CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-5288
A remote unauthorized attacker may connect to the SIM1012, interact with the device and change configuration settings. The adversary may also reset the SIM and in the worst case upload a new firmware version to the device.
https://sick.com/psirt
2023-09-29T10:17:33.150Z
2023-09-29T11:37:56.571Z
2023-09-29T11:37:56.571Z
{'Vendor': 'SICK AG', 'Product': 'SIM1012', 'Versions': 'all versions'}
CVE-2023-5267
A vulnerability has been found in Tongda OA 2017 and classified as critical. This vulnerability affects unknown code of the file general/hr/recruit/hr_pool/delete.php. The manipulation of the argument EXPERT_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-240880.
https://vuldb.com/?id.240880
2023-09-29T05:45:38.139Z
2023-09-29T15:00:08.184Z
2023-10-24T19:53:35.962Z
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': 'n/a'}
CVE-2023-5637
Unrestricted Upload of File with Dangerous Type vulnerability in ArslanSoft Education Portal allows Read Sensitive Strings Within an Executable.This issue affects Education Portal: before v1.1.
https://www.usom.gov.tr/bildirim/tr-23-0670
2023-10-18T11:04:03.784Z
2023-12-01T13:33:41.505Z
2023-12-01T13:33:41.505Z
{'Vendor': 'ArslanSoft', 'Product': 'Education Portal', 'Versions': '0'}
CVE-2023-5908
KEPServerEX is vulnerable to a buffer overflow which may allow an attacker to crash the product being accessed or leak information.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-334-03
2023-11-01T16:18:42.353Z
2023-11-30T22:03:58.098Z
2023-11-30T22:03:58.098Z
{'Vendor': 'PTC', 'Product': 'KEPServerEX', 'Versions': '0'}
CVE-2023-5709
The WD WidgetTwitter plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 1.0.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with contributor-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/86cdbfec-b1af-48ec-ae70-f97768694e44?source=cve
2023-10-22T17:41:15.355Z
2023-11-07T11:31:07.421Z
2023-11-07T11:31:07.421Z
{'Vendor': '10web', 'Product': 'WD WidgetTwitter', 'Versions': '*'}
CVE-2023-5070
The Social Media Share Buttons & Social Sharing Icons plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.8.5 via the sfsi_save_export function. This can allow subscribers to export plugin settings that include social media authentication tokens and secrets as well as app passwords.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e9e43c5b-a094-44ab-a8a3-52d437f0e00d?source=cve
2023-09-19T18:04:36.844Z
2023-10-20T07:29:38.342Z
2023-10-20T07:29:38.342Z
{'Vendor': 'socialdude', 'Product': 'Social Media Share Buttons & Social Sharing Icons', 'Versions': '*'}
CVE-2023-5565
The Shortcode Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'shortmenu' shortcode in versions up to, and including, 3.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/438b9c13-4059-4671-ab4a-07a8cf6f6122?source=cve
2023-10-13T00:24:59.300Z
2023-10-30T13:48:57.188Z
2023-10-30T13:48:57.188Z
{'Vendor': 'amitsukapure', 'Product': 'Shortcode Menu', 'Versions': '*'}
CVE-2023-5135
The Simple Cloudflare Turnstile plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'gravity-simple-turnstile' shortcode in versions up to, and including, 1.23.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/91f6c9d3-641d-42f7-bf11-e3c3a44eeb76?source=cve
2023-09-22T19:25:05.543Z
2023-09-26T01:51:14.743Z
2023-09-26T01:51:14.743Z
{'Vendor': 'elliotvs', 'Product': 'Simple Cloudflare Turnstile – CAPTCHA Alternative', 'Versions': '*'}
CVE-2023-5836
A vulnerability was found in SourceCodester Task Reminder System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file classes/Users.php?f=delete. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The identifier of this vulnerability is VDB-243800.
