-4517-b761-df87af722a64
2023-10-16T19:11:36.064Z
2023-11-06T20:42:09.334Z
2023-12-04T10:18:13.608Z
{'Vendor': 'Unknown', 'Product': 'URL Shortify', 'Versions': '0'}
CVE-2023-5255
For certificates that utilize the auto-renew feature in Puppet Server, a flaw exists which prevents the certificates from being revoked.
https://www.puppet.com/security/cve/cve-2023-5255-denial-service-revocation-auto-renewed-certificates
2023-09-28T17:42:16.370Z
2023-10-03T17:54:55.177Z
2023-10-03T22:38:41.221Z
{'Vendor': 'Puppet', 'Product': 'Puppet Enterprise', 'Versions': 'Puppet Enterprise 2023.3, Puppet Server 8.2.0'}
CVE-2023-5486
Inappropriate implementation in Input in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to spoof security UI via a crafted HTML page. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
2023-10-10T00:12:41.317Z
2023-10-11T22:28:54.163Z
2023-10-11T22:28:54.163Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'}
CVE-2023-5469
The Drop Shadow Boxes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'dropshadowbox' shortcode in versions up to, and including, 1.7.13 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c0b3911c-a960-4f28-b289-389b26282741?source=cve
2023-10-09T15:58:12.138Z
2023-11-22T15:33:33.538Z
2023-11-22T15:33:33.538Z
{'Vendor': 'stevehenty', 'Product': 'Drop Shadow Boxes', 'Versions': '*'}
CVE-2023-5193
Mattermost fails to properly check permissions when retrieving a post allowing for a System Role with the permission to manage channels to read the posts of a DM conversation.
https://mattermost.com/security-updates
2023-09-26T08:44:07.420Z
2023-09-29T09:23:47.082Z
2023-09-29T09:23:47.082Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 8.1.0, 8.0.2, 8.1.1, 7.8.10'}
CVE-2023-5890
Cross-site Scripting (XSS) - Stored in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
https://huntr.com/bounties/b60e6e1f-e44d-4b11-acf8-b0548b915686
2023-11-01T00:00:06.498Z
2023-11-01T00:00:18.404Z
2023-11-01T00:00:18.404Z
{'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'}
CVE-2023-5306
null
null
2023-09-29T16:43:58.192Z
2023-10-31T21:21:13.541Z
2024-01-02T15:08:46.922Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-5756
The Digital Publications by Supsystic plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.6. This is due to missing or incorrect nonce validation on the AJAX action handler. This makes it possible for unauthenticated attackers to execute AJAX actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/2304e4dc-0dc6-4ded-b8e6-8d76d70f63d7?source=cve
2023-10-24T17:43:25.311Z
2023-12-09T06:51:59.433Z
2023-12-09T06:51:59.433Z
{'Vendor': 'supsysticcom', 'Product': 'Digital Publications by Supsystic', 'Versions': '*'}
CVE-2023-5243
The Login Screen Manager WordPress plugin through 3.5.2 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/ad895200-a03a-4e92-b256-d6991547d38a
2023-09-27T20:29:51.225Z
2023-10-31T13:54:43.491Z
2023-10-31T13:54:43.491Z
{'Vendor': 'Unknown', 'Product': 'Login Screen Manager', 'Versions': '0'}
CVE-2023-5613
The Super Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tpsscode' shortcode in all versions up to, and including, 2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/52659f1c-642e-4c88-b3d0-d5c5a206b11c?source=cve
2023-10-17T13:36:52.724Z
2023-10-20T04:30:32.364Z
2023-10-20T04:30:32.364Z
{'Vendor': 'themepoints', 'Product': 'Super Testimonials', 'Versions': '*'}
CVE-2023-5490
A vulnerability classified as critical was found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928. This vulnerability affects unknown code of the file /useratte/userattestation.php. The manipulation of the argument web_img leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-241642 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.241642
2023-10-10T07:19:15.350Z
2023-10-10T15:00:06.541Z
2023-10-10T15:00:06.541Z
{'Vendor': 'Beijing Baichuo', 'Product': 'Smart S45F Multi-Service Secure Gateway Intelligent Management Platform', 'Versions': '20230928'}
CVE-2023-5869
A flaw was found in PostgreSQL that allows authenticated database users to execute arbitrary code through missing overflow checks during SQL array value modification. This issue exists due to an integer overflow during array modification where a remote user can trigger the overflow by providing specially crafted data. This enables the execution of arbitrary code on the target system, allowing users to write arbitrary bytes to memory and extensively read the server's memory.
