CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-5138 | Glitch detection is not enabled by default for the CortexM33 core in Silicon Labs secure vault high parts EFx32xG2xB, except EFR32xG21B. | https://github.com/SiliconLabs/gecko_sdk | 2023-09-22T21:13:46.220Z | 2024-01-03T22:31:04.433Z | 2024-01-03T22:31:04.433Z | {'Vendor': 'silabs.com', 'Product': 'GSDK', 'Versions': '1.0'} |
CVE-2023-5568 | A heap-based Buffer Overflow flaw was discovered in Samba. It could allow a remote, authenticated attacker to exploit this vulnerability to cause a denial of service. | https://access.redhat.com/security/cve/CVE-2023-5568 | 2023-10-13T07:06:17.684Z | 2023-10-24T21:56:41.633Z | 2024-01-23T01:26:11.228Z | {'Vendor': 'n/a', 'Product': 'samba', 'Versions': '4.19.2'} |
CVE-2023-5285 | A vulnerability classified as critical was found in Tongda OA 2017. Affected by this vulnerability is an unknown functionality of the file general/hr/recruit/recruitment/delete.php. The manipulation of the argument RECRUITMENT_ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-240913 was assigned to this vulnerability. | https://vuldb.com/?id.240913 | 2023-09-29T09:53:02.259Z | 2023-09-29T19:31:05.300Z | 2023-10-24T21:36:37.182Z | {'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': 'n/a'} |
CVE-2023-5790 | A vulnerability classified as critical was found in SourceCodester File Manager App 1.0. Affected by this vulnerability is an unknown functionality of the file endpoint/add-file.php. The manipulation of the argument uploadedFileName leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243595. | https://vuldb.com/?id.243595 | 2023-10-26T06:36:16.675Z | 2023-10-26T16:00:09.954Z | 2023-10-26T16:00:09.954Z | {'Vendor': 'SourceCodester', 'Product': 'File Manager App', 'Versions': '1.0'} |
CVE-2023-5840 | Weak Password Recovery Mechanism for Forgotten Password in GitHub repository linkstackorg/linkstack prior to v4.2.9. | https://huntr.com/bounties/8042d8c3-650e-4c0d-9146-d9ccf6082b30 | 2023-10-29T00:00:07.451Z | 2023-10-29T00:00:20.031Z | 2023-10-29T00:00:20.031Z | {'Vendor': 'linkstackorg', 'Product': 'linkstackorg/linkstack', 'Versions': 'unspecified'} |
CVE-2023-5143 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in D-Link DAR-7000 up to 20151231. This issue affects some unknown processing of the file /log/webmailattach.php. The manipulation of the argument table_name leads to an unknown weakness. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240239. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. | https://vuldb.com/?id.240239 | 2023-09-24T15:56:04.588Z | 2023-09-24T22:31:04.295Z | 2023-10-24T19:23:06.542Z | {'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'} |
CVE-2023-5006 | The WP Discord Invite WordPress plugin before 2.5.1 does not protect some of its actions against CSRF attacks, allowing an unauthenticated attacker to perform actions on their behalf by tricking a logged in administrator to submit a crafted request. | https://wpscan.com/vulnerability/d29bcc1c-241b-4867-a0c8-4ae5f9d1c8e8 | 2023-09-15T21:03:54.448Z | 2024-01-17T14:31:48.144Z | 2024-01-17T14:31:48.144Z | {'Vendor': 'Unknown', 'Product': 'WP Discord Invite', 'Versions': '0'} |
CVE-2023-5905 | The DeMomentSomTres WordPress Export Posts With Images WordPress plugin through 20220825 does not check authorization of requests to export the blog data, allowing any logged in user, such as subscribers to export the contents of the blog, including restricted and unpublished posts, as well as passwords of protected posts. | https://wpscan.com/vulnerability/f94e91ef-1773-476c-9945-37e89ceefd3f | 2023-11-01T08:43:31.363Z | 2024-01-15T15:10:43.450Z | 2024-01-15T15:10:43.450Z | {'Vendor': 'Unknown', 'Product': 'DeMomentSomTres WordPress Export Posts With Images', 'Versions': '0'} |
CVE-2023-5682 | A vulnerability has been found in Tongda OA 2017 and classified as critical. This vulnerability affects unknown code of the file general/hr/training/record/delete.php. The manipulation of the argument RECORD_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-243058 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.243058 | 2023-10-20T15:10:59.975Z | 2023-10-20T20:31:06.429Z | 2023-10-20T20:31:06.429Z | {'Vendor': 'Tongda', 'Product': 'OA', 'Versions': '2017'} |
CVE-2023-5728 | During garbage collection extra operations were performed on a object that should not be. This could have led to a potentially exploitable crash. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1. | https://bugzilla.mozilla.org/show_bug.cgi?id=1852729 | 2023-10-23T17:22:06.275Z | 2023-10-24T12:47:14.295Z | 2023-10-24T21:06:50.587Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-5544 | Wiki comments required additional sanitizing and access restrictions to prevent a stored XSS risk and potential IDOR risk. | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-79509 | 2023-10-12T00:14:41.896Z | 2023-11-09T19:32:16.862Z | 2023-11-09T19:32:16.862Z | {'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'} |
CVE-2023-5114 | The idbbee plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'idbbee' shortcode in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ac763936-7147-4100-8a46-4c6d2f2224b4?source=cve | 2023-09-21T19:23:48.644Z | 2023-10-31T11:29:12.590Z | 2023-10-31T11:29:12.590Z | {'Vendor': 'faikdjikic', 'Product': 'idbbee', 'Versions': '*'} |
