CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-5138
Glitch detection is not enabled by default for the CortexM33 core in Silicon Labs secure vault high parts EFx32xG2xB, except EFR32xG21B.
https://github.com/SiliconLabs/gecko_sdk
2023-09-22T21:13:46.220Z
2024-01-03T22:31:04.433Z
2024-01-03T22:31:04.433Z
{'Vendor': 'silabs.com', 'Product': 'GSDK', 'Versions': '1.0'}
CVE-2023-5568
A heap-based Buffer Overflow flaw was discovered in Samba. It could allow a remote, authenticated attacker to exploit this vulnerability to cause a denial of service.
https://access.redhat.com/security/cve/CVE-2023-5568
2023-10-13T07:06:17.684Z
2023-10-24T21:56:41.633Z
2024-01-23T01:26:11.228Z
{'Vendor': 'n/a', 'Product': 'samba', 'Versions': '4.19.2'}
CVE-2023-5285
A vulnerability classified as critical was found in Tongda OA 2017. Affected by this vulnerability is an unknown functionality of the file general/hr/recruit/recruitment/delete.php. The manipulation of the argument RECRUITMENT_ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-240913 was assigned to this vulnerability.
https://vuldb.com/?id.240913
2023-09-29T09:53:02.259Z
2023-09-29T19:31:05.300Z
2023-10-24T21:36:37.182Z
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': 'n/a'}
CVE-2023-5790
A vulnerability classified as critical was found in SourceCodester File Manager App 1.0. Affected by this vulnerability is an unknown functionality of the file endpoint/add-file.php. The manipulation of the argument uploadedFileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243595.
https://vuldb.com/?id.243595
2023-10-26T06:36:16.675Z
2023-10-26T16:00:09.954Z
2023-10-26T16:00:09.954Z
{'Vendor': 'SourceCodester', 'Product': 'File Manager App', 'Versions': '1.0'}
CVE-2023-5840
Weak Password Recovery Mechanism for Forgotten Password in GitHub repository linkstackorg/linkstack prior to v4.2.9.
https://huntr.com/bounties/8042d8c3-650e-4c0d-9146-d9ccf6082b30
2023-10-29T00:00:07.451Z
2023-10-29T00:00:20.031Z
2023-10-29T00:00:20.031Z
{'Vendor': 'linkstackorg', 'Product': 'linkstackorg/linkstack', 'Versions': 'unspecified'}
CVE-2023-5143
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DAR-7000 up to 20151231. This issue affects some unknown processing of the file /log/webmailattach.php. The manipulation of the argument table_name leads to an unknown weakness. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240239. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
https://vuldb.com/?id.240239
2023-09-24T15:56:04.588Z
2023-09-24T22:31:04.295Z
2023-10-24T19:23:06.542Z
{'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'}
CVE-2023-5006
The WP Discord Invite WordPress plugin before 2.5.1 does not protect some of its actions against CSRF attacks, allowing an unauthenticated attacker to perform actions on their behalf by tricking a logged in administrator to submit a crafted request.
https://wpscan.com/vulnerability/d29bcc1c-241b-4867-a0c8-4ae5f9d1c8e8
2023-09-15T21:03:54.448Z
2024-01-17T14:31:48.144Z
2024-01-17T14:31:48.144Z
{'Vendor': 'Unknown', 'Product': 'WP Discord Invite', 'Versions': '0'}
CVE-2023-5905
The DeMomentSomTres WordPress Export Posts With Images WordPress plugin through 20220825 does not check authorization of requests to export the blog data, allowing any logged in user, such as subscribers to export the contents of the blog, including restricted and unpublished posts, as well as passwords of protected posts.
https://wpscan.com/vulnerability/f94e91ef-1773-476c-9945-37e89ceefd3f
2023-11-01T08:43:31.363Z
2024-01-15T15:10:43.450Z
2024-01-15T15:10:43.450Z
{'Vendor': 'Unknown', 'Product': 'DeMomentSomTres WordPress Export Posts With Images', 'Versions': '0'}
CVE-2023-5682
A vulnerability has been found in Tongda OA 2017 and classified as critical. This vulnerability affects unknown code of the file general/hr/training/record/delete.php. The manipulation of the argument RECORD_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-243058 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.243058
2023-10-20T15:10:59.975Z
2023-10-20T20:31:06.429Z
2023-10-20T20:31:06.429Z
{'Vendor': 'Tongda', 'Product': 'OA', 'Versions': '2017'}
CVE-2023-5728
During garbage collection extra operations were performed on a object that should not be. This could have led to a potentially exploitable crash. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1.
https://bugzilla.mozilla.org/show_bug.cgi?id=1852729
2023-10-23T17:22:06.275Z
2023-10-24T12:47:14.295Z
2023-10-24T21:06:50.587Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5544
Wiki comments required additional sanitizing and access restrictions to prevent a stored XSS risk and potential IDOR risk.