https://vuldb.com/?id.243800
2023-10-28T06:26:38.654Z
2023-10-28T21:00:08.118Z
2023-10-28T21:00:08.118Z
{'Vendor': 'SourceCodester', 'Product': 'Task Reminder System', 'Versions': '1.0'}
CVE-2023-5027
A vulnerability classified as critical was found in SourceCodester Simple Membership System 1.0. Affected by this vulnerability is an unknown functionality of the file club_validator.php. The manipulation of the argument club leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-239869 was assigned to this vulnerability.
https://vuldb.com/?id.239869
2023-09-16T12:35:34.309Z
2023-09-17T16:31:05.163Z
2023-10-24T19:12:07.780Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Membership System', 'Versions': '1.0'}
CVE-2023-5477
Inappropriate implementation in Installer in Google Chrome prior to 118.0.5993.70 allowed a local attacker to bypass discretionary access control via a crafted command. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
2023-10-10T00:12:40.405Z
2023-10-11T22:28:53.993Z
2023-10-11T22:28:53.993Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '118.0.5993.70'}
CVE-2023-5924
A vulnerability classified as critical was found in Campcodes Simple Student Information System 1.0. This vulnerability affects unknown code of the file /admin/courses/view_course.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-244324.
https://vuldb.com/?id.244324
2023-11-02T13:00:28.343Z
2023-11-02T18:00:12.789Z
2023-11-02T18:00:12.789Z
{'Vendor': 'Campcodes', 'Product': 'Simple Student Information System', 'Versions': '1.0'}
CVE-2023-5861
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 2.0.
https://huntr.com/bounties/7baecef8-6c59-42fc-bced-886c4929e220
2023-10-31T00:00:06.133Z
2023-10-31T00:00:18.866Z
2023-10-31T00:00:18.866Z
{'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'}
CVE-2023-5162
The Options for Twenty Seventeen plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'social-links' shortcode in versions up to, and including, 2.5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/df35d8c6-55ec-4cf5-8055-93ec5193c0a4?source=cve
2023-09-25T13:33:07.762Z
2023-09-26T01:51:15.201Z
2023-09-26T01:51:15.201Z
{'Vendor': 'domainsupport', 'Product': 'Options for Twenty Seventeen', 'Versions': '*'}
CVE-2023-5498
Cross-Site Request Forgery (CSRF) in GitHub repository chiefonboarding/chiefonboarding prior to v2.0.47.
https://huntr.dev/bounties/ec367b1d-5ec4-4ab2-881a-caf82e4877d9
2023-10-10T09:08:40.422Z
2023-10-10T09:08:52.815Z
2023-10-10T09:08:52.815Z
{'Vendor': 'chiefonboarding', 'Product': 'chiefonboarding/chiefonboarding', 'Versions': 'unspecified'}
CVE-2023-5532
The ImageMapper plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.2.6. This is due to missing or incorrect nonce validation on the 'imgmap_save_area_title' function. This makes it possible for unauthenticated attackers to update the post title and inject malicious JavaScript via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/bbb67f02-87e8-4ca3-8a9d-6663a700ab5b?source=cve
2023-10-11T18:05:32.307Z
2023-11-07T11:01:46.139Z
2023-11-07T11:01:46.139Z
{'Vendor': 'spikefinned', 'Product': 'ImageMapper', 'Versions': '*'}
CVE-2023-5318
Use of Hard-coded Credentials in GitHub repository microweber/microweber prior to 2.0.
https://huntr.dev/bounties/17826bdd-8136-48ae-afb9-af627cb6fd5d
2023-09-30T00:00:06.857Z
2023-09-30T00:00:17.339Z
2023-09-30T00:00:17.339Z
{'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'}
CVE-2023-5748
Buffer copy without checking size of input ('Classic Buffer Overflow') vulnerability in cgi component in Synology SSL VPN Client before 1.4.7-0687 allows local users to conduct denial-of-service attacks via unspecified vectors.