CVE-2023-5817 | The Neon text plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's neontext_box shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes (color). This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/f9998485-e272-48fc-b2f1-9e30158d0d16?source=cve | 2023-10-26T22:35:20.800Z | 2023-10-27T10:59:12.922Z | 2023-10-27T10:59:12.922Z | {'Vendor': 'freeben', 'Product': 'Neon text', 'Versions': '*'} |
CVE-2023-5952 | The Welcart e-Commerce WordPress plugin before 2.9.5 unserializes user input from cookies, which could allow unautehtniacted users to perform PHP Object Injection when a suitable gadget is present on the blog | https://wpscan.com/vulnerability/0acd613e-dbd6-42ae-9f3d-6d6e77a4c1b7 | 2023-11-03T12:51:39.381Z | 2023-12-04T21:27:54.563Z | 2023-12-04T21:27:54.563Z | {'Vendor': 'Unknown', 'Product': 'Welcart e-Commerce', 'Versions': '0'} |
CVE-2023-5051 | The CallRail Phone Call Tracking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'callrail_form' shortcode in versions up to, and including, 0.5.2 due to insufficient input sanitization and output escaping on the 'form_id' user supplied attribute. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/35def866-7460-4cad-8d86-7b9e4905cbe4?source=cve | 2023-09-18T14:02:47.491Z | 2023-10-27T03:16:17.469Z | 2023-10-27T03:16:17.469Z | {'Vendor': 'callrail', 'Product': 'CallRail Phone Call Tracking', 'Versions': '*'} |
CVE-2023-5694 | A vulnerability was found in CodeAstro Internet Banking System 1.0. It has been classified as problematic. Affected is an unknown function of the file pages_system_settings.php. The manipulation of the argument sys_name with the input <ScRiPt >alert(991)</ScRiPt> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243132. | https://vuldb.com/?id.243132 | 2023-10-22T09:29:44.197Z | 2023-10-22T22:00:08.748Z | 2023-10-22T22:00:08.748Z | {'Vendor': 'CodeAstro', 'Product': 'Internet Banking System', 'Versions': '1.0'} |
CVE-2023-5381 | The Elementor Addon Elements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 1.12.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | https://www.wordfence.com/threat-intel/vulnerabilities/id/bd2bc2e7-960e-40db-9dcc-a6a60117bd83?source=cve | 2023-10-04T15:14:30.123Z | 2023-11-15T22:32:29.744Z | 2023-11-15T22:32:29.744Z | {'Vendor': 'webtechstreet', 'Product': 'Elementor Addon Elements', 'Versions': '*'} |
CVE-2023-5801 | Vulnerability of identity verification being bypassed in the face unlock module. Successful exploitation of this vulnerability will affect integrity and confidentiality. | https://consumer.huawei.com/en/support/bulletin/2023/11/ | 2023-10-26T11:33:07.080Z | 2023-11-08T02:48:14.529Z | 2023-11-08T02:48:14.529Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.0.0, 2.0.0'} |
CVE-2023-5102 |
Insufficient Control Flow Management in RDT400 in SICK APU allows an unprivileged remote attacker to potentially enable hidden functionality via HTTP requests.
| https://sick.com/psirt | 2023-09-21T07:10:38.363Z | 2023-10-09T12:09:08.155Z | 2023-10-09T12:09:08.155Z | {'Vendor': 'SICK AG', 'Product': 'APU0200', 'Versions': 'all versions'} |
CVE-2023-5552 | A password disclosure vulnerability in the Secure PDF eXchange (SPX) feature allows attackers with full email access to decrypt PDFs in Sophos Firewall version 19.5 MR3 (19.5.3) and older, if the password type is set to “Specified by sender”. | https://www.sophos.com/en-us/security-advisories/sophos-sa-20231017-spx-password | 2023-10-12T05:55:23.384Z | 2023-10-17T23:29:12.601Z | 2023-10-17T23:29:12.601Z | {'Vendor': 'Sophos', 'Product': 'Sophos Firewall', 'Versions': '19.5.4, 20.0.0'} |
CVE-2023-5047 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in DRD Fleet Leasing DRDrive allows SQL Injection.This issue affects DRDrive: before 20231006.
| https://www.usom.gov.tr/bildirim/tr-23-0651 | 2023-09-18T13:31:52.059Z | 2023-11-22T11:20:29.178Z | 2023-11-22T11:20:29.178Z | {'Vendor': 'DRD Fleet Leasing', 'Product': 'DRDrive', 'Versions': '0'} |
CVE-2023-5417 | The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_update_category function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to modify the Funnelforms category for a given post ID. | https://www.wordfence.com/threat-intel/vulnerabilities/id/148794ea-3bc9-4084-bdb9-6ee63a781a39?source=cve | 2023-10-04T20:39:55.568Z | 2023-11-22T15:33:20.139Z | 2023-11-22T15:33:20.139Z | {'Vendor': 'funnelforms', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free', 'Versions': '*'} |
CVE-2023-5944 |
Delta Electronics DOPSoft is vulnerable to a stack-based buffer overflow, which may allow for arbitrary code execution if an attacker can lead a legitimate user to execute a specially crafted file.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-01 | 2023-11-02T22:30:47.777Z | 2023-12-04T23:08:48.592Z | 2023-12-04T23:08:48.592Z | {'Vendor': 'Delta Electronics', 'Product': 'DOPSoft', 'Versions': 'All versions '} |
CVE-2023-5339 | Mattermost Desktop fails to set an appropriate log level during initial run after fresh installation resulting in logging all keystrokes including password entry being logged.
| https://mattermost.com/security-updates | 2023-10-02T12:42:09.725Z | 2023-10-17T09:30:41.612Z | 2023-10-17T09:30:41.612Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 5.5.0'} |
CVE-2023-5769 |
A vulnerability exists in the webserver that affects the
RTU500 series product versions listed below. A malicious
actor could perform cross-site scripting on the webserver
due to user input being improperly sanitized.