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79509
2023-10-12T00:14:41.896Z
2023-11-09T19:32:16.862Z
2023-11-09T19:32:16.862Z
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'}
CVE-2023-5114
The idbbee plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'idbbee' shortcode in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ac763936-7147-4100-8a46-4c6d2f2224b4?source=cve
2023-09-21T19:23:48.644Z
2023-10-31T11:29:12.590Z
2023-10-31T11:29:12.590Z
{'Vendor': 'faikdjikic', 'Product': 'idbbee', 'Versions': '*'}
CVE-2023-5817
The Neon text plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's neontext_box shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes (color). This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/f9998485-e272-48fc-b2f1-9e30158d0d16?source=cve
2023-10-26T22:35:20.800Z
2023-10-27T10:59:12.922Z
2023-10-27T10:59:12.922Z
{'Vendor': 'freeben', 'Product': 'Neon text', 'Versions': '*'}
CVE-2023-5952
The Welcart e-Commerce WordPress plugin before 2.9.5 unserializes user input from cookies, which could allow unautehtniacted users to perform PHP Object Injection when a suitable gadget is present on the blog
https://wpscan.com/vulnerability/0acd613e-dbd6-42ae-9f3d-6d6e77a4c1b7
2023-11-03T12:51:39.381Z
2023-12-04T21:27:54.563Z
2023-12-04T21:27:54.563Z
{'Vendor': 'Unknown', 'Product': 'Welcart e-Commerce', 'Versions': '0'}
CVE-2023-5051
The CallRail Phone Call Tracking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'callrail_form' shortcode in versions up to, and including, 0.5.2 due to insufficient input sanitization and output escaping on the 'form_id' user supplied attribute. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/35def866-7460-4cad-8d86-7b9e4905cbe4?source=cve
2023-09-18T14:02:47.491Z
2023-10-27T03:16:17.469Z
2023-10-27T03:16:17.469Z
{'Vendor': 'callrail', 'Product': 'CallRail Phone Call Tracking', 'Versions': '*'}
CVE-2023-5694
A vulnerability was found in CodeAstro Internet Banking System 1.0. It has been classified as problematic. Affected is an unknown function of the file pages_system_settings.php. The manipulation of the argument sys_name with the input <ScRiPt >alert(991)</ScRiPt> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243132.
https://vuldb.com/?id.243132
2023-10-22T09:29:44.197Z
2023-10-22T22:00:08.748Z
2023-10-22T22:00:08.748Z
{'Vendor': 'CodeAstro', 'Product': 'Internet Banking System', 'Versions': '1.0'}
CVE-2023-5381
The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 1.12.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/bd2bc2e7-960e-40db-9dcc-a6a60117bd83?source=cve
2023-10-04T15:14:30.123Z
2023-11-15T22:32:29.744Z
2023-11-15T22:32:29.744Z
{'Vendor': 'webtechstreet', 'Product': 'Elementor Addon Elements', 'Versions': '*'}
CVE-2023-5801
Vulnerability of identity verification being bypassed in the face unlock module. Successful exploitation of this vulnerability will affect integrity and confidentiality.
https://consumer.huawei.com/en/support/bulletin/2023/11/
2023-10-26T11:33:07.080Z
2023-11-08T02:48:14.529Z
2023-11-08T02:48:14.529Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.0.0, 2.0.0'}
CVE-2023-5102
Insufficient Control Flow Management in RDT400 in SICK APU allows an unprivileged remote attacker to potentially enable hidden functionality via HTTP requests.
https://sick.com/psirt
2023-09-21T07:10:38.363Z
2023-10-09T12:09:08.155Z
2023-10-09T12:09:08.155Z
{'Vendor': 'SICK AG', 'Product': 'APU0200', 'Versions': 'all versions'}
CVE-2023-5552
A password disclosure vulnerability in the Secure PDF eXchange (SPX) feature allows attackers with full email access to decrypt PDFs in Sophos Firewall version 19.5 MR3 (19.5.3) and older, if the password type is set to “Specified by sender”.
https://www.sophos.com/en-us/security-advisories/sophos-sa-20231017-spx-password
2023-10-12T05:55:23.384Z
2023-10-17T23:29:12.601Z
2023-10-17T23:29:12.601Z
{'Vendor': 'Sophos', 'Product': 'Sophos Firewall', 'Versions': '19.5.4, 20.0.0'}
CVE-2023-5047
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in DRD Fleet Leasing DRDrive allows SQL Injection.This issue affects DRDrive: before 20231006.
https://www.usom.gov.tr/bildirim/tr-23-0651
2023-09-18T13:31:52.059Z
2023-11-22T11:20:29.178Z
2023-11-22T11:20:29.178Z
{'Vendor': 'DRD Fleet Leasing', 'Product': 'DRDrive', 'Versions': '0'}
CVE-2023-5417
The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_update_category function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to modify the Funnelforms category for a given post ID.
https://www.wordfence.com/threat-intel/vulnerabilities/id/148794ea-3bc9-4084-bdb9-6ee63a781a39?source=cve
2023-10-04T20:39:55.568Z
2023-11-22T15:33:20.139Z
2023-11-22T15:33:20.139Z
{'Vendor': 'funnelforms', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free', 'Versions': '*'}
CVE-2023-5944
Delta Electronics DOPSoft is vulnerable to a stack-based buffer overflow, which may allow for arbitrary code execution if an attacker can lead a legitimate user to execute a specially crafted file.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-01
2023-11-02T22:30:47.777Z
2023-12-04T23:08:48.592Z
2023-12-04T23:08:48.592Z
{'Vendor': 'Delta Electronics', 'Product': 'DOPSoft', 'Versions': 'All versions '}
CVE-2023-5339
Mattermost Desktop fails to set an appropriate log level during initial run after fresh installation resulting in logging all keystrokes including password entry being logged. 
https://mattermost.com/security-updates
2023-10-02T12:42:09.725Z
2023-10-17T09:30:41.612Z
2023-10-17T09:30:41.612Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 5.5.0'}
CVE-2023-5769
A vulnerability exists in the webserver that affects the RTU500 series product versions listed below. A malicious actor could perform cross-site scripting on the webserver due to user input being improperly sanitized.
