CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-5288 |
A remote unauthorized attacker may connect to the SIM1012, interact with the device and
change configuration settings. The adversary may also reset the SIM and in the worst case upload a
new firmware version to the device.
| https://sick.com/psirt | 2023-09-29T10:17:33.150Z | 2023-09-29T11:37:56.571Z | 2023-09-29T11:37:56.571Z | {'Vendor': 'SICK AG', 'Product': 'SIM1012', 'Versions': 'all versions'} |
CVE-2023-5267 | A vulnerability has been found in Tongda OA 2017 and classified as critical. This vulnerability affects unknown code of the file general/hr/recruit/hr_pool/delete.php. The manipulation of the argument EXPERT_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-240880. | https://vuldb.com/?id.240880 | 2023-09-29T05:45:38.139Z | 2023-09-29T15:00:08.184Z | 2023-10-24T19:53:35.962Z | {'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': 'n/a'} |
CVE-2023-5637 | Unrestricted Upload of File with Dangerous Type vulnerability in ArslanSoft Education Portal allows Read Sensitive Strings Within an Executable.This issue affects Education Portal: before v1.1.
| https://www.usom.gov.tr/bildirim/tr-23-0670 | 2023-10-18T11:04:03.784Z | 2023-12-01T13:33:41.505Z | 2023-12-01T13:33:41.505Z | {'Vendor': 'ArslanSoft', 'Product': 'Education Portal', 'Versions': '0'} |
CVE-2023-5908 |
KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-03 | 2023-11-01T16:18:42.353Z | 2023-11-30T22:03:58.098Z | 2023-11-30T22:03:58.098Z | {'Vendor': 'PTC', 'Product': 'KEPServerEX', 'Versions': '0'} |
CVE-2023-5709 | The WD WidgetTwitter plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 1.0.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with contributor-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/86cdbfec-b1af-48ec-ae70-f97768694e44?source=cve | 2023-10-22T17:41:15.355Z | 2023-11-07T11:31:07.421Z | 2023-11-07T11:31:07.421Z | {'Vendor': '10web', 'Product': 'WD WidgetTwitter', 'Versions': '*'} |
CVE-2023-5070 | The Social Media Share Buttons & Social Sharing Icons plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.8.5 via the sfsi_save_export function. This can allow subscribers to export plugin settings that include social media authentication tokens and secrets as well as app passwords. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e9e43c5b-a094-44ab-a8a3-52d437f0e00d?source=cve | 2023-09-19T18:04:36.844Z | 2023-10-20T07:29:38.342Z | 2023-10-20T07:29:38.342Z | {'Vendor': 'socialdude', 'Product': 'Social Media Share Buttons & Social Sharing Icons', 'Versions': '*'} |
CVE-2023-5565 | The Shortcode Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'shortmenu' shortcode in versions up to, and including, 3.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/438b9c13-4059-4671-ab4a-07a8cf6f6122?source=cve | 2023-10-13T00:24:59.300Z | 2023-10-30T13:48:57.188Z | 2023-10-30T13:48:57.188Z | {'Vendor': 'amitsukapure', 'Product': 'Shortcode Menu', 'Versions': '*'} |
CVE-2023-5135 | The Simple Cloudflare Turnstile plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'gravity-simple-turnstile' shortcode in versions up to, and including, 1.23.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/91f6c9d3-641d-42f7-bf11-e3c3a44eeb76?source=cve | 2023-09-22T19:25:05.543Z | 2023-09-26T01:51:14.743Z | 2023-09-26T01:51:14.743Z | {'Vendor': 'elliotvs', 'Product': 'Simple Cloudflare Turnstile – CAPTCHA Alternative', 'Versions': '*'} |
CVE-2023-5836 | A vulnerability was found in SourceCodester Task Reminder System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file classes/Users.php?f=delete. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-243800. | https://vuldb.com/?id.243800 | 2023-10-28T06:26:38.654Z | 2023-10-28T21:00:08.118Z | 2023-10-28T21:00:08.118Z | {'Vendor': 'SourceCodester', 'Product': 'Task Reminder System', 'Versions': '1.0'} |
CVE-2023-5027 | A vulnerability classified as critical was found in SourceCodester Simple Membership System 1.0. Affected by this vulnerability is an unknown functionality of the file club_validator.php. The manipulation of the argument club leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239869 was assigned to this vulnerability. | https://vuldb.com/?id.239869 | 2023-09-16T12:35:34.309Z | 2023-09-17T16:31:05.163Z | 2023-10-24T19:12:07.780Z | {'Vendor': 'SourceCodester', 'Product': 'Simple Membership System', 'Versions': '1.0'} |
CVE-2023-5477 | Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html | 2023-10-10T00:12:40.405Z | 2023-10-11T22:28:53.993Z | 2023-10-11T22:28:53.993Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'} |
CVE-2023-5924 | A vulnerability classified as critical was found in Campcodes Simple Student Information System 1.0. This vulnerability affects unknown code of the file /admin/courses/view_course.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-244324. | https://vuldb.com/?id.244324 | 2023-11-02T13:00:28.343Z | 2023-11-02T18:00:12.789Z | 2023-11-02T18:00:12.789Z | {'Vendor': 'Campcodes', 'Product': 'Simple Student Information System', 'Versions': '1.0'} |
CVE-2023-5861 | Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 2.0. | https://huntr.com/bounties/7baecef8-6c59-42fc-bced-886c4929e220 | 2023-10-31T00:00:06.133Z | 2023-10-31T00:00:18.866Z | 2023-10-31T00:00:18.866Z | {'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'} |
CVE-2023-5162 | The Options for Twenty Seventeen plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'social-links' shortcode in versions up to, and including, 2.5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/df35d8c6-55ec-4cf5-8055-93ec5193c0a4?source=cve | 2023-09-25T13:33:07.762Z | 2023-09-26T01:51:15.201Z | 2023-09-26T01:51:15.201Z | {'Vendor': 'domainsupport', 'Product': 'Options for Twenty Seventeen', 'Versions': '*'} |