| https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176&languageCode=en&Preview=true | 2023-10-25T15:24:39.863Z | 2023-12-14T16:19:51.846Z | 2023-12-14T16:19:51.846Z | {'Vendor': 'Hitachi Energy', 'Product': 'RTU500', 'Versions': 'RTU500 series CMU Firmware version 12.0.1 – 12.0.14, RTU500 series CMU Firmware version 12.2.1 – 12.2.11, RTU500 series CMU Firmware version 12.4.1 – 12.4.11, RTU500 series CMU Firmware version 12.6.1 – 12.6.9 , RTU500 series CMU Firmware version 12.7.1 – 12.7.6, RTU500 series CMU Firmware version 13.2.1 – 13.2.6 , RTU500 series CMU Firmware version 13.4.1 – 13.4.3 '} |
CVE-2023-5293 | A vulnerability, which was classified as critical, was found in ECshop 4.1.5. Affected is an unknown function of the file /admin/leancloud.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240924. | https://vuldb.com/?id.240924 | 2023-09-29T14:19:05.445Z | 2023-09-29T20:31:04.683Z | 2023-10-25T04:52:05.131Z | {'Vendor': 'n/a', 'Product': 'ECshop', 'Versions': '4.1.5'} |
CVE-2023-5786 | A vulnerability was found in GeoServer GeoWebCache up to 1.15.1. It has been declared as problematic. This vulnerability affects unknown code of the file /geoserver/gwc/rest.html. The manipulation leads to direct request. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243592. | https://vuldb.com/?id.243592 | 2023-10-26T05:39:57.017Z | 2023-10-26T15:31:04.617Z | 2023-10-26T15:31:04.617Z | {'Vendor': 'GeoServer', 'Product': 'GeoWebCache', 'Versions': '1.15.0, 1.15.1'} |
CVE-2023-5856 | Use after free in Side Panel in Google Chrome prior to 119.0.6045.105 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html | 2023-10-30T22:11:17.244Z | 2023-11-01T17:14:02.689Z | 2023-11-01T17:14:02.689Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'} |
CVE-2023-5913 | Incorrect Privilege Assignment vulnerability in opentext Fortify ScanCentral DAST. The vulnerability could be exploited to gain elevated privileges.This issue affects Fortify ScanCentral DAST versions 21.1, 21.2, 21.2.1, 22.1, 22.1.1, 22.2, 23.1.
| https://portal.microfocus.com/s/article/KM000023500?language=en_US | 2023-11-01T22:02:30.314Z | 2023-11-08T16:42:31.074Z | 2023-11-08T16:42:31.074Z | {'Vendor': 'opentext', 'Product': 'Fortify ScanCentral DAST', 'Versions': '21.1, 21.2, 21.2.1, 22.1, 22.1.1, 22.2, 23.1'} |
CVE-2023-5010 | Student Information System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'coursecode' parameter of the marks.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/kissin/ | 2023-09-15T22:52:20.378Z | 2023-12-20T15:55:07.052Z | 2023-12-20T15:55:07.052Z | {'Vendor': 'Kashipara Group', 'Product': 'Student Information System', 'Versions': '1.0'} |
CVE-2023-5437 | The WP fade in text news plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 12.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b4accf10-710e-4cba-8d61-04e422324f9d?source=cve | 2023-10-05T19:17:37.561Z | 2023-10-31T08:32:52.624Z | 2023-10-31T08:32:52.624Z | {'Vendor': 'gopiplus', 'Product': 'WP fade in text news', 'Versions': '*'} |
CVE-2023-5964 |
The 1E-Exchange-DisplayMessageinstruction that is part of the End-User Interaction product pack available on the 1E Exchange does not properly validate the Caption or Message parameters, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions. This instruction only runs on Windows clients.
To remediate this issue DELETE the instruction “Show dialogue with caption %Caption% and message %Message%” from the list of instructions in the Settings UI, and replace it with the new instruction 1E-Exchange-ShowNotification instruction available in the updated End-User Interaction product pack. The new instruction should show as “Show %Type% type notification with header %Header% and message %Message%” with a version of 7.1 or above. | https://exchange.1e.com/product-packs/end-user-interaction/ | 2023-11-06T12:19:31.831Z | 2023-11-06T12:27:12.281Z | 2023-11-21T17:44:24.651Z | {'Vendor': '1E', 'Product': 'Platform', 'Versions': '0'} |
CVE-2023-5821 | The Thumbnail carousel slider plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing nonce validation on the deleteselected function. This makes it possible for unauthenticated attackers to delete sliders in bulk via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/bde75c5a-b0b7-4f26-91e9-dd4816e276c9?source=cve | 2023-10-26T23:04:05.411Z | 2023-10-27T11:28:44.618Z | 2023-10-27T11:28:44.618Z | {'Vendor': 'nik00726', 'Product': 'Thumbnail carousel slider', 'Versions': '1.0'} |
CVE-2023-5572 | Server-Side Request Forgery (SSRF) in GitHub repository vriteio/vrite prior to 0.3.0. | https://huntr.dev/bounties/db649f1b-8578-4ef0-8df3-d320ab33f1be | 2023-10-13T09:55:49.283Z | 2023-10-13T09:55:53.916Z | 2023-10-13T09:55:53.916Z | {'Vendor': 'vriteio', 'Product': 'vriteio/vrite', 'Versions': 'unspecified'} |
CVE-2023-5088 | A bug in QEMU could cause a guest I/O operation otherwise addressed to an arbitrary disk offset to be targeted to offset 0 instead (potentially overwriting the VM's boot code). This could be used, for example, by L2 guests with a virtual disk (vdiskL2) stored on a virtual disk of an L1 (vdiskL1) hypervisor to read and/or write data to LBA 0 of vdiskL1, potentially gaining control of L1 at its next reboot. | https://access.redhat.com/security/cve/CVE-2023-5088 | 2023-09-20T14:21:47.295Z | 2023-11-03T13:58:50.085Z | 2024-01-23T00:59:35.024Z | {'Vendor': 'n/a', 'Product': 'qemu', 'Versions': ''} |
CVE-2023-5899 | Cross-Site Request Forgery (CSRF) in GitHub repository pkp/pkp-lib prior to 3.3.0-16. | https://huntr.com/bounties/0c7f1981-3bba-4508-a07e-4cb9a2553216 | 2023-11-01T00:00:37.615Z | 2023-11-01T00:00:41.225Z | 2023-11-01T00:00:41.225Z | {'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'} |
CVE-2023-5933 | An issue has been discovered in GitLab CE/EE affecting all versions after 13.7 before 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1. Improper input sanitization of user name allows arbitrary API PUT requests. | https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16-8-1-released/ | 2023-11-02T15:01:52.148Z | 2024-01-26T01:02:58.931Z | 2024-01-26T01:02:58.931Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '13.7, 16.7, 16.8'} |
CVE-2023-5460 | A vulnerability was found in Delta Electronics WPLSoft up to 2.51 and classified as problematic. This issue affects some unknown processing of the component Modbus Data Packet Handler. The manipulation leads to heap-based buffer overflow. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241583. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.241583 | 2023-10-09T13:46:25.782Z | 2023-10-09T19:00:07.910Z | 2023-10-09T19:00:07.910Z | {'Vendor': 'Delta Electronics', 'Product': 'WPLSoft', 'Versions': '2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 2.10, 2.11, 2.12, 2.13, 2.14, 2.15, 2.16, 2.17, 2.18, 2.19, 2.20, 2.21, 2.22, 2.23, 2.24, 2.25, 2.26, 2.27, 2.28, 2.29, 2.30, 2.31, 2.32, 2.33, 2.34, 2.35, 2.36, 2.37, 2.38, 2.39, 2.40, 2.41, 2.42, 2.43, 2.44, 2.45, 2.46, 2.47, 2.48, 2.49, 2.50, 2.51'} |
