CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-5804
A vulnerability was found in PHPGurukul Nipah Virus Testing Management System 1.0 and classified as critical. This issue affects some unknown processing of the file login.php. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The identifier VDB-243617 was assigned to this vulnerability.
https://vuldb.com/?id.243617
2023-10-26T13:56:00.298Z
2023-10-26T20:00:06.279Z
2023-10-26T20:00:06.279Z
{'Vendor': 'PHPGurukul', 'Product': 'Nipah Virus Testing Management System', 'Versions': '1.0'}
CVE-2023-5557
A flaw was found in the tracker-miners package. A weakness in the sandbox allows a maliciously-crafted file to execute code outside the sandbox if the tracker-extract process has first been compromised by a separate vulnerability.
https://access.redhat.com/errata/RHSA-2023:7712
2023-10-12T14:29:58.509Z
2023-10-13T01:41:45.366Z
2024-01-23T01:25:49.381Z
{'Vendor': 'n/a', 'Product': 'tracker-miners', 'Versions': '3.3.2, 3.4.5, 3.5.3, 3.6.1'}
CVE-2023-5279
A vulnerability has been found in SourceCodester Engineers Online Portal 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file my_classmates.php. The manipulation of the argument teacher_class_student_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240907.
https://vuldb.com/?id.240907
2023-09-29T09:49:08.076Z
2023-09-29T18:00:05.885Z
2023-10-24T21:29:18.110Z
{'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'}
CVE-2023-5783
A vulnerability has been found in Tongda OA 2017 up to 11.9 and classified as critical. Affected by this vulnerability is an unknown functionality of the file general/system/approve_center/flow_sort/flow/delete.php. The manipulation of the argument id/sort_parent leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-243589 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.243589
2023-10-26T05:29:27.818Z
2023-10-26T14:00:06.232Z
2023-10-26T14:00:06.232Z
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'}
CVE-2023-5629
A CWE-601:URL Redirection to Untrusted Site (‘Open Redirect’) vulnerability exists that could cause disclosure of information through phishing attempts over HTTP.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-346-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-346-01.pdf
2023-10-18T06:12:46.648Z
2023-12-14T04:42:32.540Z
2023-12-14T04:42:32.540Z
{'Vendor': 'Schneider Electric', 'Product': 'Trio Q-Series Ethernet Data Radio', 'Versions': 'Versions prior to 2.7.0'}
CVE-2023-5296
A vulnerability was found in Xinhu RockOA 1.1/2.3.2/15.X3amdi and classified as problematic. Affected by this issue is some unknown functionality of the file api.php?m=reimplat&a=index of the component Password Handler. The manipulation leads to weak password recovery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240926 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.240926
2023-09-29T14:27:36.046Z
2023-09-29T21:31:04.441Z
2023-10-25T04:54:31.430Z
{'Vendor': 'Xinhu', 'Product': 'RockOA', 'Versions': '1.1, 2.3.2, 15.X3amdi'}
CVE-2023-5916
A vulnerability classified as critical has been found in Lissy93 Dashy 2.1.1. This affects an unknown part of the file /config-manager/save of the component Configuration Handler. The manipulation of the argument config leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-244305 was assigned to this vulnerability.
https://vuldb.com/?id.244305
2023-11-02T05:39:07.124Z
2023-11-02T10:31:06.228Z
2023-11-02T10:31:06.228Z
{'Vendor': 'Lissy93', 'Product': 'Dashy', 'Versions': '2.1.1'}
CVE-2023-5445
An open redirect vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2, allows a remote low privileged user to modify the URL parameter for the purpose of redirecting URL request(s) to a malicious site. This impacts the dashboard area of the user interface. A user would need to be logged into ePO to trigger this vulnerability. To exploit this the attacker must change the HTTP payload post submission, prior to it reaching the ePO server.
https://kcm.trellix.com/corporate/index?page=content&id=SB10410
2023-10-06T07:58:14.595Z
2023-11-17T10:01:36.927Z
2023-11-17T10:01:36.927Z
{'Vendor': 'Trellix', 'Product': 'ePolicy Orchestrator', 'Versions': 'Prior to 5.10.0 SP1 UP2'}
CVE-2023-5015
A vulnerability was found in UCMS 1.4.7. It has been classified as problematic. Affected is an unknown function of the file ajax.php?do=strarraylist. The manipulation of the argument strdefault leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239856.
https://vuldb.com/?id.239856
2023-09-16T06:39:36.678Z
2023-09-17T01:31:05.295Z
2023-10-24T16:32:52.869Z
{'Vendor': 'n/a', 'Product': 'UCMS', 'Versions': '1.4.7'}
CVE-2023-5500
This vulnerability allows an remote attacker with low privileges to misuse Improper Control of Generation of Code ('Code Injection') to gain full control of the affected device.
https://cert.vde.com/en/advisories/VDE-2023-049/
2023-10-10T13:52:02.969Z
2023-12-11T07:13:51.308Z
2023-12-11T07:13:51.308Z
{'Vendor': 'Frauscher', 'Product': 'FDS102 for FAdC/FAdCi', 'Versions': '2.10.0'}
CVE-2023-5150
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical has been found in D-Link DAR-7000 and DAR-8000 up to 20151231. Affected is an unknown function of the file /useratte/web.php. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-240246 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
https://vuldb.com/?id.240246
2023-09-24T15:56:28.630Z
2023-09-25T01:31:04.725Z
2023-10-24T19:31:38.774Z
{'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'}
CVE-2023-5853
Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
2023-10-30T22:11:16.627Z
2023-11-01T17:14:01.484Z
2023-11-01T17:14:01.484Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'}
CVE-2023-5824
Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug.
