CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-5667
|
The Tab Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 1.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/08220b23-d6fa-4005-bbbb-019412d328a5?source=cve
|
2023-10-19T16:11:24.367Z
|
2023-11-22T15:33:19.217Z
|
2023-11-22T15:33:19.217Z
|
{'Vendor': 'themepoints', 'Product': 'Tab Ultimate', 'Versions': '*'}
|
CVE-2023-5237
|
The Memberlite Shortcodes WordPress plugin before 1.3.9 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin.
|
https://wpscan.com/vulnerability/a46d686c-6234-4aa8-a656-00a65c55d0b0
|
2023-09-27T16:41:10.433Z
|
2023-10-31T13:54:44.838Z
|
2023-10-31T13:54:44.838Z
|
{'Vendor': 'Unknown', 'Product': 'Memberlite Shortcodes', 'Versions': '0'}
|
CVE-2023-5558
|
The LearnPress WordPress plugin before 4.2.5.5 does not sanitise and escape user input before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
|
https://wpscan.com/vulnerability/4efd2a4d-89bd-472f-ba5a-f9944fd4dd16/
|
2023-10-12T14:32:15.132Z
|
2024-01-16T15:54:33.473Z
|
2024-01-16T15:54:33.473Z
|
{'Vendor': 'Unknown', 'Product': 'LearnPress', 'Versions': '0'}
|
CVE-2023-5108
|
The Easy Newsletter Signups WordPress plugin through 1.0.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin
|
https://wpscan.com/vulnerability/1b277929-e88b-4ab6-9190-526e75f5ce7a
|
2023-09-21T17:15:36.929Z
|
2023-12-04T21:29:21.316Z
|
2023-12-04T21:29:21.316Z
|
{'Vendor': 'Unknown', 'Product': 'Easy Newsletter Signups', 'Versions': '0'}
|
CVE-2023-5221
|
A vulnerability classified as critical has been found in ForU CMS. This affects an unknown part of the file /install/index.php. The manipulation of the argument db_name leads to code injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The associated identifier of this vulnerability is VDB-240363. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
https://vuldb.com/?id.240363
|
2023-09-27T07:59:46.694Z
|
2023-09-27T13:31:05.111Z
|
2023-10-24T19:37:44.663Z
|
{'Vendor': 'ForU', 'Product': 'CMS', 'Versions': 'n/a'}
|
CVE-2023-5671
|
HP Print and Scan Doctor for Windows may potentially be vulnerable to escalation of privilege. HP is releasing software updates to mitigate the potential vulnerability.
|
https://support.hp.com/us-en/document/ish_9502679-9502704-16
|
2023-10-19T21:00:03.116Z
|
2023-10-25T17:11:05.225Z
|
2023-10-25T17:11:05.225Z
|
{'Vendor': 'HP Inc.', 'Product': 'HP Print and Scan Doctor for Windows', 'Versions': 'See HP Security Bulletin reference for affected versions.'}
|
CVE-2023-5919
|
A vulnerability was found in SourceCodester Company Website CMS 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /dashboard/createblog of the component Create Blog Page. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-244310 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.244310
|
2023-11-02T08:16:36.959Z
|
2023-11-02T13:31:06.780Z
|
2023-11-02T13:31:06.780Z
|
{'Vendor': 'SourceCodester', 'Product': 'Company Website CMS', 'Versions': '1.0'}
|
CVE-2023-5763
|
In Eclipse Glassfish 5 or 6, running with old versions of JDK (lower than 6u211, or < 7u201, or < 8u191), allows remote attackers to load malicious code on the server via access to insecure ORB listeners.
|
https://glassfish.org/docs/latest/security-guide.html#securing-glassfish-server
|
2023-10-25T04:59:21.006Z
|
2023-11-03T06:40:43.441Z
|
2023-11-03T06:40:43.441Z
|
{'Vendor': 'Eclipse Foundation', 'Product': 'Glassfish', 'Versions': '6.0.0, 5.0'}
|
CVE-2023-5299
|
A user with a standard account in Fuji Electric Tellus Lite may overwrite files in the system.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-325-02
|
2023-09-29T15:56:03.959Z
|
2023-11-22T00:41:18.654Z
|
2023-11-22T00:41:18.654Z
|
{'Vendor': 'Fuji Electric', 'Product': 'Tellus Lite V-Simulator', 'Versions': '0'}
|
CVE-2023-5333
|
Mattermost fails to deduplicate input IDs allowing a simple user to cause the application to consume excessive resources and possibly crash by sending a specially crafted request to /api/v4/users/ids with multiple identical IDs.
|
https://mattermost.com/security-updates
|
2023-10-02T12:25:25.552Z
|
2023-10-09T10:41:36.597Z
|
2023-10-09T10:41:36.597Z
|
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 7.8.11, 8.0.3, 8.1.2'}
|
CVE-2023-5626
|
Cross-Site Request Forgery (CSRF) in GitHub repository pkp/ojs prior to 3.3.0-16.
|
https://huntr.dev/bounties/c99279c1-709a-4e7b-a042-010c2bb44d6b
|
2023-10-17T23:22:31.262Z
|
2023-10-17T23:22:41.615Z
|
2023-10-17T23:22:41.615Z
|
{'Vendor': 'pkp', 'Product': 'pkp/ojs', 'Versions': 'unspecified'}
|
CVE-2023-5276
|
A vulnerability classified as critical was found in SourceCodester Engineers Online Portal 1.0. This vulnerability affects unknown code of the file downloadable_student.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The identifier of this vulnerability is VDB-240904.