CVE-2023-5030 | A vulnerability has been found in Tongda OA up to 11.10 and classified as critical. This vulnerability affects unknown code of the file general/hr/recruit/plan/delete.php. The manipulation of the argument PLAN_ID leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239872. | https://vuldb.com/?id.239872 | 2023-09-17T06:27:34.812Z | 2023-09-17T22:00:07.471Z | 2023-10-24T19:15:47.289Z | {'Vendor': 'Tongda', 'Product': 'OA', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9, 11.10'} |
CVE-2023-5525 | The Limit Login Attempts Reloaded WordPress plugin before 2.25.26 is missing authorization on the `toggle_auto_update` AJAX action, allowing any user with a valid nonce to toggle the auto-update status of the plugin. | https://wpscan.com/vulnerability/654bad15-1c88-446a-b28b-5a412cc0399d | 2023-10-11T14:15:40.398Z | 2023-11-27T16:22:06.971Z | 2023-11-27T16:22:06.971Z | {'Vendor': 'Unknown', 'Product': 'Limit Login Attempts Reloaded', 'Versions': '0'} |
CVE-2023-5175 | During process shutdown, it was possible that an `ImageBitmap` was created that would later be used after being freed from a different codepath, leading to a potentially exploitable crash. This vulnerability affects Firefox < 118. | https://bugzilla.mozilla.org/show_bug.cgi?id=1849704 | 2023-09-25T15:03:44.093Z | 2023-09-27T14:13:57.892Z | 2023-09-27T14:13:57.892Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-5876 | Mattermost fails to properly validate a RegExp built off the server URL path, allowing an attacker in control of an enrolled server to mount a Denial Of Service.
| https://mattermost.com/security-updates | 2023-10-31T10:56:31.545Z | 2023-11-02T08:26:01.611Z | 2023-11-02T08:26:01.611Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost Desktop', 'Versions': '0, 5.5.1'} |
CVE-2023-5319 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.18. | https://huntr.dev/bounties/e2542cbe-41ab-4a90-b6a4-191884c1834d | 2023-09-30T00:00:06.956Z | 2023-09-30T00:00:16.272Z | 2023-09-30T00:00:16.272Z | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-5749 | The EmbedPress WordPress plugin before 3.9.2 does not sanitise and escape user input before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/3931daac-3899-4169-8625-4c95fd2adafc | 2023-10-24T08:41:14.223Z | 2023-12-11T19:22:41.580Z | 2023-12-11T19:22:41.580Z | {'Vendor': 'Unknown', 'Product': 'EmbedPress', 'Versions': '0'} |
CVE-2023-5026 | A vulnerability classified as problematic has been found in Tongda OA 11.10. Affected is an unknown function of the file /general/ipanel/menu_code.php?MENU_TYPE=FAV. The manipulation of the argument OA_SUB_WINDOW leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-239868. | https://vuldb.com/?id.239868 | 2023-09-16T12:33:58.689Z | 2023-09-17T09:31:04.435Z | 2023-10-24T19:10:54.536Z | {'Vendor': 'Tongda', 'Product': 'OA', 'Versions': '11.10'} |
CVE-2023-5476 | Use after free in Blink History in Google Chrome prior to 118.0.5993.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html | 2023-10-10T00:12:40.257Z | 2023-10-11T22:28:52.850Z | 2023-10-11T22:28:52.850Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'} |
CVE-2023-5925 | A vulnerability, which was classified as critical, has been found in Campcodes Simple Student Information System 1.0. This issue affects some unknown processing of the file /classes/Master.php. The manipulation of the argument f leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-244325 was assigned to this vulnerability. | https://vuldb.com/?id.244325 | 2023-11-02T13:00:32.099Z | 2023-11-02T19:00:08.783Z | 2023-11-02T19:00:08.783Z | {'Vendor': 'Campcodes', 'Product': 'Simple Student Information System', 'Versions': '1.0'} |
CVE-2023-5860 | The Icons Font Loader plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the upload function in all versions up to, and including, 1.1.2. This makes it possible for authenticated attackers, with administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. | https://www.wordfence.com/threat-intel/vulnerabilities/id/12a9fbe8-445a-478a-b6ce-cd669ccb6a2d?source=cve | 2023-10-30T22:15:39.667Z | 2023-11-02T11:00:50.449Z | 2023-11-02T11:00:50.449Z | {'Vendor': 'abuhayat', 'Product': 'Icons Font Loader', 'Versions': '*'} |
CVE-2023-5163 | The Weather Atlas Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'shortcode-weather-atlas' shortcode in versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c2324caa-f804-4f76-9d08-8951fbee4669?source=cve | 2023-09-25T13:50:55.864Z | 2023-11-22T15:33:34.005Z | 2023-11-22T15:33:34.005Z | {'Vendor': 'weatheratlas', 'Product': 'Weather Atlas Widget', 'Versions': '*'} |
CVE-2023-5499 | Information exposure vulnerability in Shenzhen Reachfar v28, the exploitation of which could allow a remote attacker to retrieve all the week's logs stored in the 'log2' directory. An attacker could retrieve sensitive information such as remembered wifi networks, sent messages, SOS device locations and device configurations. | https://www.incibe.es/en/incibe-cert/notices/aviso/shenzhen-reachfar-v28-information-exposure | 2023-10-10T09:26:26.184Z | 2023-10-10T13:21:59.698Z | 2023-12-19T14:38:41.121Z | {'Vendor': 'SHENZHEN REACHFAR TECHNOLOGY COMPANY LIMITED', 'Product': 'Shenzhen Reachfar v28', 'Versions': 'all versions'} |
CVE-2023-5533 | The AI ChatBot plugin for WordPress is vulnerable to unauthorized use of AJAX actions due to missing capability checks on the corresponding functions in versions up to, and including, 4.8.9 as well as 4.9.2. This makes it possible for unauthenticated attackers to perform some of those actions that were intended for higher privileged users. | https://www.wordfence.com/threat-intel/vulnerabilities/id/a9db002f-ff41-493a-87b1-5f0b4b07cfc2?source=cve | 2023-10-11T19:00:32.298Z | 2023-10-20T07:29:26.096Z | 2023-10-23T13:01:54.092Z | {'Vendor': 'quantumcloud', 'Product': 'AI ChatBot', 'Versions': '*, 4.9.2'} |
CVE-2023-5972 | A null pointer dereference flaw was found in the nft_inner.c functionality of netfilter in the Linux kernel. This issue could allow a local user to crash the system or escalate their privileges on the system. | https://access.redhat.com/security/cve/CVE-2023-5972 | 2023-11-06T19:19:58.357Z | 2023-11-23T17:21:20.589Z | 2024-01-23T01:45:13.740Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''} |
CVE-2023-5421 | An attacker who is logged into OTRS as an user with privileges to create and change customer user data may manipulate the CustomerID field to execute JavaScript code that runs
immediatly after the data is saved.The issue onlyoccurs if the configuration for AdminCustomerUser::UseAutoComplete was changed before.
