CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-5804 | A vulnerability was found in PHPGurukul Nipah Virus Testing Management System 1.0 and classified as critical. This issue affects some unknown processing of the file login.php. The manipulation of the argument username leads to sql injection. The attack may be initiated remotely. The identifier VDB-243617 was assigned to this vulnerability. | https://vuldb.com/?id.243617 | 2023-10-26T13:56:00.298Z | 2023-10-26T20:00:06.279Z | 2023-10-26T20:00:06.279Z | {'Vendor': 'PHPGurukul', 'Product': 'Nipah Virus Testing Management System', 'Versions': '1.0'} |
CVE-2023-5557 | A flaw was found in the tracker-miners package. A weakness in the sandbox allows a maliciously-crafted file to execute code outside the sandbox if the tracker-extract process has first been compromised by a separate vulnerability. | https://access.redhat.com/errata/RHSA-2023:7712 | 2023-10-12T14:29:58.509Z | 2023-10-13T01:41:45.366Z | 2024-01-23T01:25:49.381Z | {'Vendor': 'n/a', 'Product': 'tracker-miners', 'Versions': '3.3.2, 3.4.5, 3.5.3, 3.6.1'} |
CVE-2023-5279 | A vulnerability has been found in SourceCodester Engineers Online Portal 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file my_classmates.php. The manipulation of the argument teacher_class_student_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240907. | https://vuldb.com/?id.240907 | 2023-09-29T09:49:08.076Z | 2023-09-29T18:00:05.885Z | 2023-10-24T21:29:18.110Z | {'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'} |
CVE-2023-5783 | A vulnerability has been found in Tongda OA 2017 up to 11.9 and classified as critical. Affected by this vulnerability is an unknown functionality of the file general/system/approve_center/flow_sort/flow/delete.php. The manipulation of the argument id/sort_parent leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-243589 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.243589 | 2023-10-26T05:29:27.818Z | 2023-10-26T14:00:06.232Z | 2023-10-26T14:00:06.232Z | {'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'} |
CVE-2023-5629 |
A CWE-601:URL Redirection to Untrusted Site (‘Open Redirect’) vulnerability exists that could
cause disclosure of information through phishing attempts over HTTP.
| https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-346-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-346-01.pdf | 2023-10-18T06:12:46.648Z | 2023-12-14T04:42:32.540Z | 2023-12-14T04:42:32.540Z | {'Vendor': 'Schneider Electric', 'Product': 'Trio Q-Series Ethernet Data Radio', 'Versions': 'Versions prior to 2.7.0'} |
CVE-2023-5296 | A vulnerability was found in Xinhu RockOA 1.1/2.3.2/15.X3amdi and classified as problematic. Affected by this issue is some unknown functionality of the file api.php?m=reimplat&a=index of the component Password Handler. The manipulation leads to weak password recovery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-240926 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.240926 | 2023-09-29T14:27:36.046Z | 2023-09-29T21:31:04.441Z | 2023-10-25T04:54:31.430Z | {'Vendor': 'Xinhu', 'Product': 'RockOA', 'Versions': '1.1, 2.3.2, 15.X3amdi'} |
CVE-2023-5916 | A vulnerability classified as critical has been found in Lissy93 Dashy 2.1.1. This affects an unknown part of the file /config-manager/save of the component Configuration Handler. The manipulation of the argument config leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-244305 was assigned to this vulnerability. | https://vuldb.com/?id.244305 | 2023-11-02T05:39:07.124Z | 2023-11-02T10:31:06.228Z | 2023-11-02T10:31:06.228Z | {'Vendor': 'Lissy93', 'Product': 'Dashy', 'Versions': '2.1.1'} |
CVE-2023-5445 |
An open redirect vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2, allows a remote low privileged user to modify the URL parameter for the purpose of redirecting URL request(s) to a malicious site. This impacts the dashboard area of the user interface. A user would need to be logged into ePO to trigger this vulnerability. To exploit this the attacker must change the HTTP payload post submission, prior to it reaching the ePO server.
| https://kcm.trellix.com/corporate/index?page=content&id=SB10410 | 2023-10-06T07:58:14.595Z | 2023-11-17T10:01:36.927Z | 2023-11-17T10:01:36.927Z | {'Vendor': 'Trellix', 'Product': 'ePolicy Orchestrator', 'Versions': 'Prior to 5.10.0 SP1 UP2'} |
CVE-2023-5015 | A vulnerability was found in UCMS 1.4.7. It has been classified as problematic. Affected is an unknown function of the file ajax.php?do=strarraylist. The manipulation of the argument strdefault leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239856. | https://vuldb.com/?id.239856 | 2023-09-16T06:39:36.678Z | 2023-09-17T01:31:05.295Z | 2023-10-24T16:32:52.869Z | {'Vendor': 'n/a', 'Product': 'UCMS', 'Versions': '1.4.7'} |
CVE-2023-5500 | This vulnerability allows an remote attacker with low privileges to misuse Improper Control of Generation of Code ('Code Injection') to gain full control of the affected device. | https://cert.vde.com/en/advisories/VDE-2023-049/ | 2023-10-10T13:52:02.969Z | 2023-12-11T07:13:51.308Z | 2023-12-11T07:13:51.308Z | {'Vendor': 'Frauscher', 'Product': 'FDS102 for FAdC/FAdCi', 'Versions': '2.10.0'} |
CVE-2023-5150 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability classified as critical has been found in D-Link DAR-7000 and DAR-8000 up to 20151231. Affected is an unknown function of the file /useratte/web.php. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-240246 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. | https://vuldb.com/?id.240246 | 2023-09-24T15:56:28.630Z | 2023-09-25T01:31:04.725Z | 2023-10-24T19:31:38.774Z | {'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'} |
CVE-2023-5853 | Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html | 2023-10-30T22:11:16.627Z | 2023-11-01T17:14:01.484Z | 2023-11-01T17:14:01.484Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'} |
CVE-2023-5824 | Squid is vulnerable to Denial of Service attack against HTTP and HTTPS clients due to an Improper Handling of Structural Elements bug. | https://access.redhat.com/errata/RHSA-2023:7465 | 2023-10-27T09:37:47.593Z | 2023-11-03T07:56:36.369Z | 2024-01-25T20:01:48.895Z | {'Vendor': 'n/a', 'Product': 'squid', 'Versions': '6.4'} |