|
https://vuldb.com/?id.240904
|
2023-09-29T09:48:58.436Z
|
2023-09-29T17:00:07.390Z
|
2023-10-24T21:25:38.499Z
|
{'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'}
|
CVE-2023-5201
|
The OpenHook plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.3.0 via the 'php' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to execute code on the server. This requires the [php] shortcode setting to be enabled on the vulnerable site.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/37b9ed0e-5af2-47c1-b2da-8d103e4c31bf?source=cve
|
2023-09-26T13:05:01.712Z
|
2023-09-30T02:33:28.344Z
|
2023-09-30T02:33:28.344Z
|
{'Vendor': 'brazenlygeek', 'Product': 'OpenHook', 'Versions': '*'}
|
CVE-2023-5651
|
The WP Hotel Booking WordPress plugin before 2.0.8 does not have authorisation and CSRF checks, as well as does not ensure that the package to be deleted is a package, allowing any authenticated users, such as subscriber to delete arbitrary posts
|
https://wpscan.com/vulnerability/a365c050-96ae-4266-aa87-850ee259ee2c
|
2023-10-19T09:02:59.887Z
|
2023-11-20T18:55:08.790Z
|
2023-11-20T18:55:08.790Z
|
{'Vendor': 'Unknown', 'Product': 'WP Hotel Booking', 'Versions': '0'}
|
CVE-2023-5344
|
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969.
|
https://huntr.dev/bounties/530cb762-899e-48d7-b50e-dad09eb775bf
|
2023-10-02T19:20:20.807Z
|
2023-10-02T19:20:30.352Z
|
2023-10-02T19:20:30.352Z
|
{'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'}
|
CVE-2023-5714
|
The System Dashboard plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the sd_db_specs() function hooked via an AJAX action in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve data key specs.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/53b3ac83-847d-4bd0-a79b-531af266e1b4?source=cve
|
2023-10-23T00:44:29.567Z
|
2023-12-07T02:00:06.032Z
|
2023-12-07T02:00:06.032Z
|
{'Vendor': 'qriouslad', 'Product': 'System Dashboard', 'Versions': '*'}
|
CVE-2023-5981
|
A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
|
http://www.openwall.com/lists/oss-security/2024/01/19/3
|
2023-11-07T08:05:10.875Z
|
2023-11-28T11:49:50.138Z
|
2024-01-25T19:55:01.185Z
|
{'Vendor': 'n/a', 'Product': 'GnuTLS', 'Versions': '3.8.2'}
|
CVE-2023-5578
|
A vulnerability was found in Portábilis i-Educar up to 2.7.5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file \intranet\agenda_imprimir.php of the component HTTP GET Request Handler. The manipulation of the argument cod_agenda with the input ");'> <script>alert(document.cookie)</script> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-242143. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
https://vuldb.com/?id.242143
|
2023-10-13T18:52:07.052Z
|
2023-10-14T10:31:04.690Z
|
2023-10-14T10:31:04.690Z
|
{'Vendor': 'Portábilis', 'Product': 'i-Educar', 'Versions': '2.7.0, 2.7.1, 2.7.2, 2.7.3, 2.7.4, 2.7.5'}
|
CVE-2023-5082
|
The History Log by click5 WordPress plugin before 1.0.13 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by admin users when using the Smash Balloon Social Photo Feed plugin alongside it.
|
https://wpscan.com/vulnerability/13a196ba-49c7-4575-9a49-3ef9eb2348f3
|
2023-09-19T21:13:44.430Z
|
2023-11-06T20:40:37.134Z
|
2023-11-06T20:40:37.134Z
|
{'Vendor': 'Unknown', 'Product': 'History Log by click5', 'Versions': '0'}
|
CVE-2023-5128
|
The TCD Google Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'map' shortcode in versions up to, and including, 1.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/50f6d0aa-059d-48d9-873b-6404f288f002?source=cve
|
2023-09-22T15:45:06.036Z
|
2023-11-22T15:33:24.310Z
|
2023-11-22T15:33:24.310Z
|
{'Vendor': 'designplus', 'Product': 'TCD Google Maps', 'Versions': '*'}
|
CVE-2023-5606
|
The ChatBot for WordPress is vulnerable to Stored Cross-Site Scripting via the FAQ Builder in versions 4.8.6 through 4.9.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. NOTE: This vulnerability is a re-introduction of CVE-2023-4253.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/fc305c48-8337-42b7-ad61-61aea8018def?source=cve
|
2023-10-16T21:35:09.687Z
|
2023-11-02T08:31:43.007Z
|
2023-11-02T08:31:43.007Z
|
{'Vendor': 'quantumcloud', 'Product': 'AI ChatBot', 'Versions': '4.8.6'}
|
CVE-2023-5256
|
In certain scenarios, Drupal's JSON:API module will output error backtraces. With some configurations, this may cause sensitive information to be cached and made available to anonymous users, leading to privilege escalation.
This vulnerability only affects sites with the JSON:API module enabled, and can be mitigated by uninstalling JSON:API.
The core REST and contributed GraphQL modules are not affected.
|
https://www.drupal.org/sa-core-2023-006
|
2023-09-28T18:13:12.881Z
|
2023-09-28T18:17:43.128Z
|
2023-09-28T18:17:43.128Z
|
{'Vendor': 'Drupal', 'Product': 'Core', 'Versions': '10.1, 10.0, 9.5'}
|
CVE-2023-5743
|
The Telephone Number Linker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'telnumlink' shortcode in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/06424d9f-0064-4101-b819-688489a18eee?source=cve
|
2023-10-24T01:31:47.569Z
|
2023-11-07T11:01:43.518Z
|
2023-11-07T11:01:43.518Z
|
{'Vendor': 'stoatoffear', 'Product': 'Telephone Number Linker', 'Versions': '*'}
|
CVE-2023-5313
|
A vulnerability classified as problematic was found in phpkobo Ajax Poll Script 3.18. Affected by this vulnerability is an unknown functionality of the file ajax-poll.php of the component Poll Handler. The manipulation leads to improper enforcement of a single, unique action. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240949 was assigned to this vulnerability.
|
https://vuldb.com/?id.240949
|
2023-09-29T20:28:22.069Z
|
2023-09-30T15:00:04.962Z
|
2023-10-25T05:05:30.194Z
|
{'Vendor': 'phpkobo', 'Product': 'Ajax Poll Script', 'Versions': '3.18'}
|
CVE-2023-5939
|
The rtMedia for WordPress, BuddyPress and bbPress WordPress plugin before 4.6.16 loads the contents of the import file in an unsafe manner, leading to remote code execution by privileged users.