This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.
| https://otrs.com/release-notes/otrs-security-advisory-2023-09/ | 2023-10-05T08:12:09.849Z | 2023-10-16T08:10:55.114Z | 2023-10-16T08:10:55.114Z | {'Vendor': 'OTRS AG', 'Product': 'OTRS', 'Versions': '7.0.x, 8.0.x'} |
CVE-2023-5071 | The Sitekit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'sitekit_iframe' shortcode in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/011c8a06-298e-4a53-9ef8-552585426d79?source=cve | 2023-09-19T18:26:21.367Z | 2023-10-20T06:35:04.245Z | 2023-10-20T06:35:04.245Z | {'Vendor': 'webvitaly', 'Product': 'Sitekit', 'Versions': '*'} |
CVE-2023-5564 | Cross-site Scripting (XSS) - Stored in GitHub repository froxlor/froxlor prior to 2.1.0-dev1. | https://huntr.dev/bounties/9254d8f3-a847-4ae8-8477-d2ce027cff5c | 2023-10-13T00:00:06.686Z | 2023-10-13T00:00:19.626Z | 2023-10-13T00:00:19.626Z | {'Vendor': 'froxlor', 'Product': 'froxlor/froxlor', 'Versions': 'unspecified'} |
CVE-2023-5134 | The Easy Registration Forms for WordPress is vulnerable to Information Disclosure via the 'erforms_user_meta' shortcode in versions up to, and including, 2.1.1 due to insufficient controls on the information retrievable via the shortcode. This makes it possible for authenticated attackers, with subscriber-level capabilities or above, to retrieve arbitrary sensitive user meta. | https://www.wordfence.com/threat-intel/vulnerabilities/id/562fe11f-36a0-4f23-9eed-50ada7ab2961?source=cve | 2023-09-22T19:23:30.408Z | 2023-09-23T07:34:02.132Z | 2023-09-23T07:34:02.132Z | {'Vendor': 'easyregistrationforms', 'Product': 'Easy Registration Forms', 'Versions': '*'} |
CVE-2023-5837 | A vulnerability classified as problematic was found in AlexanderLivanov FotosCMS2 up to 2.4.3. This vulnerability affects unknown code of the file profile.php of the component Cookie Handler. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-243802 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.243802 | 2023-10-28T06:39:20.313Z | 2023-10-28T21:31:04.594Z | 2023-10-28T21:31:04.594Z | {'Vendor': 'AlexanderLivanov', 'Product': 'FotosCMS2', 'Versions': '2.4.0, 2.4.1, 2.4.2, 2.4.3'} |
CVE-2023-5358 | Improper access control in Report log filters feature in Devolutions Server 2023.2.10.0 and earlier allows attackers to retrieve logs from vaults or entries they are not allowed to access via the report request url query parameters. | https://devolutions.net/security/advisories/DEVO-2023-0019/ | 2023-10-03T13:22:28.118Z | 2023-11-01T17:17:31.501Z | 2023-11-01T17:18:14.337Z | {'Vendor': 'Devolutions', 'Product': 'Devolutions Server', 'Versions': '0'} |
CVE-2023-5708 | The WP Post Columns plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'column' shortcode in all versions up to, and including, 2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d96e5986-8c89-4e7e-aa63-f41aa13eeff4?source=cve | 2023-10-22T17:40:08.376Z | 2023-11-22T15:33:35.847Z | 2023-11-22T15:33:35.847Z | {'Vendor': 'sammyb', 'Product': 'WP Post Columns', 'Versions': '*'} |
CVE-2023-5909 |
KEPServerEX does not properly validate certificates from clients which may allow unauthenticated users to connect.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-03 | 2023-11-01T16:18:45.060Z | 2023-11-30T22:05:59.595Z | 2023-11-30T22:05:59.595Z | {'Vendor': 'PTC', 'Product': 'KEPServerEX', 'Versions': '0'} |
CVE-2023-5323 | Cross-site Scripting (XSS) - Generic in GitHub repository dolibarr/dolibarr prior to 18.0. | https://huntr.dev/bounties/7a048bb7-bfdd-4299-931e-9bc283e92bc8 | 2023-10-01T00:00:06.888Z | 2023-10-01T00:00:19.423Z | 2023-10-01T00:00:19.423Z | {'Vendor': 'dolibarr', 'Product': 'dolibarr/dolibarr', 'Versions': 'unspecified'} |
CVE-2023-5773 | null | null | 2023-10-25T22:07:49.187Z | null | 2023-11-27T21:42:55.097Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-5289 | Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.8.4. | https://huntr.dev/bounties/8d0e0804-d3fd-49fe-bfa4-7a91135767ce | 2023-09-29T13:59:04.251Z | 2023-09-29T13:59:17.250Z | 2023-09-29T13:59:17.250Z | {'Vendor': 'ikus060', 'Product': 'ikus060/rdiffweb', 'Versions': 'unspecified'} |
CVE-2023-5266 | A vulnerability, which was classified as critical, was found in DedeBIZ 6.2. This affects an unknown part of the file /src/admin/tags_main.php. The manipulation of the argument ids leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240879. | https://vuldb.com/?id.240879 | 2023-09-29T05:43:54.605Z | 2023-09-29T15:00:06.967Z | 2023-10-24T19:52:22.784Z | {'Vendor': 'n/a', 'Product': 'DedeBIZ', 'Versions': '6.2'} |
CVE-2023-5636 | Unrestricted Upload of File with Dangerous Type vulnerability in ArslanSoft Education Portal allows Command Injection.This issue affects Education Portal: before v1.1.