https://access.redhat.com/errata/RHSA-2023:7465
2023-10-27T09:37:47.593Z
2023-11-03T07:56:36.369Z
2024-01-25T20:01:48.895Z
{'Vendor': 'n/a', 'Product': 'squid', 'Versions': '6.4'}
CVE-2023-5127
The WP Font Awesome plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 1.7.9 due to insufficient input sanitization and output escaping on 'icon' user supplied attribute. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/59ee0b56-c11f-4951-aac0-8344200e4484?source=cve
2023-09-22T15:44:06.480Z
2023-10-24T13:52:58.747Z
2023-10-24T13:52:58.747Z
{'Vendor': 'zayedbaloch', 'Product': 'WP Font Awesome', 'Versions': '*'}
CVE-2023-5577
The Bitly's plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpbitly' shortcode in all versions up to, and including, 2.7.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/31522e54-f260-46d0-8d57-2d46af7d3450?source=cve
2023-10-13T16:56:51.074Z
2023-11-07T11:31:06.058Z
2023-11-07T11:31:06.058Z
{'Vendor': 'bitlydeveloper', 'Product': 'Bitly's WordPress Plugin', 'Versions': '*'}
CVE-2023-5062
The WordPress Charts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wp_charts' shortcode in versions up to, and including, 0.7.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/2de2d2c5-1373-45b6-93a0-575713226669?source=cve
2023-09-19T14:23:49.810Z
2023-09-20T02:31:41.145Z
2023-09-20T02:31:41.145Z
{'Vendor': 'webfactory', 'Product': 'WordPress Charts', 'Versions': '*'}
CVE-2023-5598
Stored Cross-site Scripting (XSS) vulnerabilities affecting 3DSwym in 3DSwymer from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2023x allow an attacker to execute arbitrary script code.
https://www.3ds.com/vulnerability/advisories
2023-10-16T08:52:28.948Z
2023-11-21T09:29:05.310Z
2023-11-29T09:25:56.435Z
{'Vendor': 'Dassault Systèmes', 'Product': '3DSwymer', 'Versions': 'Release 3DEXPERIENCE R2022x Golden, Release 3DEXPERIENCE R2023x Golden'}
CVE-2023-5432
The Jquery news ticker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'jquery-news-ticker' shortcode in versions up to, and including, 3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d22d9414-2df9-4528-a426-dce6e83f8d44?source=cve
2023-10-05T19:16:27.282Z
2023-12-19T03:30:30.598Z
2023-12-19T03:30:30.598Z
{'Vendor': 'gopiplushotmailcom', 'Product': 'Jquery news ticker', 'Versions': '*'}
CVE-2023-5961
A Cross-Site Request Forgery (CSRF) vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. An attacker can exploit this vulnerability to trick a client into making an unintentional request to the web server, which will be treated as an authentic request. This vulnerability may lead an attacker to perform operations on behalf of the victimized user.
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-235250-iologik-e1200-series-web-server-vulnerability
2023-11-06T07:47:31.237Z
2023-12-23T09:01:02.875Z
2023-12-23T09:01:02.875Z
{'Vendor': 'Moxa', 'Product': 'ioLogik E1200 Series', 'Versions': '1.0'}
CVE-2023-5520
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2.
https://huntr.dev/bounties/681e42d0-18d4-4ebc-aba0-c5b0f77ac74a
2023-10-11T11:55:58.015Z
2023-10-11T11:56:06.789Z
2023-10-11T11:56:06.789Z
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
CVE-2023-5170
In canvas rendering, a compromised content process could have caused a surface to change unexpectedly, leading to a memory leak of a privileged process. This memory leak could be used to effect a sandbox escape if the correct data was leaked. This vulnerability affects Firefox < 118.
https://bugzilla.mozilla.org/show_bug.cgi?id=1846686
2023-09-25T15:03:41.844Z
2023-09-27T14:13:28.264Z
2023-09-27T14:13:28.264Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5873
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 11.1.0.
https://huntr.com/bounties/701cfc30-22a1-4c4b-9b2f-885c77c290ce
2023-10-31T08:06:32.067Z
2023-10-31T08:06:44.834Z
2023-10-31T08:06:44.834Z
{'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'}
CVE-2023-5465
The Popup with fancybox plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 3.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c943cf0b-0e99-4d47-808d-2b803369d53a?source=cve
2023-10-09T15:47:06.800Z
2023-11-22T15:33:34.454Z
2023-11-22T15:33:34.454Z
{'Vendor': 'gopiplushotmailcom', 'Product': 'Popup with fancybox', 'Versions': '*'}
CVE-2023-5035
A vulnerability has been identified in PT-G503 Series firmware versions prior to v5.2, where the Secure attribute for sensitive cookies in HTTPS sessions is not set, which could cause the cookie to be transmitted in plaintext over an HTTP session. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation.
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230203-pt-g503-series-multiple-vulnerabilities
2023-09-18T05:24:28.222Z
2023-11-02T16:11:13.854Z
2023-11-02T16:11:13.854Z
{'Vendor': 'Moxa', 'Product': 'PT-G503 Series', 'Versions': '1.0'}
CVE-2023-5259
A vulnerability classified as problematic was found in ForU CMS. This vulnerability affects unknown code of the file /admin/cms_admin.php. The manipulation of the argument del leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The identifier of this vulnerability is VDB-240868.
https://vuldb.com/?id.240868
2023-09-29T05:16:04.313Z
2023-09-29T11:31:05.823Z
2023-10-24T19:43:50.656Z
{'Vendor': 'ForU', 'Product': 'CMS', 'Versions': 'n/a'}
CVE-2023-5609
The Seraphinite Accelerator WordPress plugin before 2.2.29 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/aac4bcc8-b826-4165-aed3-f422dd178692
2023-10-17T09:46:46.018Z
2023-11-20T18:55:06.964Z
2023-11-20T18:55:06.964Z
{'Vendor': 'Unknown', 'Product': 'Seraphinite Accelerator', 'Versions': '0'}
CVE-2023-5865
Insufficient Session Expiration in GitHub repository thorsten/phpmyfaq prior to 3.2.2.