https://access.redhat.com/errata/RHSA-2023:7545
2023-10-31T03:56:42.638Z
2023-12-10T17:56:57.131Z
2024-01-25T20:06:52.056Z
{'Vendor': 'n/a', 'Product': 'PostgreSQL', 'Versions': '16.1, 15.5, 14.10, 13.13, 12.17, 11.22'}
CVE-2023-5886
The Export any WordPress data to XML/CSV WordPress plugin before 1.4.0, WP All Export Pro WordPress plugin before 1.8.6 does not check nonce tokens early enough in the request lifecycle, allowing attackers with the ability to upload files to make logged in users perform unwanted actions leading to PHAR deserialization, which may lead to remote code execution.
https://wpscan.com/vulnerability/0a08e49d-d34e-4140-a15d-ad64444665a3
2023-10-31T18:39:06.473Z
2023-12-18T20:07:57.546Z
2023-12-18T20:07:57.546Z
{'Vendor': 'Unknown', 'Product': 'Export any WordPress data to XML/CSV', 'Versions': '0'}
CVE-2023-5185
Gym Management System Project v1.0 is vulnerable to an Insecure File Upload vulnerability on the 'file' parameter of profile/i.php page, allowing an authenticated attacker to obtain Remote Code Execution on the server hosting the application.
https://fluidattacks.com/advisories/orion
2023-09-25T22:29:10.371Z
2023-09-28T20:52:35.938Z
2023-09-28T20:52:35.938Z
{'Vendor': 'Gym Management System Project', 'Product': 'Gym Management System Project', 'Versions': '1.0'}
CVE-2023-5701
A vulnerability has been found in vnotex vnote up to 3.17.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Markdown File Handler. The manipulation with the input <xss onclick="alert(1)" style=display:block>Click here</xss> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243139. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.243139
2023-10-22T16:04:48.859Z
2023-10-23T00:00:07.895Z
2023-10-23T00:00:07.895Z
{'Vendor': 'vnotex', 'Product': 'vnote', 'Versions': '3.0, 3.1, 3.2, 3.3, 3.4, 3.5, 3.6, 3.7, 3.8, 3.9, 3.10, 3.11, 3.12, 3.13, 3.14, 3.15, 3.16, 3.17'}
CVE-2023-5351
Cross-site Scripting (XSS) - Stored in GitHub repository salesagility/suitecrm prior to 7.14.1.
https://huntr.dev/bounties/f7c7fcbc-5421-4a29-9385-346a1caa485b
2023-10-03T11:57:49.759Z
2023-10-03T11:58:01.156Z
2023-10-03T11:58:01.156Z
{'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm', 'Versions': 'unspecified'}
CVE-2023-5644
The WP Mail Log WordPress plugin before 1.1.3 does not correctly authorize its REST API endpoints, allowing users with the Contributor role to view and delete data that should only be accessible to Admin users.
https://wpscan.com/vulnerability/08f1d623-0453-4103-a9aa-2d0ddb6eb69e
2023-10-18T18:10:57.430Z
2023-12-26T18:33:08.615Z
2023-12-26T18:33:08.615Z
{'Vendor': 'Unknown', 'Product': 'WP Mail Log', 'Versions': '0'}
CVE-2023-5214
In Puppet Bolt versions prior to 3.27.4, a path to escalate privileges was identified.