| https://www.usom.gov.tr/bildirim/tr-23-0670 | 2023-10-18T11:04:02.785Z | 2023-12-01T13:37:57.783Z | 2023-12-01T13:37:57.783Z | {'Vendor': 'ArslanSoft', 'Product': 'Education Portal', 'Versions': '0'} |
CVE-2023-5118 | The application is vulnerable to Stored Cross-Site Scripting (XSS) in the endpoint /sofer/DocumentService.asc/SaveAnnotation, where input data transmitted via the POST method in the parameters author and text are not adequately sanitized and validated. This allows for the injection of malicious JavaScript code. The vulnerability was identified in the function for adding new annotations while editing document content.
Reporters inform that the vulnerability has been removed in software versions above 11.1.x. Previous versions may also be vulnerable, but this has not been confirmed.
| https://cert.pl/en/posts/2024/01/CVE-2023-5118/ | 2023-09-22T07:46:21.503Z | 2024-01-11T15:23:44.745Z | 2024-01-11T15:23:44.745Z | {'Vendor': 'Kofax', 'Product': 'Capture', 'Versions': '11.0.0'} |
CVE-2023-5548 | Stronger revision number limitations were required on file serving endpoints to improve cache poisoning protection. | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-77846 | 2023-10-12T00:42:28.476Z | 2023-11-09T19:36:18.676Z | 2023-11-09T19:36:18.676Z | {'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'} |
CVE-2023-5724 | Drivers are not always robust to extremely large draw calls and in some cases this scenario could have led to a crash. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1. | https://bugzilla.mozilla.org/show_bug.cgi?id=1836705 | 2023-10-23T17:22:04.914Z | 2023-10-24T12:47:10.797Z | 2023-10-24T21:06:48.318Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-5374 | A vulnerability classified as critical was found in SourceCodester Online Computer and Laptop Store 1.0. Affected by this vulnerability is an unknown functionality of the file products.php. The manipulation of the argument c leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-241255. | https://vuldb.com/?id.241255 | 2023-10-04T06:44:02.148Z | 2023-10-04T13:31:04.897Z | 2023-10-05T05:30:50.709Z | {'Vendor': 'SourceCodester', 'Product': 'Online Computer and Laptop Store', 'Versions': '1.0'} |
CVE-2023-5661 | The Social Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'socialfeed' shortcode in all versions up to, and including, 1.5.4.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with author-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/8b145772-624e-4af0-9156-03c483bf8381?source=cve | 2023-10-19T16:06:58.900Z | 2023-11-07T11:31:07.891Z | 2023-11-07T11:31:07.891Z | {'Vendor': 'umarbajwa', 'Product': 'Social Feed | All social media in one place', 'Versions': '*'} |
CVE-2023-5231 | The Magic Action Box plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 2.17.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ce9b908b-1388-41fb-915c-e4e29eaf57ed?source=cve | 2023-09-27T15:50:02.669Z | 2023-10-20T07:29:32.612Z | 2023-10-20T07:29:32.612Z | {'Vendor': 'pogidude', 'Product': 'Magic Action Box', 'Versions': '*'} |
CVE-2023-5948 | Improper Authorization in GitHub repository teamamaze/amazefileutilities prior to 1.91. | https://huntr.com/bounties/ac1363b5-207b-40d9-aac5-e66d6213f692 | 2023-11-03T06:39:51.066Z | 2023-11-03T06:40:02.720Z | 2023-11-03T06:40:02.720Z | {'Vendor': 'teamamaze', 'Product': 'teamamaze/amazefileutilities', 'Versions': 'unspecified'} |
CVE-2023-5362 | The Carousel, Recent Post Slider and Banner Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'spice_post_slider' shortcode in versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c0dd70b9-6f8a-41fc-ab4f-f6cdfee8dfb8?source=cve | 2023-10-03T13:34:34.333Z | 2023-10-30T13:49:01.699Z | 2023-10-30T13:49:01.699Z | {'Vendor': 'spicethemes', 'Product': 'Carousel, Recent Post Slider and Banner Slider', 'Versions': '*'} |
CVE-2023-5698 | A vulnerability classified as problematic was found in CodeAstro Internet Banking System 1.0. This vulnerability affects unknown code of the file pages_deposit_money.php. The manipulation of the argument account_number with the input 421873905--><ScRiPt%20>alert(9523)</ScRiPt><!-- leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-243136. | https://vuldb.com/?id.243136 | 2023-10-22T09:30:00.400Z | 2023-10-22T23:00:08.487Z | 2023-10-22T23:00:08.487Z | {'Vendor': 'CodeAstro', 'Product': 'Internet Banking System', 'Versions': '1.0'} |
CVE-2023-5732 | An attacker could have created a malicious link using bidirectional characters to spoof the location in the address bar when visited. This vulnerability affects Firefox < 117, Firefox ESR < 115.4, and Thunderbird < 115.4.1. | https://bugzilla.mozilla.org/show_bug.cgi?id=1690979 | 2023-10-23T17:22:07.478Z | 2023-10-24T12:47:17.600Z | 2023-10-24T21:06:46.643Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-5227 | Unrestricted Upload of File with Dangerous Type in GitHub repository thorsten/phpmyfaq prior to 3.1.8. | https://huntr.dev/bounties/a335c013-db75-4120-872c-42059c7100e8 | 2023-09-27T13:07:57.342Z | 2023-09-30T00:00:15.175Z | 2023-09-30T00:00:15.175Z | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-5159 | Mattermost fails to properly verify the permissions when managing/updating a bot allowing a User Manager role with user edit permissions to manage/update bots.