CVE-2023-5498 | Cross-Site Request Forgery (CSRF) in GitHub repository chiefonboarding/chiefonboarding prior to v2.0.47. | https://huntr.dev/bounties/ec367b1d-5ec4-4ab2-881a-caf82e4877d9 | 2023-10-10T09:08:40.422Z | 2023-10-10T09:08:52.815Z | 2023-10-10T09:08:52.815Z | {'Vendor': 'chiefonboarding', 'Product': 'chiefonboarding/chiefonboarding', 'Versions': 'unspecified'} |
CVE-2023-5532 | The ImageMapper plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.6. This is due to missing or incorrect nonce validation on the 'imgmap_save_area_title' function. This makes it possible for unauthenticated attackers to update the post title and inject malicious JavaScript via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/bbb67f02-87e8-4ca3-8a9d-6663a700ab5b?source=cve | 2023-10-11T18:05:32.307Z | 2023-11-07T11:01:46.139Z | 2023-11-07T11:01:46.139Z | {'Vendor': 'spikefinned', 'Product': 'ImageMapper', 'Versions': '*'} |
CVE-2023-5318 | Use of Hard-coded Credentials in GitHub repository microweber/microweber prior to 2.0. | https://huntr.dev/bounties/17826bdd-8136-48ae-afb9-af627cb6fd5d | 2023-09-30T00:00:06.857Z | 2023-09-30T00:00:17.339Z | 2023-09-30T00:00:17.339Z | {'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'} |
CVE-2023-5748 | Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology SSL VPN Client before 1.4.7-0687 allows local users to conduct denial-of-service attacks via unspecified vectors. | https://www.synology.com/en-global/security/advisory/Synology_SA_23_12 | 2023-10-24T06:10:16.429Z | 2023-10-24T10:26:59.087Z | 2023-11-09T09:51:01.023Z | {'Vendor': 'Synology', 'Product': 'Synology SSL VPN Client', 'Versions': '*'} |
CVE-2023-5898 | Cross-Site Request Forgery (CSRF) in GitHub repository pkp/pkp-lib prior to 3.3.0-16. | https://huntr.com/bounties/19801d12-b8ad-45e7-86e1-8f0230667c9e | 2023-11-01T00:00:37.528Z | 2023-11-01T00:00:41.808Z | 2023-11-01T00:00:41.808Z | {'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'} |
CVE-2023-5461 | A vulnerability was found in Delta Electronics WPLSoft 2.51. It has been classified as problematic. Affected is an unknown function of the component Modbus Handler. The manipulation leads to cleartext transmission of sensitive information. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241584. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.241584 | 2023-10-09T13:46:31.730Z | 2023-10-09T20:00:06.688Z | 2023-10-09T20:00:06.688Z | {'Vendor': 'Delta Electronics', 'Product': 'WPLSoft', 'Versions': '2.51'} |
CVE-2023-5031 | A vulnerability was found in OpenRapid RapidCMS 1.3.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/article/article-add.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-239875. | https://vuldb.com/?id.239875 | 2023-09-17T17:26:11.876Z | 2023-09-18T01:31:06.536Z | 2023-10-24T19:17:00.474Z | {'Vendor': 'OpenRapid', 'Product': 'RapidCMS', 'Versions': '1.3.1'} |
CVE-2023-5524 | Insufficient blacklisting in M-Files Web Companion before release version 23.10 and LTS Service Release Versions before 23.8 LTS SR1 allows
Remote Code Execution
via specific file types
| https://www.m-files.com/about/trust-center/security-advisories/cve-2023-5524/ | 2023-10-11T13:31:23.607Z | 2023-10-20T06:41:56.499Z | 2023-10-20T06:41:56.499Z | {'Vendor': 'M-Files', 'Product': 'Web Companion', 'Versions': '23.3, 23.8 LTS SR1'} |
CVE-2023-5174 | If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash.
*This bug only affects Firefox on Windows when run in non-standard configurations (such as using `runas`). Other operating systems are unaffected.* This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3. | https://bugzilla.mozilla.org/show_bug.cgi?id=1848454 | 2023-09-25T15:03:43.655Z | 2023-09-27T14:13:19.990Z | 2023-09-27T14:13:19.990Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-5877 | The affiliate-toolkit WordPress plugin before 3.4.3 lacks authorization and authentication for requests to it's affiliate-toolkit-starter/tools/atkp_imagereceiver.php endpoint, allowing unauthenticated visitors to make requests to arbitrary URL's, including RFC1918 private addresses, leading to a Server Side Request Forgery (SSRF) issue. | https://wpscan.com/vulnerability/39ed4934-3d91-4924-8acc-25759fef9e81 | 2023-10-31T12:53:17.769Z | 2024-01-01T14:18:58.165Z | 2024-01-01T14:18:58.165Z | {'Vendor': 'Unknown', 'Product': 'affiliate-toolkit', 'Versions': '0'} |
CVE-2023-5436 | The Vertical marquee plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 7.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/cd90d9c0-0cab-4fd3-b016-106032f300f7?source=cve | 2023-10-05T19:17:20.431Z | 2023-10-31T08:32:53.078Z | 2023-10-31T08:32:53.078Z | {'Vendor': 'gopiplushotmailcom', 'Product': 'Vertical marquee plugin', 'Versions': '*'} |
CVE-2023-5965 | An authenticated privileged attacker could upload a specially crafted zip to the EspoCRM server in version 7.2.5, via the update form, which could lead to arbitrary PHP code execution. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-espocrm | 2023-11-06T13:18:10.761Z | 2023-11-30T13:26:15.451Z | 2023-11-30T13:26:15.451Z | {'Vendor': 'EspoCRM', 'Product': 'EspoCRM', 'Versions': '0'} |
CVE-2023-5820 | The Thumbnail Slider With Lightbox plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing or incorrect nonce validation on the addedit functionality. This makes it possible for unauthenticated attackers to upload arbitrary files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e51e1cd2-6de9-4820-8bba-1c6b5053e2c1?source=cve | 2023-10-26T23:02:41.067Z | 2023-10-27T11:28:45.091Z | 2023-10-27T11:28:45.091Z | {'Vendor': 'nik00726', 'Product': 'Thumbnail Slider With Lightbox', 'Versions': '1.0'} |