https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176&languageCode=en&Preview=true
2023-10-25T15:24:39.863Z
2023-12-14T16:19:51.846Z
2023-12-14T16:19:51.846Z
{'Vendor': 'Hitachi Energy', 'Product': 'RTU500', 'Versions': 'RTU500 series CMU Firmware version 12.0.1 – 12.0.14, RTU500 series CMU Firmware version 12.2.1 – 12.2.11, RTU500 series CMU Firmware version 12.4.1 – 12.4.11, RTU500 series CMU Firmware version 12.6.1 – 12.6.9 , RTU500 series CMU Firmware version 12.7.1 – 12.7.6, RTU500 series CMU Firmware version 13.2.1 – 13.2.6 , RTU500 series CMU Firmware version 13.4.1 – 13.4.3 '}
CVE-2023-5293
A vulnerability, which was classified as critical, was found in ECshop 4.1.5. Affected is an unknown function of the file /admin/leancloud.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240924.
https://vuldb.com/?id.240924
2023-09-29T14:19:05.445Z
2023-09-29T20:31:04.683Z
2023-10-25T04:52:05.131Z
{'Vendor': 'n/a', 'Product': 'ECshop', 'Versions': '4.1.5'}
CVE-2023-5786
A vulnerability was found in GeoServer GeoWebCache up to 1.15.1. It has been declared as problematic. This vulnerability affects unknown code of the file /geoserver/gwc/rest.html. The manipulation leads to direct request. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243592.
https://vuldb.com/?id.243592
2023-10-26T05:39:57.017Z
2023-10-26T15:31:04.617Z
2023-10-26T15:31:04.617Z
{'Vendor': 'GeoServer', 'Product': 'GeoWebCache', 'Versions': '1.15.0, 1.15.1'}
CVE-2023-5856
Use after free in Side Panel in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
2023-10-30T22:11:17.244Z
2023-11-01T17:14:02.689Z
2023-11-01T17:14:02.689Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'}
CVE-2023-5913
Incorrect Privilege Assignment vulnerability in opentext Fortify ScanCentral DAST. The vulnerability could be exploited to gain elevated privileges.This issue affects Fortify ScanCentral DAST versions 21.1, 21.2, 21.2.1, 22.1, 22.1.1, 22.2, 23.1.
https://portal.microfocus.com/s/article/KM000023500?language=en_US
2023-11-01T22:02:30.314Z
2023-11-08T16:42:31.074Z
2023-11-08T16:42:31.074Z
{'Vendor': 'opentext', 'Product': 'Fortify ScanCentral DAST', 'Versions': '21.1, 21.2, 21.2.1, 22.1, 22.1.1, 22.2, 23.1'}
CVE-2023-5010
Student Information System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'coursecode' parameter of the marks.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/kissin/
2023-09-15T22:52:20.378Z
2023-12-20T15:55:07.052Z
2023-12-20T15:55:07.052Z
{'Vendor': 'Kashipara Group', 'Product': 'Student Information System', 'Versions': '1.0'}
CVE-2023-5437
The WP fade in text news plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b4accf10-710e-4cba-8d61-04e422324f9d?source=cve
2023-10-05T19:17:37.561Z
2023-10-31T08:32:52.624Z
2023-10-31T08:32:52.624Z
{'Vendor': 'gopiplus', 'Product': 'WP fade in text news', 'Versions': '*'}
CVE-2023-5964
The 1E-Exchange-DisplayMessageinstruction that is part of the End-User Interaction product pack available on the 1E Exchange does not properly validate the Caption or Message parameters, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients. To remediate this issue DELETE the instruction “Show dialogue with caption %Caption% and message %Message%” from the list of instructions in the Settings UI, and replace it with the new instruction 1E-Exchange-ShowNotification instruction available in the updated End-User Interaction product pack. The new instruction should show as “Show %Type% type notification with header %Header% and message %Message%” with a version of 7.1 or above.
https://exchange.1e.com/product-packs/end-user-interaction/
2023-11-06T12:19:31.831Z
2023-11-06T12:27:12.281Z
2023-11-21T17:44:24.651Z
{'Vendor': '1E', 'Product': 'Platform', 'Versions': '0'}
CVE-2023-5821
The Thumbnail carousel slider plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing nonce validation on the deleteselected function. This makes it possible for unauthenticated attackers to delete sliders in bulk via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/bde75c5a-b0b7-4f26-91e9-dd4816e276c9?source=cve
2023-10-26T23:04:05.411Z
2023-10-27T11:28:44.618Z
2023-10-27T11:28:44.618Z
{'Vendor': 'nik00726', 'Product': 'Thumbnail carousel slider', 'Versions': '1.0'}
CVE-2023-5572
Server-Side Request Forgery (SSRF) in GitHub repository vriteio/vrite prior to 0.3.0.
https://huntr.dev/bounties/db649f1b-8578-4ef0-8df3-d320ab33f1be
2023-10-13T09:55:49.283Z
2023-10-13T09:55:53.916Z
2023-10-13T09:55:53.916Z
{'Vendor': 'vriteio', 'Product': 'vriteio/vrite', 'Versions': 'unspecified'}
CVE-2023-5088
A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor to read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot.
https://access.redhat.com/security/cve/CVE-2023-5088
2023-09-20T14:21:47.295Z
2023-11-03T13:58:50.085Z
2024-01-23T00:59:35.024Z
{'Vendor': 'n/a', 'Product': 'qemu', 'Versions': ''}
CVE-2023-5899
Cross-Site Request Forgery (CSRF) in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
https://huntr.com/bounties/0c7f1981-3bba-4508-a07e-4cb9a2553216
2023-11-01T00:00:37.615Z
2023-11-01T00:00:41.225Z
2023-11-01T00:00:41.225Z
{'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'}
CVE-2023-5933
An issue has been discovered in GitLab CE/EE affecting all versions after 13.7 before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. Improper input sanitization of user name allows arbitrary API PUT requests.
