CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-5667
The Tab Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/08220b23-d6fa-4005-bbbb-019412d328a5?source=cve
2023-10-19T16:11:24.367Z
2023-11-22T15:33:19.217Z
2023-11-22T15:33:19.217Z
{'Vendor': 'themepoints', 'Product': 'Tab Ultimate', 'Versions': '*'}
CVE-2023-5237
The Memberlite Shortcodes WordPress plugin before 1.3.9 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin.
https://wpscan.com/vulnerability/a46d686c-6234-4aa8-a656-00a65c55d0b0
2023-09-27T16:41:10.433Z
2023-10-31T13:54:44.838Z
2023-10-31T13:54:44.838Z
{'Vendor': 'Unknown', 'Product': 'Memberlite Shortcodes', 'Versions': '0'}
CVE-2023-5558
The LearnPress WordPress plugin before 4.2.5.5 does not sanitise and escape user input before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
https://wpscan.com/vulnerability/4efd2a4d-89bd-472f-ba5a-f9944fd4dd16/
2023-10-12T14:32:15.132Z
2024-01-16T15:54:33.473Z
2024-01-16T15:54:33.473Z
{'Vendor': 'Unknown', 'Product': 'LearnPress', 'Versions': '0'}
CVE-2023-5108
The Easy Newsletter Signups WordPress plugin through 1.0.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
https://wpscan.com/vulnerability/1b277929-e88b-4ab6-9190-526e75f5ce7a
2023-09-21T17:15:36.929Z
2023-12-04T21:29:21.316Z
2023-12-04T21:29:21.316Z
{'Vendor': 'Unknown', 'Product': 'Easy Newsletter Signups', 'Versions': '0'}
CVE-2023-5221
A vulnerability classified as critical has been found in ForU CMS. This affects an unknown part of the file /install/index.php. The manipulation of the argument db_name leads to code injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-240363. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.240363
2023-09-27T07:59:46.694Z
2023-09-27T13:31:05.111Z
2023-10-24T19:37:44.663Z
{'Vendor': 'ForU', 'Product': 'CMS', 'Versions': 'n/a'}
CVE-2023-5671
HP Print and Scan Doctor for Windows may potentially be vulnerable to escalation of privilege. HP is releasing software updates to mitigate the potential vulnerability.
https://support.hp.com/us-en/document/ish_9502679-9502704-16
2023-10-19T21:00:03.116Z
2023-10-25T17:11:05.225Z
2023-10-25T17:11:05.225Z
{'Vendor': 'HP Inc.', 'Product': 'HP Print and Scan Doctor for Windows', 'Versions': 'See HP Security Bulletin reference for affected versions.'}
CVE-2023-5919
A vulnerability was found in SourceCodester Company Website CMS 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /dashboard/createblog of the component Create Blog Page. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-244310 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.244310
2023-11-02T08:16:36.959Z
2023-11-02T13:31:06.780Z
2023-11-02T13:31:06.780Z
{'Vendor': 'SourceCodester', 'Product': 'Company Website CMS', 'Versions': '1.0'}
CVE-2023-5763
In Eclipse Glassfish 5 or 6, running with old versions of JDK (lower than 6u211, or < 7u201, or < 8u191), allows remote attackers to load malicious code on the server via access to insecure ORB listeners.
https://glassfish.org/docs/latest/security-guide.html#securing-glassfish-server
2023-10-25T04:59:21.006Z
2023-11-03T06:40:43.441Z
2023-11-03T06:40:43.441Z
{'Vendor': 'Eclipse Foundation', 'Product': 'Glassfish', 'Versions': '6.0.0, 5.0'}
CVE-2023-5299
A user with a standard account in Fuji Electric Tellus Lite may overwrite files in the system.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-325-02
2023-09-29T15:56:03.959Z
2023-11-22T00:41:18.654Z
2023-11-22T00:41:18.654Z
{'Vendor': 'Fuji Electric', 'Product': 'Tellus Lite V-Simulator', 'Versions': '0'}
CVE-2023-5333
Mattermost fails to deduplicate input IDs allowing a simple user to cause the application to consume excessive resources and possibly crash by sending a specially crafted request to /api/v4/users/ids with multiple identical IDs.
https://mattermost.com/security-updates
2023-10-02T12:25:25.552Z
2023-10-09T10:41:36.597Z
2023-10-09T10:41:36.597Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.11, 8.0.3, 8.1.2'}
CVE-2023-5626
Cross-Site Request Forgery (CSRF) in GitHub repository pkp/ojs prior to 3.3.0-16.
https://huntr.dev/bounties/c99279c1-709a-4e7b-a042-010c2bb44d6b
2023-10-17T23:22:31.262Z
2023-10-17T23:22:41.615Z
2023-10-17T23:22:41.615Z
{'Vendor': 'pkp', 'Product': 'pkp/ojs', 'Versions': 'unspecified'}
CVE-2023-5276
A vulnerability classified as critical was found in SourceCodester Engineers Online Portal 1.0. This vulnerability affects unknown code of the file downloadable_student.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-240904.
https://vuldb.com/?id.240904
2023-09-29T09:48:58.436Z
2023-09-29T17:00:07.390Z
2023-10-24T21:25:38.499Z
{'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'}
CVE-2023-5201
The OpenHook plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.3.0 via the 'php' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to execute code on the server. This requires the [php] shortcode setting to be enabled on the vulnerable site.