https://huntr.com/bounties/4c4b7395-d9fd-4ca0-98d7-2e20c1249aff
2023-10-31T00:00:36.972Z
2023-10-31T00:00:40.896Z
2023-10-31T00:00:40.896Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-5166
Docker Desktop before 4.23.0 allows Access Token theft via a crafted extension icon URL. This issue affects Docker Desktop: before 4.23.0.
https://docs.docker.com/desktop/release-notes/#4230
2023-09-25T14:05:47.327Z
2023-09-25T15:30:10.164Z
2023-09-25T15:30:10.164Z
{'Vendor': 'Docker Inc.', 'Product': 'Docker Desktop', 'Versions': '0'}
CVE-2023-5536
A feature in LXD (LP#1829071), affects the default configuration of Ubuntu Server which allows privileged users in the lxd group to escalate their privilege to root without requiring a sudo password.
https://discourse.ubuntu.com/t/easy-multi-user-lxd-setup/26215/4
2023-10-11T21:19:39.035Z
2023-12-12T01:51:08.849Z
2023-12-12T01:51:08.849Z
{'Vendor': 'Canonical', 'Product': 'Ubuntu Server', 'Versions': '0'}
CVE-2023-5023
A vulnerability was found in Tongda OA 2017 and classified as critical. Affected by this issue is some unknown functionality of the file general/hr/manage/staff_relatives/delete.php. The manipulation of the argument RELATIVES_ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239864.
https://vuldb.com/?id.239864
2023-09-16T07:53:52.400Z
2023-09-17T06:00:10.673Z
2023-10-24T19:07:14.827Z
{'Vendor': 'Tongda', 'Product': 'OA', 'Versions': '2017'}
CVE-2023-5473
Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
2023-10-10T00:12:39.875Z
2023-10-11T22:28:54.314Z
2023-10-11T22:28:54.314Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'}
CVE-2023-5189
A path traversal vulnerability exists in Ansible when extracting tarballs. An attacker could craft a malicious tarball so that when using the galaxy importer of Ansible Automation Hub, a symlink could be dropped on the disk, resulting in files being overwritten.
https://access.redhat.com/errata/RHSA-2023:7773
2023-09-26T05:27:24.004Z
2023-11-14T22:57:00.584Z
2024-01-23T01:07:37.296Z
{'Vendor': 'n/a', 'Product': 'automation_hub', 'Versions': ''}
CVE-2023-5920
Mattermost Desktop for MacOS fails to utilize the secure keyboard input functionality provided by macOS, allowing for other processes to read the keyboard input.
https://mattermost.com/security-updates
2023-11-02T08:29:11.115Z
2023-11-02T08:34:30.659Z
2023-11-02T08:34:30.659Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost Desktop', 'Versions': '0, 5.5.1'}
CVE-2023-5561
WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack
https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441
2023-10-12T17:42:19.461Z
2023-10-16T19:39:10.424Z
2023-11-08T18:23:17.512Z
{'Vendor': 'WordPress', 'Product': 'WordPress', 'Versions': '6.3.0, 6.2.0, 6.1.0, 6.0.0, 5.9.0, 5.8.0, 5.7.0, 5.6.0, 5.5.0, 5.4.0, 5.3.0, 5.2.0, 5.0.0, 4.9.0, 4.8.0, 4.7.0'}
CVE-2023-5131
A heap buffer-overflow exists in Delta Electronics ISPSoft. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DVP file to achieve code execution.
https://blog.exodusintel.com/2024/01/18/delta-electronics-ispsoft-heap-buffer-overflow/
2023-09-22T16:18:19.317Z
2024-01-18T21:14:39.954Z
2024-01-18T21:14:39.954Z
{'Vendor': 'Delta Electronics', 'Product': 'ISPSoft', 'Versions': '3.02.11'}
CVE-2023-5998
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3.0-DEV.
https://huntr.com/bounties/ea02a231-b688-422b-a881-ef415bcf6113
2023-11-07T18:44:47.880Z
2023-11-07T18:45:03.305Z
2023-11-07T18:45:03.305Z
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
CVE-2023-5832
Improper Input Validation in GitHub repository mintplex-labs/anything-llm prior to 0.1.0.
https://huntr.com/bounties/afee3726-571f-416e-bba5-0828c815f5df
2023-10-27T18:44:47.169Z
2023-10-30T12:24:09.831Z
2023-10-30T12:24:09.831Z
{'Vendor': 'mintplex-labs', 'Product': 'mintplex-labs/anything-llm', 'Versions': 'unspecified'}
CVE-2023-5977
null
null
2023-11-07T00:15:54.215Z
null
2023-11-13T23:42:23.793Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-5074
Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28
https://www.tenable.com/security/research/tra-2023-32
2023-09-19T19:03:25.470Z
2023-09-20T15:32:44.451Z
2023-09-20T15:32:44.451Z
{'Vendor': 'D-Link', 'Product': 'D-View 8', 'Versions': '2.0.1.28'}
CVE-2023-5218
Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
2023-09-27T01:52:05.980Z
2023-10-11T22:28:51.637Z
2023-10-11T22:28:51.637Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'}
CVE-2023-5849
Integer overflow in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
2023-10-30T22:11:15.745Z
2023-11-01T17:14:00.170Z
2023-11-01T17:14:00.170Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'}
CVE-2023-5263
A vulnerability was found in ZZZCMS 2.1.7 and classified as critical. Affected by this issue is the function restore of the file /admin/save.php of the component Database Backup File Handler. The manipulation leads to permission issues. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240872.