https://www.puppet.com/security/cve/cve-2023-5214-privilege-escalation-puppet-bolt
2023-09-26T21:53:09.685Z
2023-10-06T17:22:49.431Z
2023-10-17T16:09:45.913Z
{'Vendor': 'Puppet', 'Product': 'Bolt', 'Versions': 'prior to 3.27.4'}
CVE-2023-5097
Improper Input Validation vulnerability in HYPR Workforce Access on Windows allows Path Traversal.This issue affects Workforce Access: before 8.7.
https://www.hypr.com/security-advisories
2023-09-20T18:19:39.334Z
2024-01-16T19:40:57.869Z
2024-01-16T19:40:57.869Z
{'Vendor': 'HYPR', 'Product': 'Workforce Access', 'Versions': '0'}
CVE-2023-5078
A vulnerability was reported in some ThinkPad BIOS that could allow a physical or local attacker with elevated privileges to tamper with BIOS firmware.
https://support.lenovo.com/us/en/product_security/LEN-141775
2023-09-19T20:53:37.522Z
2023-11-08T22:02:49.076Z
2023-11-08T22:02:49.076Z
{'Vendor': 'Lenovo', 'Product': 'ThinkPad BIOS', 'Versions': 'various'}
CVE-2023-5582
A vulnerability, which was classified as problematic, has been found in ZZZCMS 2.2.0. This issue affects some unknown processing of the component Personal Profile Page. The manipulation leads to basic cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-242147.
https://vuldb.com/?id.242147
2023-10-13T19:11:08.508Z
2023-10-14T14:00:06.426Z
2023-10-14T14:00:06.426Z
{'Vendor': 'n/a', 'Product': 'ZZZCMS', 'Versions': '2.2.0'}
CVE-2023-5428
The Image vertical reel scroll slideshow plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 9.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/01d31d8a-4459-488a-9cbe-92761faa58b4?source=cve
2023-10-05T19:15:11.167Z
2023-10-31T08:32:47.779Z
2023-10-31T08:32:47.779Z
{'Vendor': 'gopiplus', 'Product': 'Image vertical reel scroll slideshow', 'Versions': '*'}
CVE-2023-5795
A vulnerability was found in CodeAstro POS System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /profil of the component Profile Picture Handler. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243601 was assigned to this vulnerability.
https://vuldb.com/?id.243601
2023-10-26T07:30:17.060Z
2023-10-26T17:31:03.942Z
2023-10-26T17:31:03.942Z
{'Vendor': 'CodeAstro', 'Product': 'POS System', 'Versions': '1.0'}
CVE-2023-5280
A vulnerability was found in SourceCodester Engineers Online Portal 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file my_students.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240908.
https://vuldb.com/?id.240908
2023-09-29T09:49:11.930Z
2023-09-29T18:00:07.099Z
2023-10-24T21:30:31.303Z
{'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'}
CVE-2023-5003
The Active Directory Integration / LDAP Integration WordPress plugin before 4.1.10 stores sensitive LDAP logs in a buffer file when an administrator wants to export said logs. Unfortunately, this log file is never removed, and remains accessible to any users knowing the URL to do so.