CVE-2023-5127 | The WP Font Awesome plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 1.7.9 due to insufficient input sanitization and output escaping on 'icon' user supplied attribute. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/59ee0b56-c11f-4951-aac0-8344200e4484?source=cve | 2023-09-22T15:44:06.480Z | 2023-10-24T13:52:58.747Z | 2023-10-24T13:52:58.747Z | {'Vendor': 'zayedbaloch', 'Product': 'WP Font Awesome', 'Versions': '*'} |
CVE-2023-5577 | The Bitly's plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wpbitly' shortcode in all versions up to, and including, 2.7.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/31522e54-f260-46d0-8d57-2d46af7d3450?source=cve | 2023-10-13T16:56:51.074Z | 2023-11-07T11:31:06.058Z | 2023-11-07T11:31:06.058Z | {'Vendor': 'bitlydeveloper', 'Product': 'Bitly's WordPress Plugin', 'Versions': '*'} |
CVE-2023-5062 | The WordPress Charts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'wp_charts' shortcode in versions up to, and including, 0.7.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/2de2d2c5-1373-45b6-93a0-575713226669?source=cve | 2023-09-19T14:23:49.810Z | 2023-09-20T02:31:41.145Z | 2023-09-20T02:31:41.145Z | {'Vendor': 'webfactory', 'Product': 'WordPress Charts', 'Versions': '*'} |
CVE-2023-5598 | Stored Cross-site Scripting (XSS) vulnerabilities affecting 3DSwym in 3DSwymer from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2023x allow an attacker to execute arbitrary script code. | https://www.3ds.com/vulnerability/advisories | 2023-10-16T08:52:28.948Z | 2023-11-21T09:29:05.310Z | 2023-11-29T09:25:56.435Z | {'Vendor': 'Dassault Systèmes', 'Product': '3DSwymer', 'Versions': 'Release 3DEXPERIENCE R2022x Golden, Release 3DEXPERIENCE R2023x Golden'} |
CVE-2023-5432 | The Jquery news ticker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'jquery-news-ticker' shortcode in versions up to, and including, 3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d22d9414-2df9-4528-a426-dce6e83f8d44?source=cve | 2023-10-05T19:16:27.282Z | 2023-12-19T03:30:30.598Z | 2023-12-19T03:30:30.598Z | {'Vendor': 'gopiplushotmailcom', 'Product': 'Jquery news ticker', 'Versions': '*'} |
CVE-2023-5961 | A Cross-Site Request Forgery (CSRF) vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. An attacker can exploit this vulnerability to trick a client into making an unintentional request to the web server, which will be treated as an authentic request. This vulnerability may lead an attacker to perform operations on behalf of the victimized user.
| https://www.moxa.com/en/support/product-support/security-advisory/mpsa-235250-iologik-e1200-series-web-server-vulnerability | 2023-11-06T07:47:31.237Z | 2023-12-23T09:01:02.875Z | 2023-12-23T09:01:02.875Z | {'Vendor': 'Moxa', 'Product': 'ioLogik E1200 Series', 'Versions': '1.0'} |
CVE-2023-5520 | Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2. | https://huntr.dev/bounties/681e42d0-18d4-4ebc-aba0-c5b0f77ac74a | 2023-10-11T11:55:58.015Z | 2023-10-11T11:56:06.789Z | 2023-10-11T11:56:06.789Z | {'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'} |
CVE-2023-5170 | In canvas rendering, a compromised content process could have caused a surface to change unexpectedly, leading to a memory leak of a privileged process. This memory leak could be used to effect a sandbox escape if the correct data was leaked. This vulnerability affects Firefox < 118. | https://bugzilla.mozilla.org/show_bug.cgi?id=1846686 | 2023-09-25T15:03:41.844Z | 2023-09-27T14:13:28.264Z | 2023-09-27T14:13:28.264Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-5873 | Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 11.1.0. | https://huntr.com/bounties/701cfc30-22a1-4c4b-9b2f-885c77c290ce | 2023-10-31T08:06:32.067Z | 2023-10-31T08:06:44.834Z | 2023-10-31T08:06:44.834Z | {'Vendor': 'pimcore', 'Product': 'pimcore/pimcore', 'Versions': 'unspecified'} |
CVE-2023-5465 | The Popup with fancybox plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 3.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c943cf0b-0e99-4d47-808d-2b803369d53a?source=cve | 2023-10-09T15:47:06.800Z | 2023-11-22T15:33:34.454Z | 2023-11-22T15:33:34.454Z | {'Vendor': 'gopiplushotmailcom', 'Product': 'Popup with fancybox', 'Versions': '*'} |
CVE-2023-5035 | A vulnerability has been identified in PT-G503 Series firmware versions prior to v5.2, where the Secure attribute for sensitive cookies in HTTPS sessions is not set, which could cause the cookie to be transmitted in plaintext over an HTTP session. The vulnerability may lead to security risks, potentially exposing user session data to unauthorized access and manipulation.
| https://www.moxa.com/en/support/product-support/security-advisory/mpsa-230203-pt-g503-series-multiple-vulnerabilities | 2023-09-18T05:24:28.222Z | 2023-11-02T16:11:13.854Z | 2023-11-02T16:11:13.854Z | {'Vendor': 'Moxa', 'Product': 'PT-G503 Series', 'Versions': '1.0'} |
CVE-2023-5259 | A vulnerability classified as problematic was found in ForU CMS. This vulnerability affects unknown code of the file /admin/cms_admin.php. The manipulation of the argument del leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The identifier of this vulnerability is VDB-240868. | https://vuldb.com/?id.240868 | 2023-09-29T05:16:04.313Z | 2023-09-29T11:31:05.823Z | 2023-10-24T19:43:50.656Z | {'Vendor': 'ForU', 'Product': 'CMS', 'Versions': 'n/a'} |
CVE-2023-5609 | The Seraphinite Accelerator WordPress plugin before 2.2.29 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/aac4bcc8-b826-4165-aed3-f422dd178692 | 2023-10-17T09:46:46.018Z | 2023-11-20T18:55:06.964Z | 2023-11-20T18:55:06.964Z | {'Vendor': 'Unknown', 'Product': 'Seraphinite Accelerator', 'Versions': '0'} |
CVE-2023-5865 | Insufficient Session Expiration in GitHub repository thorsten/phpmyfaq prior to 3.2.2. | https://huntr.com/bounties/4c4b7395-d9fd-4ca0-98d7-2e20c1249aff | 2023-10-31T00:00:36.972Z | 2023-10-31T00:00:40.896Z | 2023-10-31T00:00:40.896Z | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-5166 | Docker Desktop before 4.23.0 allows Access Token theft via a crafted extension icon URL.