https://www.wordfence.com/threat-intel/vulnerabilities/id/37b9ed0e-5af2-47c1-b2da-8d103e4c31bf?source=cve
2023-09-26T13:05:01.712Z
2023-09-30T02:33:28.344Z
2023-09-30T02:33:28.344Z
{'Vendor': 'brazenlygeek', 'Product': 'OpenHook', 'Versions': '*'}
CVE-2023-5651
The WP Hotel Booking WordPress plugin before 2.0.8 does not have authorisation and CSRF checks, as well as does not ensure that the package to be deleted is a package, allowing any authenticated users, such as subscriber to delete arbitrary posts
https://wpscan.com/vulnerability/a365c050-96ae-4266-aa87-850ee259ee2c
2023-10-19T09:02:59.887Z
2023-11-20T18:55:08.790Z
2023-11-20T18:55:08.790Z
{'Vendor': 'Unknown', 'Product': 'WP Hotel Booking', 'Versions': '0'}
CVE-2023-5344
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969.
https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf
2023-10-02T19:20:20.807Z
2023-10-02T19:20:30.352Z
2023-10-02T19:20:30.352Z
{'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'}
CVE-2023-5714
The System Dashboard plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the sd_db_specs() function hooked via an AJAX action in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve data key specs.
https://www.wordfence.com/threat-intel/vulnerabilities/id/53b3ac83-847d-4bd0-a79b-531af266e1b4?source=cve
2023-10-23T00:44:29.567Z
2023-12-07T02:00:06.032Z
2023-12-07T02:00:06.032Z
{'Vendor': 'qriouslad', 'Product': 'System Dashboard', 'Versions': '*'}
CVE-2023-5981
A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
http://www.openwall.com/lists/oss-security/2024/01/19/3
2023-11-07T08:05:10.875Z
2023-11-28T11:49:50.138Z
2024-01-25T19:55:01.185Z
{'Vendor': 'n/a', 'Product': 'GnuTLS', 'Versions': '3.8.2'}
CVE-2023-5578
A vulnerability was found in Portábilis i-Educar up to 2.7.5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file \intranet\agenda_imprimir.php of the component HTTP GET Request Handler. The manipulation of the argument cod_agenda with the input ");'> <script>alert(document.cookie)</script> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-242143. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.242143
2023-10-13T18:52:07.052Z
2023-10-14T10:31:04.690Z
2023-10-14T10:31:04.690Z
{'Vendor': 'Portábilis', 'Product': 'i-Educar', 'Versions': '2.7.0, 2.7.1, 2.7.2, 2.7.3, 2.7.4, 2.7.5'}
CVE-2023-5082
The History Log by click5 WordPress plugin before 1.0.13 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by admin users when using the Smash Balloon Social Photo Feed plugin alongside it.
https://wpscan.com/vulnerability/13a196ba-49c7-4575-9a49-3ef9eb2348f3
2023-09-19T21:13:44.430Z
2023-11-06T20:40:37.134Z
2023-11-06T20:40:37.134Z
{'Vendor': 'Unknown', 'Product': 'History Log by click5', 'Versions': '0'}
CVE-2023-5128
The TCD Google Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'map' shortcode in versions up to, and including, 1.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/50f6d0aa-059d-48d9-873b-6404f288f002?source=cve
2023-09-22T15:45:06.036Z
2023-11-22T15:33:24.310Z
2023-11-22T15:33:24.310Z
{'Vendor': 'designplus', 'Product': 'TCD Google Maps', 'Versions': '*'}
CVE-2023-5606
The ChatBot for WordPress is vulnerable to Stored Cross-Site Scripting via the FAQ Builder in versions 4.8.6 through 4.9.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. NOTE: This vulnerability is a re-introduction of CVE-2023-4253.
https://www.wordfence.com/threat-intel/vulnerabilities/id/fc305c48-8337-42b7-ad61-61aea8018def?source=cve
2023-10-16T21:35:09.687Z
2023-11-02T08:31:43.007Z
2023-11-02T08:31:43.007Z
{'Vendor': 'quantumcloud', 'Product': 'AI ChatBot', 'Versions': '4.8.6'}
CVE-2023-5256
In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation. This vulnerability only affects sites with the JSON:API module enabled, and can be mitigated by uninstalling JSON:API. The core REST and contributed GraphQL modules are not affected.
https://www.drupal.org/sa-core-2023-006
2023-09-28T18:13:12.881Z
2023-09-28T18:17:43.128Z
2023-09-28T18:17:43.128Z
{'Vendor': 'Drupal', 'Product': 'Core', 'Versions': '10.1, 10.0, 9.5'}
CVE-2023-5743
The Telephone Number Linker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'telnumlink' shortcode in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/06424d9f-0064-4101-b819-688489a18eee?source=cve
2023-10-24T01:31:47.569Z
2023-11-07T11:01:43.518Z
2023-11-07T11:01:43.518Z
{'Vendor': 'stoatoffear', 'Product': 'Telephone Number Linker', 'Versions': '*'}
CVE-2023-5313
A vulnerability classified as problematic was found in phpkobo Ajax Poll Script 3.18. Affected by this vulnerability is an unknown functionality of the file ajax-poll.php of the component Poll Handler. The manipulation leads to improper enforcement of a single, unique action. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240949 was assigned to this vulnerability.
https://vuldb.com/?id.240949
2023-09-29T20:28:22.069Z
2023-09-30T15:00:04.962Z
2023-10-25T05:05:30.194Z
{'Vendor': 'phpkobo', 'Product': 'Ajax Poll Script', 'Versions': '3.18'}
CVE-2023-5939
The rtMedia for WordPress, BuddyPress and bbPress WordPress plugin before 4.6.16 loads the contents of the import file in an unsafe manner, leading to remote code execution by privileged users.