https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16-8-1-released/
2023-11-02T15:01:52.148Z
2024-01-26T01:02:58.931Z
2024-01-26T01:02:58.931Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '13.7, 16.7, 16.8'}
CVE-2023-5460
A vulnerability was found in Delta Electronics WPLSoft up to 2.51 and classified as problematic. This issue affects some unknown processing of the component Modbus Data Packet Handler. The manipulation leads to heap-based buffer overflow. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241583. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.241583
2023-10-09T13:46:25.782Z
2023-10-09T19:00:07.910Z
2023-10-09T19:00:07.910Z
{'Vendor': 'Delta Electronics', 'Product': 'WPLSoft', 'Versions': '2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 2.10, 2.11, 2.12, 2.13, 2.14, 2.15, 2.16, 2.17, 2.18, 2.19, 2.20, 2.21, 2.22, 2.23, 2.24, 2.25, 2.26, 2.27, 2.28, 2.29, 2.30, 2.31, 2.32, 2.33, 2.34, 2.35, 2.36, 2.37, 2.38, 2.39, 2.40, 2.41, 2.42, 2.43, 2.44, 2.45, 2.46, 2.47, 2.48, 2.49, 2.50, 2.51'}
CVE-2023-5030
A vulnerability has been found in Tongda OA up to 11.10 and classified as critical. This vulnerability affects unknown code of the file general/hr/recruit/plan/delete.php. The manipulation of the argument PLAN_ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239872.
https://vuldb.com/?id.239872
2023-09-17T06:27:34.812Z
2023-09-17T22:00:07.471Z
2023-10-24T19:15:47.289Z
{'Vendor': 'Tongda', 'Product': 'OA', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9, 11.10'}
CVE-2023-5525
The Limit Login Attempts Reloaded WordPress plugin before 2.25.26 is missing authorization on the `toggle_auto_update` AJAX action, allowing any user with a valid nonce to toggle the auto-update status of the plugin.
https://wpscan.com/vulnerability/654bad15-1c88-446a-b28b-5a412cc0399d
2023-10-11T14:15:40.398Z
2023-11-27T16:22:06.971Z
2023-11-27T16:22:06.971Z
{'Vendor': 'Unknown', 'Product': 'Limit Login Attempts Reloaded', 'Versions': '0'}
CVE-2023-5175
During process shutdown, it was possible that an `ImageBitmap` was created that would later be used after being freed from a different codepath, leading to a potentially exploitable crash. This vulnerability affects Firefox < 118.
https://bugzilla.mozilla.org/show_bug.cgi?id=1849704
2023-09-25T15:03:44.093Z
2023-09-27T14:13:57.892Z
2023-09-27T14:13:57.892Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5876
Mattermost fails to properly validate a RegExp built off the server URL path, allowing an attacker in control of an enrolled server to mount a Denial Of Service.
https://mattermost.com/security-updates
2023-10-31T10:56:31.545Z
2023-11-02T08:26:01.611Z
2023-11-02T08:26:01.611Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost Desktop', 'Versions': '0, 5.5.1'}
CVE-2023-5319
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18.
https://huntr.dev/bounties/e2542cbe-41ab-4a90-b6a4-191884c1834d
2023-09-30T00:00:06.956Z
2023-09-30T00:00:16.272Z
2023-09-30T00:00:16.272Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-5749
The EmbedPress WordPress plugin before 3.9.2 does not sanitise and escape user input before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/3931daac-3899-4169-8625-4c95fd2adafc
2023-10-24T08:41:14.223Z
2023-12-11T19:22:41.580Z
2023-12-11T19:22:41.580Z
{'Vendor': 'Unknown', 'Product': 'EmbedPress', 'Versions': '0'}
CVE-2023-5026
A vulnerability classified as problematic has been found in Tongda OA 11.10. Affected is an unknown function of the file /general/ipanel/menu_code.php?MENU_TYPE=FAV. The manipulation of the argument OA_SUB_WINDOW leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239868.
https://vuldb.com/?id.239868
2023-09-16T12:33:58.689Z
2023-09-17T09:31:04.435Z
2023-10-24T19:10:54.536Z
{'Vendor': 'Tongda', 'Product': 'OA', 'Versions': '11.10'}
CVE-2023-5476
Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
2023-10-10T00:12:40.257Z
2023-10-11T22:28:52.850Z
2023-10-11T22:28:52.850Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'}
CVE-2023-5925
A vulnerability, which was classified as critical, has been found in Campcodes Simple Student Information System 1.0. This issue affects some unknown processing of the file /classes/Master.php. The manipulation of the argument f leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-244325 was assigned to this vulnerability.
https://vuldb.com/?id.244325
2023-11-02T13:00:32.099Z
2023-11-02T19:00:08.783Z
2023-11-02T19:00:08.783Z
{'Vendor': 'Campcodes', 'Product': 'Simple Student Information System', 'Versions': '1.0'}
CVE-2023-5860
The Icons Font Loader plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload function in all versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
https://www.wordfence.com/threat-intel/vulnerabilities/id/12a9fbe8-445a-478a-b6ce-cd669ccb6a2d?source=cve
2023-10-30T22:15:39.667Z
2023-11-02T11:00:50.449Z
2023-11-02T11:00:50.449Z
{'Vendor': 'abuhayat', 'Product': 'Icons Font Loader', 'Versions': '*'}
CVE-2023-5163
The Weather Atlas Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'shortcode-weather-atlas' shortcode in versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c2324caa-f804-4f76-9d08-8951fbee4669?source=cve
2023-09-25T13:50:55.864Z
2023-11-22T15:33:34.005Z
2023-11-22T15:33:34.005Z
{'Vendor': 'weatheratlas', 'Product': 'Weather Atlas Widget', 'Versions': '*'}
CVE-2023-5499
Information exposure vulnerability in Shenzhen Reachfar v28, the exploitation of which could allow a remote attacker to retrieve all the week's logs stored in the 'log2' directory. An attacker could retrieve sensitive information such as remembered wifi networks, sent messages, SOS device locations and device configurations.