This issue affects Docker Desktop: before 4.23.0.
| https://docs.docker.com/desktop/release-notes/#4230 | 2023-09-25T14:05:47.327Z | 2023-09-25T15:30:10.164Z | 2023-09-25T15:30:10.164Z | {'Vendor': 'Docker Inc.', 'Product': 'Docker Desktop', 'Versions': '0'} |
CVE-2023-5536 | A feature in LXD (LP#1829071), affects the default configuration of Ubuntu Server which allows privileged users in the lxd group to escalate their privilege to root without requiring a sudo password. | https://discourse.ubuntu.com/t/easy-multi-user-lxd-setup/26215/4 | 2023-10-11T21:19:39.035Z | 2023-12-12T01:51:08.849Z | 2023-12-12T01:51:08.849Z | {'Vendor': 'Canonical', 'Product': 'Ubuntu Server', 'Versions': '0'} |
CVE-2023-5023 | A vulnerability was found in Tongda OA 2017 and classified as critical. Affected by this issue is some unknown functionality of the file general/hr/manage/staff_relatives/delete.php. The manipulation of the argument RELATIVES_ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239864. | https://vuldb.com/?id.239864 | 2023-09-16T07:53:52.400Z | 2023-09-17T06:00:10.673Z | 2023-10-24T19:07:14.827Z | {'Vendor': 'Tongda', 'Product': 'OA', 'Versions': '2017'} |
CVE-2023-5473 | Use after free in Cast in Google Chrome prior to 118.0.5993.70 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html | 2023-10-10T00:12:39.875Z | 2023-10-11T22:28:54.314Z | 2023-10-11T22:28:54.314Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'} |
CVE-2023-5189 | A path traversal vulnerability exists in Ansible when extracting tarballs. An attacker could craft a malicious tarball so that when using the galaxy importer of Ansible Automation Hub, a symlink could be dropped on the disk, resulting in files being overwritten. | https://access.redhat.com/errata/RHSA-2023:7773 | 2023-09-26T05:27:24.004Z | 2023-11-14T22:57:00.584Z | 2024-01-23T01:07:37.296Z | {'Vendor': 'n/a', 'Product': 'automation_hub', 'Versions': ''} |
CVE-2023-5920 | Mattermost Desktop for MacOS fails to utilize the secure keyboard input functionality provided by macOS, allowing for other processes to read the keyboard input.
| https://mattermost.com/security-updates | 2023-11-02T08:29:11.115Z | 2023-11-02T08:34:30.659Z | 2023-11-02T08:34:30.659Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost Desktop', 'Versions': '0, 5.5.1'} |
CVE-2023-5561 | WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack | https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441 | 2023-10-12T17:42:19.461Z | 2023-10-16T19:39:10.424Z | 2023-11-08T18:23:17.512Z | {'Vendor': 'WordPress', 'Product': 'WordPress', 'Versions': '6.3.0, 6.2.0, 6.1.0, 6.0.0, 5.9.0, 5.8.0, 5.7.0, 5.6.0, 5.5.0, 5.4.0, 5.3.0, 5.2.0, 5.0.0, 4.9.0, 4.8.0, 4.7.0'} |
CVE-2023-5131 | A heap buffer-overflow exists in Delta Electronics ISPSoft. An anonymous attacker can exploit this vulnerability by enticing a user to open a specially crafted DVP file to achieve code execution.
| https://blog.exodusintel.com/2024/01/18/delta-electronics-ispsoft-heap-buffer-overflow/ | 2023-09-22T16:18:19.317Z | 2024-01-18T21:14:39.954Z | 2024-01-18T21:14:39.954Z | {'Vendor': 'Delta Electronics', 'Product': 'ISPSoft', 'Versions': '3.02.11'} |
CVE-2023-5998 | Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3.0-DEV. | https://huntr.com/bounties/ea02a231-b688-422b-a881-ef415bcf6113 | 2023-11-07T18:44:47.880Z | 2023-11-07T18:45:03.305Z | 2023-11-07T18:45:03.305Z | {'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'} |
CVE-2023-5832 | Improper Input Validation in GitHub repository mintplex-labs/anything-llm prior to 0.1.0. | https://huntr.com/bounties/afee3726-571f-416e-bba5-0828c815f5df | 2023-10-27T18:44:47.169Z | 2023-10-30T12:24:09.831Z | 2023-10-30T12:24:09.831Z | {'Vendor': 'mintplex-labs', 'Product': 'mintplex-labs/anything-llm', 'Versions': 'unspecified'} |
CVE-2023-5977 | null | null | 2023-11-07T00:15:54.215Z | null | 2023-11-13T23:42:23.793Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-5074 | Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28 | https://www.tenable.com/security/research/tra-2023-32 | 2023-09-19T19:03:25.470Z | 2023-09-20T15:32:44.451Z | 2023-09-20T15:32:44.451Z | {'Vendor': 'D-Link', 'Product': 'D-View 8', 'Versions': '2.0.1.28'} |
CVE-2023-5218 | Use after free in Site Isolation in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html | 2023-09-27T01:52:05.980Z | 2023-10-11T22:28:51.637Z | 2023-10-11T22:28:51.637Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'} |
CVE-2023-5849 | Integer overflow in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html | 2023-10-30T22:11:15.745Z | 2023-11-01T17:14:00.170Z | 2023-11-01T17:14:00.170Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'} |
CVE-2023-5263 | A vulnerability was found in ZZZCMS 2.1.7 and classified as critical. Affected by this issue is the function restore of the file /admin/save.php of the component Database Backup File Handler. The manipulation leads to permission issues. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240872. | https://vuldb.com/?id.240872 | 2023-09-29T05:25:13.272Z | 2023-09-29T14:00:07.851Z | 2023-10-24T19:48:43.349Z | {'Vendor': 'n/a', 'Product': 'ZZZCMS', 'Versions': '2.1.7'} |