https://wpscan.com/vulnerability/db5d41fc-bcd3-414f-aa99-54d5537007bc
2023-11-02T17:10:45.825Z
2023-12-26T18:33:10.220Z
2023-12-26T18:33:10.220Z
{'Vendor': 'Unknown', 'Product': 'rtMedia for WordPress, BuddyPress and bbPress', 'Versions': '0'}
CVE-2023-5893
Cross-Site Request Forgery (CSRF) in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
https://huntr.com/bounties/a965aa16-79ce-4185-8f58-3d3b0d74a71e
2023-11-01T00:00:06.784Z
2023-11-01T00:00:18.533Z
2023-11-01T00:00:18.533Z
{'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'}
CVE-2023-5485
Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
2023-10-10T00:12:41.202Z
2023-10-11T22:28:53.651Z
2023-10-11T22:28:53.651Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'}
CVE-2023-5240
Improper access control in PAM propagation scripts in Devolutions Server 2023.2.8.0 and ealier allows an attack with permission to manage PAM propagation scripts to retrieve passwords stored in it via a GET request.
https://devolutions.net/security/advisories/DEVO-2023-0017
2023-09-27T18:43:43.331Z
2023-10-13T12:22:23.816Z
2023-10-13T12:22:23.816Z
{'Vendor': 'Devolutions', 'Product': 'Server', 'Versions': '0'}
CVE-2023-5610
The Seraphinite Accelerator WordPress plugin before 2.2.29 does not validate the URL to redirect any authenticated user to, leading to an arbitrary redirect
https://wpscan.com/vulnerability/e880a9fb-b089-4f98-9781-7d946f22777e
2023-10-17T09:47:14.378Z
2023-11-20T18:55:09.577Z
2023-11-20T18:55:09.577Z
{'Vendor': 'Unknown', 'Product': 'Seraphinite Accelerator', 'Versions': '0'}
CVE-2023-5305
A vulnerability was found in Online Banquet Booking System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /mail.php of the component Contact Us Page. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-240944.
https://vuldb.com/?id.240944
2023-09-29T16:25:06.516Z
2023-09-30T14:31:04.346Z
2023-10-25T05:04:17.013Z
{'Vendor': 'n/a', 'Product': 'Online Banquet Booking System', 'Versions': '1.0'}
CVE-2023-5186
Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html
2023-09-26T00:14:20.345Z
2023-09-28T15:23:18.607Z
2023-09-28T15:23:18.607Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '117.0.5938.132'}
CVE-2023-5885
The discontinued FFS Colibri product allows a remote user to access files on the system including files containing login credentials for other users.
https://www.cisa.gov/news-events/ics-advisories/ICSA-23-331-02
2023-10-31T17:12:11.313Z
2023-11-27T21:48:30.996Z
2023-11-27T21:48:30.996Z
{'Vendor': 'Franklin Electric Fueling Systems', 'Product': 'Colibri', 'Versions': 'all versions'}
CVE-2023-5539
A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers.
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79408
2023-10-11T23:11:25.576Z
2023-11-09T19:11:06.859Z
2023-11-09T19:11:06.859Z
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'}
CVE-2023-5169
A compromised content process could have provided malicious data in a `PathRecording` resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.
https://bugzilla.mozilla.org/show_bug.cgi?id=1846685
2023-09-25T15:03:41.394Z
2023-09-27T14:13:08.573Z
2023-09-27T14:13:08.573Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5493
A vulnerability has been found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /useratte/web.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-241645 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.241645
2023-10-10T07:19:24.962Z
2023-10-10T16:00:07.713Z
2023-10-10T16:00:07.713Z
{'Vendor': 'Beijing Baichuo', 'Product': 'Smart S45F Multi-Service Secure Gateway Intelligent Management Platform', 'Versions': '20230928'}
CVE-2023-5647
null
null
2023-10-18T21:00:03.669Z
2023-10-20T01:51:34.384Z
2024-01-23T22:29:39.643Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-5217
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html
2023-09-27T01:52:05.679Z
2023-09-28T15:23:18.340Z
2023-09-28T17:20:53.866Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '117.0.5938.132'}
CVE-2023-5702
A vulnerability was found in Viessmann Vitogate 300 up to 2.1.3.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /cgi-bin/. The manipulation leads to direct request. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243140. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.243140
2023-10-22T16:09:16.060Z
2023-10-23T00:31:04.073Z
2023-10-23T00:31:04.073Z
{'Vendor': 'Viessmann', 'Product': 'Vitogate 300', 'Versions': '2.1.0, 2.1.1, 2.1.2, 2.1.3'}
CVE-2023-5352
The Awesome Support WordPress plugin before 6.1.5 does not correctly authorize the wpas_edit_reply function, allowing users to edit posts for which they do not have permission.
https://wpscan.com/vulnerability/d32b2136-d923-4f36-bd76-af4578deb23b
2023-10-03T12:01:47.585Z
2023-11-06T20:40:54.117Z
2023-11-06T20:40:54.117Z
{'Vendor': 'Unknown', 'Product': 'Awesome Support', 'Versions': '0'}
CVE-2023-5978
In versions of FreeBSD 13-RELEASE before 13-RELEASE-p5, under certain circumstances the cap_net libcasper(3) service incorrectly validates that updated constraints are strictly subsets of the active constraints.  When only a list of resolvable domain names was specified without setting any other limitations, an application could submit a new list of domains including include entries not previously listed.  This could permit the application to resolve domain names that were previously restricted.