| https://mattermost.com/security-updates | 2023-09-25T11:36:21.829Z | 2023-09-29T09:21:37.828Z | 2023-09-29T09:21:37.828Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 7.8.10, 8.1.1'} |
CVE-2023-5509 | The myStickymenu WordPress plugin before 2.6.5 does not adequately authorize some ajax calls, allowing any logged-in user to perform the actions. | https://wpscan.com/vulnerability/3b33c262-e7f0-4310-b26d-4727d7c25c9d | 2023-10-10T23:27:19.261Z | 2023-11-20T18:55:10.363Z | 2023-11-20T18:55:10.363Z | {'Vendor': 'Unknown', 'Product': 'Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any Theme', 'Versions': '0'} |
CVE-2023-5765 | Improper access control in the password analyzer feature in Devolutions Remote Desktop Manager 2023.2.33 and earlier on Windows allows an attacker to bypass permissions via data source switching.
| https://devolutions.net/security/advisories/DEVO-2023-0019/ | 2023-10-25T13:40:26.166Z | 2023-11-01T17:12:15.912Z | 2023-11-01T17:12:15.912Z | {'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'} |
CVE-2023-5335 | The Buzzsprout Podcasting plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'buzzsprout' shortcode in versions up to, and including, 1.8.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/be7f8b73-801d-46e8-81c1-8bb0bb576700?source=cve | 2023-10-02T12:33:34.231Z | 2023-10-30T13:49:01.192Z | 2023-10-30T13:49:01.192Z | {'Vendor': 'molehill', 'Product': 'Buzzsprout Podcasting', 'Versions': '*'} |
CVE-2023-5620 | The Web Push Notifications WordPress plugin before 4.35.0 does not prevent visitors on the site from changing some of the plugin options, some of which may be used to conduct Stored XSS attacks. | https://wpscan.com/vulnerability/a03330c2-3ae0-404d-a114-33b18cc47666 | 2023-10-17T18:32:57.635Z | 2023-11-27T16:22:07.320Z | 2023-11-27T16:22:07.320Z | {'Vendor': 'Unknown', 'Product': 'Web Push Notifications', 'Versions': '0'} |
CVE-2023-5270 | A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file view_parcel.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-240883. | https://vuldb.com/?id.240883 | 2023-09-29T06:32:50.141Z | 2023-09-29T16:00:05.812Z | 2023-10-24T19:57:15.614Z | {'Vendor': 'SourceCodester', 'Product': 'Best Courier Management System', 'Versions': '1.0'} |
CVE-2023-5764 | A template injection flaw was found in Ansible where a user's controller internal templating operations may remove the unsafe designation from template data. This issue could allow an attacker to use a specially crafted file to introduce code injection when supplying templating data. | https://access.redhat.com/errata/RHSA-2023:7773 | 2023-10-25T10:27:46.601Z | 2023-12-12T22:01:33.467Z | 2024-01-23T01:38:29.888Z | {'Vendor': 'n/a', 'Product': 'ansible', 'Versions': ''} |
CVE-2023-5334 | The WP Responsive header image slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'sp_responsiveslider' shortcode in versions up to, and including, 3.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/6953dea2-ca2d-4283-97c2-45c3420d9390?source=cve | 2023-10-02T12:32:48.437Z | 2023-10-03T01:58:50.744Z | 2023-10-03T01:58:50.744Z | {'Vendor': 'wponlinesupport', 'Product': 'WP Responsive header image slider', 'Versions': '*'} |
CVE-2023-5621 | The Thumbnail Slider With Lightbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Image Title field in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | https://www.wordfence.com/threat-intel/vulnerabilities/id/547c425d-8b0f-4e65-8b8a-c3a3059301fe?source=cve | 2023-10-17T18:54:32.809Z | 2023-10-18T07:31:16.506Z | 2023-10-18T07:31:16.506Z | {'Vendor': 'nik00726', 'Product': 'Thumbnail Slider With Lightbox', 'Versions': '*'} |
CVE-2023-5271 | A vulnerability was found in SourceCodester Best Courier Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file edit_parcel.php. The manipulation of the argument email leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240884. | https://vuldb.com/?id.240884 | 2023-09-29T06:32:58.549Z | 2023-09-29T16:00:07.092Z | 2023-10-24T21:21:58.748Z | {'Vendor': 'SourceCodester', 'Product': 'Best Courier Management System', 'Versions': '1.0'} |
CVE-2023-5158 | A flaw was found in vringh_kiov_advance in drivers/vhost/vringh.c in the host side of a virtio ring in the Linux Kernel. This issue may result in a denial of service from guest to host via zero length descriptor. | https://access.redhat.com/security/cve/CVE-2023-5158 | 2023-09-25T11:01:28.398Z | 2023-09-25T15:55:15.724Z | 2024-01-23T01:02:35.622Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '5.13-rc1'} |
CVE-2023-5363 | Issue summary: A bug has been identified in the processing of key and
initialisation vector (IV) lengths. This can lead to potential truncation
or overruns during the initialisation of some symmetric ciphers.
Impact summary: A truncation in the IV can result in non-uniqueness,
which could result in loss of confidentiality for some cipher modes.
When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or
EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after
the key and IV have been established. Any alterations to the key length,
via the "keylen" parameter or the IV length, via the "ivlen" parameter,
within the OSSL_PARAM array will not take effect as intended, potentially
causing truncation or overreading of these values. The following ciphers
and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB.
For the CCM, GCM and OCB cipher modes, truncation of the IV can result in
loss of confidentiality. For example, when following NIST's SP 800-38D
section 8.2.1 guidance for constructing a deterministic IV for AES in
GCM mode, truncation of the counter portion could lead to IV reuse.
Both truncations and overruns of the key and overruns of the IV will
produce incorrect results and could, in some cases, trigger a memory
exception. However, these issues are not currently assessed as security
critical.
Changing the key and/or IV lengths is not considered to be a common operation
and the vulnerable API was recently introduced. Furthermore it is likely that
application developers will have spotted this problem during testing since
decryption would fail unless both peers in the communication were similarly
vulnerable. For these reasons we expect the probability of an application being
vulnerable to this to be quite low. However if an application is vulnerable then
this issue is considered very serious. For these reasons we have assessed this
issue as Moderate severity overall.
The OpenSSL SSL/TLS implementation is not affected by this issue.
The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because
the issue lies outside of the FIPS provider boundary.