CVE-2023-5799 | The WP Hotel Booking WordPress plugin before 2.0.8 does not have proper authorisation when deleting a package, allowing Contributor and above roles to delete posts that do no belong to them | https://wpscan.com/vulnerability/3061f85e-a70e-49e5-bccf-ae9240f51178 | 2023-10-26T09:30:44.726Z | 2023-11-20T18:55:07.999Z | 2023-11-20T18:55:07.999Z | {'Vendor': 'Unknown', 'Product': 'WP Hotel Booking', 'Versions': '0'} |
CVE-2023-5633 | The reference count changes made as part of the CVE-2023-33951 and CVE-2023-33952 fixes exposed a use-after-free flaw in the way memory objects were handled when they were being used to store a surface. When running inside a VMware guest with 3D acceleration enabled, a local, unprivileged user could potentially use this flaw to escalate their privileges. | https://access.redhat.com/errata/RHSA-2024:0113 | 2023-10-18T08:39:18.720Z | 2023-10-23T21:58:59.776Z | 2024-01-25T20:45:43.818Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '6.6-rc6'} |
CVE-2023-5326 | A vulnerability was found in SATO CL4NX-J Plus 1.13.2-u455_r2. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component WebConfig. The manipulation leads to improper authentication. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241027. | https://vuldb.com/?id.241027 | 2023-10-01T12:10:13.678Z | 2023-10-01T22:00:08.112Z | 2023-10-25T05:09:09.735Z | {'Vendor': 'SATO', 'Product': 'CL4NX-J Plus', 'Versions': '1.13.2-u455_r2'} |
CVE-2023-5776 | The Post Meta Data Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.1. This is due to missing nonce validation on the pmdm_wp_ajax_delete_meta, pmdm_wp_delete_user_meta, and pmdm_wp_delete_user_meta functions. This makes it possible for unauthenticated attackers to delete arbitrary user, term, and post meta via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d49b8c44-4dad-4990-a8a8-116b424a7dfa?source=cve | 2023-10-25T22:26:54.172Z | 2023-11-21T08:32:47.939Z | 2023-11-21T08:32:47.939Z | {'Vendor': 'gandhihitesh9', 'Product': 'Post Meta Data Manager', 'Versions': '*'} |
CVE-2023-5058 | Improper Input Validation in the processing of user-supplied splash screen during system boot in Phoenix SecureCore™ Technology™ 4 potentially allows denial-of-service attacks or arbitrary code execution. | https://www.phoenix.com/security-notifications/ | 2023-09-18T21:36:23.632Z | 2023-12-07T22:29:05.717Z | 2023-12-07T22:29:05.717Z | {'Vendor': 'Phoenix', 'Product': 'SecureCore™ Technology™ 4', 'Versions': '4.0'} |
CVE-2023-5408 | A privilege escalation flaw was found in the node restriction admission plugin of the kubernetes api server of OpenShift. A remote attacker who modifies the node role label could steer workloads from the control plane and etcd nodes onto different worker nodes and gain broader access to the cluster. | https://access.redhat.com/errata/RHSA-2023:5006 | 2023-10-04T17:58:23.775Z | 2023-11-02T02:55:58.195Z | 2024-01-23T01:23:58.385Z | {'Vendor': 'n/a', 'Product': 'kubernetes', 'Versions': ''} |
CVE-2023-5664 | The Garden Gnome Package plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ggpkg' shortcode in all versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This was partially patched in version 2.2.7 and fully patched in version 2.2.9. | https://www.wordfence.com/threat-intel/vulnerabilities/id/8c7385c7-47de-4511-b474-7415c3977aa8?source=cve | 2023-10-19T16:09:31.734Z | 2023-11-22T15:33:31.110Z | 2023-11-22T15:33:31.110Z | {'Vendor': 'ggnomes', 'Product': 'Garden Gnome Package', 'Versions': '*'} |
CVE-2023-5234 | The Related Products for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'woo-related' shortcode in versions up to, and including, 3.3.15 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/a98498b8-9397-42e9-9c99-a576975c9ac9?source=cve | 2023-09-27T15:51:20.070Z | 2023-11-22T15:33:32.634Z | 2023-11-22T15:33:32.634Z | {'Vendor': 'peachpay', 'Product': 'Related Products for WooCommerce', 'Versions': '*'} |
CVE-2023-5721 | It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an insufficient activation-delay. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1. | https://bugzilla.mozilla.org/show_bug.cgi?id=1830820 | 2023-10-23T17:22:03.993Z | 2023-10-24T12:47:08.306Z | 2023-10-24T21:06:47.252Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-5371 | RTPS dissector memory leak in Wireshark 4.0.0 to 4.0.8 and 3.6.0 to 3.6.16 allows denial of service via packet injection or crafted capture file | https://www.wireshark.org/security/wnpa-sec-2023-27.html | 2023-10-04T03:01:36.569Z | 2023-10-04T16:01:48.187Z | 2023-10-04T16:01:48.187Z | {'Vendor': 'Wireshark Foundation', 'Product': 'Wireshark', 'Versions': '4.0.0, 3.6.0'} |
CVE-2023-5808 | SMU versions prior to 14.8.7825.01 are susceptible to unintended information disclosure, through URL manipulation. Authenticated users in a Storage administrative role are able to access HNAS configuration backup and diagnostic data, that would normally be barred to that specific administrative role. | https://knowledge.hitachivantara.com/Security/System_Management_Unit_(SMU)_versions_prior_to_14.8.7825.01%2C_used_to_manage_Hitachi_Vantara_NAS_products_are_susceptible_to_unintended_information_disclosure_via_unprivileged_access_to_HNAS_configuration_backup_and_diagnostic_data. | 2023-10-26T17:39:05.623Z | 2023-12-04T23:53:33.743Z | 2023-12-12T16:36:56.916Z | {'Vendor': 'Hitachi Vantara', 'Product': 'System Management Unit (SMU)', 'Versions': '6.0'} |