https://security.freebsd.org/advisories/FreeBSD-SA-23:16.cap_net.asc
2023-11-07T02:39:14.800Z
2023-11-08T08:52:46.920Z
2023-11-08T08:52:46.920Z
{'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '13.2-RELEASE'}
CVE-2023-5581
A vulnerability classified as problematic was found in SourceCodester Medicine Tracker System 1.0. This vulnerability affects unknown code of the file index.php. The manipulation of the argument page leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-242146 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.242146
2023-10-13T19:07:50.548Z
2023-10-14T12:31:04.178Z
2023-10-14T12:31:04.178Z
{'Vendor': 'SourceCodester', 'Product': 'Medicine Tracker System', 'Versions': '1.0'}
CVE-2023-5997
Use after free in Garbage Collection in Google Chrome prior to 119.0.6045.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html
2023-11-07T18:34:39.548Z
2023-11-15T17:19:43.599Z
2023-11-15T17:19:43.599Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.159'}
CVE-2023-5283
A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file teacher_signup.php. The manipulation of the argument firstname/lastname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240911.
https://vuldb.com/?id.240911
2023-09-29T09:49:22.885Z
2023-09-29T19:00:08.080Z
2023-10-24T21:34:10.871Z
{'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'}
CVE-2023-5329
A vulnerability classified as problematic was found in Field Logic DataCube4 up to 20231001. This vulnerability affects unknown code of the file /api/ of the component Web API. The manipulation leads to improper authentication. The exploit has been disclosed to the public and may be used. VDB-241030 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.241030
2023-10-01T16:14:07.712Z
2023-10-02T00:00:07.030Z
2023-10-25T05:12:49.414Z
{'Vendor': 'Field Logic', 'Product': 'DataCube4', 'Versions': '20231001'}
CVE-2023-5796
A vulnerability was found in CodeAstro POS System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /setting of the component Logo Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-243602 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.243602
2023-10-26T07:32:25.905Z
2023-10-26T17:31:05.052Z
2023-10-26T17:31:05.052Z
{'Vendor': 'CodeAstro', 'Product': 'POS System', 'Versions': '1.0'}
CVE-2023-5145
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in D-Link DAR-7000 up to 20151231 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /sysmanage/licence.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240241 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
https://vuldb.com/?id.240241
2023-09-24T15:56:10.716Z
2023-09-24T23:31:05.183Z
2023-10-24T19:25:32.951Z
{'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'}
CVE-2023-5515
The responses for web queries with certain parameters disclose internal path of resources. This information can be used to learn internal structure of the application and to further plot attacks against web servers and deployed web applications.
https://publisher.hitachienergy.com/preview?DocumentId=8DBD000175&languageCode=en&Preview=true
2023-10-11T01:30:12.236Z
2023-11-01T02:49:08.085Z
2023-11-01T02:49:08.085Z
{'Vendor': 'Hitachi Energy', 'Product': 'eSOMS', 'Versions': '6.0'}
CVE-2023-5846
Franklin Fueling System TS-550 versions prior to 1.9.23.8960 are vulnerable to attackers decoding admin credentials, resulting in unauthenticated access to the device.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-04
2023-10-30T16:24:03.097Z
2023-11-02T16:47:40.389Z
2023-11-02T16:47:40.389Z
{'Vendor': 'Franklin Fueling System', 'Product': 'TS-550', 'Versions': '0'}
CVE-2023-5903
Cross-site Scripting (XSS) - Stored in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
https://huntr.com/bounties/5c147ff8-3cc4-4f21-9f1c-13fd50957dad
2023-11-01T00:00:38.225Z
2023-11-01T00:00:42.777Z
2023-11-01T00:00:42.777Z
{'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'}
CVE-2023-5450
An insufficient verification of data vulnerability exists in BIG-IP Edge Client Installer on macOS that may allow an attacker elevation of privileges during the installation process.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
https://my.f5.com/manage/s/article/K000135040
2023-10-06T16:06:33.781Z
2023-10-10T12:31:48.600Z
2023-10-10T12:31:48.600Z
{'Vendor': 'F5', 'Product': 'BIG-IP Edge Client', 'Versions': '7.2.3'}
CVE-2023-5684
A vulnerability was found in Beijing Baichuo Smart S85F Management Platform up to 20231012. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /importexport.php. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243061 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.243061
2023-10-20T15:21:36.767Z
2023-10-21T07:00:07.193Z
2023-10-21T07:00:07.193Z
{'Vendor': 'Beijing Baichuo', 'Product': 'Smart S85F Management Platform', 'Versions': '20231012'}
CVE-2023-5391
A CWE-502: Deserialization of untrusted data vulnerability exists that could allow an attacker to execute arbitrary code on the targeted system by sending a specifically crafted packet to the application.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-283-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-283-02.pdf
2023-10-04T17:50:08.965Z
2023-10-04T18:13:00.746Z
2023-10-11T08:25:11.967Z
{'Vendor': 'Schneider Electric', 'Product': 'EcoStruxure Power Monitoring Expert', 'Versions': 'All versions – prior to application of Hotfix-145271'}
CVE-2023-5811
A vulnerability, which was classified as problematic, was found in flusity CMS. Affected is the function loadPostAddForm of the file core/tools/posts.php. The manipulation of the argument menu_id leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as 6943991c62ed87c7a57989a0cb7077316127def8. It is recommended to apply a patch to fix this issue. VDB-243642 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.243642
2023-10-26T18:13:58.431Z
2023-10-27T00:31:06.093Z
2023-10-27T00:31:06.093Z
{'Vendor': 'flusity', 'Product': 'CMS', 'Versions': 'n/a'}
CVE-2023-5542
Students in "Only see own membership" groups could see other students in the group, which should be hidden.