https://www.synology.com/en-global/security/advisory/Synology_SA_23_12
2023-10-24T06:10:16.429Z
2023-10-24T10:26:59.087Z
2023-11-09T09:51:01.023Z
{'Vendor': 'Synology', 'Product': 'Synology SSL VPN Client', 'Versions': '*'}
CVE-2023-5898
Cross-Site Request Forgery (CSRF) in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
https://huntr.com/bounties/19801d12-b8ad-45e7-86e1-8f0230667c9e
2023-11-01T00:00:37.528Z
2023-11-01T00:00:41.808Z
2023-11-01T00:00:41.808Z
{'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'}
CVE-2023-5461
A vulnerability was found in Delta Electronics WPLSoft 2.51. It has been classified as problematic. Affected is an unknown function of the component Modbus Handler. The manipulation leads to cleartext transmission of sensitive information. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-241584. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.241584
2023-10-09T13:46:31.730Z
2023-10-09T20:00:06.688Z
2023-10-09T20:00:06.688Z
{'Vendor': 'Delta Electronics', 'Product': 'WPLSoft', 'Versions': '2.51'}
CVE-2023-5031
A vulnerability was found in OpenRapid RapidCMS 1.3.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/article/article-add.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-239875.
https://vuldb.com/?id.239875
2023-09-17T17:26:11.876Z
2023-09-18T01:31:06.536Z
2023-10-24T19:17:00.474Z
{'Vendor': 'OpenRapid', 'Product': 'RapidCMS', 'Versions': '1.3.1'}
CVE-2023-5524
Insufficient blacklisting in M-Files Web Companion before release version 23.10 and LTS Service Release Versions before 23.8 LTS SR1 allows Remote Code Execution via specific file types
https://www.m-files.com/about/trust-center/security-advisories/cve-2023-5524/
2023-10-11T13:31:23.607Z
2023-10-20T06:41:56.499Z
2023-10-20T06:41:56.499Z
{'Vendor': 'M-Files', 'Product': 'Web Companion', 'Versions': '23.3, 23.8 LTS SR1'}
CVE-2023-5174
If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash. *This bug only affects Firefox on Windows when run in non-standard configurations (such as using `runas`). Other operating systems are unaffected.* This vulnerability affects Firefox < 118, Firefox ESR < 115.3, and Thunderbird < 115.3.
https://bugzilla.mozilla.org/show_bug.cgi?id=1848454
2023-09-25T15:03:43.655Z
2023-09-27T14:13:19.990Z
2023-09-27T14:13:19.990Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5877
The affiliate-toolkit WordPress plugin before 3.4.3 lacks authorization and authentication for requests to it's affiliate-toolkit-starter/tools/atkp_imagereceiver.php endpoint, allowing unauthenticated visitors to make requests to arbitrary URL's, including RFC1918 private addresses, leading to a Server Side Request Forgery (SSRF) issue.
https://wpscan.com/vulnerability/39ed4934-3d91-4924-8acc-25759fef9e81
2023-10-31T12:53:17.769Z
2024-01-01T14:18:58.165Z
2024-01-01T14:18:58.165Z
{'Vendor': 'Unknown', 'Product': 'affiliate-toolkit', 'Versions': '0'}
CVE-2023-5436
The Vertical marquee plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcode in versions up to, and including, 7.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level and above permissions to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/cd90d9c0-0cab-4fd3-b016-106032f300f7?source=cve
2023-10-05T19:17:20.431Z
2023-10-31T08:32:53.078Z
2023-10-31T08:32:53.078Z
{'Vendor': 'gopiplushotmailcom', 'Product': 'Vertical marquee plugin', 'Versions': '*'}
CVE-2023-5965
An authenticated privileged attacker could upload a specially crafted zip to the EspoCRM server in version 7.2.5, via the update form, which could lead to arbitrary PHP code execution.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-espocrm
2023-11-06T13:18:10.761Z
2023-11-30T13:26:15.451Z
2023-11-30T13:26:15.451Z
{'Vendor': 'EspoCRM', 'Product': 'EspoCRM', 'Versions': '0'}
CVE-2023-5820
The Thumbnail Slider With Lightbox plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing or incorrect nonce validation on the addedit functionality. This makes it possible for unauthenticated attackers to upload arbitrary files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e51e1cd2-6de9-4820-8bba-1c6b5053e2c1?source=cve
2023-10-26T23:02:41.067Z
2023-10-27T11:28:45.091Z
2023-10-27T11:28:45.091Z
{'Vendor': 'nik00726', 'Product': 'Thumbnail Slider With Lightbox', 'Versions': '1.0'}
CVE-2023-5573
Allocation of Resources Without Limits or Throttling in GitHub repository vriteio/vrite prior to 0.3.0.