|
https://wpscan.com/vulnerability/db5d41fc-bcd3-414f-aa99-54d5537007bc
|
2023-11-02T17:10:45.825Z
|
2023-12-26T18:33:10.220Z
|
2023-12-26T18:33:10.220Z
|
{'Vendor': 'Unknown', 'Product': 'rtMedia for WordPress, BuddyPress and bbPress', 'Versions': '0'}
|
CVE-2023-5893
|
Cross-Site Request Forgery (CSRF) in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
|
https://huntr.com/bounties/a965aa16-79ce-4185-8f58-3d3b0d74a71e
|
2023-11-01T00:00:06.784Z
|
2023-11-01T00:00:18.533Z
|
2023-11-01T00:00:18.533Z
|
{'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'}
|
CVE-2023-5485
|
Inappropriate implementation in Autofill in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to bypass autofill restrictions via a crafted HTML page. (Chromium security severity: Low)
|
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
|
2023-10-10T00:12:41.202Z
|
2023-10-11T22:28:53.651Z
|
2023-10-11T22:28:53.651Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'}
|
CVE-2023-5240
|
Improper access control in PAM propagation scripts in Devolutions Server 2023.2.8.0 and ealier allows an attack with permission to manage PAM propagation scripts to retrieve passwords stored in it via a GET request.
|
https://devolutions.net/security/advisories/DEVO-2023-0017
|
2023-09-27T18:43:43.331Z
|
2023-10-13T12:22:23.816Z
|
2023-10-13T12:22:23.816Z
|
{'Vendor': 'Devolutions', 'Product': 'Server', 'Versions': '0'}
|
CVE-2023-5610
|
The Seraphinite Accelerator WordPress plugin before 2.2.29 does not validate the URL to redirect any authenticated user to, leading to an arbitrary redirect
|
https://wpscan.com/vulnerability/e880a9fb-b089-4f98-9781-7d946f22777e
|
2023-10-17T09:47:14.378Z
|
2023-11-20T18:55:09.577Z
|
2023-11-20T18:55:09.577Z
|
{'Vendor': 'Unknown', 'Product': 'Seraphinite Accelerator', 'Versions': '0'}
|
CVE-2023-5305
|
A vulnerability was found in Online Banquet Booking System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /mail.php of the component Contact Us Page. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-240944.
|
https://vuldb.com/?id.240944
|
2023-09-29T16:25:06.516Z
|
2023-09-30T14:31:04.346Z
|
2023-10-25T05:04:17.013Z
|
{'Vendor': 'n/a', 'Product': 'Online Banquet Booking System', 'Versions': '1.0'}
|
CVE-2023-5186
|
Use after free in Passwords in Google Chrome prior to 117.0.5938.132 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via crafted UI interaction. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html
|
2023-09-26T00:14:20.345Z
|
2023-09-28T15:23:18.607Z
|
2023-09-28T15:23:18.607Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '117.0.5938.132'}
|
CVE-2023-5885
|
The discontinued FFS Colibri product allows a remote user to access files on the system including files containing login credentials for other users.
|
https://www.cisa.gov/news-events/ics-advisories/ICSA-23-331-02
|
2023-10-31T17:12:11.313Z
|
2023-11-27T21:48:30.996Z
|
2023-11-27T21:48:30.996Z
|
{'Vendor': 'Franklin Electric Fueling Systems', 'Product': 'Colibri', 'Versions': 'all versions'}
|
CVE-2023-5539
|
A remote code execution risk was identified in the Lesson activity. By default this was only available to teachers and managers.
|
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79408
|
2023-10-11T23:11:25.576Z
|
2023-11-09T19:11:06.859Z
|
2023-11-09T19:11:06.859Z
|
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'}
|
CVE-2023-5169
|
A compromised content process could have provided malicious data in a `PathRecording` resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process. This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.
|
https://bugzilla.mozilla.org/show_bug.cgi?id=1846685
|
2023-09-25T15:03:41.394Z
|
2023-09-27T14:13:08.573Z
|
2023-09-27T14:13:08.573Z
|
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
|
CVE-2023-5493
|
A vulnerability has been found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /useratte/web.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-241645 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
https://vuldb.com/?id.241645
|
2023-10-10T07:19:24.962Z
|
2023-10-10T16:00:07.713Z
|
2023-10-10T16:00:07.713Z
|
{'Vendor': 'Beijing Baichuo', 'Product': 'Smart S45F Multi-Service Secure Gateway Intelligent Management Platform', 'Versions': '20230928'}
|
CVE-2023-5647
| null | null |
2023-10-18T21:00:03.669Z
|
2023-10-20T01:51:34.384Z
|
2024-01-23T22:29:39.643Z
|
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
|
CVE-2023-5217
|
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html
|
2023-09-27T01:52:05.679Z
|
2023-09-28T15:23:18.340Z
|
2023-09-28T17:20:53.866Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '117.0.5938.132'}
|
CVE-2023-5702
|
A vulnerability was found in Viessmann Vitogate 300 up to 2.1.3.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /cgi-bin/. The manipulation leads to direct request. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243140. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
https://vuldb.com/?id.243140
|
2023-10-22T16:09:16.060Z
|
2023-10-23T00:31:04.073Z
|
2023-10-23T00:31:04.073Z
|
{'Vendor': 'Viessmann', 'Product': 'Vitogate 300', 'Versions': '2.1.0, 2.1.1, 2.1.2, 2.1.3'}
|
CVE-2023-5352
|
The Awesome Support WordPress plugin before 6.1.5 does not correctly authorize the wpas_edit_reply function, allowing users to edit posts for which they do not have permission.
|
https://wpscan.com/vulnerability/d32b2136-d923-4f36-bd76-af4578deb23b
|
2023-10-03T12:01:47.585Z
|
2023-11-06T20:40:54.117Z
|
2023-11-06T20:40:54.117Z
|
{'Vendor': 'Unknown', 'Product': 'Awesome Support', 'Versions': '0'}
|
CVE-2023-5978
|
In versions of FreeBSD 13-RELEASE before 13-RELEASE-p5, under certain circumstances the cap_net libcasper(3) service incorrectly validates that updated constraints are strictly subsets of the active constraints. When only a list of resolvable domain names was specified without setting any other limitations, an application could submit a new list of domains including include entries not previously listed. This could permit the application to resolve domain names that were previously restricted.