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79213
2023-10-12T00:01:12.085Z
2023-11-09T19:27:38.733Z
2023-11-09T19:27:38.733Z
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3'}
CVE-2023-5112
Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability. This vulnerability allows attackers to inject JS through the "specials_type_name[1]" parameter, potentially leading to unauthorized execution of scripts within a user's web browser.
https://fluidattacks.com/advisories/bts/
2023-09-21T18:57:33.901Z
2023-09-30T22:08:55.337Z
2023-10-06T15:50:56.131Z
{'Vendor': 'Os Commerce', 'Product': 'Os Commerce', 'Versions': '4.12.56860'}
CVE-2023-5057
The ActivityPub WordPress plugin before 1.0.0 does not escape user metadata before outputting them in mentions, which could allow users with a role of Contributor and above to perform Stored XSS attacks
https://wpscan.com/vulnerability/58a63507-f0fd-46f1-a80c-6b1c41dddcf5
2023-09-18T20:14:19.297Z
2023-10-16T19:39:13.142Z
2023-10-16T19:39:13.142Z
{'Vendor': 'Unknown', 'Product': 'ActivityPub', 'Versions': '0'}
CVE-2023-5954
HashiCorp Vault and Vault Enterprise inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. Fixed in Vault 1.15.2, 1.14.6, and 1.13.10.
https://discuss.hashicorp.com/t/hcsec-2023-33-vault-requests-triggering-policy-checks-may-lead-to-unbounded-memory-consumption/59926
2023-11-03T16:18:00.469Z
2023-11-09T20:13:49.346Z
2023-11-09T20:13:49.346Z
{'Vendor': 'HashiCorp', 'Product': 'Vault', 'Versions': '1.15.0, 1.15.1, 1.14.3, 1.14.4, 1.14.5, 1.13.7, 1.13.8, 1.13.9'}
CVE-2023-5738
The WordPress Backup & Migration WordPress plugin before 1.4.4 does not sanitise and escape some parameters, which could allow users with a role as low as Subscriber to perform Cross-Site Scripting attacks.
https://wpscan.com/vulnerability/7f935916-9a1a-40c7-b6d8-efcc46eb8eaf
2023-10-23T18:24:37.660Z
2023-11-27T16:22:04.717Z
2023-11-27T16:22:04.717Z
{'Vendor': 'Unknown', 'Product': 'WordPress Backup & Migration', 'Versions': '0'}
CVE-2023-5368
On an msdosfs filesystem, the 'truncate' or 'ftruncate' system calls under certain circumstances populate the additional space in the file with unallocated data from the underlying disk device, rather than zero bytes. This may permit a user with write access to files on a msdosfs filesystem to read unintended data (e.g. from a previously deleted file).
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:12.msdosfs.asc
2023-10-03T21:14:20.733Z
2023-10-04T03:38:09.357Z
2023-11-29T20:59:57.519Z
{'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '13.2-RELEASE, 12.4-RELEASE'}
CVE-2023-5387
The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_af2_trigger_dark_mode function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to enable or disable the dark mode plugin setting.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ccb34b44-9fa4-4ebe-b217-b2a42920247f?source=cve
2023-10-04T17:10:20.585Z
2023-11-22T15:33:34.930Z
2023-11-22T15:33:34.930Z
{'Vendor': 'funnelforms', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free', 'Versions': '*'}
CVE-2023-5104
Improper Input Validation in GitHub repository nocodb/nocodb prior to 0.96.0.
https://huntr.dev/bounties/1b5c6d9f-941e-4dd7-a964-42b53d6826b0
2023-09-21T08:44:05.527Z
2023-09-21T08:44:16.801Z
2023-09-21T08:44:16.801Z
{'Vendor': 'nocodb', 'Product': 'nocodb/nocodb', 'Versions': 'unspecified'}
CVE-2023-5554
Lack of TLS certificate verification in log transmission of a financial module within LINE Client for iOS prior to 13.16.0.
https://hackerone.com/reports/2106827
2023-10-12T09:17:12.045Z
2023-10-12T09:34:01.586Z
2023-10-13T05:40:43.366Z
{'Vendor': 'LINE Corporation', 'Product': 'LINE Client for iOS', 'Versions': '13.12.0'}
CVE-2023-5807
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TRtek Software Education Portal allows SQL Injection.This issue affects Education Portal: before 3.2023.29.
https://www.usom.gov.tr/bildirim/tr-23-0608
2023-10-26T14:32:36.428Z
2023-10-27T12:37:32.112Z
2023-10-27T12:37:32.112Z
{'Vendor': 'TRtek Software', 'Product': 'Education Portal', 'Versions': '0'}
CVE-2023-5942
The Medialist WordPress plugin before 1.4.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
https://wpscan.com/vulnerability/914559e1-eed5-4a69-8371-a48055835453
2023-11-02T19:22:36.157Z
2023-11-27T16:22:05.089Z
2023-11-27T16:22:05.089Z
{'Vendor': 'Unknown', 'Product': 'Medialist', 'Versions': '0'}
CVE-2023-5041
The Track The Click WordPress plugin before 0.3.12 does not properly sanitize query parameters to the stats REST endpoint before using them in a database query, allowing a logged in user with an author role or higher to perform time based blind SQLi attacks on the database.