https://vuldb.com/?id.240872
2023-09-29T05:25:13.272Z
2023-09-29T14:00:07.851Z
2023-10-24T19:48:43.349Z
{'Vendor': 'n/a', 'Product': 'ZZZCMS', 'Versions': '2.1.7'}
CVE-2023-5799
The WP Hotel Booking WordPress plugin before 2.0.8 does not have proper authorisation when deleting a package, allowing Contributor and above roles to delete posts that do no belong to them
https://wpscan.com/vulnerability/3061f85e-a70e-49e5-bccf-ae9240f51178
2023-10-26T09:30:44.726Z
2023-11-20T18:55:07.999Z
2023-11-20T18:55:07.999Z
{'Vendor': 'Unknown', 'Product': 'WP Hotel Booking', 'Versions': '0'}
CVE-2023-5633
The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges.
https://access.redhat.com/errata/RHSA-2024:0113
2023-10-18T08:39:18.720Z
2023-10-23T21:58:59.776Z
2024-01-25T20:45:43.818Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '6.6-rc6'}
CVE-2023-5326
A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component WebConfig. The manipulation leads to improper authentication. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241027.
https://vuldb.com/?id.241027
2023-10-01T12:10:13.678Z
2023-10-01T22:00:08.112Z
2023-10-25T05:09:09.735Z
{'Vendor': 'SATO', 'Product': 'CL4NX-J Plus', 'Versions': '1.13.2-u455_r2'}
CVE-2023-5776
The Post Meta Data Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.1. This is due to missing nonce validation on the pmdm_wp_ajax_delete_meta, pmdm_wp_delete_user_meta, and pmdm_wp_delete_user_meta functions. This makes it possible for unauthenticated attackers to delete arbitrary user, term, and post meta via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d49b8c44-4dad-4990-a8a8-116b424a7dfa?source=cve
2023-10-25T22:26:54.172Z
2023-11-21T08:32:47.939Z
2023-11-21T08:32:47.939Z
{'Vendor': 'gandhihitesh9', 'Product': 'Post Meta Data Manager', 'Versions': '*'}
CVE-2023-5058
Improper Input Validation in the processing of user-supplied splash screen during system boot in Phoenix SecureCore™ Technology™ 4 potentially allows denial-of-service attacks or arbitrary code execution.
https://www.phoenix.com/security-notifications/
2023-09-18T21:36:23.632Z
2023-12-07T22:29:05.717Z
2023-12-07T22:29:05.717Z
{'Vendor': 'Phoenix', 'Product': 'SecureCore™ Technology™ 4', 'Versions': '4.0'}
CVE-2023-5408
A privilege escalation flaw was found in the node restriction admission plugin of the kubernetes api server of OpenShift. A remote attacker who modifies the node role label could steer workloads from the control plane and etcd nodes onto different worker nodes and gain broader access to the cluster.
https://access.redhat.com/errata/RHSA-2023:5006
2023-10-04T17:58:23.775Z
2023-11-02T02:55:58.195Z
2024-01-23T01:23:58.385Z
{'Vendor': 'n/a', 'Product': 'kubernetes', 'Versions': ''}
CVE-2023-5664
The Garden Gnome Package plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ggpkg' shortcode in all versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This was partially patched in version 2.2.7 and fully patched in version 2.2.9.
https://www.wordfence.com/threat-intel/vulnerabilities/id/8c7385c7-47de-4511-b474-7415c3977aa8?source=cve
2023-10-19T16:09:31.734Z
2023-11-22T15:33:31.110Z
2023-11-22T15:33:31.110Z
{'Vendor': 'ggnomes', 'Product': 'Garden Gnome Package', 'Versions': '*'}
CVE-2023-5234
The Related Products for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'woo-related' shortcode in versions up to, and including, 3.3.15 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/a98498b8-9397-42e9-9c99-a576975c9ac9?source=cve
2023-09-27T15:51:20.070Z
2023-11-22T15:33:32.634Z
2023-11-22T15:33:32.634Z
{'Vendor': 'peachpay', 'Product': 'Related Products for WooCommerce', 'Versions': '*'}
CVE-2023-5721
It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an insufficient activation-delay. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1.
https://bugzilla.mozilla.org/show_bug.cgi?id=1830820
2023-10-23T17:22:03.993Z
2023-10-24T12:47:08.306Z
2023-10-24T21:06:47.252Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5371
RTPS dissector memory leak in Wireshark 4.0.0 to 4.0.8 and 3.6.0 to 3.6.16 allows denial of service via packet injection or crafted capture file
https://www.wireshark.org/security/wnpa-sec-2023-27.html
2023-10-04T03:01:36.569Z
2023-10-04T16:01:48.187Z
2023-10-04T16:01:48.187Z
{'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '4.0.0, 3.6.0'}
CVE-2023-5808
SMU versions prior to 14.8.7825.01 are susceptible to unintended information disclosure, through URL manipulation. Authenticated users in a Storage administrative role are able to access HNAS configuration backup and diagnostic data, that would normally be barred to that specific administrative role.
https://knowledge.hitachivantara.com/Security/System_Management_Unit_(SMU)_versions_prior_to_14.8.7825.01%2C_used_to_manage_Hitachi_Vantara_NAS_products_are_susceptible_to_unintended_information_disclosure_via_unprivileged_access_to_HNAS_configuration_backup_and_diagnostic_data.