CVE-2023-5573 | Allocation of Resources Without Limits or Throttling in GitHub repository vriteio/vrite prior to 0.3.0. | https://huntr.dev/bounties/46a2bb2c-712a-4008-a147-b862e3af7d72 | 2023-10-13T09:56:13.341Z | 2023-10-13T09:56:18.689Z | 2023-10-13T09:56:18.689Z | {'Vendor': 'vriteio', 'Product': 'vriteio/vrite', 'Versions': 'unspecified'} |
CVE-2023-5089 | The Defender Security WordPress plugin before 4.1.0 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the login page, even when the hide login page functionality of the plugin is enabled. | https://wpscan.com/vulnerability/2b547488-187b-44bc-a57d-f876a7d4c87d | 2023-09-20T14:56:32.290Z | 2023-10-16T19:39:25.420Z | 2023-10-16T19:39:25.420Z | {'Vendor': 'Unknown', 'Product': 'Defender Security', 'Versions': '0'} |
CVE-2023-5504 | The BackWPup plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.0.1 via the Log File Folder. This allows authenticated attackers to store backups in arbitrary folders on the server provided they can be written to by the server. Additionally, default settings will place an index.php and a .htaccess file into the chosen directory (unless already present) when the first backup job is run that are intended to prevent directory listing and file access. This means that an attacker could set the backup directory to the root of another site in a shared environment and thus disable that site. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e830fe1e-1171-46da-8ee7-0a6654153f18?source=cve | 2023-10-10T18:10:11.211Z | 2024-01-11T08:33:06.702Z | 2024-01-11T08:33:06.702Z | {'Vendor': 'wp_media', 'Product': 'BackWPup – WordPress Backup Plugin', 'Versions': '*'} |
CVE-2023-5154 | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in D-Link DAR-8000 up to 20151231 and classified as critical. This vulnerability affects unknown code of the file /sysmanage/changelogo.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-240250 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced. | https://vuldb.com/?id.240250 | 2023-09-24T15:56:48.480Z | 2023-09-25T03:00:07.651Z | 2023-10-24T19:36:31.546Z | {'Vendor': 'D-Link', 'Product': 'DAR-8000', 'Versions': '20151231'} |
CVE-2023-5857 | Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially execute arbitrary code via a malicious file. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html | 2023-10-30T22:11:17.344Z | 2023-11-01T17:14:02.873Z | 2023-11-01T17:14:02.873Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'} |
CVE-2023-5441 | NULL Pointer Dereference in GitHub repository vim/vim prior to 20d161ace307e28690229b68584f2d84556f8960. | https://huntr.dev/bounties/b54cbdf5-3e85-458d-bb38-9ea2c0b669f2 | 2023-10-05T20:29:56.622Z | 2023-10-05T20:30:09.121Z | 2023-10-05T20:30:09.121Z | {'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'} |
CVE-2023-5011 | Student Information System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'coursename' parameter of the marks.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/kissin/ | 2023-09-15T22:56:03.585Z | 2023-12-20T15:57:19.012Z | 2023-12-20T15:57:19.012Z | {'Vendor': 'Kashipara Group', 'Product': 'Student Information System', 'Versions': '1.0'} |
CVE-2023-5338 | The Theme Blvd Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 1.6.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/88809668-ea6b-41df-b2a7-ffe03a931c86?source=cve | 2023-10-02T12:35:56.699Z | 2023-11-22T15:33:30.652Z | 2023-11-22T15:33:30.652Z | {'Vendor': 'themeblvd', 'Product': 'Theme Blvd Shortcodes', 'Versions': '*'} |
CVE-2023-5768 | A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below.
Incomplete or wrong received APDU frame layout may
cause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer
with wrong length information of APDU or delayed reception
of data octets.
Only communication link of affected HCI IEC 60870-5-104
is blocked. If attack sequence stops the communication to
the previously attacked link gets normal again.
| https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176&languageCode=en&Preview=true | 2023-10-25T15:24:39.183Z | 2023-12-04T14:33:47.898Z | 2023-12-04T14:35:49.612Z | {'Vendor': 'Hitachi Energy', 'Product': 'RTU500 series', 'Versions': 'RTU500 series CMU Firmware version 12.0.1 – 12.0.14, RTU500 series CMU Firmware version 12.2.1 – 12.2.11, RTU500 series CMU Firmware version 12.4.1 – 12.4.11 , RTU500 series CMU Firmware version 12.6.1 – 12.6.9 , RTU500 series CMU Firmware version 12.7.1 – 12.7.6, RTU500 series CMU Firmware version 13.2.1 – 13.2.6 , RTU500 series CMU Firmware version 13.4.1 – 13.4.3 '} |
CVE-2023-5292 | The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'acfe_form' shortcode in versions up to, and including, 0.8.9.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/dcbe0c72-d518-45d3-a220-896a51071b26?source=cve | 2023-09-29T14:18:33.716Z | 2023-10-20T07:29:35.924Z | 2023-10-20T07:29:35.924Z | {'Vendor': 'hwk-fr', 'Product': 'Advanced Custom Fields: Extended', 'Versions': '*'} |
CVE-2023-5787 | A vulnerability was found in Shaanxi Chanming Education Technology Score Query System 5.0. It has been rated as critical. This issue affects some unknown processing. The manipulation of the argument stuIdCard leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243593 was assigned to this vulnerability. | https://vuldb.com/?id.243593 | 2023-10-26T05:44:07.034Z | 2023-10-26T15:31:05.733Z | 2023-10-26T15:31:05.733Z | {'Vendor': 'Shaanxi Chanming Education Technology', 'Product': 'Score Query System', 'Versions': '5.0'} |
CVE-2023-5103 | Improper Restriction of Rendered UI Layers or Frames in RDT400 in SICK APU allows an unprivileged remote attacker to potentially reveal sensitive information via tricking a user into
clicking on an actionable item using an iframe.