https://www.incibe.es/en/incibe-cert/notices/aviso/shenzhen-reachfar-v28-information-exposure
2023-10-10T09:26:26.184Z
2023-10-10T13:21:59.698Z
2023-12-19T14:38:41.121Z
{'Vendor': 'SHENZHEN REACHFAR TECHNOLOGY COMPANY LIMITED', 'Product': 'Shenzhen Reachfar v28', 'Versions': 'all versions'}
CVE-2023-5533
The AI ChatBot plugin for WordPress is vulnerable to unauthorized use of AJAX actions due to missing capability checks on the corresponding functions in versions up to, and including, 4.8.9 as well as 4.9.2. This makes it possible for unauthenticated attackers to perform some of those actions that were intended for higher privileged users.
https://www.wordfence.com/threat-intel/vulnerabilities/id/a9db002f-ff41-493a-87b1-5f0b4b07cfc2?source=cve
2023-10-11T19:00:32.298Z
2023-10-20T07:29:26.096Z
2023-10-23T13:01:54.092Z
{'Vendor': 'quantumcloud', 'Product': 'AI ChatBot', 'Versions': '*, 4.9.2'}
CVE-2023-5972
A null pointer dereference flaw was found in the nft_inner.c functionality of netfilter in the Linux kernel. This issue could allow a local user to crash the system or escalate their privileges on the system.
https://access.redhat.com/security/cve/CVE-2023-5972
2023-11-06T19:19:58.357Z
2023-11-23T17:21:20.589Z
2024-01-23T01:45:13.740Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''}
CVE-2023-5421
An attacker who is logged into OTRS as an user with privileges to create and change customer user data may manipulate the CustomerID field to execute JavaScript code that runs immediatly after the data is saved.The issue onlyoccurs if the configuration for AdminCustomerUser::UseAutoComplete was changed before. This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.
https://otrs.com/release-notes/otrs-security-advisory-2023-09/
2023-10-05T08:12:09.849Z
2023-10-16T08:10:55.114Z
2023-10-16T08:10:55.114Z
{'Vendor': 'OTRS AG', 'Product': 'OTRS', 'Versions': '7.0.x, 8.0.x'}
CVE-2023-5071
The Sitekit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'sitekit_iframe' shortcode in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/011c8a06-298e-4a53-9ef8-552585426d79?source=cve
2023-09-19T18:26:21.367Z
2023-10-20T06:35:04.245Z
2023-10-20T06:35:04.245Z
{'Vendor': 'webvitaly', 'Product': 'Sitekit', 'Versions': '*'}
CVE-2023-5564
Cross-site Scripting (XSS) - Stored in GitHub repository froxlor/froxlor prior to 2.1.0-dev1.
https://huntr.dev/bounties/9254d8f3-a847-4ae8-8477-d2ce027cff5c
2023-10-13T00:00:06.686Z
2023-10-13T00:00:19.626Z
2023-10-13T00:00:19.626Z
{'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'}
CVE-2023-5134
The Easy Registration Forms for WordPress is vulnerable to Information Disclosure via the 'erforms_user_meta' shortcode in versions up to, and including, 2.1.1 due to insufficient controls on the information retrievable via the shortcode. This makes it possible for authenticated attackers, with subscriber-level capabilities or above, to retrieve arbitrary sensitive user meta.
https://www.wordfence.com/threat-intel/vulnerabilities/id/562fe11f-36a0-4f23-9eed-50ada7ab2961?source=cve
2023-09-22T19:23:30.408Z
2023-09-23T07:34:02.132Z
2023-09-23T07:34:02.132Z
{'Vendor': 'easyregistrationforms', 'Product': 'Easy Registration Forms', 'Versions': '*'}
CVE-2023-5837
A vulnerability classified as problematic was found in AlexanderLivanov FotosCMS2 up to 2.4.3. This vulnerability affects unknown code of the file profile.php of the component Cookie Handler. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-243802 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.243802
2023-10-28T06:39:20.313Z
2023-10-28T21:31:04.594Z
2023-10-28T21:31:04.594Z
{'Vendor': 'AlexanderLivanov', 'Product': 'FotosCMS2', 'Versions': '2.4.0, 2.4.1, 2.4.2, 2.4.3'}
CVE-2023-5358
Improper access control in Report log filters feature in Devolutions Server 2023.2.10.0 and earlier allows attackers to retrieve logs from vaults or entries they are not allowed to access via the report request url query parameters.
https://devolutions.net/security/advisories/DEVO-2023-0019/
2023-10-03T13:22:28.118Z
2023-11-01T17:17:31.501Z
2023-11-01T17:18:14.337Z
{'Vendor': 'Devolutions', 'Product': 'Devolutions Server', 'Versions': '0'}
CVE-2023-5708
The WP Post Columns plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'column' shortcode in all versions up to, and including, 2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d96e5986-8c89-4e7e-aa63-f41aa13eeff4?source=cve
2023-10-22T17:40:08.376Z
2023-11-22T15:33:35.847Z
2023-11-22T15:33:35.847Z
{'Vendor': 'sammyb', 'Product': 'WP Post Columns', 'Versions': '*'}
CVE-2023-5909
KEPServerEX does not properly validate certificates from clients which may allow unauthenticated users to connect.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-03
2023-11-01T16:18:45.060Z
2023-11-30T22:05:59.595Z
2023-11-30T22:05:59.595Z
{'Vendor': 'PTC', 'Product': 'KEPServerEX', 'Versions': '0'}
CVE-2023-5323
Cross-site Scripting (XSS) - Generic in GitHub repository dolibarr/dolibarr prior to 18.0.