CVE-2023-5222 | A vulnerability classified as critical was found in Viessmann Vitogate 300 up to 2.1.3.0. This vulnerability affects the function isValidUser of the file /cgi-bin/vitogate.cgi of the component Web Management Interface. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240364. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.240364 | 2023-09-27T08:02:38.512Z | 2023-09-27T13:31:06.216Z | 2023-10-24T19:38:57.833Z | {'Vendor': 'Viessmann', 'Product': 'Vitogate 300', 'Versions': '2.1.0, 2.1.1, 2.1.2, 2.1.3'} |
CVE-2023-5672 | The WP Mail Log WordPress plugin before 1.1.3 does not properly validate file path parameters when attaching files to emails, leading to local file inclusion, and allowing an attacker to leak the contents of arbitrary files. | https://wpscan.com/vulnerability/7c1dff5b-bed3-49f8-96cc-1bc9abe78749 | 2023-10-20T00:25:27.900Z | 2023-12-26T18:33:09.420Z | 2023-12-26T18:33:09.420Z | {'Vendor': 'Unknown', 'Product': 'WP Mail Log', 'Versions': '0'} |
CVE-2023-5367 | A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service. | https://access.redhat.com/errata/RHSA-2023:6802 | 2023-10-03T19:20:29.874Z | 2023-10-25T19:46:58.494Z | 2024-01-23T01:21:33.291Z | {'Vendor': 'n/a', 'Product': 'xorg-server', 'Versions': '21.1.9'} |
CVE-2023-5737 | The WordPress Backup & Migration WordPress plugin before 1.4.4 does not authorize some AJAX requests, allowing users with a role as low as Subscriber to update some plugin settings. | https://wpscan.com/vulnerability/c761c67c-eab8-4e1b-a332-c9a45e22bb13 | 2023-10-23T18:23:44.480Z | 2023-11-27T16:22:02.521Z | 2023-11-27T16:22:02.521Z | {'Vendor': 'Unknown', 'Product': 'WordPress Backup & Migration', 'Versions': '0'} |
CVE-2023-5019 | A vulnerability classified as critical was found in Tongda OA. This vulnerability affects unknown code of the file general/hr/manage/staff_reinstatement/delete.php. The manipulation of the argument REINSTATEMENT_ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-239860. | https://vuldb.com/?id.239860 | 2023-09-16T07:12:24.467Z | 2023-09-17T04:00:06.950Z | 2023-10-24T16:37:45.695Z | {'Vendor': 'Tongda', 'Product': 'OA', 'Versions': 'n/a'} |
CVE-2023-5449 | A potential security vulnerability has been identified in certain HP Displays supporting the Theft Deterrence feature which may allow a monitor’s Theft Deterrence to be deactivated. | https://support.hp.com/us-en/document/ish_9438665-9438794-16 | 2023-10-06T15:54:48.265Z | 2023-10-13T16:23:12.704Z | 2023-10-13T16:23:12.704Z | {'Vendor': 'HP Inc.', 'Product': 'HP Displays', 'Versions': 'See HP Security Bulletin reference for affected products.'} |
CVE-2023-5625 | A regression was introduced in the Red Hat build of python-eventlet due to a change in the patch application strategy, resulting in a patch for CVE-2021-21419 not being applied for all builds of all products. | https://access.redhat.com/errata/RHSA-2023:6128 | 2023-10-17T22:35:25.280Z | 2023-11-01T13:28:10.190Z | 2024-01-23T01:28:09.049Z | {'Vendor': 'n/a', 'Product': 'python-eventlet-0.30.2', 'Versions': '3.el8, 4.el9'} |
CVE-2023-5275 | Improper Input Validation vulnerability in simulation function of GX Works2 allows an attacker to cause a denial-of-service (DoS) condition on the function by sending specially crafted packets. However, the attacker would need to send the packets from within the same personal computer where the function is running.
| https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-015_en.pdf | 2023-09-29T07:57:57.067Z | 2023-11-21T03:46:55.339Z | 2023-11-30T04:13:52.003Z | {'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'GX Works2', 'Versions': 'all versions'} |
CVE-2023-5760 | A time-of-check to time-of-use (TOCTOU) bug in handling of IOCTL (input/output control) requests. This TOCTOU bug leads to an out-of-bounds write vulnerability which can be further exploited, allowing an attacker to gain full local privilege escalation on the system.This issue affects Avast/Avg Antivirus: 23.8.
| https://support.norton.com/sp/static/external/tools/security-advisories.html | 2023-10-25T00:31:22.790Z | 2023-11-08T16:36:29.217Z | 2023-11-15T12:47:10.735Z | {'Vendor': 'Avast/AVG', 'Product': 'Avast/Avg Antivirus', 'Versions': ' 23.8'} |
CVE-2023-5330 | Mattermost fails to enforce a limit for the size of the cache entry for OpenGraph data allowing an attacker to send a specially crafted request to the /api/v4/opengraph filling the cache and turning the server unavailable.
| https://mattermost.com/security-updates | 2023-10-02T10:48:43.542Z | 2023-10-09T10:38:39.415Z | 2023-10-09T10:38:39.415Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.11, 8.0.3, 8.1.2'} |
CVE-2023-5962 | A weak cryptographic algorithm vulnerability has been identified in ioLogik E1200 Series firmware versions v3.3 and prior. This vulnerability can help an attacker compromise the confidentiality of sensitive data. This vulnerability may lead an attacker to get unexpected authorization.