2023-10-26T17:39:05.623Z
2023-12-04T23:53:33.743Z
2023-12-12T16:36:56.916Z
{'Vendor': 'Hitachi Vantara', 'Product': 'System Management Unit (SMU)', 'Versions': '6.0'}
CVE-2023-5222
A vulnerability classified as critical was found in Viessmann Vitogate 300 up to 2.1.3.0. This vulnerability affects the function isValidUser of the file /cgi-bin/vitogate.cgi of the component Web Management Interface. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240364. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.240364
2023-09-27T08:02:38.512Z
2023-09-27T13:31:06.216Z
2023-10-24T19:38:57.833Z
{'Vendor': 'Viessmann', 'Product': 'Vitogate 300', 'Versions': '2.1.0, 2.1.1, 2.1.2, 2.1.3'}
CVE-2023-5672
The WP Mail Log WordPress plugin before 1.1.3 does not properly validate file path parameters when attaching files to emails, leading to local file inclusion, and allowing an attacker to leak the contents of arbitrary files.
https://wpscan.com/vulnerability/7c1dff5b-bed3-49f8-96cc-1bc9abe78749
2023-10-20T00:25:27.900Z
2023-12-26T18:33:09.420Z
2023-12-26T18:33:09.420Z
{'Vendor': 'Unknown', 'Product': 'WP Mail Log', 'Versions': '0'}
CVE-2023-5367
A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.
https://access.redhat.com/errata/RHSA-2023:6802
2023-10-03T19:20:29.874Z
2023-10-25T19:46:58.494Z
2024-01-23T01:21:33.291Z
{'Vendor': 'n/a', 'Product': 'xorg-server', 'Versions': '21.1.9'}
CVE-2023-5737
The WordPress Backup & Migration WordPress plugin before 1.4.4 does not authorize some AJAX requests, allowing users with a role as low as Subscriber to update some plugin settings.
https://wpscan.com/vulnerability/c761c67c-eab8-4e1b-a332-c9a45e22bb13
2023-10-23T18:23:44.480Z
2023-11-27T16:22:02.521Z
2023-11-27T16:22:02.521Z
{'Vendor': 'Unknown', 'Product': 'WordPress Backup & Migration', 'Versions': '0'}
CVE-2023-5019
A vulnerability classified as critical was found in Tongda OA. This vulnerability affects unknown code of the file general/hr/manage/staff_reinstatement/delete.php. The manipulation of the argument REINSTATEMENT_ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-239860.
https://vuldb.com/?id.239860
2023-09-16T07:12:24.467Z
2023-09-17T04:00:06.950Z
2023-10-24T16:37:45.695Z
{'Vendor': 'Tongda', 'Product': 'OA', 'Versions': 'n/a'}
CVE-2023-5449
A potential security vulnerability has been identified in certain HP Displays supporting the Theft Deterrence feature which may allow a monitor’s Theft Deterrence to be deactivated.
https://support.hp.com/us-en/document/ish_9438665-9438794-16
2023-10-06T15:54:48.265Z
2023-10-13T16:23:12.704Z
2023-10-13T16:23:12.704Z
{'Vendor': 'HP Inc.', 'Product': 'HP Displays', 'Versions': 'See HP Security Bulletin reference for affected products.'}
CVE-2023-5625
A regression was introduced in the Red Hat build of python-eventlet due to a change in the patch application strategy, resulting in a patch for CVE-2021-21419 not being applied for all builds of all products.
https://access.redhat.com/errata/RHSA-2023:6128
2023-10-17T22:35:25.280Z
2023-11-01T13:28:10.190Z
2024-01-23T01:28:09.049Z
{'Vendor': 'n/a', 'Product': 'python-eventlet-0.30.2', 'Versions': '3.el8, 4.el9'}
CVE-2023-5275
Improper Input Validation vulnerability in simulation function of GX Works2 allows an attacker to cause a denial-of-service (DoS) condition on the function by sending specially crafted packets. However, the attacker would need to send the packets from within the same personal computer where the function is running.
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-015_en.pdf
2023-09-29T07:57:57.067Z
2023-11-21T03:46:55.339Z
2023-11-30T04:13:52.003Z
{'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'GX Works2', 'Versions': 'all versions'}
CVE-2023-5760
A time-of-check to time-of-use (TOCTOU) bug in handling of IOCTL (input/output control) requests. This TOCTOU bug leads to an out-of-bounds write vulnerability which can be further exploited, allowing an attacker to gain full local privilege escalation on the system.This issue affects Avast/Avg Antivirus: 23.8.
https://support.norton.com/sp/static/external/tools/security-advisories.html
2023-10-25T00:31:22.790Z
2023-11-08T16:36:29.217Z
2023-11-15T12:47:10.735Z
{'Vendor': 'Avast/AVG', 'Product': 'Avast/Avg Antivirus', 'Versions': ' 23.8'}
CVE-2023-5330
Mattermost fails to enforce a limit for the size of the cache entry for OpenGraph data allowing an attacker to send a specially crafted request to the /api/v4/opengraph filling the cache and turning the server unavailable.
https://mattermost.com/security-updates
2023-10-02T10:48:43.542Z
2023-10-09T10:38:39.415Z
2023-10-09T10:38:39.415Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.11, 8.0.3, 8.1.2'}
CVE-2023-5962
A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization.
https://www.moxa.com/en/support/product-support/security-advisory/mpsa-235250-iologik-e1200-series-web-server-vulnerability
2023-11-06T07:47:33.243Z
2023-12-23T09:09:01.920Z
2023-12-23T09:09:01.920Z
{'Vendor': 'Moxa', 'Product': 'ioLogik E1200 Series', 'Versions': '1.0'}
CVE-2023-5061
An issue has been discovered in GitLab affecting all versions starting from 9.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. In certain situations, it may have been possible for developers to override predefined CI variables via the REST API.