https://huntr.dev/bounties/7a048bb7-bfdd-4299-931e-9bc283e92bc8
2023-10-01T00:00:06.888Z
2023-10-01T00:00:19.423Z
2023-10-01T00:00:19.423Z
{'Vendor': 'dolibarr', 'Product': 'dolibarr/dolibarr', 'Versions': 'unspecified'}
CVE-2023-5773
null
null
2023-10-25T22:07:49.187Z
null
2023-11-27T21:42:55.097Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-5289
Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.8.4.
https://huntr.dev/bounties/8d0e0804-d3fd-49fe-bfa4-7a91135767ce
2023-09-29T13:59:04.251Z
2023-09-29T13:59:17.250Z
2023-09-29T13:59:17.250Z
{'Vendor': 'ikus060', 'Product': 'ikus060/rdiffweb', 'Versions': 'unspecified'}
CVE-2023-5266
A vulnerability, which was classified as critical, was found in DedeBIZ 6.2. This affects an unknown part of the file /src/admin/tags_main.php. The manipulation of the argument ids leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240879.
https://vuldb.com/?id.240879
2023-09-29T05:43:54.605Z
2023-09-29T15:00:06.967Z
2023-10-24T19:52:22.784Z
{'Vendor': 'n/a', 'Product': 'DedeBIZ', 'Versions': '6.2'}
CVE-2023-5636
Unrestricted Upload of File with Dangerous Type vulnerability in ArslanSoft Education Portal allows Command Injection.This issue affects Education Portal: before v1.1.
https://www.usom.gov.tr/bildirim/tr-23-0670
2023-10-18T11:04:02.785Z
2023-12-01T13:37:57.783Z
2023-12-01T13:37:57.783Z
{'Vendor': 'ArslanSoft', 'Product': 'Education Portal', 'Versions': '0'}
CVE-2023-5118
The application is vulnerable to Stored Cross-Site Scripting (XSS) in the endpoint /sofer/DocumentService.asc/SaveAnnotation, where input data transmitted via the POST method in the parameters author and text are not adequately sanitized and validated. This allows for the injection of malicious JavaScript code. The vulnerability was identified in the function for adding new annotations while editing document content. Reporters inform that the vulnerability has been removed in software versions above 11.1.x. Previous versions may also be vulnerable, but this has not been confirmed.
https://cert.pl/en/posts/2024/01/CVE-2023-5118/
2023-09-22T07:46:21.503Z
2024-01-11T15:23:44.745Z
2024-01-11T15:23:44.745Z
{'Vendor': 'Kofax', 'Product': 'Capture', 'Versions': '11.0.0'}
CVE-2023-5548
Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection.
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77846
2023-10-12T00:42:28.476Z
2023-11-09T19:36:18.676Z
2023-11-09T19:36:18.676Z
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'}
CVE-2023-5724
Drivers are not always robust to extremely large draw calls and in some cases this scenario could have led to a crash. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1.
https://bugzilla.mozilla.org/show_bug.cgi?id=1836705
2023-10-23T17:22:04.914Z
2023-10-24T12:47:10.797Z
2023-10-24T21:06:48.318Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5374
A vulnerability classified as critical was found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this vulnerability is an unknown functionality of the file products.php. The manipulation of the argument c leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241255.
https://vuldb.com/?id.241255
2023-10-04T06:44:02.148Z
2023-10-04T13:31:04.897Z
2023-10-05T05:30:50.709Z
{'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'}
CVE-2023-5661
The Social Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'socialfeed' shortcode in all versions up to, and including, 1.5.4.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with author-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/8b145772-624e-4af0-9156-03c483bf8381?source=cve
2023-10-19T16:06:58.900Z
2023-11-07T11:31:07.891Z
2023-11-07T11:31:07.891Z
{'Vendor': 'umarbajwa', 'Product': 'Social Feed | All social media in one place', 'Versions': '*'}
CVE-2023-5231
The Magic Action Box plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 2.17.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ce9b908b-1388-41fb-915c-e4e29eaf57ed?source=cve
2023-09-27T15:50:02.669Z
2023-10-20T07:29:32.612Z
2023-10-20T07:29:32.612Z
{'Vendor': 'pogidude', 'Product': 'Magic Action Box', 'Versions': '*'}
CVE-2023-5948
Improper Authorization in GitHub repository teamamaze/amazefileutilities prior to 1.91.
https://huntr.com/bounties/ac1363b5-207b-40d9-aac5-e66d6213f692
2023-11-03T06:39:51.066Z
2023-11-03T06:40:02.720Z
2023-11-03T06:40:02.720Z
{'Vendor': 'teamamaze', 'Product': 'teamamaze/amazefileutilities', 'Versions': 'unspecified'}
CVE-2023-5362
The Carousel, Recent Post Slider and Banner Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'spice_post_slider' shortcode in versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c0dd70b9-6f8a-41fc-ab4f-f6cdfee8dfb8?source=cve
2023-10-03T13:34:34.333Z
2023-10-30T13:49:01.699Z
2023-10-30T13:49:01.699Z
{'Vendor': 'spicethemes', 'Product': 'Carousel, Recent Post Slider and Banner Slider', 'Versions': '*'}
CVE-2023-5698
A vulnerability classified as problematic was found in CodeAstro Internet Banking System 1.0. This vulnerability affects unknown code of the file pages_deposit_money.php. The manipulation of the argument account_number with the input 421873905--><ScRiPt%20>alert(9523)</ScRiPt><!-- leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243136.