https://wpscan.com/vulnerability/45194442-6eea-4e07-85a5-4a1e2fde3523
2023-09-18T10:34:59.045Z
2024-01-17T14:27:26.529Z
2024-01-17T14:31:47.758Z
{'Vendor': 'Unknown', 'Product': 'Track The Click', 'Versions': '0'}
CVE-2023-5411
The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_af2_save_post function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to modify certain post values. Note that the extent of modification is limited due to fixed values passed to the wp_update_post function.
https://www.wordfence.com/threat-intel/vulnerabilities/id/816f5fc1-e4e6-4c0d-b222-fe733f026e33?source=cve
2023-10-04T19:24:53.846Z
2023-11-22T15:33:30.215Z
2023-11-22T15:33:30.215Z
{'Vendor': 'funnelforms', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free', 'Versions': '*'}
CVE-2023-5295
The Blog Filter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'vivafbcomment' shortcode in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/602b3b9c-76a7-4b0b-8aad-e554c2fd6910?source=cve
2023-09-29T14:19:08.501Z
2023-09-30T02:33:28.888Z
2023-09-30T02:33:28.888Z
{'Vendor': 'vivacityinfotechjaipur', 'Product': 'Comments by Startbit', 'Versions': '*'}
CVE-2023-5780
A vulnerability classified as critical was found in Tongda OA 2017 11.10. This vulnerability affects unknown code of the file general/system/approve_center/flow_guide/flow_type/set_print/delete.php. The manipulation of the argument DELETE_STR leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-243586 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.243586
2023-10-26T05:23:27.010Z
2023-10-26T12:00:07.857Z
2023-10-26T12:00:07.857Z
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.10'}
CVE-2023-5850
Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain spoofing via a crafted domain name. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
2023-10-30T22:11:15.999Z
2023-11-01T17:14:00.570Z
2023-11-01T17:14:00.570Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'}
CVE-2023-5153
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DAR-8000 up to 20151231. This affects an unknown part of the file /Tool/querysql.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240249 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
https://vuldb.com/?id.240249
2023-09-24T15:56:44.621Z
2023-09-25T02:31:04.442Z
2023-10-24T19:35:18.416Z
{'Vendor': 'D-Link', 'Product': 'DAR-8000', 'Versions': '20151231'}
CVE-2023-5016
A vulnerability was found in spider-flow up to 0.5.0. It has been declared as critical. Affected by this vulnerability is the function DriverManager.getConnection of the file src/main/java/org/spiderflow/controller/DataSourceController.java of the component API. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239857 was assigned to this vulnerability.
https://vuldb.com/?id.239857
2023-09-16T06:43:13.210Z
2023-09-17T02:00:06.688Z
2023-10-24T16:34:06.064Z
{'Vendor': 'n/a', 'Product': 'spider-flow', 'Versions': '0.1, 0.2, 0.3, 0.4, 0.5'}
CVE-2023-5915
A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation. This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller’s operation is not stopped by the condition. The affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.
https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf
2023-11-02T04:37:11.569Z
2023-12-01T06:12:03.581Z
2023-12-01T06:14:45.335Z
{'Vendor': 'Yokogawa Electric Corporation', 'Product': 'STARDOM', 'Versions': 'STARDOM FCN/FCJ R1.01 to R4.31'}
CVE-2023-5851
Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
2023-10-30T22:11:16.183Z
2023-11-01T17:14:00.867Z
2023-11-01T17:14:00.867Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'}
CVE-2023-5152
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DAR-7000 and DAR-8000 up to 20151231. Affected by this issue is some unknown functionality of the file /importexport.php. The manipulation of the argument sql leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240248. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
https://vuldb.com/?id.240248
2023-09-24T15:56:40.343Z
2023-09-25T02:00:05.853Z
2023-10-24T19:34:05.175Z
{'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'}
CVE-2023-5017
A vulnerability was found in lmxcms up to 1.41. It has been rated as critical. Affected by this issue is some unknown functionality of the file admin.php. The manipulation of the argument lid leads to sql injection. VDB-239858 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.239858
2023-09-16T06:47:37.085Z
2023-09-17T03:00:07.410Z
2023-10-24T16:35:19.242Z
{'Vendor': 'n/a', 'Product': 'lmxcms', 'Versions': '1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12, 1.13, 1.14, 1.15, 1.16, 1.17, 1.18, 1.19, 1.20, 1.21, 1.22, 1.23, 1.24, 1.25, 1.26, 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, 1.33, 1.34, 1.35, 1.36, 1.37, 1.38, 1.39, 1.40, 1.41'}
CVE-2023-5914
  Cross-site scripting (XSS)
https://support.citrix.com/article/CTX583759/citrix-storefront-security-bulletin-for-cve20235914
2023-11-01T22:55:27.290Z
2024-01-17T20:19:49.869Z
2024-01-17T20:19:49.869Z
{'Vendor': 'Cloud Software Group', 'Product': 'Citrix StoreFront', 'Versions': '2308 Current Release, 2311 Current Release, 1912 LTSR, 2203 LTSR '}
CVE-2023-5294
A vulnerability has been found in ECshop 4.1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/order.php. The manipulation of the argument goods_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240925 was assigned to this vulnerability.