| https://www.moxa.com/en/support/product-support/security-advisory/mpsa-235250-iologik-e1200-series-web-server-vulnerability | 2023-11-06T07:47:33.243Z | 2023-12-23T09:09:01.920Z | 2023-12-23T09:09:01.920Z | {'Vendor': 'Moxa', 'Product': 'ioLogik E1200 Series', 'Versions': '1.0'} |
CVE-2023-5061 | An issue has been discovered in GitLab affecting all versions starting from 9.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. In certain situations, it may have been possible for developers to override predefined CI variables via the REST API. | https://gitlab.com/gitlab-org/gitlab/-/issues/425521 | 2023-09-19T07:30:36.245Z | 2023-12-15T16:03:05.257Z | 2023-12-15T16:03:05.257Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '9.3, 16.5, 16.6'} |
CVE-2023-5431 | The Left right image slideshow gallery plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/69902627-ce79-4a43-8949-43db6a9cc0dd?source=cve | 2023-10-05T19:16:02.522Z | 2023-10-31T08:32:51.725Z | 2023-10-31T08:32:51.725Z | {'Vendor': 'gopiplus', 'Product': 'Left right image slideshow gallery', 'Versions': '*'} |
CVE-2023-5574 | A use-after-free flaw was found in xorg-x11-server-Xvfb. This issue occurs in Xvfb with a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode). If the pointer is warped from a screen 1 to a screen 0, a use-after-free issue may be triggered during shutdown or reset of the Xvfb server, allowing for possible escalation of privileges or denial of service. | https://access.redhat.com/security/cve/CVE-2023-5574 | 2023-10-13T11:35:44.857Z | 2023-10-25T19:47:03.122Z | 2024-01-23T01:27:02.375Z | {'Vendor': 'n/a', 'Product': 'xorg-server', 'Versions': '21.1.9'} |
CVE-2023-5827 | A vulnerability was found in Shanghai CTI Navigation CTI Monitoring and Early Warning System 2.2. It has been classified as critical. This affects an unknown part of the file /Web/SysManage/UserEdit.aspx. The manipulation of the argument ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-243717 was assigned to this vulnerability. | https://vuldb.com/?id.243717 | 2023-10-27T10:48:15.318Z | 2023-10-27T17:31:05.656Z | 2023-10-27T17:31:05.656Z | {'Vendor': 'Shanghai CTI Navigation', 'Product': 'CTI Monitoring and Early Warning System', 'Versions': '2.2'} |
CVE-2023-5718 | The Vue.js Devtools extension was found to leak screenshot data back to a malicious web page via the standard `postMessage()` API. By creating a malicious web page with an iFrame targeting a sensitive resource (i.e. a locally accessible file or sensitive website), and registering a listener on the web page, the extension sent messages back to the listener, containing the base64 encoded screenshot data of the sensitive resource. | https://gist.github.com/CalumHutton/bdb97077a66021ed455f87823cd7c7cb | 2023-10-23T13:48:05.531Z | 2023-10-23T14:02:43.544Z | 2023-10-23T14:04:21.011Z | {'Vendor': 'Vue.js', 'Product': 'Vue.js devtools', 'Versions': '< 6.5.1'} |
CVE-2023-5348 | The Product Catalog Mode For WooCommerce WordPress plugin before 5.0.3 does not properly authorize settings updates or escape settings values, leading to stored XSS by unauthenticated users. | https://wpscan.com/vulnerability/b37b09c1-1b53-471c-9b10-7d2d05ae11f1 | 2023-10-03T10:02:33.963Z | 2023-12-18T20:07:59.959Z | 2023-12-18T20:07:59.959Z | {'Vendor': 'Unknown', 'Product': 'Product Catalog Mode For WooCommerce', 'Versions': '0'} |
CVE-2023-5466 | The Wp anything slider plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/535e754e-f851-4809-a148-d9ba808b9d8a?source=cve | 2023-10-09T15:47:17.216Z | 2023-11-22T15:33:24.767Z | 2023-11-22T15:33:24.767Z | {'Vendor': 'gopi_plus', 'Product': 'Wp anything slider', 'Versions': '*'} |
CVE-2023-5036 | Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos prior to 0.15.1. | https://huntr.dev/bounties/46881df7-eb41-4ce2-a78f-82de9bc4fc2d | 2023-09-18T05:46:34.513Z | 2023-09-18T05:46:44.541Z | 2023-09-18T05:46:44.541Z | {'Vendor': 'usememos', 'Product': 'usememos/memos', 'Versions': 'unspecified'} |
CVE-2023-5870 | A flaw was found in PostgreSQL involving the pg_cancel_backend role that signals background workers, including the logical replication launcher, autovacuum workers, and the autovacuum launcher. Successful exploitation requires a non-core extension with a less-resilient background worker and would affect that specific background worker only. This issue may allow a remote high privileged user to launch a denial of service (DoS) attack. | https://access.redhat.com/errata/RHSA-2023:7545 | 2023-10-31T03:56:58.366Z | 2023-12-10T17:58:30.213Z | 2024-01-25T20:06:33.517Z | {'Vendor': 'n/a', 'Product': 'PostgreSQL', 'Versions': '16.1, 15.5, 14.10, 13.13, 12.17, 11.22'} |
CVE-2023-5523 | Execution of downloaded content flaw in M-Files Web Companion before release version 23.10 and LTS Service Release Versions before 23.8 LTS SR1 allows
Remote Code Execution
| https://www.m-files.com/about/trust-center/security-advisories/cve-2023-5523/ | 2023-10-11T13:17:44.566Z | 2023-10-20T06:40:29.555Z | 2023-10-20T06:40:29.555Z | {'Vendor': 'M-Files', 'Product': 'Web Companion', 'Versions': '23.3, 23.8 LTS SR1'} |
CVE-2023-5173 | In a non-standard configuration of Firefox, an integer overflow could have occurred based on network traffic (possibly under influence of a local unprivileged webpage), leading to an out-of-bounds write to privileged process memory.