https://vuldb.com/?id.243136
2023-10-22T09:30:00.400Z
2023-10-22T23:00:08.487Z
2023-10-22T23:00:08.487Z
{'Vendor': 'CodeAstro', 'Product': 'Internet Banking System', 'Versions': '1.0'}
CVE-2023-5732
An attacker could have created a malicious link using bidirectional characters to spoof the location in the address bar when visited. This vulnerability affects Firefox < 117, Firefox ESR < 115.4, and Thunderbird < 115.4.1.
https://bugzilla.mozilla.org/show_bug.cgi?id=1690979
2023-10-23T17:22:07.478Z
2023-10-24T12:47:17.600Z
2023-10-24T21:06:46.643Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5227
Unrestricted Upload of File with Dangerous Type in GitHub repository thorsten/phpmyfaq prior to 3.1.8.
https://huntr.dev/bounties/a335c013-db75-4120-872c-42059c7100e8
2023-09-27T13:07:57.342Z
2023-09-30T00:00:15.175Z
2023-09-30T00:00:15.175Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-5159
Mattermost fails to properly verify the permissions when managing/updating a bot allowing a User Manager role with user edit permissions to manage/update bots.
https://mattermost.com/security-updates
2023-09-25T11:36:21.829Z
2023-09-29T09:21:37.828Z
2023-09-29T09:21:37.828Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 7.8.10, 8.1.1'}
CVE-2023-5509
The myStickymenu WordPress plugin before 2.6.5 does not adequately authorize some ajax calls, allowing any logged-in user to perform the actions.
https://wpscan.com/vulnerability/3b33c262-e7f0-4310-b26d-4727d7c25c9d
2023-10-10T23:27:19.261Z
2023-11-20T18:55:10.363Z
2023-11-20T18:55:10.363Z
{'Vendor': 'Unknown', 'Product': 'Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any Theme', 'Versions': '0'}
CVE-2023-5765
Improper access control in the password analyzer feature in Devolutions Remote Desktop Manager 2023.2.33 and earlier on Windows allows an attacker to bypass permissions via data source switching.
https://devolutions.net/security/advisories/DEVO-2023-0019/
2023-10-25T13:40:26.166Z
2023-11-01T17:12:15.912Z
2023-11-01T17:12:15.912Z
{'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'}
CVE-2023-5335
The Buzzsprout Podcasting plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'buzzsprout' shortcode in versions up to, and including, 1.8.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/be7f8b73-801d-46e8-81c1-8bb0bb576700?source=cve
2023-10-02T12:33:34.231Z
2023-10-30T13:49:01.192Z
2023-10-30T13:49:01.192Z
{'Vendor': 'molehill', 'Product': 'Buzzsprout Podcasting', 'Versions': '*'}
CVE-2023-5620
The Web Push Notifications WordPress plugin before 4.35.0 does not prevent visitors on the site from changing some of the plugin options, some of which may be used to conduct Stored XSS attacks.
https://wpscan.com/vulnerability/a03330c2-3ae0-404d-a114-33b18cc47666
2023-10-17T18:32:57.635Z
2023-11-27T16:22:07.320Z
2023-11-27T16:22:07.320Z
{'Vendor': 'Unknown', 'Product': 'Web Push Notifications', 'Versions': '0'}
CVE-2023-5270
A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file view_parcel.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240883.
https://vuldb.com/?id.240883
2023-09-29T06:32:50.141Z
2023-09-29T16:00:05.812Z
2023-10-24T19:57:15.614Z
{'Vendor': 'SourceCodester', 'Product': 'Best Courier Management System', 'Versions': '1.0'}
CVE-2023-5764
A template injection flaw was found in Ansible where a user's controller internal templating operations may remove the unsafe designation from template data. This issue could allow an attacker to use a specially crafted file to introduce code injection when supplying templating data.
https://access.redhat.com/errata/RHSA-2023:7773
2023-10-25T10:27:46.601Z
2023-12-12T22:01:33.467Z
2024-01-23T01:38:29.888Z
{'Vendor': 'n/a', 'Product': 'ansible', 'Versions': ''}
CVE-2023-5334
The WP Responsive header image slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'sp_responsiveslider' shortcode in versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/6953dea2-ca2d-4283-97c2-45c3420d9390?source=cve
2023-10-02T12:32:48.437Z
2023-10-03T01:58:50.744Z
2023-10-03T01:58:50.744Z
{'Vendor': 'wponlinesupport', 'Product': 'WP Responsive header image slider', 'Versions': '*'}
CVE-2023-5621
The Thumbnail Slider With Lightbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Title field in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
https://www.wordfence.com/threat-intel/vulnerabilities/id/547c425d-8b0f-4e65-8b8a-c3a3059301fe?source=cve
2023-10-17T18:54:32.809Z
2023-10-18T07:31:16.506Z
2023-10-18T07:31:16.506Z
{'Vendor': 'nik00726', 'Product': 'Thumbnail Slider With Lightbox', 'Versions': '*'}
CVE-2023-5271
A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file edit_parcel.php. The manipulation of the argument email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240884.
https://vuldb.com/?id.240884
2023-09-29T06:32:58.549Z
2023-09-29T16:00:07.092Z
2023-10-24T21:21:58.748Z
{'Vendor': 'SourceCodester', 'Product': 'Best Courier Management System', 'Versions': '1.0'}
CVE-2023-5158
A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor.
https://access.redhat.com/security/cve/CVE-2023-5158
2023-09-25T11:01:28.398Z
2023-09-25T15:55:15.724Z
2024-01-23T01:02:35.622Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '5.13-rc1'}
CVE-2023-5363
Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse. Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception. However, these issues are not currently assessed as security critical. Changing the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary. OpenSSL 3.1 and 3.0 are vulnerable to this issue.