| https://sick.com/psirt | 2023-09-21T07:10:39.063Z | 2023-10-09T12:11:04.740Z | 2023-10-09T12:11:04.740Z | {'Vendor': 'SICK AG', 'Product': 'APU0200', 'Versions': 'all versions'} |
CVE-2023-5553 | During internal Axis Security Development Model (ASDM) threat-modelling, a flaw was found in the protection for device tampering (commonly known as Secure Boot) in AXIS OS making it vulnerable to a sophisticated attack to bypass this protection. To Axis' knowledge, there are no known exploits of the vulnerability at this time. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
| https://www.axis.com/dam/public/0a/66/25/cve-2023-5553-en-US-417789.pdf | 2023-10-12T07:06:14.462Z | 2023-11-21T06:59:42.711Z | 2023-11-21T06:59:42.711Z | {'Vendor': 'Axis Communications AB', 'Product': 'AXIS OS', 'Versions': 'AXIS OS 10.8 - 11.6'} |
CVE-2023-5046 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Biltay Technology Procost allows SQL Injection, Command Line Execution through SQL Injection.This issue affects Procost: before 1390.
| https://www.usom.gov.tr/bildirim/tr-23-0581 | 2023-09-18T13:25:32.541Z | 2023-10-12T11:55:21.003Z | 2023-11-30T08:22:48.713Z | {'Vendor': 'Biltay Technology', 'Product': 'Procost', 'Versions': '0'} |
CVE-2023-5416 | The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_delete_category function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete categories. | https://www.wordfence.com/threat-intel/vulnerabilities/id/992fc98f-4b23-4596-81fb-5543d82fd615?source=cve | 2023-10-04T20:35:11.689Z | 2023-11-22T15:33:32.162Z | 2023-11-22T15:33:32.162Z | {'Vendor': 'funnelforms', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free', 'Versions': '*'} |
CVE-2023-5945 | The video carousel slider with lightbox plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing or incorrect nonce validation on the responsive_video_gallery_with_lightbox_video_management_func() function. This makes it possible for unauthenticated attackers to delete videos hosted from the video slider via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/dc052b00-65a7-4668-8bdd-b06d69d12a4a?source=cve | 2023-11-03T00:19:31.883Z | 2023-11-03T12:31:29.214Z | 2023-11-03T12:31:29.214Z | {'Vendor': 'nik00726', 'Product': 'video carousel slider with lightbox', 'Versions': '1.0'} |
CVE-2023-5695 | A vulnerability was found in CodeAstro Internet Banking System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file pages_reset_pwd.php. The manipulation of the argument email with the input testing%40example.com'%26%25<ScRiPt%20>alert(9860)</ScRiPt> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243133 was assigned to this vulnerability. | https://vuldb.com/?id.243133 | 2023-10-22T09:29:47.970Z | 2023-10-22T22:31:04.837Z | 2023-10-22T22:31:04.837Z | {'Vendor': 'CodeAstro', 'Product': 'Internet Banking System', 'Versions': '1.0'} |
CVE-2023-5380 | A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed. | https://access.redhat.com/errata/RHSA-2023:7428 | 2023-10-04T14:27:46.912Z | 2023-10-25T19:46:59.432Z | 2024-01-23T01:22:55.043Z | {'Vendor': 'n/a', 'Product': 'xorg-server', 'Versions': '21.1.9'} |
CVE-2023-5545 | H5P metadata automatically populated the author with the user's username, which could be sensitive information. | http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78820 | 2023-10-12T00:18:04.007Z | 2023-11-09T19:33:18.127Z | 2023-11-09T19:33:18.127Z | {'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'} |
CVE-2023-5115 | An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path. | https://access.redhat.com/errata/RHSA-2023:5701 | 2023-09-21T19:29:27.130Z | 2023-12-18T13:43:07.791Z | 2024-01-23T01:00:25.919Z | {'Vendor': 'n/a', 'Product': 'ansible', 'Versions': '2.14.11'} |
CVE-2023-5953 | The Welcart e-Commerce WordPress plugin before 2.9.5 does not validate files to be uploaded, as well as does not have authorisation and CSRF in an AJAX action handling such upload. As a result, any authenticated users, such as subscriber could upload arbitrary files, such as PHP on the server | https://wpscan.com/vulnerability/6d29ba12-f14a-4cee-baae-a6049d83bce6 | 2023-11-03T13:51:50.331Z | 2023-12-04T21:28:03.020Z | 2023-12-04T21:28:03.020Z | {'Vendor': 'Unknown', 'Product': 'Welcart e-Commerce', 'Versions': '0'} |
CVE-2023-5050 | The Leaflet Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.3.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/3084c9ab-00aa-4b8e-aa46-bd70b335ec77?source=cve | 2023-09-18T14:00:46.486Z | 2023-10-20T06:35:15.119Z | 2023-10-20T06:35:15.119Z | {'Vendor': 'bozdoz', 'Product': 'Leaflet Map', 'Versions': '*'} |
CVE-2023-5379 | A flaw was found in Undertow. When an AJP request is sent that exceeds the max-header-size attribute in ajp-listener, JBoss EAP is marked in an error state by mod_cluster in httpd, causing JBoss EAP to close the TCP connection without returning an AJP response. This happens because mod_proxy_cluster marks the JBoss EAP instance as an error worker when the TCP connection is closed from the backend after sending the AJP request without receiving an AJP response, and stops forwarding. This issue could allow a malicious user could to repeatedly send requests that exceed the max-header-size, causing a Denial of Service (DoS). | https://access.redhat.com/errata/RHSA-2023:4509 | 2023-10-04T11:52:15.504Z | 2023-12-12T21:54:52.669Z | 2024-01-23T01:22:11.958Z | {'Vendor': 'n/a', 'Product': 'upstream', 'Versions': ''} |
CVE-2023-5683 | A vulnerability was found in Beijing Baichuo Smart S85F Management Platform up to 20231010 and classified as critical. This issue affects some unknown processing of the file /sysmanage/importconf.php. The manipulation of the argument btn_file_renew leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243059. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.243059 | 2023-10-20T15:16:21.750Z | 2023-10-21T05:00:06.020Z | 2023-10-21T05:00:06.020Z | {'Vendor': 'Beijing Baichuo', 'Product': 'Smart S85F Management Platform', 'Versions': '20231010'} |
CVE-2023-5729 | A malicious web site can enter fullscreen mode while simultaneously triggering a WebAuthn prompt. This could have obscured the fullscreen notification and could have been leveraged in a spoofing attack. This vulnerability affects Firefox < 119. | https://bugzilla.mozilla.org/show_bug.cgi?id=1823720 | 2023-10-23T17:22:06.586Z | 2023-10-24T12:47:15.116Z | 2023-10-24T12:47:15.116Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-5142 | A vulnerability classified as problematic was found in H3C GR-1100-P, GR-1108-P, GR-1200W, GR-1800AX, GR-2200, GR-3200, GR-5200, GR-8300, ER2100n, ER2200G2, ER3200G2, ER3260G2, ER5100G2, ER5200G2 and ER6300G2 up to 20230908. This vulnerability affects unknown code of the file /userLogin.asp of the component Config File Handler. The manipulation leads to path traversal. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-240238 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.240238 | 2023-09-24T14:06:15.230Z | 2023-09-24T22:00:06.432Z | 2023-10-24T19:21:53.383Z | {'Vendor': 'H3C', 'Product': 'GR-1100-P', 'Versions': '20230908'} |
CVE-2023-5512 | An issue has been discovered in GitLab CE/EE affecting all versions from 16.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. File integrity may be compromised when specific HTML encoding is used for file names leading for incorrect representation in the UI. | https://gitlab.com/gitlab-org/gitlab/-/issues/427827 | 2023-10-11T00:30:29.337Z | 2023-12-15T16:03:00.260Z | 2023-12-15T16:03:00.260Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.3, 16.5, 16.6'} |
CVE-2023-5007 | Student Information System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'id' parameter of the marks.php resource does not validate the characters received and they are sent unfiltered to the database.