OpenSSL 3.1 and 3.0 are vulnerable to this issue. | https://www.openssl.org/news/secadv/20231024.txt | 2023-10-03T16:19:46.060Z | 2023-10-24T15:31:40.890Z | 2023-10-24T15:51:07.614Z | {'Vendor': 'OpenSSL', 'Product': 'OpenSSL', 'Versions': '3.0.0, 3.1.0'} |
CVE-2023-5699 | A vulnerability, which was classified as problematic, has been found in CodeAstro Internet Banking System 1.0. This issue affects some unknown processing of the file pages_view_client.php. The manipulation of the argument acc_name with the input Johnnie Reyes'"()&%<zzz><ScRiPt >alert(5646)</ScRiPt> leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243137 was assigned to this vulnerability. | https://vuldb.com/?id.243137 | 2023-10-22T09:30:04.464Z | 2023-10-22T23:31:05.110Z | 2023-10-22T23:31:05.110Z | {'Vendor': 'CodeAstro', 'Product': 'Internet Banking System', 'Versions': '1.0'} |
CVE-2023-5226 | An issue has been discovered in GitLab affecting all versions before 16.4.3, all versions starting from 16.5 before 16.5.3, all versions starting from 16.6 before 16.6.1. Under certain circumstances, a malicious actor bypass prohibited branch checks using a specially crafted branch name to manipulate repository content in the UI. | https://gitlab.com/gitlab-org/gitlab/-/issues/426400 | 2023-09-27T13:01:23.089Z | 2023-12-01T07:01:43.131Z | 2023-12-01T07:01:43.131Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '0, 16.5, 16.6'} |
CVE-2023-5676 | In Eclipse OpenJ9 before version 0.41.0, the JVM can be forced into an infinite busy hang on a spinlock or a segmentation fault if a shutdown signal (SIGTERM, SIGINT or SIGHUP) is received before the JVM has finished initializing.
| https://github.com/eclipse-openj9/openj9/pull/18085 | 2023-10-20T04:59:29.125Z | 2023-11-15T14:02:01.422Z | 2023-11-15T14:02:01.422Z | {'Vendor': 'Eclipse Foundation', 'Product': 'OpenJ9', 'Versions': '0'} |
CVE-2023-5949 | The SmartCrawl WordPress plugin before 3.8.3 does not prevent unauthorised users from accessing password-protected posts' content. | https://wpscan.com/vulnerability/3cec27ca-f470-402d-ae3e-271cb59cf407 | 2023-11-03T09:17:17.312Z | 2023-12-18T20:08:03.243Z | 2023-12-18T20:08:03.243Z | {'Vendor': 'Unknown', 'Product': 'SmartCrawl WordPress SEO checker, SEO analyzer, SEO optimizer', 'Versions': '0'} |
CVE-2023-5725 | A malicious installed WebExtension could open arbitrary URLs, which under the right circumstance could be leveraged to collect sensitive user data. This vulnerability affects Firefox < 119, Firefox ESR < 115.4, and Thunderbird < 115.4.1. | https://bugzilla.mozilla.org/show_bug.cgi?id=1845739 | 2023-10-23T17:22:05.279Z | 2023-10-24T12:47:11.631Z | 2023-10-24T21:06:48.899Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-5375 | Open Redirect in GitHub repository mosparo/mosparo prior to 1.0.2. | https://huntr.dev/bounties/3fa2abde-cb58-45a3-a115-1727ece9acb9 | 2023-10-04T08:30:27.542Z | 2023-10-04T08:30:39.679Z | 2023-10-04T08:30:39.679Z | {'Vendor': 'mosparo', 'Product': 'mosparo/mosparo', 'Versions': 'unspecified'} |
CVE-2023-5660 | The SendPress Newsletters plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcode(s) in all versions up to, and including, 1.22.3.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/cbce42a0-29a7-40df-973c-1fe7338f6c94?source=cve | 2023-10-19T16:06:37.518Z | 2023-11-07T11:31:09.310Z | 2023-11-07T11:31:09.310Z | {'Vendor': 'brewlabs', 'Product': 'SendPress Newsletters', 'Versions': '*'} |
CVE-2023-5230 | The TM WooCommerce Compare & Wishlist plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'tm_woo_wishlist_table' shortcode in versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/771ecb8c-feb1-40ea-b47b-a2ae033b3c87?source=cve | 2023-09-27T15:49:24.121Z | 2023-09-28T04:31:35.287Z | 2023-09-28T04:31:35.287Z | {'Vendor': 'templatemonster-2002', 'Product': 'TM WooCommerce Compare & Wishlist', 'Versions': '*'} |
CVE-2023-5119 | The Forminator WordPress plugin before 1.27.0 does not properly sanitize the redirect-url field in the form submission settings, which could allow high-privilege users such as an administrator to inject arbitrary web scripts even when the unfiltered_html capability is disallowed (for example in a multisite setup). | https://wpscan.com/vulnerability/229207bb-8f8d-4579-a8e2-54516474ccb4 | 2023-09-22T09:32:26.565Z | 2023-11-20T18:55:11.173Z | 2023-11-20T18:55:11.173Z | {'Vendor': 'Unknown', 'Product': 'Forminator', 'Versions': '0'} |
CVE-2023-5549 | Insufficient web service capability checks made it possible to move categories a user had permission to manage, to a parent category they did not have the capability to manage. | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-66730 | 2023-10-12T00:45:57.574Z | 2023-11-09T19:37:15.856Z | 2023-11-09T19:37:15.856Z | {'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'} |
CVE-2023-5322 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in D-Link DAR-7000 up to 20151231. It has been rated as critical. Affected by this issue is some unknown functionality of the file /sysmanage/edit_manageadmin.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240992. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. | https://vuldb.com/?id.240992 | 2023-09-30T14:26:20.733Z | 2023-10-01T04:31:04.085Z | 2023-10-25T05:06:43.345Z | {'Vendor': 'D-Link', 'Product': 'DAR-7000', 'Versions': '20151231'} |
CVE-2023-5772 | The Debug Log Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.1. This is due to missing or incorrect nonce validation on the clear_log() function. This makes it possible for unauthenticated attackers to clear the debug log via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/7e539549-1125-4b0e-aa3c-c8844041c23a?source=cve | 2023-10-25T22:04:46.513Z | 2023-11-30T03:32:49.964Z | 2023-11-30T03:32:49.964Z | {'Vendor': 'qriouslad', 'Product': 'Debug Log Manager', 'Versions': '*'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.