https://huntr.dev/bounties/46a2bb2c-712a-4008-a147-b862e3af7d72
2023-10-13T09:56:13.341Z
2023-10-13T09:56:18.689Z
2023-10-13T09:56:18.689Z
{'Vendor': 'vriteio', 'Product': 'vriteio/vrite', 'Versions': 'unspecified'}
CVE-2023-5089
The Defender Security WordPress plugin before 4.1.0 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the login page, even when the hide login page functionality of the plugin is enabled.
https://wpscan.com/vulnerability/2b547488-187b-44bc-a57d-f876a7d4c87d
2023-09-20T14:56:32.290Z
2023-10-16T19:39:25.420Z
2023-10-16T19:39:25.420Z
{'Vendor': 'Unknown', 'Product': 'Defender Security', 'Versions': '0'}
CVE-2023-5504
The BackWPup plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 4.0.1 via the Log File Folder. This allows authenticated attackers to store backups in arbitrary folders on the server provided they can be written to by the server. Additionally, default settings will place an index.php and a .htaccess file into the chosen directory (unless already present) when the first backup job is run that are intended to prevent directory listing and file access. This means that an attacker could set the backup directory to the root of another site in a shared environment and thus disable that site.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e830fe1e-1171-46da-8ee7-0a6654153f18?source=cve
2023-10-10T18:10:11.211Z
2024-01-11T08:33:06.702Z
2024-01-11T08:33:06.702Z
{'Vendor': 'wp_media', 'Product': 'BackWPup – WordPress Backup Plugin', 'Versions': '*'}
CVE-2023-5154
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability has been found in D-Link DAR-8000 up to 20151231 and classified as critical. This vulnerability affects unknown code of the file /sysmanage/changelogo.php. The manipulation of the argument file_upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-240250 is the identifier assigned to this vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
https://vuldb.com/?id.240250
2023-09-24T15:56:48.480Z
2023-09-25T03:00:07.651Z
2023-10-24T19:36:31.546Z
{'Vendor': 'D-Link', 'Product': 'DAR-8000', 'Versions': '20151231'}
CVE-2023-5857
Inappropriate implementation in Downloads in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to potentially execute arbitrary code via a malicious file. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
2023-10-30T22:11:17.344Z
2023-11-01T17:14:02.873Z
2023-11-01T17:14:02.873Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'}
CVE-2023-5441
NULL Pointer Dereference in GitHub repository vim/vim prior to 20d161ace307e28690229b68584f2d84556f8960.
https://huntr.dev/bounties/b54cbdf5-3e85-458d-bb38-9ea2c0b669f2
2023-10-05T20:29:56.622Z
2023-10-05T20:30:09.121Z
2023-10-05T20:30:09.121Z
{'Vendor': 'vim', 'Product': 'vim/vim', 'Versions': 'unspecified'}
CVE-2023-5011
Student Information System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'coursename' parameter of the marks.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/kissin/
2023-09-15T22:56:03.585Z
2023-12-20T15:57:19.012Z
2023-12-20T15:57:19.012Z
{'Vendor': 'Kashipara Group', 'Product': 'Student Information System', 'Versions': '1.0'}
CVE-2023-5338
The Theme Blvd Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 1.6.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/88809668-ea6b-41df-b2a7-ffe03a931c86?source=cve
2023-10-02T12:35:56.699Z
2023-11-22T15:33:30.652Z
2023-11-22T15:33:30.652Z
{'Vendor': 'themeblvd', 'Product': 'Theme Blvd Shortcodes', 'Versions': '*'}
CVE-2023-5768
A vulnerability exists in the HCI IEC 60870-5-104 that affects the RTU500 series product versions listed below. Incomplete or wrong received APDU frame layout may cause blocking on link layer. Error reason was an endless blocking when reading incoming frames on link layer with wrong length information of APDU or delayed reception of data octets. Only communication link of affected HCI IEC 60870-5-104 is blocked. If attack sequence stops the communication to the previously attacked link gets normal again.