| https://fluidattacks.com/advisories/kissin/ | 2023-09-15T21:43:30.060Z | 2023-12-20T15:58:34.088Z | 2023-12-20T15:58:34.088Z | {'Vendor': 'Kashipara Group', 'Product': 'Student Information System', 'Versions': '1.0'} |
CVE-2023-5904 | Cross-site Scripting (XSS) - Stored in GitHub repository pkp/pkp-lib prior to 3.3.0-16. | https://huntr.com/bounties/4df6bce6-dbe3-48e4-9830-e95cdc5138b6 | 2023-11-01T00:01:39.559Z | 2023-11-01T00:01:44.457Z | 2023-11-01T00:01:44.457Z | {'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'} |
CVE-2023-5284 | A vulnerability classified as critical has been found in SourceCodester Engineers Online Portal 1.0. Affected is an unknown function of the file upload_save_student.php. The manipulation of the argument uploaded_file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240912. | https://vuldb.com/?id.240912 | 2023-09-29T09:49:26.885Z | 2023-09-29T19:31:04.095Z | 2023-10-24T21:35:24.022Z | {'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'} |
CVE-2023-5791 | A vulnerability, which was classified as problematic, was found in SourceCodester Sticky Notes App 1.0. This affects an unknown part of the file endpoint/add-note.php. The manipulation of the argument noteTitle/noteContent leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243597 was assigned to this vulnerability. | https://vuldb.com/?id.243597 | 2023-10-26T07:15:04.620Z | 2023-10-26T16:31:04.854Z | 2023-10-26T16:31:04.854Z | {'Vendor': 'SourceCodester', 'Product': 'Sticky Notes App', 'Versions': '1.0'} |
CVE-2023-5586 | NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3.0-DEV. | https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740 | 2023-10-15T00:27:58.982Z | 2023-10-15T00:28:09.002Z | 2023-10-15T00:28:09.002Z | {'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'} |
CVE-2023-5990 | The Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor WordPress plugin before 3.4.2 does not have CSRF checks on some of its form actions such as deletion and duplication, which could allow attackers to make logged in admin perform such actions via CSRF attacks | https://wpscan.com/vulnerability/0a615ce3-93da-459d-a33f-a2a6e74a2f94 | 2023-11-07T11:41:14.856Z | 2023-12-04T21:29:10.777Z | 2023-12-04T21:29:10.777Z | {'Vendor': 'Unknown', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor', 'Versions': '0'} |
CVE-2023-5139 | Potential buffer overflow vulnerability at the following location in the Zephyr STM32 Crypto driver | https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rhrc-pcxp-4453 | 2023-09-22T23:08:46.735Z | 2023-10-26T04:40:36.930Z | 2023-10-26T04:40:36.930Z | {'Vendor': 'zephyrproject-rtos', 'Product': 'Zephyr', 'Versions': '*'} |
CVE-2023-5640 | The Article Analytics WordPress plugin does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection vulnerability. | https://wpscan.com/vulnerability/9a383ef5-0f1a-4894-8f78-845abcb5062d | 2023-10-18T13:28:24.069Z | 2023-11-20T18:55:11.955Z | 2023-11-20T18:55:11.955Z | {'Vendor': 'Unknown', 'Product': 'Article analytics', 'Versions': '0'} |
CVE-2023-5210 | The AMP+ Plus WordPress plugin through 3.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | https://wpscan.com/vulnerability/1c3ff47a-12a5-49c1-a166-2c57e5c0d0aa | 2023-09-26T19:24:57.427Z | 2023-12-04T21:28:59.242Z | 2023-12-04T21:28:59.242Z | {'Vendor': 'Unknown', 'Product': 'AMP+ Plus', 'Versions': '0'} |
CVE-2023-5705 | The VK Filter Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'vk_filter_search' shortcode in all versions up to, and including, 2.3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/012946d4-82ce-48b9-9b9a-1fc49846dca6?source=cve | 2023-10-22T17:38:39.588Z | 2023-10-27T11:28:44.082Z | 2023-10-27T11:28:44.082Z | {'Vendor': 'vektor-inc', 'Product': 'VK Filter Search', 'Versions': '*'} |
CVE-2023-5355 | The Awesome Support WordPress plugin before 6.1.5 does not sanitize file paths when deleting temporary attachment files, allowing a ticket submitter to delete arbitrary files on the server. | https://wpscan.com/vulnerability/d6f7faca-dacf-4455-a837-0404803d0f25 | 2023-10-03T12:25:54.894Z | 2023-11-06T20:41:57.821Z | 2023-11-06T20:41:57.821Z | {'Vendor': 'Unknown', 'Product': 'Awesome Support', 'Versions': '0'} |
CVE-2023-5882 | The Export any WordPress data to XML/CSV WordPress plugin before 1.4.0, WP All Export Pro WordPress plugin before 1.8.6 does not check nonce tokens early enough in the request lifecycle, allowing attackers to make logged in users perform unwanted actions leading to remote code execution. | https://wpscan.com/vulnerability/72be4b5c-21be-46af-a3f4-08b4c190a7e2 | 2023-10-31T14:23:44.548Z | 2023-12-18T20:08:04.861Z | 2023-12-18T20:08:04.861Z | {'Vendor': 'Unknown', 'Product': 'Export any WordPress data to XML/CSV', 'Versions': '0'} |
CVE-2023-5928 | A vulnerability was found in Campcodes Simple Student Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/departments/manage_department.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-244328. | https://vuldb.com/?id.244328 | 2023-11-02T13:00:43.506Z | 2023-11-02T19:31:05.941Z | 2023-11-02T19:31:05.941Z | {'Vendor': 'Campcodes', 'Product': 'Simple Student Information System', 'Versions': '1.0'} |
CVE-2023-5181 | The WP Discord Invite WordPress plugin before 2.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/564ad2b0-6ba6-4415-98d7-8d41bc1c3d44 | 2023-09-25T17:32:40.592Z | 2023-11-06T20:41:32.307Z | 2023-11-06T20:41:32.307Z | {'Vendor': 'Unknown', 'Product': 'WP Discord Invite', 'Versions': '0'} |
CVE-2023-5494 | A vulnerability was found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928 and classified as critical. Affected by this issue is some unknown functionality of the file /log/download.php. The manipulation of the argument file leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-241646 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.241646 | 2023-10-10T07:19:28.529Z | 2023-10-10T16:00:09.066Z | 2023-10-10T16:00:09.066Z | {'Vendor': 'Beijing Baichuo', 'Product': 'Smart S45F Multi-Service Secure Gateway Intelligent Management Platform', 'Versions': '20230928'} |