|
https://security.freebsd.org/advisories/FreeBSD-SA-23:16.cap_net.asc
|
2023-11-07T02:39:14.800Z
|
2023-11-08T08:52:46.920Z
|
2023-11-08T08:52:46.920Z
|
{'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '13.2-RELEASE'}
|
CVE-2023-5581
|
A vulnerability classified as problematic was found in SourceCodester Medicine Tracker System 1.0. This vulnerability affects unknown code of the file index.php. The manipulation of the argument page leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-242146 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.242146
|
2023-10-13T19:07:50.548Z
|
2023-10-14T12:31:04.178Z
|
2023-10-14T12:31:04.178Z
|
{'Vendor': 'SourceCodester', 'Product': 'Medicine Tracker System', 'Versions': '1.0'}
|
CVE-2023-5997
|
Use after free in Garbage Collection in Google Chrome prior to 119.0.6045.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html
|
2023-11-07T18:34:39.548Z
|
2023-11-15T17:19:43.599Z
|
2023-11-15T17:19:43.599Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.159'}
|
CVE-2023-5283
|
A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been rated as critical. This issue affects some unknown processing of the file teacher_signup.php. The manipulation of the argument firstname/lastname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240911.
|
https://vuldb.com/?id.240911
|
2023-09-29T09:49:22.885Z
|
2023-09-29T19:00:08.080Z
|
2023-10-24T21:34:10.871Z
|
{'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'}
|
CVE-2023-5329
|
A vulnerability classified as problematic was found in Field Logic DataCube4 up to 20231001. This vulnerability affects unknown code of the file /api/ of the component Web API. The manipulation leads to improper authentication. The exploit has been disclosed to the public and may be used. VDB-241030 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.241030
|
2023-10-01T16:14:07.712Z
|
2023-10-02T00:00:07.030Z
|
2023-10-25T05:12:49.414Z
|
{'Vendor': 'Field Logic', 'Product': 'DataCube4', 'Versions': '20231001'}
|
CVE-2023-5796
|
A vulnerability was found in CodeAstro POS System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /setting of the component Logo Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-243602 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.243602
|
2023-10-26T07:32:25.905Z
|
2023-10-26T17:31:05.052Z
|
2023-10-26T17:31:05.052Z
|
{'Vendor': 'CodeAstro', 'Product': 'POS System', 'Versions': '1.0'}
|
CVE-2023-5145
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in D-Link DAR-7000 up to 20151231 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /sysmanage/licence.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240241 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
|
https://vuldb.com/?id.240241
|
2023-09-24T15:56:10.716Z
|
2023-09-24T23:31:05.183Z
|
2023-10-24T19:25:32.951Z
|
{'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'}
|
CVE-2023-5515
|
The responses for web queries with certain parameters disclose internal path of resources. This information can be used to learn internal structure of the application and to further plot attacks against
web servers and deployed web applications.
|
https://publisher.hitachienergy.com/preview?DocumentId=8DBD000175&languageCode=en&Preview=true
|
2023-10-11T01:30:12.236Z
|
2023-11-01T02:49:08.085Z
|
2023-11-01T02:49:08.085Z
|
{'Vendor': 'Hitachi Energy', 'Product': 'eSOMS', 'Versions': '6.0'}
|
CVE-2023-5846
|
Franklin Fueling System TS-550 versions prior to 1.9.23.8960 are vulnerable to attackers decoding admin credentials, resulting in unauthenticated access to the device.
|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-306-04
|
2023-10-30T16:24:03.097Z
|
2023-11-02T16:47:40.389Z
|
2023-11-02T16:47:40.389Z
|
{'Vendor': 'Franklin Fueling System', 'Product': 'TS-550', 'Versions': '0'}
|
CVE-2023-5903
|
Cross-site Scripting (XSS) - Stored in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
|
https://huntr.com/bounties/5c147ff8-3cc4-4f21-9f1c-13fd50957dad
|
2023-11-01T00:00:38.225Z
|
2023-11-01T00:00:42.777Z
|
2023-11-01T00:00:42.777Z
|
{'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'}
|
CVE-2023-5450
|
An insufficient verification of data vulnerability exists in BIG-IP Edge Client Installer on macOS that may allow an attacker elevation of privileges during the installation process.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
|
https://my.f5.com/manage/s/article/K000135040
|
2023-10-06T16:06:33.781Z
|
2023-10-10T12:31:48.600Z
|
2023-10-10T12:31:48.600Z
|
{'Vendor': 'F5', 'Product': 'BIG-IP Edge Client', 'Versions': '7.2.3'}
|
CVE-2023-5684
|
A vulnerability was found in Beijing Baichuo Smart S85F Management Platform up to 20231012. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /importexport.php. The manipulation leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243061 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
https://vuldb.com/?id.243061
|
2023-10-20T15:21:36.767Z
|
2023-10-21T07:00:07.193Z
|
2023-10-21T07:00:07.193Z
|
{'Vendor': 'Beijing Baichuo', 'Product': 'Smart S85F Management Platform', 'Versions': '20231012'}
|
CVE-2023-5391
|
A CWE-502: Deserialization of untrusted data vulnerability exists that could allow an attacker to
execute arbitrary code on the targeted system by sending a specifically crafted packet to the
application.
|
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-283-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-283-02.pdf
|
2023-10-04T17:50:08.965Z
|
2023-10-04T18:13:00.746Z
|
2023-10-11T08:25:11.967Z
|
{'Vendor': 'Schneider Electric', 'Product': 'EcoStruxure Power Monitoring Expert', 'Versions': 'All versions – prior to application of Hotfix-145271'}
|
CVE-2023-5811
|
A vulnerability, which was classified as problematic, was found in flusity CMS. Affected is the function loadPostAddForm of the file core/tools/posts.php. The manipulation of the argument menu_id leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The patch is identified as 6943991c62ed87c7a57989a0cb7077316127def8. It is recommended to apply a patch to fix this issue. VDB-243642 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.243642
|
2023-10-26T18:13:58.431Z
|
2023-10-27T00:31:06.093Z
|
2023-10-27T00:31:06.093Z
|
{'Vendor': 'flusity', 'Product': 'CMS', 'Versions': 'n/a'}
|
CVE-2023-5542
|
Students in "Only see own membership" groups could see other students in the group, which should be hidden.
|
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79213
|
2023-10-12T00:01:12.085Z
|
2023-11-09T19:27:38.733Z
|
2023-11-09T19:27:38.733Z
|
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3'}
|
CVE-2023-5112
|
Os Commerce is currently susceptible to a Cross-Site Scripting (XSS) vulnerability.