https://gitlab.com/gitlab-org/gitlab/-/issues/425521
2023-09-19T07:30:36.245Z
2023-12-15T16:03:05.257Z
2023-12-15T16:03:05.257Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '9.3, 16.5, 16.6'}
CVE-2023-5431
The Left right image slideshow gallery plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/69902627-ce79-4a43-8949-43db6a9cc0dd?source=cve
2023-10-05T19:16:02.522Z
2023-10-31T08:32:51.725Z
2023-10-31T08:32:51.725Z
{'Vendor': 'gopiplus', 'Product': 'Left right image slideshow gallery', 'Versions': '*'}
CVE-2023-5574
A use-after-free flaw was found in xorg-x11-server-Xvfb. This issue occurs in Xvfb with a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode). If the pointer is warped from a screen 1 to a screen 0, a use-after-free issue may be triggered during shutdown or reset of the Xvfb server, allowing for possible escalation of privileges or denial of service.
https://access.redhat.com/security/cve/CVE-2023-5574
2023-10-13T11:35:44.857Z
2023-10-25T19:47:03.122Z
2024-01-23T01:27:02.375Z
{'Vendor': 'n/a', 'Product': 'xorg-server', 'Versions': '21.1.9'}
CVE-2023-5827
A vulnerability was found in Shanghai CTI Navigation CTI Monitoring and Early Warning System 2.2. It has been classified as critical. This affects an unknown part of the file /Web/SysManage/UserEdit.aspx. The manipulation of the argument ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-243717 was assigned to this vulnerability.
https://vuldb.com/?id.243717
2023-10-27T10:48:15.318Z
2023-10-27T17:31:05.656Z
2023-10-27T17:31:05.656Z
{'Vendor': 'Shanghai CTI Navigation', 'Product': 'CTI Monitoring and Early Warning System', 'Versions': '2.2'}
CVE-2023-5718
The Vue.js Devtools extension was found to leak screenshot data back to a malicious web page via the standard `postMessage()` API. By creating a malicious web page with an iFrame targeting a sensitive resource (i.e. a locally accessible file or sensitive website), and registering a listener on the web page, the extension sent messages back to the listener, containing the base64 encoded screenshot data of the sensitive resource.
https://gist.github.com/CalumHutton/bdb97077a66021ed455f87823cd7c7cb
2023-10-23T13:48:05.531Z
2023-10-23T14:02:43.544Z
2023-10-23T14:04:21.011Z
{'Vendor': 'Vue.js', 'Product': 'Vue.js devtools', 'Versions': '< 6.5.1'}
CVE-2023-5348
The Product Catalog Mode For WooCommerce WordPress plugin before 5.0.3 does not properly authorize settings updates or escape settings values, leading to stored XSS by unauthenticated users.
https://wpscan.com/vulnerability/b37b09c1-1b53-471c-9b10-7d2d05ae11f1
2023-10-03T10:02:33.963Z
2023-12-18T20:07:59.959Z
2023-12-18T20:07:59.959Z
{'Vendor': 'Unknown', 'Product': 'Product Catalog Mode For WooCommerce', 'Versions': '0'}
CVE-2023-5466
The Wp anything slider plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/535e754e-f851-4809-a148-d9ba808b9d8a?source=cve
2023-10-09T15:47:17.216Z
2023-11-22T15:33:24.767Z
2023-11-22T15:33:24.767Z
{'Vendor': 'gopi_plus', 'Product': 'Wp anything slider', 'Versions': '*'}
CVE-2023-5036
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.15.1.
https://huntr.dev/bounties/46881df7-eb41-4ce2-a78f-82de9bc4fc2d
2023-09-18T05:46:34.513Z
2023-09-18T05:46:44.541Z
2023-09-18T05:46:44.541Z
{'Vendor': 'usememos', 'Product': 'usememos/memos', 'Versions': 'unspecified'}
CVE-2023-5870
A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack.
https://access.redhat.com/errata/RHSA-2023:7545
2023-10-31T03:56:58.366Z
2023-12-10T17:58:30.213Z
2024-01-25T20:06:33.517Z
{'Vendor': 'n/a', 'Product': 'PostgreSQL', 'Versions': '16.1, 15.5, 14.10, 13.13, 12.17, 11.22'}
CVE-2023-5523
Execution of downloaded content flaw in M-Files Web Companion before release version 23.10 and LTS Service Release Versions before 23.8 LTS SR1 allows Remote Code Execution 
https://www.m-files.com/about/trust-center/security-advisories/cve-2023-5523/
2023-10-11T13:17:44.566Z
2023-10-20T06:40:29.555Z
2023-10-20T06:40:29.555Z
{'Vendor': 'M-Files', 'Product': 'Web Companion', 'Versions': '23.3, 23.8 LTS SR1'}
CVE-2023-5173
In a non-standard configuration of Firefox, an integer overflow could have occurred based on network traffic (possibly under influence of a local unprivileged webpage), leading to an out-of-bounds write to privileged process memory. *This bug only affects Firefox if a non-standard preference allowing non-HTTPS Alternate Services (`network.http.altsvc.oe`) is enabled.* This vulnerability affects Firefox < 118.
https://bugzilla.mozilla.org/show_bug.cgi?id=1823172
2023-09-25T15:03:43.198Z
2023-09-27T14:13:51.511Z
2023-09-27T14:13:51.511Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5489
A vulnerability classified as critical has been found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928. This affects an unknown part of the file /Tool/uploadfile.php. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-241641 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.241641
2023-10-10T07:19:12.774Z
2023-10-10T14:31:05.075Z
2023-10-10T14:31:05.075Z
{'Vendor': 'Beijing Baichuo', 'Product': 'Smart S45F Multi-Service Secure Gateway Intelligent Management Platform', 'Versions': '20230928'}
CVE-2023-5923
A vulnerability classified as critical has been found in Campcodes Simple Student Information System 1.0. This affects an unknown part of the file /admin/index.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-244323.