CVE-2023-5247 | Malicious Code Execution Vulnerability due to External Control of File Name or Path in multiple Mitsubishi Electric FA Engineering Software Products allows a malicious attacker to execute a malicious code by having legitimate users open a specially crafted project file, which could result in information disclosure, tampering and deletion, or a denial-of-service (DoS) condition. | https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-016_en.pdf | 2023-09-28T07:26:44.445Z | 2023-11-30T03:57:30.083Z | 2023-11-30T03:57:30.083Z | {'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'GX Works3', 'Versions': 'all versions'} |
CVE-2023-5302 | A vulnerability, which was classified as problematic, has been found in SourceCodester Best Courier Management System 1.0. This issue affects some unknown processing of the component Manage Account Page. The manipulation of the argument First Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240941 was assigned to this vulnerability. | https://vuldb.com/?id.240941 | 2023-09-29T16:17:41.561Z | 2023-09-30T12:00:07.117Z | 2023-10-25T05:00:37.220Z | {'Vendor': 'SourceCodester', 'Product': 'Best Courier Management System', 'Versions': '1.0'} |
CVE-2023-5752 | When installing a package from a Mercurial VCS URL (ie "pip install
hg+...") with pip prior to v23.3, the specified Mercurial revision could
be used to inject arbitrary configuration options to the "hg clone"
call (ie "--config"). Controlling the Mercurial configuration can modify
how and which repository is installed. This vulnerability does not
affect users who aren't installing from Mercurial.
| https://github.com/pypa/pip/pull/12306 | 2023-10-24T15:04:01.631Z | 2023-10-24T20:56:05.469Z | 2023-10-24T21:41:30.616Z | {'Vendor': 'Pip maintainers', 'Product': 'pip', 'Versions': '23.3'} |
CVE-2023-5197 | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.
Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free.
We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f15f29fd4779be8a418b66e9d52979bb6d6c2325 | 2023-09-26T09:43:24.384Z | 2023-09-26T10:04:37.147Z | 2023-09-26T10:04:37.147Z | {'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '5.9'} |
CVE-2023-5894 | Cross-site Scripting (XSS) - Stored in GitHub repository pkp/ojs prior to 3.3.0-16. | https://huntr.com/bounties/aba3ba5b-aa6b-4076-b663-4237b4a0761d | 2023-11-01T00:00:06.923Z | 2023-11-01T00:00:18.898Z | 2023-11-01T00:00:18.898Z | {'Vendor': 'pkp', 'Product': 'pkp/ojs', 'Versions': 'unspecified'} |
CVE-2023-5178 | A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation problem. | https://access.redhat.com/errata/RHSA-2023:7370 | 2023-09-25T16:38:10.637Z | 2023-11-01T16:32:20.350Z | 2024-01-25T19:45:46.845Z | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': '6.6-rc7'} |
CVE-2023-5482 | Insufficient data validation in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html | 2023-10-10T00:12:40.892Z | 2023-11-01T17:13:59.713Z | 2023-11-01T17:13:59.713Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'} |
CVE-2023-5528 | A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes. | https://github.com/kubernetes/kubernetes/issues/121879 | 2023-10-11T16:12:14.212Z | 2023-11-14T20:32:08.411Z | 2023-11-14T20:32:08.411Z | {'Vendor': 'Kubernetes', 'Product': 'kubelet', 'Versions': 'v1.28.0, v1.27.0, v1.26.0, 0, v1.28.4, v1.27.8, v1.26.11, v1.25.16'} |
CVE-2023-5601 | The WooCommerce Ninja Forms Product Add-ons WordPress plugin before 1.7.1 does not validate the file to be uploaded, allowing any unauthenticated users to upload arbitrary files to the server, leading to RCE. | https://wpscan.com/vulnerability/0035ec5e-d405-4eb7-8fe4-29dd0c71e4bc | 2023-10-16T11:56:41.635Z | 2023-11-06T20:41:49.307Z | 2023-11-06T20:41:49.307Z | {'Vendor': 'Unknown', 'Product': 'WooCommerce Ninja Forms Product Add-ons', 'Versions': '0'} |
CVE-2023-5251 | The Grid Plus plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the 'grid_plus_save_layout_callback' and 'grid_plus_delete_callback' functions in versions up to, and including, 1.3.2. This makes it possible for authenticated attackers with subscriber privileges or above, to add, update or delete grid layout. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d2d34c84-473c-49f8-b55c-c869b5479974?source=cve | 2023-09-28T12:38:09.118Z | 2023-10-30T13:49:02.343Z | 2023-10-30T13:49:02.343Z | {'Vendor': 'g5theme', 'Product': 'Grid Plus – Unlimited grid layout', 'Versions': '*'} |
CVE-2023-5744 | The Very Simple Google Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'vsgmap' shortcode in all versions up to, and including, 2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/fca7837c-ad24-44ce-b073-7df3f8bc4300?source=cve | 2023-10-24T01:32:07.580Z | 2023-10-24T13:53:01.122Z | 2023-10-24T13:53:01.122Z | {'Vendor': 'masterk', 'Product': 'Very Simple Google Maps', 'Versions': '*'} |
CVE-2023-5314 | The WP EXtra plugin for WordPress is vulnerable to unauthorized access to restricted functionality due to a missing capability check on the 'test-email' section of the register() function in versions up to, and including, 6.2. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to send emails with arbitrary content to arbitrary locations from the affected site's mail server. | https://www.wordfence.com/threat-intel/vulnerabilities/id/93c10a58-c5f2-440b-a88e-5314143fdd90?source=cve | 2023-09-29T20:40:57.343Z | 2023-11-22T15:33:31.574Z | 2023-11-22T15:33:31.574Z | {'Vendor': 'wpvncom', 'Product': 'WP EXtra', 'Versions': '*'} |
CVE-2023-5969 | Mattermost fails to properly sanitize the request to /api/v4/redirect_location allowing an attacker, sending a specially crafted request to /api/v4/redirect_location, to fill up the memory due to caching large items.