This vulnerability allows attackers to inject JS through the "specials_type_name[1]" parameter,
potentially leading to unauthorized execution of scripts within a user's web browser.
|
https://fluidattacks.com/advisories/bts/
|
2023-09-21T18:57:33.901Z
|
2023-09-30T22:08:55.337Z
|
2023-10-06T15:50:56.131Z
|
{'Vendor': 'Os Commerce', 'Product': 'Os Commerce', 'Versions': '4.12.56860'}
|
CVE-2023-5057
|
The ActivityPub WordPress plugin before 1.0.0 does not escape user metadata before outputting them in mentions, which could allow users with a role of Contributor and above to perform Stored XSS attacks
|
https://wpscan.com/vulnerability/58a63507-f0fd-46f1-a80c-6b1c41dddcf5
|
2023-09-18T20:14:19.297Z
|
2023-10-16T19:39:13.142Z
|
2023-10-16T19:39:13.142Z
|
{'Vendor': 'Unknown', 'Product': 'ActivityPub', 'Versions': '0'}
|
CVE-2023-5954
|
HashiCorp Vault and Vault Enterprise inbound client requests triggering a policy check can lead to an unbounded consumption of memory. A large number of these requests may lead to denial-of-service. Fixed in Vault 1.15.2, 1.14.6, and 1.13.10.
|
https://discuss.hashicorp.com/t/hcsec-2023-33-vault-requests-triggering-policy-checks-may-lead-to-unbounded-memory-consumption/59926
|
2023-11-03T16:18:00.469Z
|
2023-11-09T20:13:49.346Z
|
2023-11-09T20:13:49.346Z
|
{'Vendor': 'HashiCorp', 'Product': 'Vault', 'Versions': '1.15.0, 1.15.1, 1.14.3, 1.14.4, 1.14.5, 1.13.7, 1.13.8, 1.13.9'}
|
CVE-2023-5738
|
The WordPress Backup & Migration WordPress plugin before 1.4.4 does not sanitise and escape some parameters, which could allow users with a role as low as Subscriber to perform Cross-Site Scripting attacks.
|
https://wpscan.com/vulnerability/7f935916-9a1a-40c7-b6d8-efcc46eb8eaf
|
2023-10-23T18:24:37.660Z
|
2023-11-27T16:22:04.717Z
|
2023-11-27T16:22:04.717Z
|
{'Vendor': 'Unknown', 'Product': 'WordPress Backup & Migration', 'Versions': '0'}
|
CVE-2023-5368
|
On an msdosfs filesystem, the 'truncate' or 'ftruncate' system calls under certain circumstances populate the additional space in the file with unallocated data from the underlying disk device, rather than zero bytes.
This may permit a user with write access to files on a msdosfs filesystem to read unintended data (e.g. from a previously deleted file).
|
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:12.msdosfs.asc
|
2023-10-03T21:14:20.733Z
|
2023-10-04T03:38:09.357Z
|
2023-11-29T20:59:57.519Z
|
{'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '13.2-RELEASE, 12.4-RELEASE'}
|
CVE-2023-5387
|
The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_af2_trigger_dark_mode function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to enable or disable the dark mode plugin setting.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/ccb34b44-9fa4-4ebe-b217-b2a42920247f?source=cve
|
2023-10-04T17:10:20.585Z
|
2023-11-22T15:33:34.930Z
|
2023-11-22T15:33:34.930Z
|
{'Vendor': 'funnelforms', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free', 'Versions': '*'}
|
CVE-2023-5104
|
Improper Input Validation in GitHub repository nocodb/nocodb prior to 0.96.0.
|
https://huntr.dev/bounties/1b5c6d9f-941e-4dd7-a964-42b53d6826b0
|
2023-09-21T08:44:05.527Z
|
2023-09-21T08:44:16.801Z
|
2023-09-21T08:44:16.801Z
|
{'Vendor': 'nocodb', 'Product': 'nocodb/nocodb', 'Versions': 'unspecified'}
|
CVE-2023-5554
|
Lack of TLS certificate verification in log transmission of a financial module within LINE Client for iOS prior to 13.16.0.
|
https://hackerone.com/reports/2106827
|
2023-10-12T09:17:12.045Z
|
2023-10-12T09:34:01.586Z
|
2023-10-13T05:40:43.366Z
|
{'Vendor': 'LINE Corporation', 'Product': 'LINE Client for iOS', 'Versions': '13.12.0'}
|
CVE-2023-5807
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TRtek Software Education Portal allows SQL Injection.This issue affects Education Portal: before 3.2023.29.
|
https://www.usom.gov.tr/bildirim/tr-23-0608
|
2023-10-26T14:32:36.428Z
|
2023-10-27T12:37:32.112Z
|
2023-10-27T12:37:32.112Z
|
{'Vendor': 'TRtek Software', 'Product': 'Education Portal', 'Versions': '0'}
|
CVE-2023-5942
|
The Medialist WordPress plugin before 1.4.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks
|
https://wpscan.com/vulnerability/914559e1-eed5-4a69-8371-a48055835453
|
2023-11-02T19:22:36.157Z
|
2023-11-27T16:22:05.089Z
|
2023-11-27T16:22:05.089Z
|
{'Vendor': 'Unknown', 'Product': 'Medialist', 'Versions': '0'}
|
CVE-2023-5041
|
The Track The Click WordPress plugin before 0.3.12 does not properly sanitize query parameters to the stats REST endpoint before using them in a database query, allowing a logged in user with an author role or higher to perform time based blind SQLi attacks on the database.