https://vuldb.com/?id.240925
2023-09-29T14:19:08.289Z
2023-09-29T21:00:08.582Z
2023-10-25T04:53:18.293Z
{'Vendor': 'n/a', 'Product': 'ECshop', 'Versions': '4.1.1'}
CVE-2023-5781
A vulnerability, which was classified as critical, has been found in Tongda OA 2017 11.10. This issue affects the function DELETE_STR of the file general/system/res_manage/monitor/delete_webmail.php. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243587. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.243587
2023-10-26T05:24:13.117Z
2023-10-26T12:31:04.961Z
2023-10-26T12:31:04.961Z
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.10'}
CVE-2023-5105
The Frontend File Manager Plugin WordPress plugin before 22.6 has a vulnerability that allows an Editor+ user to bypass the file download logic and download files such as `wp-config.php`
https://wpscan.com/vulnerability/d40c7108-bad6-4ed3-8539-35c0f57e62cc
2023-09-21T09:50:58.856Z
2023-12-04T21:27:46.153Z
2023-12-04T21:27:46.153Z
{'Vendor': 'Unknown', 'Product': 'Frontend File Manager Plugin', 'Versions': '0'}
CVE-2023-5555
Cross-site Scripting (XSS) - Generic in GitHub repository frappe/lms prior to 5614a6203fb7d438be8e2b1e3030e4528d170ec4.
https://huntr.dev/bounties/f6d688ee-b049-4f85-ac3e-f4d3e29e7b9f
2023-10-12T10:31:53.729Z
2023-10-12T10:32:05.674Z
2023-10-12T10:32:05.674Z
{'Vendor': 'frappe', 'Product': 'frappe/lms', 'Versions': 'unspecified'}
CVE-2023-5806
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mergen Software Quality Management System allows SQL Injection.This issue affects Quality Management System: before v1.2.
https://www.usom.gov.tr/bildirim/tr-24-0040
2023-10-26T14:07:58.357Z
2024-01-18T12:58:31.264Z
2024-01-18T12:58:31.264Z
{'Vendor': 'Mergen Software', 'Product': 'Quality Management System', 'Versions': '0'}
CVE-2023-5739
Certain versions of HP PC Hardware Diagnostics Windows are potentially vulnerable to elevation of privilege.
https://support.hp.com/us-en/document/ish_8128401-8128440-16
2023-10-23T21:07:24.730Z
2023-10-31T15:47:40.302Z
2023-10-31T15:47:40.302Z
{'Vendor': 'HP Inc.', 'Product': 'HP PC Hardware Diagnostics Windows', 'Versions': 'See HP Security Bulletin reference for affected versions.'}
CVE-2023-5369
Before correction, the copy_file_range system call checked only for the CAP_READ and CAP_WRITE capabilities on the input and output file descriptors, respectively. Using an offset is logically equivalent to seeking, and the system call must additionally require the CAP_SEEK capability. This incorrect privilege check enabled sandboxed processes with only read or write but no seek capability on a file descriptor to read data from or write data to an arbitrary location within the file corresponding to that file descriptor.
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:13.capsicum.asc
2023-10-03T21:25:17.658Z
2023-10-04T03:48:53.559Z
2023-10-04T03:53:02.846Z
{'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '13.2-RELEASE'}
CVE-2023-5693
A vulnerability was found in CodeAstro Internet Banking System 1.0 and classified as critical. This issue affects some unknown processing of the file pages_reset_pwd.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243131.
https://vuldb.com/?id.243131
2023-10-22T09:29:41.801Z
2023-10-22T22:00:07.605Z
2023-10-22T22:00:07.605Z
{'Vendor': 'CodeAstro', 'Product': 'Internet Banking System', 'Versions': '1.0'}
CVE-2023-5386
The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_delete_posts function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete arbitrary posts, including administrator posts, and posts not related to the Funnelforms Free plugin.
https://www.wordfence.com/threat-intel/vulnerabilities/id/400fe58b-8203-4fd5-a3d3-d30eb1b8cd85?source=cve
2023-10-04T17:04:33.753Z
2023-11-22T15:33:23.381Z
2023-11-22T15:33:23.381Z
{'Vendor': 'funnelforms', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free', 'Versions': '*'}
CVE-2023-5810
A vulnerability, which was classified as problematic, has been found in flusity CMS. This issue affects the function loadPostAddForm of the file core/tools/posts.php. The manipulation of the argument edit_post_id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The identifier of the patch is 6943991c62ed87c7a57989a0cb7077316127def8. It is recommended to apply a patch to fix this issue. The identifier VDB-243641 was assigned to this vulnerability.
https://vuldb.com/?id.243641
2023-10-26T18:13:56.089Z
2023-10-27T00:31:05.032Z
2023-10-27T00:31:05.032Z
{'Vendor': 'flusity', 'Product': 'CMS', 'Versions': 'n/a'}
CVE-2023-5543
When duplicating a BigBlueButton activity, the original meeting ID was also duplicated instead of using a new ID for the new activity. This could provide unintended access to the original meeting.
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77795
2023-10-12T00:08:16.985Z
2023-11-09T21:35:38.116Z
2023-11-09T21:35:38.116Z
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11'}
CVE-2023-5113
Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to denial of service due to WS-Print request and potential injections of Cross Site Scripting via jQuery-UI.
https://support.hp.com/us-en/document/ish_9365285-9365309-16
2023-09-21T19:23:26.633Z
2023-10-04T14:20:46.768Z
2023-10-04T14:20:46.768Z
{'Vendor': 'HP Inc.', 'Product': 'Certain HP Enterprise LaserJet, LaserJet Managed printers', 'Versions': 'See HP Security Bulletin reference for affected versions.'}
CVE-2023-5056
A flaw was found in the Skupper operator, which may permit a certain configuration to create a service account that would allow an authenticated attacker in the adjacent cluster to view deployments in all namespaces in the cluster. This issue permits unauthorized viewing of information outside of the user's purview.