| https://mattermost.com/security-updates | 2023-11-06T15:45:39.602Z | 2023-11-06T15:48:23.590Z | 2023-11-06T15:48:23.590Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 7.8.12, 8.0.4, 8.1.3, 9.0.1'} |
CVE-2023-5590 | NULL Pointer Dereference in GitHub repository seleniumhq/selenium prior to 4.14.0. | https://huntr.dev/bounties/e268cd68-4f34-49bd-878b-82b96dcc0c99 | 2023-10-15T22:13:53.229Z | 2023-10-15T22:14:03.767Z | 2023-10-15T22:14:03.767Z | {'Vendor': 'seleniumhq', 'Product': 'seleniumhq/selenium', 'Versions': 'unspecified'} |
CVE-2023-5085 | The Advanced Menu Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'advMenu' shortcode in versions up to, and including, 0.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/5da2dac6-940c-419e-853f-6cfd5d53d427?source=cve | 2023-09-20T12:20:30.669Z | 2023-10-24T13:52:59.223Z | 2023-10-24T13:52:59.223Z | {'Vendor': 'johnnypea', 'Product': 'Advanced Menu Widget', 'Versions': '*'} |
CVE-2023-5986 |
A CWE-601 URL Redirection to Untrusted Site vulnerability exists that could cause an openredirect vulnerability leading to a cross site scripting attack. By providing a URL-encoded input
attackers can cause the software’s web application to redirect to the chosen domain after a
successful login is performed.
| https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-318-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-318-02.pdf | 2023-11-07T10:57:54.715Z | 2023-11-15T03:47:17.684Z | 2023-11-15T03:47:17.684Z | {'Vendor': 'Schneider Electric', 'Product': 'EcoStruxure Power Monitoring Expert (PME)', 'Versions': 'Version 2020 CU2 and prior, Version 2021 CU1 and prior'} |
CVE-2023-5656 | null | null | 2023-10-19T13:37:41.454Z | 2023-10-20T07:29:25.188Z | 2024-01-23T22:32:20.323Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-5343 | The Popup box WordPress plugin before 3.7.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed. | https://wpscan.com/vulnerability/74613b38-48f2-43d5-bae5-25c89ba7db6e | 2023-10-02T16:46:08.810Z | 2023-11-20T18:55:12.772Z | 2023-11-20T18:55:12.772Z | {'Vendor': 'Unknown', 'Product': 'Popup box', 'Versions': '0'} |
CVE-2023-5713 | The System Dashboard plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the sd_option_value() function hooked via an AJAX action in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve potentially sensitive option values, and deserialize the content of those values. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e9d1a33b-2518-48f7-90b6-a94a34473d1e?source=cve | 2023-10-23T00:43:23.424Z | 2023-12-07T02:00:07.318Z | 2023-12-07T02:00:07.318Z | {'Vendor': 'qriouslad', 'Product': 'System Dashboard', 'Versions': '*'} |
CVE-2023-28348 | An issue was discovered in Faronics Insight 10.0.19045 on Windows. A suitably positioned attacker could perform a man-in-the-middle attack on either a connected student or teacher, enabling them to intercept student keystrokes or modify executable files being sent from teachers to students. | https://research.nccgroup.com/?research=Technical%20advisories | 2023-03-14T00:00:00 | 2023-05-30T00:00:00 | 2023-05-30T00:00:00 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28718 | Osprey Pump Controller version 1.01 allows users to perform certain actions via HTTP requests without performing any checks to verify the requests. This may allow an attacker to perform certain actions with administrative privileges if a logged-in user visits a malicious website. | https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06 | 2023-03-21T21:17:06.902Z | 2023-03-28T20:09:15.958Z | 2023-03-28T20:09:15.958Z | {'Vendor': 'ProPump and Controls, Inc.', 'Product': 'Osprey Pump Controller', 'Versions': '1.01'} |
CVE-2023-28574 | Memory corruption in core services when Diag handler receives a command to configure event listeners. | https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin | 2023-03-17T11:41:45.850Z | 2023-11-07T05:26:45.653Z | 2023-11-07T05:26:45.653Z | {'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AR8035, FastConnect 6700, FastConnect 6900, FastConnect 7800, QAM8255P, QAM8650P, QAM8775P, QAMSRV1H, QCA6310, QCA6320, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8081, QCA8337, QCC710, QCM4490, QCM8550, QCN6024, QCN6224, QCN6274, QCN9024, QCS4490, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRU1032, QRU1052, QRU1062, SA8255P, SA8650P, SA9000P, SC8380XP, SD835, SG8275P, SM8550P, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon AR2 Gen 1 Platform, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, SRV1H, SSG2115P, SSG2125P, SXR1230P, SXR2230P, WCD9335, WCD9340, WCD9341, WCD9370, WCD9380, WCD9385, WCD9390, WCD9395, WCN3950, WCN3988, WCN3990, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'} |
CVE-2023-28124 | Improper usage of symmetric encryption in UI Desktop for Windows (Version 0.59.1.71 and earlier) could allow users with access to UI Desktop configuration files to decrypt their content.This vulnerability is fixed in Version 0.62.3 and later. | https://community.ui.com/releases/Security-Advisory-Bulletin-029-029/a47c68f2-1f3a-47c3-b577-eb70599644e4 | 2023-03-10T00:00:00 | 2023-04-19T00:00:00 | 2023-04-19T00:00:00 | {'Vendor': 'n/a', 'Product': 'UI Desktop for Windows', 'Versions': 'Fixed on Version 0.62.3 or later.'} |
CVE-2023-28431 | Frontier is an Ethereum compatibility layer for Substrate. Frontier's `modexp` precompile uses `num-bigint` crate under the hood. In the implementation prior to pull request 1017, the cases for modulus being even and modulus being odd are treated separately. Odd modulus uses the fast Montgomery multiplication, and even modulus uses the slow plain power algorithm. This gas cost discrepancy was not accounted for in the `modexp` precompile, leading to possible denial of service attacks.