|
https://wpscan.com/vulnerability/45194442-6eea-4e07-85a5-4a1e2fde3523
|
2023-09-18T10:34:59.045Z
|
2024-01-17T14:27:26.529Z
|
2024-01-17T14:31:47.758Z
|
{'Vendor': 'Unknown', 'Product': 'Track The Click', 'Versions': '0'}
|
CVE-2023-5411
|
The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_af2_save_post function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to modify certain post values. Note that the extent of modification is limited due to fixed values passed to the wp_update_post function.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/816f5fc1-e4e6-4c0d-b222-fe733f026e33?source=cve
|
2023-10-04T19:24:53.846Z
|
2023-11-22T15:33:30.215Z
|
2023-11-22T15:33:30.215Z
|
{'Vendor': 'funnelforms', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free', 'Versions': '*'}
|
CVE-2023-5295
|
The Blog Filter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'vivafbcomment' shortcode in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/602b3b9c-76a7-4b0b-8aad-e554c2fd6910?source=cve
|
2023-09-29T14:19:08.501Z
|
2023-09-30T02:33:28.888Z
|
2023-09-30T02:33:28.888Z
|
{'Vendor': 'vivacityinfotechjaipur', 'Product': 'Comments by Startbit', 'Versions': '*'}
|
CVE-2023-5780
|
A vulnerability classified as critical was found in Tongda OA 2017 11.10. This vulnerability affects unknown code of the file general/system/approve_center/flow_guide/flow_type/set_print/delete.php. The manipulation of the argument DELETE_STR leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-243586 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
https://vuldb.com/?id.243586
|
2023-10-26T05:23:27.010Z
|
2023-10-26T12:00:07.857Z
|
2023-10-26T12:00:07.857Z
|
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.10'}
|
CVE-2023-5850
|
Incorrect security UI in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform domain spoofing via a crafted domain name. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
|
2023-10-30T22:11:15.999Z
|
2023-11-01T17:14:00.570Z
|
2023-11-01T17:14:00.570Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'}
|
CVE-2023-5153
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DAR-8000 up to 20151231. This affects an unknown part of the file /Tool/querysql.php. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240249 was assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
|
https://vuldb.com/?id.240249
|
2023-09-24T15:56:44.621Z
|
2023-09-25T02:31:04.442Z
|
2023-10-24T19:35:18.416Z
|
{'Vendor': 'D-Link', 'Product': 'DAR-8000', 'Versions': '20151231'}
|
CVE-2023-5016
|
A vulnerability was found in spider-flow up to 0.5.0. It has been declared as critical. Affected by this vulnerability is the function DriverManager.getConnection of the file src/main/java/org/spiderflow/controller/DataSourceController.java of the component API. The manipulation leads to deserialization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239857 was assigned to this vulnerability.
|
https://vuldb.com/?id.239857
|
2023-09-16T06:43:13.210Z
|
2023-09-17T02:00:06.688Z
|
2023-10-24T16:34:06.064Z
|
{'Vendor': 'n/a', 'Product': 'spider-flow', 'Versions': '0.1, 0.2, 0.3, 0.4, 0.5'}
|
CVE-2023-5915
|
A vulnerability of Uncontrolled Resource Consumption has been identified in STARDOM provided by Yokogawa Electric Corporation. This vulnerability may allow to a remote attacker to cause a denial-of-service condition to the FCN/FCJ controller by sending a crafted packet. While sending the packet, the maintenance homepage of the controller could not be accessed. Therefore, functions of the maintenance homepage, changing configuration, viewing logs, etc. are not available. But the controller’s operation is not stopped by the condition.
The affected products and versions are as follows: STARDOM FCN/FCJ R1.01 to R4.31.
|
https://web-material3.yokogawa.com/1/35463/files/YSAR-23-0003-E.pdf
|
2023-11-02T04:37:11.569Z
|
2023-12-01T06:12:03.581Z
|
2023-12-01T06:14:45.335Z
|
{'Vendor': 'Yokogawa Electric Corporation', 'Product': 'STARDOM', 'Versions': 'STARDOM FCN/FCJ R1.01 to R4.31'}
|
CVE-2023-5851
|
Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to obfuscate security UI via a crafted HTML page. (Chromium security severity: Medium)
|
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
|
2023-10-30T22:11:16.183Z
|
2023-11-01T17:14:00.867Z
|
2023-11-01T17:14:00.867Z
|
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'}
|
CVE-2023-5152
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DAR-7000 and DAR-8000 up to 20151231. Affected by this issue is some unknown functionality of the file /importexport.php. The manipulation of the argument sql leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240248. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
|
https://vuldb.com/?id.240248
|
2023-09-24T15:56:40.343Z
|
2023-09-25T02:00:05.853Z
|
2023-10-24T19:34:05.175Z
|
{'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'}
|
CVE-2023-5017
|
A vulnerability was found in lmxcms up to 1.41. It has been rated as critical. Affected by this issue is some unknown functionality of the file admin.php. The manipulation of the argument lid leads to sql injection. VDB-239858 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
https://vuldb.com/?id.239858
|
2023-09-16T06:47:37.085Z
|
2023-09-17T03:00:07.410Z
|
2023-10-24T16:35:19.242Z
|
{'Vendor': 'n/a', 'Product': 'lmxcms', 'Versions': '1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12, 1.13, 1.14, 1.15, 1.16, 1.17, 1.18, 1.19, 1.20, 1.21, 1.22, 1.23, 1.24, 1.25, 1.26, 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, 1.33, 1.34, 1.35, 1.36, 1.37, 1.38, 1.39, 1.40, 1.41'}
|
CVE-2023-5914
|
Cross-site scripting (XSS)
|
https://support.citrix.com/article/CTX583759/citrix-storefront-security-bulletin-for-cve20235914
|
2023-11-01T22:55:27.290Z
|
2024-01-17T20:19:49.869Z
|
2024-01-17T20:19:49.869Z
|
{'Vendor': 'Cloud Software Group', 'Product': 'Citrix StoreFront', 'Versions': '2308 Current Release, 2311 Current Release, 1912 LTSR, 2203 LTSR '}
|
CVE-2023-5294
|
A vulnerability has been found in ECshop 4.1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/order.php. The manipulation of the argument goods_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240925 was assigned to this vulnerability.