https://www.openssl.org/news/secadv/20231024.txt
2023-10-03T16:19:46.060Z
2023-10-24T15:31:40.890Z
2023-10-24T15:51:07.614Z
{'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.0.0, 3.1.0'}
CVE-2023-5699
A vulnerability, which was classified as problematic, has been found in CodeAstro Internet Banking System 1.0. This issue affects some unknown processing of the file pages_view_client.php. The manipulation of the argument acc_name with the input Johnnie Reyes'"()&%<zzz><ScRiPt >alert(5646)</ScRiPt> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243137 was assigned to this vulnerability.
https://vuldb.com/?id.243137
2023-10-22T09:30:04.464Z
2023-10-22T23:31:05.110Z
2023-10-22T23:31:05.110Z
{'Vendor': 'CodeAstro', 'Product': 'Internet Banking System', 'Versions': '1.0'}
CVE-2023-5226
An issue has been discovered in GitLab affecting all versions before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. Under certain circumstances, a malicious actor bypass prohibited branch checks using a specially crafted branch name to manipulate repository content in the UI.
https://gitlab.com/gitlab-org/gitlab/-/issues/426400
2023-09-27T13:01:23.089Z
2023-12-01T07:01:43.131Z
2023-12-01T07:01:43.131Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '0, 16.5, 16.6'}
CVE-2023-5676
In Eclipse OpenJ9 before version 0.41.0, the JVM can be forced into an infinite busy hang on a spinlock or a segmentation fault if a shutdown signal (SIGTERM, SIGINT or SIGHUP) is received before the JVM has finished initializing.
https://github.com/eclipse-openj9/openj9/pull/18085
2023-10-20T04:59:29.125Z
2023-11-15T14:02:01.422Z
2023-11-15T14:02:01.422Z
{'Vendor': 'Eclipse Foundation', 'Product': 'OpenJ9', 'Versions': '0'}
CVE-2023-5949
The SmartCrawl WordPress plugin before 3.8.3 does not prevent unauthorised users from accessing password-protected posts' content.
https://wpscan.com/vulnerability/3cec27ca-f470-402d-ae3e-271cb59cf407
2023-11-03T09:17:17.312Z
2023-12-18T20:08:03.243Z
2023-12-18T20:08:03.243Z
{'Vendor': 'Unknown', 'Product': 'SmartCrawl WordPress SEO checker, SEO analyzer, SEO optimizer', 'Versions': '0'}
CVE-2023-5725
A malicious installed WebExtension could open arbitrary URLs, which under the right circumstance could be leveraged to collect sensitive user data. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1.
https://bugzilla.mozilla.org/show_bug.cgi?id=1845739
2023-10-23T17:22:05.279Z
2023-10-24T12:47:11.631Z
2023-10-24T21:06:48.899Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5375
Open Redirect in GitHub repository mosparo/mosparo prior to 1.0.2.
https://huntr.dev/bounties/3fa2abde-cb58-45a3-a115-1727ece9acb9
2023-10-04T08:30:27.542Z
2023-10-04T08:30:39.679Z
2023-10-04T08:30:39.679Z
{'Vendor': 'mosparo', 'Product': 'mosparo/mosparo', 'Versions': 'unspecified'}
CVE-2023-5660
The SendPress Newsletters plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.22.3.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/cbce42a0-29a7-40df-973c-1fe7338f6c94?source=cve
2023-10-19T16:06:37.518Z
2023-11-07T11:31:09.310Z
2023-11-07T11:31:09.310Z
{'Vendor': 'brewlabs', 'Product': 'SendPress Newsletters', 'Versions': '*'}
CVE-2023-5230
The TM WooCommerce Compare & Wishlist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'tm_woo_wishlist_table' shortcode in versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/771ecb8c-feb1-40ea-b47b-a2ae033b3c87?source=cve
2023-09-27T15:49:24.121Z
2023-09-28T04:31:35.287Z
2023-09-28T04:31:35.287Z
{'Vendor': 'templatemonster-2002', 'Product': 'TM WooCommerce Compare & Wishlist', 'Versions': '*'}
CVE-2023-5119
The Forminator WordPress plugin before 1.27.0 does not properly sanitize the redirect-url field in the form submission settings, which could allow high-privilege users such as an administrator to inject arbitrary web scripts even when the unfiltered_html capability is disallowed (for example in a multisite setup).
https://wpscan.com/vulnerability/229207bb-8f8d-4579-a8e2-54516474ccb4
2023-09-22T09:32:26.565Z
2023-11-20T18:55:11.173Z
2023-11-20T18:55:11.173Z
{'Vendor': 'Unknown', 'Product': 'Forminator', 'Versions': '0'}
CVE-2023-5549
Insufficient web service capability checks made it possible to move categories a user had permission to manage, to a parent category they did not have the capability to manage.
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-66730
2023-10-12T00:45:57.574Z
2023-11-09T19:37:15.856Z
2023-11-09T19:37:15.856Z
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'}
CVE-2023-5322
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 20151231. It has been rated as critical. Affected by this issue is some unknown functionality of the file /sysmanage/edit_manageadmin.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240992. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
https://vuldb.com/?id.240992
2023-09-30T14:26:20.733Z
2023-10-01T04:31:04.085Z
2023-10-25T05:06:43.345Z
{'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'}
CVE-2023-5772
The Debug Log Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.1. This is due to missing or incorrect nonce validation on the clear_log() function. This makes it possible for unauthenticated attackers to clear the debug log via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/7e539549-1125-4b0e-aa3c-c8844041c23a?source=cve
2023-10-25T22:04:46.513Z
2023-11-30T03:32:49.964Z
2023-11-30T03:32:49.964Z
{'Vendor': 'qriouslad', 'Product': 'Debug Log Manager', 'Versions': '*'}