https://wpscan.com/vulnerability/91f4e500-71f3-4ef6-9cc7-24a7c12a5748
2023-09-15T19:38:39.194Z
2023-10-16T19:39:08.657Z
2023-10-16T19:39:08.657Z
{'Vendor': 'Unknown', 'Product': 'Active Directory Integration / LDAP Integration', 'Versions': '0'}
CVE-2023-5900
Cross-Site Request Forgery in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
https://huntr.com/bounties/c3f011d4-9f76-4b2b-b3d4-a5e2ecd2e354
2023-11-01T00:00:37.641Z
2023-11-01T00:00:42.738Z
2023-11-16T21:09:35.708Z
{'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'}
CVE-2023-5845
The Simple Social Media Share Buttons WordPress plugin before 5.1.1 leaks password-protected post content to unauthenticated visitors in some meta tags
https://wpscan.com/vulnerability/d5b59e9e-85e5-4d26-aebe-64757c8495fa
2023-10-30T13:07:08.285Z
2023-11-27T16:22:02.151Z
2023-11-27T16:22:02.151Z
{'Vendor': 'Unknown', 'Product': 'Simple Social Media Share Buttons', 'Versions': '0'}
CVE-2023-5146
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 and DAR-8000 up to 20151231 and classified as critical. Affected by this issue is some unknown functionality of the file /sysmanage/updatelib.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240242 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
https://vuldb.com/?id.240242
2023-09-24T15:56:13.356Z
2023-09-25T00:00:09.044Z
2023-10-24T19:26:46.111Z
{'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'}
CVE-2023-5516
Poorly constructed webap requests and URI components with special characters trigger unhandled errors and exceptions, disclosing information about the underlying technology and other sensitive information details. The website unintentionally reveals sensitive information including technical details like version Info, endpoints, backend server, Internal IP. etc., which can potentially expose additional attack surface containing other interesting vulnerabilities.
https://publisher.hitachienergy.com/preview?DocumentId=8DBD000175&languageCode=en&Preview=true
2023-10-11T01:30:14.840Z
2023-11-01T02:54:21.225Z
2023-11-01T02:54:21.225Z
{'Vendor': 'Hitachi Energy', 'Product': 'eSOMS', 'Versions': '6.0'}
CVE-2023-5238
The EventPrime WordPress plugin before 3.2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to an HTML Injection on the plugin in the search area of the website.
https://wpscan.com/vulnerability/47a5fbfd-f47c-4356-8567-b29dadb48423
2023-09-27T16:42:14.824Z
2023-10-31T13:54:43.838Z
2023-10-31T13:54:43.838Z
{'Vendor': 'Unknown', 'Product': 'EventPrime', 'Versions': '0'}
CVE-2023-5668
The WhatsApp Share Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'whatsapp' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/77911b0f-c028-49ae-b85e-15909d806e30?source=cve
2023-10-19T16:12:21.360Z
2023-10-20T04:30:32.830Z
2023-10-20T04:30:32.830Z
{'Vendor': 'alexmoss', 'Product': 'WhatsApp Share Button', 'Versions': '*'}
CVE-2023-5687
Cross-Site Request Forgery (CSRF) in GitHub repository mosparo/mosparo prior to 1.0.3.
https://huntr.com/bounties/33f95510-cdee-460e-8e61-107874962f2d
2023-10-20T16:22:40.571Z
2023-10-20T16:22:43.785Z
2023-10-20T16:22:43.785Z
{'Vendor': 'mosparo', 'Product': 'mosparo/mosparo', 'Versions': 'unspecified'}
CVE-2023-5957
The Ni Purchase Order(PO) For WooCommerce WordPress plugin through 1.2.1 does not validate logo and signature image files uploaded in the settings, allowing high privileged user to upload arbitrary files to the web server, triggering an RCE vulnerability by uploading a web shell.
https://wpscan.com/vulnerability/70f823ff-64ad-4f05-9eb3-b69b3b79dc12
2023-11-03T17:40:53.323Z
2024-01-08T19:00:32.181Z
2024-01-08T19:00:32.181Z
{'Vendor': 'Unknown', 'Product': 'Ni Purchase Order(PO) For WooCommerce', 'Versions': '0'}
CVE-2023-5054
The Super Store Finder plugin for WordPress is vulnerable to unauthenticated arbitrary email creation and relay in versions up to, and including, 6.9.3. This is due to insufficient restrictions on the sendMail.php file that allows direct access. This makes it possible for unauthenticated attackers to send emails utilizing the vulnerable site's server, with arbitrary content. Please note that this vulnerability has already been publicly disclosed with an exploit which is why we are publishing the details without a patch available, we are attempting to initiate contact with the developer.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d31d0553-9378-4c7e-a258-12562aa6b388?source=cve
2023-09-18T16:35:41.554Z
2023-09-19T06:38:44.229Z
2023-10-13T00:51:30.084Z
{'Vendor': 'Super Store Finder', 'Product': 'Super Store Finder', 'Versions': '*'}
CVE-2023-5541
The CSV grade import method contained an XSS risk for users importing the spreadsheet, if it contained unsafe content.