https://access.redhat.com/errata/RHSA-2023:6219
2023-09-18T18:33:13.584Z
2023-12-18T13:43:07.807Z
2024-01-23T00:57:58.296Z
{'Vendor': 'n/a', 'Product': 'skupper-operator', 'Versions': ''}
CVE-2023-5955
The Contact Form Email WordPress plugin before 1.3.44 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/1b5fce7e-14fc-4548-8747-96fdd58fdd98
2023-11-03T17:01:30.907Z
2023-12-11T19:30:26.587Z
2023-12-11T19:30:26.587Z
{'Vendor': 'Unknown', 'Product': 'Contact Form Email', 'Versions': '0'}
CVE-2023-5144
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DAR-7000 and DAR-8000 up to 20151231. Affected is an unknown function of the file /sysmanage/updateos.php. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240240. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
https://vuldb.com/?id.240240
2023-09-24T15:56:06.977Z
2023-09-24T23:00:06.505Z
2023-10-24T19:24:19.675Z
{'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'}
CVE-2023-5514
The response messages received from the eSOMS report generation using certain parameter queries with full file path can be abused for enumerating the local file system structure.
https://publisher.hitachienergy.com/preview?DocumentId=8DBD000175&languageCode=en&Preview=true
2023-10-11T01:30:06.720Z
2023-11-01T02:40:53.285Z
2023-11-01T02:40:53.285Z
{'Vendor': 'Hitachi Energy', 'Product': 'eSOMS', 'Versions': '6.0'}
CVE-2023-5847
Under certain conditions, a low privileged attacker could load a specially crafted file during installation or upgrade to escalate privileges on Windows and Linux hosts.
https://www.tenable.com/security/tns-2023-37
2023-10-30T16:43:53.216Z
2023-11-01T15:30:55.181Z
2023-11-01T15:30:55.181Z
{'Vendor': 'Tenable', 'Product': 'Nessus', 'Versions': '0'}
CVE-2023-5902
Cross-Site Request Forgery (CSRF) in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
https://huntr.com/bounties/8b93c7bf-5052-424a-85cc-7e5491c61f20
2023-11-01T00:00:38.082Z
2023-11-01T00:00:41.753Z
2023-11-01T00:00:41.753Z
{'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'}
CVE-2023-5001
The Horizontal scrolling announcement for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'horizontal-scrolling' shortcode in versions up to, and including, 9.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d4f60e8c-2745-4930-9101-914bd73c6e1c?source=cve
2023-09-15T16:11:07.798Z
2023-09-16T04:25:56.199Z
2023-09-16T04:25:56.199Z
{'Vendor': 'gopiplus', 'Product': 'Horizontal scrolling announcement', 'Versions': '*'}
CVE-2023-5282
A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been declared as critical. This vulnerability affects unknown code of the file seed_message_student.php. The manipulation of the argument teacher_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-240910 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.240910
2023-09-29T09:49:19.396Z
2023-09-29T19:00:06.791Z
2023-10-24T21:32:57.735Z
{'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'}
CVE-2023-5328
A vulnerability classified as critical has been found in SATO CL4NX-J Plus 1.13.2-u455_r2. This affects an unknown part of the component Cookie Handler. The manipulation with the input auth=user,level1,settings; web=true leads to improper authentication. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-241029 was assigned to this vulnerability.
https://vuldb.com/?id.241029
2023-10-01T12:10:18.932Z
2023-10-01T23:31:04.962Z
2023-10-25T05:11:36.069Z
{'Vendor': 'SATO', 'Product': 'CL4NX-J Plus', 'Versions': '1.13.2-u455_r2'}
CVE-2023-5797
An improper privilege management vulnerability in the debug CLI command of the Zyxel ATP series firmware versions 4.32 through 5.37, USG FLEX series firmware versions 4.50 through 5.37, USG FLEX 50(W) series firmware versions 4.16 through 5.37, USG20(W)-VPN series firmware versions 4.16 through 5.37, VPN series firmware versions 4.30 through 5.37, NWA50AX firmware version 6.29(ABYW.2), WAC500 firmware version 6.65(ABVS.1), WAX300H firmware version 6.60(ACHF.1), and WBE660S firmware version 6.65(ACGG.1), could allow an authenticated local attacker to access the administrator’s logs on an affected device.
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps
2023-10-26T08:51:44.363Z
2023-11-28T02:00:59.801Z
2023-11-28T02:00:59.801Z
{'Vendor': 'Zyxel', 'Product': 'ATP series firmware', 'Versions': ' versions 4.32 through 5.37'}
CVE-2023-5979
The eCommerce Product Catalog Plugin for WordPress plugin before 3.3.26 does not have CSRF checks in some of its admin pages, which could allow attackers to make logged-in users perform unwanted actions via CSRF attacks, such as delete all products
https://wpscan.com/vulnerability/936934c3-5bfe-416e-b6aa-47bed4db05c4
2023-11-07T03:18:36.255Z
2023-12-04T21:27:37.654Z
2023-12-04T21:27:37.654Z
{'Vendor': 'Unknown', 'Product': 'eCommerce Product Catalog Plugin for WordPress', 'Versions': '0'}
CVE-2023-5580
A vulnerability classified as critical has been found in SourceCodester Library System 1.0. This affects an unknown part of the file index.php. The manipulation of the argument category leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-242145 was assigned to this vulnerability.
https://vuldb.com/?id.242145
2023-10-13T19:05:08.863Z
2023-10-14T12:00:07.066Z
2023-10-14T12:00:07.066Z
{'Vendor': 'SourceCodester', 'Product': 'Library System', 'Versions': '1.0'}