*This bug only affects Firefox if a non-standard preference allowing non-HTTPS Alternate Services (`network.http.altsvc.oe`) is enabled.* This vulnerability affects Firefox < 118. | https://bugzilla.mozilla.org/show_bug.cgi?id=1823172 | 2023-09-25T15:03:43.198Z | 2023-09-27T14:13:51.511Z | 2023-09-27T14:13:51.511Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-5489 | A vulnerability classified as critical has been found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928. This affects an unknown part of the file /Tool/uploadfile.php. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-241641 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.241641 | 2023-10-10T07:19:12.774Z | 2023-10-10T14:31:05.075Z | 2023-10-10T14:31:05.075Z | {'Vendor': 'Beijing Baichuo', 'Product': 'Smart S45F Multi-Service Secure Gateway Intelligent Management Platform', 'Versions': '20230928'} |
CVE-2023-5923 | A vulnerability classified as critical has been found in Campcodes Simple Student Information System 1.0. This affects an unknown part of the file /admin/index.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-244323. | https://vuldb.com/?id.244323 | 2023-11-02T13:00:26.096Z | 2023-11-02T18:00:11.560Z | 2023-11-02T18:00:11.560Z | {'Vendor': 'Campcodes', 'Product': 'Simple Student Information System', 'Versions': '1.0'} |
CVE-2023-5889 | Insufficient Session Expiration in GitHub repository pkp/pkp-lib prior to 3.3.0-16. | https://huntr.com/bounties/fba2991a-1b8a-4c89-9689-d708526928e1 | 2023-11-01T00:00:06.287Z | 2023-11-01T00:00:18.857Z | 2023-11-01T00:00:18.857Z | {'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'} |
CVE-2023-5020 | A vulnerability, which was classified as critical, has been found in 07FLY CRM V2. This issue affects some unknown processing of the file /index.php/sysmanage/Login/login_auth/ of the component Administrator Login Page. The manipulation of the argument account leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239861 was assigned to this vulnerability. | https://vuldb.com/?id.239861 | 2023-09-16T07:14:43.416Z | 2023-09-17T04:31:04.139Z | 2023-10-24T16:38:58.877Z | {'Vendor': '07FLY', 'Product': 'CRM', 'Versions': 'V2'} |
CVE-2023-5470 | The Etsy Shop plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'etsy-shop' shortcode in versions up to, and including, 3.0.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e4696f7a-8b87-4376-b4c9-596eca30b38c?source=cve | 2023-10-09T16:01:15.887Z | 2023-10-12T06:38:29.925Z | 2023-10-12T06:38:29.925Z | {'Vendor': 'fsheedy', 'Product': 'Etsy Shop', 'Versions': '*'} |
CVE-2023-5165 | Docker Desktop before 4.23.0 allows an unprivileged user to bypass Enhanced Container Isolation (ECI) restrictions via the debug shell which remains accessible for a short time window after launching Docker Desktop. The affected functionality is available for Docker Business customers only and assumes an environment where users are not granted local root or Administrator privileges.
This issue has been fixed in Docker Desktop 4.23.0.
Affected Docker Desktop versions: from 4.13.0 before 4.23.0.
| https://docs.docker.com/desktop/release-notes/#4230 | 2023-09-25T14:05:45.905Z | 2023-09-25T15:29:12.869Z | 2023-09-25T15:29:12.869Z | {'Vendor': 'Docker Inc.', 'Product': 'Docker Desktop', 'Versions': '4.13.0'} |
CVE-2023-5535 | Use After Free in GitHub repository vim/vim prior to v9.0.2010. | https://huntr.dev/bounties/2c2d85a7-1171-4014-bf7f-a2451745861f | 2023-10-11T19:12:10.998Z | 2023-10-11T19:12:21.957Z | 2023-10-11T19:12:21.957Z | {'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'} |
CVE-2023-5866 | Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in GitHub repository thorsten/phpmyfaq prior to 3.2.1. | https://huntr.com/bounties/ec44bcba-ae7f-497a-851e-8165ecf56945 | 2023-10-31T00:00:37.064Z | 2023-10-31T00:00:42.138Z | 2023-10-31T00:00:42.138Z | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-5759 | In Helix Core versions prior to 2023.2, an unauthenticated remote Denial of Service (DoS) via the buffer was identified. Reported by Jason Geffner.
| https://perforce.com | 2023-10-24T21:49:40.705Z | 2023-11-08T15:48:18.816Z | 2024-01-04T17:18:40.109Z | {'Vendor': 'Helix', 'Product': 'Helix Core', 'Versions': '0.0.0, 0.0.0, 0.0.0, 0.0.0, 0.0.0'} |
CVE-2023-5309 | Versions of Puppet Enterprise prior to 2021.7.6 and 2023.5 contain a flaw which results in broken session management for SAML implementations.
| https://www.puppet.com/security/cve/cve-2023-5309-broken-session-management-puppet-enterprise | 2023-09-29T18:16:55.826Z | 2023-11-07T19:01:05.041Z | 2023-11-07T19:01:17.138Z | {'Vendor': 'Puppet', 'Product': 'Puppet Enterprise', 'Versions': '2021.7.0, 2023.0.0'} |
CVE-2023-5427 | Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r44p0 through r45p0; Valhall GPU Kernel Driver: from r44p0 through r45p0; Arm 5th Gen GPU Architecture Kernel Driver: from r44p0 through r45p0.
| https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities | 2023-10-05T19:12:49.840Z | 2023-12-01T10:13:49.299Z | 2023-12-03T21:59:38.184Z | {'Vendor': 'Arm Ltd', 'Product': 'Bifrost GPU Kernel Driver', 'Versions': 'r44p0'} |
CVE-2023-5077 | The Vault and Vault Enterprise ("Vault") Google Cloud secrets engine did not preserve existing Google Cloud IAM Conditions upon creating or updating rolesets. Fixed in Vault 1.13.0. | https://discuss.hashicorp.com/t/hcsec-2023-30-vault-s-google-cloud-secrets-engine-removed-existing-iam-conditions-when-creating-updating-rolesets/58654 | 2023-09-19T20:49:08.136Z | 2023-09-28T23:24:28.643Z | 2023-09-28T23:24:28.643Z | {'Vendor': 'HashiCorp', 'Product': 'Vault', 'Versions': '0.10.0'} |
CVE-2023-5974 | The WPB Show Core WordPress plugin through 2.2 is vulnerable to server-side request forgery (SSRF) via the `path` parameter. | https://wpscan.com/vulnerability/c0136057-f420-4fe7-a147-ecbec7e7a9b5 | 2023-11-06T21:00:42.926Z | 2023-11-27T16:22:02.863Z | 2023-11-27T16:22:02.863Z | {'Vendor': 'Unknown', 'Product': 'wpb-show-core', 'Versions': '0'} |
CVE-2023-5831 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.0 before 16.3.6, all versions starting from 16.4 before 16.4.2, and all versions starting from 16.5.0 before 16.5.1 which have the `super_sidebar_logged_out` feature flag enabled. Affected versions with this default-disabled feature flag enabled may unintentionally disclose GitLab version metadata to unauthorized actors. | https://gitlab.com/gitlab-org/gitlab/-/issues/428919 | 2023-10-27T17:01:12.454Z | 2023-11-06T10:30:28.442Z | 2023-11-06T10:30:28.442Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.0, 16.4, 16.5'} |
CVE-2023-5562 | An unsafe default configuration in KNIME Analytics Platform before 5.2.0 allows for a cross-site scripting attack. When KNIME Analytics Platform is used as an executor for either KNIME Server or KNIME Business Hub several JavaScript-based view nodes do not sanitize the data that is displayed by default. If the data to be displayed contains JavaScript this code is executed in the browser and can perform any operations that the current user is allowed to perform silently.