https://publisher.hitachienergy.com/preview?DocumentId=8DBD000176&languageCode=en&Preview=true
2023-10-25T15:24:39.183Z
2023-12-04T14:33:47.898Z
2023-12-04T14:35:49.612Z
{'Vendor': 'Hitachi Energy', 'Product': 'RTU500 series', 'Versions': 'RTU500 series CMU Firmware version 12.0.1 – 12.0.14, RTU500 series CMU Firmware version 12.2.1 – 12.2.11, RTU500 series CMU Firmware version 12.4.1 – 12.4.11 , RTU500 series CMU Firmware version 12.6.1 – 12.6.9 , RTU500 series CMU Firmware version 12.7.1 – 12.7.6, RTU500 series CMU Firmware version 13.2.1 – 13.2.6 , RTU500 series CMU Firmware version 13.4.1 – 13.4.3 '}
CVE-2023-5292
The Advanced Custom Fields: Extended plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'acfe_form' shortcode in versions up to, and including, 0.8.9.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/dcbe0c72-d518-45d3-a220-896a51071b26?source=cve
2023-09-29T14:18:33.716Z
2023-10-20T07:29:35.924Z
2023-10-20T07:29:35.924Z
{'Vendor': 'hwk-fr', 'Product': 'Advanced Custom Fields: Extended', 'Versions': '*'}
CVE-2023-5787
A vulnerability was found in Shaanxi Chanming Education Technology Score Query System 5.0. It has been rated as critical. This issue affects some unknown processing. The manipulation of the argument stuIdCard leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243593 was assigned to this vulnerability.
https://vuldb.com/?id.243593
2023-10-26T05:44:07.034Z
2023-10-26T15:31:05.733Z
2023-10-26T15:31:05.733Z
{'Vendor': 'Shaanxi Chanming Education Technology', 'Product': 'Score Query System', 'Versions': '5.0'}
CVE-2023-5103
Improper Restriction of Rendered UI Layers or Frames in RDT400 in SICK APU allows an unprivileged remote attacker to potentially reveal sensitive information via tricking a user into clicking on an actionable item using an iframe.
https://sick.com/psirt
2023-09-21T07:10:39.063Z
2023-10-09T12:11:04.740Z
2023-10-09T12:11:04.740Z
{'Vendor': 'SICK AG', 'Product': 'APU0200', 'Versions': 'all versions'}
CVE-2023-5553
During internal Axis Security Development Model (ASDM) threat-modelling, a flaw was found in the protection for device tampering (commonly known as Secure Boot) in AXIS OS making it vulnerable to a sophisticated attack to bypass this protection. To Axis' knowledge, there are no known exploits of the vulnerability at this time. Axis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution.
https://www.axis.com/dam/public/0a/66/25/cve-2023-5553-en-US-417789.pdf
2023-10-12T07:06:14.462Z
2023-11-21T06:59:42.711Z
2023-11-21T06:59:42.711Z
{'Vendor': 'Axis Communications AB', 'Product': 'AXIS OS', 'Versions': 'AXIS OS 10.8 - 11.6'}
CVE-2023-5046
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Biltay Technology Procost allows SQL Injection, Command Line Execution through SQL Injection.This issue affects Procost: before 1390.