|
https://vuldb.com/?id.240925
|
2023-09-29T14:19:08.289Z
|
2023-09-29T21:00:08.582Z
|
2023-10-25T04:53:18.293Z
|
{'Vendor': 'n/a', 'Product': 'ECshop', 'Versions': '4.1.1'}
|
CVE-2023-5781
|
A vulnerability, which was classified as critical, has been found in Tongda OA 2017 11.10. This issue affects the function DELETE_STR of the file general/system/res_manage/monitor/delete_webmail.php. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243587. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
https://vuldb.com/?id.243587
|
2023-10-26T05:24:13.117Z
|
2023-10-26T12:31:04.961Z
|
2023-10-26T12:31:04.961Z
|
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.10'}
|
CVE-2023-5105
|
The Frontend File Manager Plugin WordPress plugin before 22.6 has a vulnerability that allows an Editor+ user to bypass the file download logic and download files such as `wp-config.php`
|
https://wpscan.com/vulnerability/d40c7108-bad6-4ed3-8539-35c0f57e62cc
|
2023-09-21T09:50:58.856Z
|
2023-12-04T21:27:46.153Z
|
2023-12-04T21:27:46.153Z
|
{'Vendor': 'Unknown', 'Product': 'Frontend File Manager Plugin', 'Versions': '0'}
|
CVE-2023-5555
|
Cross-site Scripting (XSS) - Generic in GitHub repository frappe/lms prior to 5614a6203fb7d438be8e2b1e3030e4528d170ec4.
|
https://huntr.dev/bounties/f6d688ee-b049-4f85-ac3e-f4d3e29e7b9f
|
2023-10-12T10:31:53.729Z
|
2023-10-12T10:32:05.674Z
|
2023-10-12T10:32:05.674Z
|
{'Vendor': 'frappe', 'Product': 'frappe/lms', 'Versions': 'unspecified'}
|
CVE-2023-5806
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mergen Software Quality Management System allows SQL Injection.This issue affects Quality Management System: before v1.2.
|
https://www.usom.gov.tr/bildirim/tr-24-0040
|
2023-10-26T14:07:58.357Z
|
2024-01-18T12:58:31.264Z
|
2024-01-18T12:58:31.264Z
|
{'Vendor': 'Mergen Software', 'Product': 'Quality Management System', 'Versions': '0'}
|
CVE-2023-5739
|
Certain versions of HP PC Hardware Diagnostics Windows are potentially vulnerable to elevation of privilege.
|
https://support.hp.com/us-en/document/ish_8128401-8128440-16
|
2023-10-23T21:07:24.730Z
|
2023-10-31T15:47:40.302Z
|
2023-10-31T15:47:40.302Z
|
{'Vendor': 'HP Inc.', 'Product': 'HP PC Hardware Diagnostics Windows', 'Versions': 'See HP Security Bulletin reference for affected versions.'}
|
CVE-2023-5369
|
Before correction, the copy_file_range system call checked only for the CAP_READ and CAP_WRITE capabilities on the input and output file descriptors, respectively. Using an offset is logically equivalent to seeking, and the system call must additionally require the CAP_SEEK capability.
This incorrect privilege check enabled sandboxed processes with only read or write but no seek capability on a file descriptor to read data from or write data to an arbitrary location within the file corresponding to that file descriptor.
|
https://security.FreeBSD.org/advisories/FreeBSD-SA-23:13.capsicum.asc
|
2023-10-03T21:25:17.658Z
|
2023-10-04T03:48:53.559Z
|
2023-10-04T03:53:02.846Z
|
{'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '13.2-RELEASE'}
|
CVE-2023-5693
|
A vulnerability was found in CodeAstro Internet Banking System 1.0 and classified as critical. This issue affects some unknown processing of the file pages_reset_pwd.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243131.
|
https://vuldb.com/?id.243131
|
2023-10-22T09:29:41.801Z
|
2023-10-22T22:00:07.605Z
|
2023-10-22T22:00:07.605Z
|
{'Vendor': 'CodeAstro', 'Product': 'Internet Banking System', 'Versions': '1.0'}
|
CVE-2023-5386
|
The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_delete_posts function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete arbitrary posts, including administrator posts, and posts not related to the Funnelforms Free plugin.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/400fe58b-8203-4fd5-a3d3-d30eb1b8cd85?source=cve
|
2023-10-04T17:04:33.753Z
|
2023-11-22T15:33:23.381Z
|
2023-11-22T15:33:23.381Z
|
{'Vendor': 'funnelforms', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free', 'Versions': '*'}
|
CVE-2023-5810
|
A vulnerability, which was classified as problematic, has been found in flusity CMS. This issue affects the function loadPostAddForm of the file core/tools/posts.php. The manipulation of the argument edit_post_id leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The identifier of the patch is 6943991c62ed87c7a57989a0cb7077316127def8. It is recommended to apply a patch to fix this issue. The identifier VDB-243641 was assigned to this vulnerability.
|
https://vuldb.com/?id.243641
|
2023-10-26T18:13:56.089Z
|
2023-10-27T00:31:05.032Z
|
2023-10-27T00:31:05.032Z
|
{'Vendor': 'flusity', 'Product': 'CMS', 'Versions': 'n/a'}
|
CVE-2023-5543
|
When duplicating a BigBlueButton activity, the original meeting ID was also duplicated instead of using a new ID for the new activity. This could provide unintended access to the original meeting.
|
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77795
|
2023-10-12T00:08:16.985Z
|
2023-11-09T21:35:38.116Z
|
2023-11-09T21:35:38.116Z
|
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11'}
|
CVE-2023-5113
|
Certain HP Enterprise LaserJet and HP LaserJet Managed Printers are potentially vulnerable to denial of service due to WS-Print request and potential injections of Cross Site Scripting via jQuery-UI.
|
https://support.hp.com/us-en/document/ish_9365285-9365309-16
|
2023-09-21T19:23:26.633Z
|
2023-10-04T14:20:46.768Z
|
2023-10-04T14:20:46.768Z
|
{'Vendor': 'HP Inc.', 'Product': 'Certain HP Enterprise LaserJet, LaserJet Managed printers', 'Versions': 'See HP Security Bulletin reference for affected versions.'}
|
CVE-2023-5056
|
A flaw was found in the Skupper operator, which may permit a certain configuration to create a service account that would allow an authenticated attacker in the adjacent cluster to view deployments in all namespaces in the cluster. This issue permits unauthorized viewing of information outside of the user's purview.