No fixes for `num-bigint` are currently available, and thus this issue is fixed in the short term by raising the gas costs for even modulus, and in the long term fixing it in `num-bigint` or switching to another modexp implementation. The short-term fix for Frontier is deployed at pull request 1017. There are no known workarounds aside from applying the fix. | https://github.com/paritytech/frontier/security/advisories/GHSA-fcmm-54jp-7vf6 | 2023-03-15T15:59:10.051Z | 2023-03-22T20:11:43.772Z | 2023-03-22T20:11:43.772Z | {'Vendor': 'paritytech', 'Product': 'frontier', 'Versions': '<= 0.1.0'} |
CVE-2023-28061 |
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
| https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities | 2023-03-10T05:06:06.441Z | 2023-06-23T09:19:23.540Z | 2023-06-23T09:19:23.540Z | {'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'} |
CVE-2023-28962 | An Improper Authentication vulnerability in upload-file.php, used by the J-Web component of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to upload arbitrary files to temporary folders on the device. This issue affects Juniper Networks Junos OS: All versions prior to 19.4R3-S11; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3-S6; 21.1 version 21.1R1 and later versions; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2. | https://supportportal.juniper.net/JSA70587 | 2023-03-29T00:00:00 | 2023-04-17T00:00:00 | 2023-04-17T00:00:00 | {'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': 'unspecified, 20.1R1, 20.2, 20.3R1, 20.4, 21.1R1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3'} |
CVE-2023-28173 | Cross-Site Request Forgery (CSRF) vulnerability in Amit Agarwal Google XML Sitemap for Images plugin <= 2.1.3 versions. | https://patchstack.com/database/vulnerability/google-image-sitemap/wordpress-google-xml-sitemap-for-images-plugin-2-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-03-13T14:15:16.910Z | 2023-11-12T22:19:58.654Z | 2023-11-12T22:19:58.654Z | {'Vendor': 'Amit Agarwal', 'Product': 'Google XML Sitemap for Images', 'Versions': 'n/a'} |
CVE-2023-28489 | A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05), CP-8050 MASTER MODULE (All versions < CPCI85 V05). Affected devices are vulnerable to command injection via the web server port 443/tcp, if the parameter “Remote Operation” is enabled. The parameter is disabled by default.
The vulnerability could allow an unauthenticated remote attacker to perform arbitrary code execution on the device. | https://cert-portal.siemens.com/productcert/pdf/ssa-472454.pdf | 2023-03-16T10:14:37.883Z | 2023-04-11T09:03:04.302Z | 2023-04-11T09:03:04.302Z | {'Vendor': 'Siemens', 'Product': 'CP-8031 MASTER MODULE', 'Versions': 'All versions < CPCI85 V05'} |
CVE-2023-28523 |
IBM Informix Dynamic Server 12.10 and 14.10 onsmsync is vulnerable to a heap buffer overflow, caused by improper bounds checking which could allow an attacker to execute arbitrary code. IBM X-Force ID: 250753.
| https://www.ibm.com/support/pages/node/7070188 | 2023-03-16T21:05:56.575Z | 2023-12-09T02:24:19.177Z | 2023-12-09T02:24:19.177Z | {'Vendor': 'IBM', 'Product': 'Informix Dynamic Server', 'Versions': '12.10, 14.10'} |
CVE-2023-28870 | Insecure File Permissions in Support Assistant in NCP Secure Enterprise Client before 12.22 allow attackers to write to configuration files from low-privileged user accounts. | https://herolab.usd.de/en/security-advisories/usd-2022-0004/ | 2023-03-27T00:00:00 | 2023-12-09T00:00:00 | 2023-12-09T06:30:27.740635 | {'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'} |
CVE-2023-28935 | ** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache UIMA DUCC.
When using the "Distributed UIMA Cluster Computing" (DUCC) module of Apache UIMA, an authenticated user that has the permissions to modify core entities can cause command execution as the system user that runs the web process.
As the "Distributed UIMA Cluster Computing" module for UIMA is retired, we do not plan to release a fix for this issue.
NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
| https://lists.apache.org/thread/r19z14b9rrfxv72r93q5trq5tyffo75g | 2023-03-28T11:32:41.873Z | 2023-03-30T09:10:11.178Z | 2023-03-30T09:10:11.178Z | {'Vendor': 'Apache Software Foundation', 'Product': 'Apache UIMA DUCC', 'Versions': '0'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.