https://www.usom.gov.tr/bildirim/tr-23-0581
2023-09-18T13:25:32.541Z
2023-10-12T11:55:21.003Z
2023-11-30T08:22:48.713Z
{'Vendor': 'Biltay Technology', 'Product': 'Procost', 'Versions': '0'}
CVE-2023-5416
The Funnelforms Free plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the fnsf_delete_category function in versions up to, and including, 3.4. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete categories.
https://www.wordfence.com/threat-intel/vulnerabilities/id/992fc98f-4b23-4596-81fb-5543d82fd615?source=cve
2023-10-04T20:35:11.689Z
2023-11-22T15:33:32.162Z
2023-11-22T15:33:32.162Z
{'Vendor': 'funnelforms', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor – Funnelforms Free', 'Versions': '*'}
CVE-2023-5945
The video carousel slider with lightbox plugin for WordPress is vulnerable to Cross-Site Request Forgery in version 1.0. This is due to missing or incorrect nonce validation on the responsive_video_gallery_with_lightbox_video_management_func() function. This makes it possible for unauthenticated attackers to delete videos hosted from the video slider via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/dc052b00-65a7-4668-8bdd-b06d69d12a4a?source=cve
2023-11-03T00:19:31.883Z
2023-11-03T12:31:29.214Z
2023-11-03T12:31:29.214Z
{'Vendor': 'nik00726', 'Product': 'video carousel slider with lightbox', 'Versions': '1.0'}
CVE-2023-5695
A vulnerability was found in CodeAstro Internet Banking System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file pages_reset_pwd.php. The manipulation of the argument email with the input testing%40example.com'%26%25<ScRiPt%20>alert(9860)</ScRiPt> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243133 was assigned to this vulnerability.
https://vuldb.com/?id.243133
2023-10-22T09:29:47.970Z
2023-10-22T22:31:04.837Z
2023-10-22T22:31:04.837Z
{'Vendor': 'CodeAstro', 'Product': 'Internet Banking System', 'Versions': '1.0'}
CVE-2023-5380
A use-after-free flaw was found in the xorg-x11-server. An X server crash may occur in a very specific and legacy configuration (a multi-screen setup with multiple protocol screens, also known as Zaphod mode) if the pointer is warped from within a window on one screen to the root window of the other screen and if the original window is destroyed followed by another window being destroyed.
https://access.redhat.com/errata/RHSA-2023:7428
2023-10-04T14:27:46.912Z
2023-10-25T19:46:59.432Z
2024-01-23T01:22:55.043Z
{'Vendor': 'n/a', 'Product': 'xorg-server', 'Versions': '21.1.9'}
CVE-2023-5545
H5P metadata automatically populated the author with the user's username, which could be sensitive information.
http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-78820
2023-10-12T00:18:04.007Z
2023-11-09T19:33:18.127Z
2023-11-09T19:33:18.127Z
{'Vendor': 'n/a', 'Product': 'moodle', 'Versions': '4.2.3, 4.1.6, 4.0.11, 3.11.17, 3.9.24'}
CVE-2023-5115
An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path.
https://access.redhat.com/errata/RHSA-2023:5701
2023-09-21T19:29:27.130Z
2023-12-18T13:43:07.791Z
2024-01-23T01:00:25.919Z
{'Vendor': 'n/a', 'Product': 'ansible', 'Versions': '2.14.11'}
CVE-2023-5953
The Welcart e-Commerce WordPress plugin before 2.9.5 does not validate files to be uploaded, as well as does not have authorisation and CSRF in an AJAX action handling such upload. As a result, any authenticated users, such as subscriber could upload arbitrary files, such as PHP on the server
https://wpscan.com/vulnerability/6d29ba12-f14a-4cee-baae-a6049d83bce6
2023-11-03T13:51:50.331Z
2023-12-04T21:28:03.020Z
2023-12-04T21:28:03.020Z
{'Vendor': 'Unknown', 'Product': 'Welcart e-Commerce', 'Versions': '0'}
CVE-2023-5050
The Leaflet Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.3.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with contributor level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/3084c9ab-00aa-4b8e-aa46-bd70b335ec77?source=cve
2023-09-18T14:00:46.486Z
2023-10-20T06:35:15.119Z
2023-10-20T06:35:15.119Z
{'Vendor': 'bozdoz', 'Product': 'Leaflet Map', 'Versions': '*'}
CVE-2023-5379
A flaw was found in Undertow. When an AJP request is sent that exceeds the max-header-size attribute in ajp-listener, JBoss EAP is marked in an error state by mod_cluster in httpd, causing JBoss EAP to close the TCP connection without returning an AJP response. This happens because mod_proxy_cluster marks the JBoss EAP instance as an error worker when the TCP connection is closed from the backend after sending the AJP request without receiving an AJP response, and stops forwarding. This issue could allow a malicious user could to repeatedly send requests that exceed the max-header-size, causing a Denial of Service (DoS).