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79426
2023-10-11T23:48:36.508Z
2023-11-09T19:18:22.119Z
2023-11-09T19:18:22.119Z
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'}
CVE-2023-5111
Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "featured_type_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.
https://fluidattacks.com/advisories/bts/
2023-09-21T18:57:26.464Z
2023-09-30T22:08:52.218Z
2023-10-03T23:12:48.211Z
{'Vendor': 'Os Commerce', 'Product': 'Os Commerce', 'Versions': '4.12.56860'}
CVE-2023-5812
A vulnerability has been found in flusity CMS and classified as critical. Affected by this vulnerability is the function handleFileUpload of the file core/tools/upload.php. The manipulation of the argument uploaded_file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-243643.
https://vuldb.com/?id.243643
2023-10-26T18:14:01.706Z
2023-10-27T01:31:05.296Z
2023-10-27T01:31:05.296Z
{'Vendor': 'flusity', 'Product': 'CMS', 'Versions': 'n/a'}
CVE-2023-5384
A flaw was found in Infinispan. When serializing the configuration for a cache to XML/JSON/YAML, which contains credentials (JDBC store with connection pooling, remote store), the credentials are returned in clear text as part of the configuration.
https://access.redhat.com/errata/RHSA-2023:7676
2023-10-04T16:12:42.727Z
2023-12-18T13:43:08.728Z
2023-12-18T13:43:08.728Z
{'Vendor': 'n/a', 'Product': 'infinispan', 'Versions': ''}
CVE-2023-5691
The Chatbot for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in version 2.3.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/dfd67329-11b1-4f00-a422-bb4833a3181d?source=cve
2023-10-20T19:07:22.844Z
2024-01-11T08:33:04.545Z
2024-01-11T08:33:04.545Z
{'Vendor': 'collectchat', 'Product': 'Collect.chat Chatbot ⚡️', 'Versions': '2.3.9'}
CVE-2023-5042
Sensitive information disclosure due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 40713.
https://security-advisory.acronis.com/advisories/SEC-5330
2023-09-18T12:18:29.150Z
2023-09-20T11:03:34.796Z
2023-09-20T11:03:34.796Z
{'Vendor': 'Acronis', 'Product': 'Acronis Cyber Protect Home Office', 'Versions': 'unspecified'}
CVE-2023-5412
The Image horizontal reel scroll slideshow plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 13.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/08fb698f-c87c-4200-85fe-3fe72745633e?source=cve
2023-10-04T20:02:01.581Z
2023-10-31T08:32:48.974Z
2023-10-31T08:32:48.974Z
{'Vendor': 'gopiplus', 'Product': 'Image horizontal reel scroll slideshow', 'Versions': '*'}
CVE-2023-5941
In versions of FreeBSD 12.4-RELEASE prior to 12.4-RELEASE-p7 and FreeBSD 13.2-RELEASE prior to 13.2-RELEASE-p5 the __sflush() stdio function in libc does not correctly update FILE objects' write space members for write-buffered streams when the write(2) system call returns an error.  Depending on the nature of an application that calls libc's stdio functions and the presence of errors returned from the write(2) system call (or an overridden stdio write routine) a heap buffer overflow may occur. Such overflows may lead to data corruption or the execution of arbitrary code at the privilege level of the calling program.
https://security.freebsd.org/advisories/FreeBSD-SA-23:15.stdio.asc
2023-11-02T18:54:11.312Z
2023-11-08T08:52:26.564Z
2023-11-08T08:52:26.564Z
{'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '12.4-RELEASE, 13.2-RELEASE'}