https://vuldb.com/?id.244323
2023-11-02T13:00:26.096Z
2023-11-02T18:00:11.560Z
2023-11-02T18:00:11.560Z
{'Vendor': 'Campcodes', 'Product': 'Simple Student Information System', 'Versions': '1.0'}
CVE-2023-5889
Insufficient Session Expiration in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
https://huntr.com/bounties/fba2991a-1b8a-4c89-9689-d708526928e1
2023-11-01T00:00:06.287Z
2023-11-01T00:00:18.857Z
2023-11-01T00:00:18.857Z
{'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'}
CVE-2023-5020
A vulnerability, which was classified as critical, has been found in 07FLY CRM V2. This issue affects some unknown processing of the file /index.php/sysmanage/Login/login_auth/ of the component Administrator Login Page. The manipulation of the argument account leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239861 was assigned to this vulnerability.
https://vuldb.com/?id.239861
2023-09-16T07:14:43.416Z
2023-09-17T04:31:04.139Z
2023-10-24T16:38:58.877Z
{'Vendor': '07FLY', 'Product': 'CRM', 'Versions': 'V2'}
CVE-2023-5470
The Etsy Shop plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'etsy-shop' shortcode in versions up to, and including, 3.0.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e4696f7a-8b87-4376-b4c9-596eca30b38c?source=cve
2023-10-09T16:01:15.887Z
2023-10-12T06:38:29.925Z
2023-10-12T06:38:29.925Z
{'Vendor': 'fsheedy', 'Product': 'Etsy Shop', 'Versions': '*'}
CVE-2023-5165
Docker Desktop before 4.23.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions via the debug shell which remains accessible for a short time window after launching Docker Desktop. The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges. This issue has been fixed in Docker Desktop 4.23.0. Affected Docker Desktop versions: from 4.13.0 before 4.23.0.
https://docs.docker.com/desktop/release-notes/#4230
2023-09-25T14:05:45.905Z
2023-09-25T15:29:12.869Z
2023-09-25T15:29:12.869Z
{'Vendor': 'Docker Inc.', 'Product': 'Docker Desktop', 'Versions': '4.13.0'}
CVE-2023-5535
Use After Free in GitHub repository vim/vim prior to v9.0.2010.
https://huntr.dev/bounties/2c2d85a7-1171-4014-bf7f-a2451745861f
2023-10-11T19:12:10.998Z
2023-10-11T19:12:21.957Z
2023-10-11T19:12:21.957Z
{'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'}
CVE-2023-5866
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository thorsten/phpmyfaq prior to 3.2.1.
https://huntr.com/bounties/ec44bcba-ae7f-497a-851e-8165ecf56945
2023-10-31T00:00:37.064Z
2023-10-31T00:00:42.138Z
2023-10-31T00:00:42.138Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-5759
In Helix Core versions prior to 2023.2, an unauthenticated remote Denial of Service (DoS) via the buffer was identified. Reported by Jason Geffner.  
https://perforce.com
2023-10-24T21:49:40.705Z
2023-11-08T15:48:18.816Z
2024-01-04T17:18:40.109Z
{'Vendor': 'Helix', 'Product': 'Helix Core', 'Versions': '0.0.0, 0.0.0, 0.0.0, 0.0.0, 0.0.0'}
CVE-2023-5309
Versions of Puppet Enterprise prior to 2021.7.6 and 2023.5 contain a flaw which results in broken session management for SAML implementations.
https://www.puppet.com/security/cve/cve-2023-5309-broken-session-management-puppet-enterprise
2023-09-29T18:16:55.826Z
2023-11-07T19:01:05.041Z
2023-11-07T19:01:17.138Z
{'Vendor': 'Puppet', 'Product': 'Puppet Enterprise', 'Versions': '2021.7.0, 2023.0.0'}
CVE-2023-5427
Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r44p0 through r45p0; Valhall GPU Kernel Driver: from r44p0 through r45p0; Arm 5th Gen GPU Architecture Kernel Driver: from r44p0 through r45p0.
https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities
2023-10-05T19:12:49.840Z
2023-12-01T10:13:49.299Z
2023-12-03T21:59:38.184Z
{'Vendor': 'Arm Ltd', 'Product': 'Bifrost GPU Kernel Driver', 'Versions': 'r44p0'}
CVE-2023-5077
The Vault and Vault Enterprise ("Vault") Google Cloud secrets engine did not preserve existing Google Cloud IAM Conditions upon creating or updating rolesets. Fixed in Vault 1.13.0.
https://discuss.hashicorp.com/t/hcsec-2023-30-vault-s-google-cloud-secrets-engine-removed-existing-iam-conditions-when-creating-updating-rolesets/58654
2023-09-19T20:49:08.136Z
2023-09-28T23:24:28.643Z
2023-09-28T23:24:28.643Z
{'Vendor': 'HashiCorp', 'Product': 'Vault', 'Versions': '0.10.0'}
CVE-2023-5974
The WPB Show Core WordPress plugin through 2.2 is vulnerable to server-side request forgery (SSRF) via the `path` parameter.
https://wpscan.com/vulnerability/c0136057-f420-4fe7-a147-ecbec7e7a9b5
2023-11-06T21:00:42.926Z
2023-11-27T16:22:02.863Z
2023-11-27T16:22:02.863Z
{'Vendor': 'Unknown', 'Product': 'wpb-show-core', 'Versions': '0'}
CVE-2023-5831
An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.0 before 16.3.6, all versions starting from 16.4 before 16.4.2, and all versions starting from 16.5.0 before 16.5.1 which have the `super_sidebar_logged_out` feature flag enabled. Affected versions with this default-disabled feature flag enabled may unintentionally disclose GitLab version metadata to unauthorized actors.