KNIME Analytics Platform already has configuration options with which sanitization of data can be actived, see https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal https://docs.knime.com/latest/webportal_admin_guide/index.html#html-sanitization-webportal . However, these are off by default which allows for cross-site scripting attacks.
KNIME Analytics Platform 5.2.0 will enable sanitization by default. For all previous releases we recommend users to add the corresponding settings to the executor's knime.ini.
| https://www.knime.com/security/advisories#CVE-2023-5562 | 2023-10-12T18:31:19.504Z | 2023-10-12T19:00:54.732Z | 2023-10-12T19:00:54.732Z | {'Vendor': 'KNIME', 'Product': 'KNIME Analytics Platform', 'Versions': '0'} |
CVE-2023-5098 | The Campaign Monitor Forms by Optin Cat WordPress plugin before 2.5.6 does not prevent users with low privileges (like subscribers) from overwriting any options on a site with the string "true", which could lead to a variety of outcomes, including DoS. | https://wpscan.com/vulnerability/3167a83c-291e-4372-a42e-d842205ba722 | 2023-09-20T19:24:32.385Z | 2023-10-31T13:54:44.176Z | 2023-10-31T13:54:44.176Z | {'Vendor': 'Unknown', 'Product': 'Campaign Monitor Forms by Optin Cat', 'Versions': '0'} |
CVE-2023-5132 | The Soisy Pagamento Rateale plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the parseRemoteRequest function in versions up to, and including, 6.0.1. This makes it possible for unauthenticated attackers with knowledge of an existing WooCommerce Order ID to expose sensitive WooCommerce order information (e.g., Name, Address, Email Address, and other order metadata). | https://www.wordfence.com/threat-intel/vulnerabilities/id/d3c997cd-37b4-4b9c-b99e-397be484aa36?source=cve | 2023-09-22T16:20:49.833Z | 2023-10-21T01:53:41.144Z | 2023-10-21T01:53:41.144Z | {'Vendor': 'soisytech', 'Product': 'Soisy Pagamento Rateale', 'Versions': '*'} |
CVE-2023-5519 | The EventPrime WordPress plugin before 3.2.0 does not have CSRF checks when creating bookings, which could allow attackers to make logged in users create unwanted bookings via CSRF attacks. | https://wpscan.com/vulnerability/ce564628-3d15-4bc5-8b8e-60b71786ac19 | 2023-10-11T08:04:13.825Z | 2023-10-31T13:54:44.499Z | 2023-10-31T13:54:44.499Z | {'Vendor': 'Unknown', 'Product': 'EventPrime', 'Versions': '0'} |
CVE-2023-5149 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 20151231. It has been rated as critical. This issue affects some unknown processing of the file /useratte/userattestation.php. The manipulation of the argument web_img leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240245 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. | https://vuldb.com/?id.240245 | 2023-09-24T15:56:24.556Z | 2023-09-25T01:00:09.724Z | 2023-10-24T19:30:25.597Z | {'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'} |
CVE-2023-5325 | The Woocommerce Vietnam Checkout WordPress plugin before 2.0.6 does not escape the custom shipping phone field no the checkout form leading to XSS | https://wpscan.com/vulnerability/e93841ef-e113-41d3-9fa1-b21af85bd812 | 2023-10-01T09:26:31.768Z | 2023-11-27T16:22:03.231Z | 2023-11-27T16:22:03.231Z | {'Vendor': 'Unknown', 'Product': 'Woocommerce Vietnam Checkout', 'Versions': '0'} |
CVE-2023-5260 | A vulnerability, which was classified as critical, has been found in SourceCodester Simple Membership System 1.0. This issue affects some unknown processing of the file group_validator.php. The manipulation of the argument club_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240869 was assigned to this vulnerability. | https://vuldb.com/?id.240869 | 2023-09-29T05:18:25.916Z | 2023-09-29T12:00:07.381Z | 2023-10-24T19:45:03.865Z | {'Vendor': 'SourceCodester', 'Product': 'Simple Membership System', 'Versions': '1.0'} |
CVE-2023-5630 |
A CWE-494: Download of Code Without Integrity Check vulnerability exists that could allow a
privileged user to install an untrusted firmware.
| https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-346-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-346-01.pdf | 2023-10-18T06:16:44.486Z | 2023-12-14T04:49:38.476Z | 2023-12-14T04:49:38.476Z | {'Vendor': 'Schneider Electric', 'Product': 'Trio Q-Series Ethernet Data Radio', 'Versions': 'All versions'} |
CVE-2023-5958 | The POST SMTP Mailer WordPress plugin before 2.7.1 does not escape email message content before displaying it in the backend, allowing an unauthenticated attacker to perform XSS attacks against highly privileged users. | https://wpscan.com/vulnerability/22fa478d-e42e-488d-9b4b-a8720dec7cee | 2023-11-03T19:08:32.554Z | 2023-11-27T16:22:03.963Z | 2023-11-27T16:22:03.963Z | {'Vendor': 'Unknown', 'Product': 'POST SMTP Mailer', 'Versions': '0'} |
CVE-2023-5722 | Using iterative requests an attacker was able to learn the size of an opaque response, as well as the contents of a server-supplied Vary header. This vulnerability affects Firefox < 119. | https://bugzilla.mozilla.org/show_bug.cgi?id=1738426 | 2023-10-23T17:22:04.324Z | 2023-10-24T12:47:09.118Z | 2023-10-24T12:47:09.118Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-5688 | Cross-site Scripting (XSS) - DOM in GitHub repository modoboa/modoboa prior to 2.2.2. | https://huntr.com/bounties/0ceb10e4-952b-4ca4-baf8-5b6f12e3a8a7 | 2023-10-20T16:22:43.904Z | 2023-10-20T16:22:46.873Z | 2023-10-20T16:22:46.873Z | {'Vendor': 'modoboa', 'Product': 'modoboa/modoboa', 'Versions': 'unspecified'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.