|
https://access.redhat.com/errata/RHSA-2023:6219
|
2023-09-18T18:33:13.584Z
|
2023-12-18T13:43:07.807Z
|
2024-01-23T00:57:58.296Z
|
{'Vendor': 'n/a', 'Product': 'skupper-operator', 'Versions': ''}
|
CVE-2023-5955
|
The Contact Form Email WordPress plugin before 1.3.44 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
https://wpscan.com/vulnerability/1b5fce7e-14fc-4548-8747-96fdd58fdd98
|
2023-11-03T17:01:30.907Z
|
2023-12-11T19:30:26.587Z
|
2023-12-11T19:30:26.587Z
|
{'Vendor': 'Unknown', 'Product': 'Contact Form Email', 'Versions': '0'}
|
CVE-2023-5144
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DAR-7000 and DAR-8000 up to 20151231. Affected is an unknown function of the file /sysmanage/updateos.php. The manipulation of the argument file_upload leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240240. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
|
https://vuldb.com/?id.240240
|
2023-09-24T15:56:06.977Z
|
2023-09-24T23:00:06.505Z
|
2023-10-24T19:24:19.675Z
|
{'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'}
|
CVE-2023-5514
|
The response messages received from the eSOMS report generation using certain parameter queries with full file path can be
abused for enumerating the local file system structure.
|
https://publisher.hitachienergy.com/preview?DocumentId=8DBD000175&languageCode=en&Preview=true
|
2023-10-11T01:30:06.720Z
|
2023-11-01T02:40:53.285Z
|
2023-11-01T02:40:53.285Z
|
{'Vendor': 'Hitachi Energy', 'Product': 'eSOMS', 'Versions': '6.0'}
|
CVE-2023-5847
|
Under certain conditions, a low privileged attacker could load a specially crafted file during installation or upgrade to escalate privileges on Windows and Linux hosts.
|
https://www.tenable.com/security/tns-2023-37
|
2023-10-30T16:43:53.216Z
|
2023-11-01T15:30:55.181Z
|
2023-11-01T15:30:55.181Z
|
{'Vendor': 'Tenable', 'Product': 'Nessus', 'Versions': '0'}
|
CVE-2023-5902
|
Cross-Site Request Forgery (CSRF) in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
|
https://huntr.com/bounties/8b93c7bf-5052-424a-85cc-7e5491c61f20
|
2023-11-01T00:00:38.082Z
|
2023-11-01T00:00:41.753Z
|
2023-11-01T00:00:41.753Z
|
{'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'}
|
CVE-2023-5001
|
The Horizontal scrolling announcement for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'horizontal-scrolling' shortcode in versions up to, and including, 9.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
https://www.wordfence.com/threat-intel/vulnerabilities/id/d4f60e8c-2745-4930-9101-914bd73c6e1c?source=cve
|
2023-09-15T16:11:07.798Z
|
2023-09-16T04:25:56.199Z
|
2023-09-16T04:25:56.199Z
|
{'Vendor': 'gopiplus', 'Product': 'Horizontal scrolling announcement', 'Versions': '*'}
|
CVE-2023-5282
|
A vulnerability was found in SourceCodester Engineers Online Portal 1.0. It has been declared as critical. This vulnerability affects unknown code of the file seed_message_student.php. The manipulation of the argument teacher_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-240910 is the identifier assigned to this vulnerability.
|
https://vuldb.com/?id.240910
|
2023-09-29T09:49:19.396Z
|
2023-09-29T19:00:06.791Z
|
2023-10-24T21:32:57.735Z
|
{'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'}
|
CVE-2023-5328
|
A vulnerability classified as critical has been found in SATO CL4NX-J Plus 1.13.2-u455_r2. This affects an unknown part of the component Cookie Handler. The manipulation with the input auth=user,level1,settings; web=true leads to improper authentication. Access to the local network is required for this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-241029 was assigned to this vulnerability.
|
https://vuldb.com/?id.241029
|
2023-10-01T12:10:18.932Z
|
2023-10-01T23:31:04.962Z
|
2023-10-25T05:11:36.069Z
|
{'Vendor': 'SATO', 'Product': 'CL4NX-J Plus', 'Versions': '1.13.2-u455_r2'}
|
CVE-2023-5797
|
An improper privilege management vulnerability in the debug CLI command of the Zyxel ATP series firmware versions 4.32 through 5.37, USG FLEX series firmware versions 4.50 through 5.37, USG FLEX 50(W) series firmware versions 4.16 through 5.37, USG20(W)-VPN series firmware versions 4.16 through 5.37, VPN series firmware versions 4.30 through 5.37, NWA50AX firmware version 6.29(ABYW.2), WAC500 firmware version 6.65(ABVS.1), WAX300H firmware version 6.60(ACHF.1), and WBE660S firmware version 6.65(ACGG.1), could allow an authenticated local attacker to access the administrator’s logs on an affected device.
|
https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-multiple-vulnerabilities-in-firewalls-and-aps
|
2023-10-26T08:51:44.363Z
|
2023-11-28T02:00:59.801Z
|
2023-11-28T02:00:59.801Z
|
{'Vendor': 'Zyxel', 'Product': 'ATP series firmware', 'Versions': ' versions 4.32 through 5.37'}
|
CVE-2023-5979
|
The eCommerce Product Catalog Plugin for WordPress plugin before 3.3.26 does not have CSRF checks in some of its admin pages, which could allow attackers to make logged-in users perform unwanted actions via CSRF attacks, such as delete all products
|
https://wpscan.com/vulnerability/936934c3-5bfe-416e-b6aa-47bed4db05c4
|
2023-11-07T03:18:36.255Z
|
2023-12-04T21:27:37.654Z
|
2023-12-04T21:27:37.654Z
|
{'Vendor': 'Unknown', 'Product': 'eCommerce Product Catalog Plugin for WordPress', 'Versions': '0'}
|
CVE-2023-5580
|
A vulnerability classified as critical has been found in SourceCodester Library System 1.0. This affects an unknown part of the file index.php. The manipulation of the argument category leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-242145 was assigned to this vulnerability.
|
https://vuldb.com/?id.242145
|
2023-10-13T19:05:08.863Z
|
2023-10-14T12:00:07.066Z
|
2023-10-14T12:00:07.066Z
|
{'Vendor': 'SourceCodester', 'Product': 'Library System', 'Versions': '1.0'}
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.