https://gitlab.com/gitlab-org/gitlab/-/issues/428919
2023-10-27T17:01:12.454Z
2023-11-06T10:30:28.442Z
2023-11-06T10:30:28.442Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.0, 16.4, 16.5'}
CVE-2023-5562
An unsafe default configuration in KNIME Analytics Platform before 5.2.0 allows for a cross-site scripting attack. When KNIME Analytics Platform is used as an executor for either KNIME Server or KNIME Business Hub several JavaScript-based view nodes do not sanitize the data that is displayed by default. If the data to be displayed contains JavaScript this code is executed in the browser and can perform any operations that the current user is allowed to perform silently. KNIME Analytics Platform already has configuration options with which sanitization of data can be actived, see https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal . However, these are off by default which allows for cross-site scripting attacks. KNIME Analytics Platform 5.2.0 will enable sanitization by default. For all previous releases we recommend users to add the corresponding settings to the executor's knime.ini.
https://www.knime.com/security/advisories#CVE-2023-5562
2023-10-12T18:31:19.504Z
2023-10-12T19:00:54.732Z
2023-10-12T19:00:54.732Z
{'Vendor': 'KNIME', 'Product': 'KNIME Analytics Platform', 'Versions': '0'}
CVE-2023-5098
The Campaign Monitor Forms by Optin Cat WordPress plugin before 2.5.6 does not prevent users with low privileges (like subscribers) from overwriting any options on a site with the string "true", which could lead to a variety of outcomes, including DoS.
https://wpscan.com/vulnerability/3167a83c-291e-4372-a42e-d842205ba722
2023-09-20T19:24:32.385Z
2023-10-31T13:54:44.176Z
2023-10-31T13:54:44.176Z
{'Vendor': 'Unknown', 'Product': 'Campaign Monitor Forms by Optin Cat', 'Versions': '0'}
CVE-2023-5132
The Soisy Pagamento Rateale plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the parseRemoteRequest function in versions up to, and including, 6.0.1. This makes it possible for unauthenticated attackers with knowledge of an existing WooCommerce Order ID to expose sensitive WooCommerce order information (e.g., Name, Address, Email Address, and other order metadata).
https://www.wordfence.com/threat-intel/vulnerabilities/id/d3c997cd-37b4-4b9c-b99e-397be484aa36?source=cve
2023-09-22T16:20:49.833Z
2023-10-21T01:53:41.144Z
2023-10-21T01:53:41.144Z
{'Vendor': 'soisytech', 'Product': 'Soisy Pagamento Rateale', 'Versions': '*'}
CVE-2023-5519
The EventPrime WordPress plugin before 3.2.0 does not have CSRF checks when creating bookings, which could allow attackers to make logged in users create unwanted bookings via CSRF attacks.
https://wpscan.com/vulnerability/ce564628-3d15-4bc5-8b8e-60b71786ac19
2023-10-11T08:04:13.825Z
2023-10-31T13:54:44.499Z
2023-10-31T13:54:44.499Z
{'Vendor': 'Unknown', 'Product': 'EventPrime', 'Versions': '0'}
CVE-2023-5149
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 20151231. It has been rated as critical. This issue affects some unknown processing of the file /useratte/userattestation.php. The manipulation of the argument web_img leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240245 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
https://vuldb.com/?id.240245
2023-09-24T15:56:24.556Z
2023-09-25T01:00:09.724Z
2023-10-24T19:30:25.597Z
{'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'}
CVE-2023-5325
The Woocommerce Vietnam Checkout WordPress plugin before 2.0.6 does not escape the custom shipping phone field no the checkout form leading to XSS
https://wpscan.com/vulnerability/e93841ef-e113-41d3-9fa1-b21af85bd812
2023-10-01T09:26:31.768Z
2023-11-27T16:22:03.231Z
2023-11-27T16:22:03.231Z
{'Vendor': 'Unknown', 'Product': 'Woocommerce Vietnam Checkout', 'Versions': '0'}
CVE-2023-5260
A vulnerability, which was classified as critical, has been found in SourceCodester Simple Membership System 1.0. This issue affects some unknown processing of the file group_validator.php. The manipulation of the argument club_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240869 was assigned to this vulnerability.
https://vuldb.com/?id.240869
2023-09-29T05:18:25.916Z
2023-09-29T12:00:07.381Z
2023-10-24T19:45:03.865Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Membership System', 'Versions': '1.0'}
CVE-2023-5630
A CWE-494: Download of Code Without Integrity Check vulnerability exists that could allow a privileged user to install an untrusted firmware.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-346-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-346-01.pdf
2023-10-18T06:16:44.486Z
2023-12-14T04:49:38.476Z
2023-12-14T04:49:38.476Z
{'Vendor': 'Schneider Electric', 'Product': 'Trio Q-Series Ethernet Data Radio', 'Versions': 'All versions'}
CVE-2023-5958
The POST SMTP Mailer WordPress plugin before 2.7.1 does not escape email message content before displaying it in the backend, allowing an unauthenticated attacker to perform XSS attacks against highly privileged users.
https://wpscan.com/vulnerability/22fa478d-e42e-488d-9b4b-a8720dec7cee
2023-11-03T19:08:32.554Z
2023-11-27T16:22:03.963Z
2023-11-27T16:22:03.963Z
{'Vendor': 'Unknown', 'Product': 'POST SMTP Mailer', 'Versions': '0'}
CVE-2023-5722
Using iterative requests an attacker was able to learn the size of an opaque response, as well as the contents of a server-supplied Vary header. This vulnerability affects Firefox < 119.
https://bugzilla.mozilla.org/show_bug.cgi?id=1738426
2023-10-23T17:22:04.324Z
2023-10-24T12:47:09.118Z
2023-10-24T12:47:09.118Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5688
Cross-site Scripting (XSS) - DOM in GitHub repository modoboa/modoboa prior to 2.2.2.
https://huntr.com/bounties/0ceb10e4-952b-4ca4-baf8-5b6f12e3a8a7
2023-10-20T16:22:43.904Z
2023-10-20T16:22:46.873Z
2023-10-20T16:22:46.873Z
{'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'}