https://access.redhat.com/errata/RHSA-2023:4509
2023-10-04T11:52:15.504Z
2023-12-12T21:54:52.669Z
2024-01-23T01:22:11.958Z
{'Vendor': 'n/a', 'Product': 'upstream', 'Versions': ''}
CVE-2023-5683
A vulnerability was found in Beijing Baichuo Smart S85F Management Platform up to 20231010 and classified as critical. This issue affects some unknown processing of the file /sysmanage/importconf.php. The manipulation of the argument btn_file_renew leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-243059. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.243059
2023-10-20T15:16:21.750Z
2023-10-21T05:00:06.020Z
2023-10-21T05:00:06.020Z
{'Vendor': 'Beijing Baichuo', 'Product': 'Smart S85F Management Platform', 'Versions': '20231010'}
CVE-2023-5729
A malicious web site can enter fullscreen mode while simultaneously triggering a WebAuthn prompt. This could have obscured the fullscreen notification and could have been leveraged in a spoofing attack. This vulnerability affects Firefox < 119.
https://bugzilla.mozilla.org/show_bug.cgi?id=1823720
2023-10-23T17:22:06.586Z
2023-10-24T12:47:15.116Z
2023-10-24T12:47:15.116Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-5142
A vulnerability classified as problematic was found in H3C GR-1100-P, GR-1108-P, GR-1200W, GR-1800AX, GR-2200, GR-3200, GR-5200, GR-8300, ER2100n, ER2200G2, ER3200G2, ER3260G2, ER5100G2, ER5200G2 and ER6300G2 up to 20230908. This vulnerability affects unknown code of the file /userLogin.asp of the component Config File Handler. The manipulation leads to path traversal. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. VDB-240238 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.240238
2023-09-24T14:06:15.230Z
2023-09-24T22:00:06.432Z
2023-10-24T19:21:53.383Z
{'Vendor': 'H3C', 'Product': 'GR-1100-P', 'Versions': '20230908'}
CVE-2023-5512
An issue has been discovered in GitLab CE/EE affecting all versions from 16.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. File integrity may be compromised when specific HTML encoding is used for file names leading for incorrect representation in the UI.
https://gitlab.com/gitlab-org/gitlab/-/issues/427827
2023-10-11T00:30:29.337Z
2023-12-15T16:03:00.260Z
2023-12-15T16:03:00.260Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '16.3, 16.5, 16.6'}
CVE-2023-5007
Student Information System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'id' parameter of the marks.php resource does not validate the characters received and they are sent unfiltered to the database.
https://fluidattacks.com/advisories/kissin/
2023-09-15T21:43:30.060Z
2023-12-20T15:58:34.088Z
2023-12-20T15:58:34.088Z
{'Vendor': 'Kashipara Group', 'Product': 'Student Information System', 'Versions': '1.0'}
CVE-2023-5904
Cross-site Scripting (XSS) - Stored in GitHub repository pkp/pkp-lib prior to 3.3.0-16.
https://huntr.com/bounties/4df6bce6-dbe3-48e4-9830-e95cdc5138b6
2023-11-01T00:01:39.559Z
2023-11-01T00:01:44.457Z
2023-11-01T00:01:44.457Z
{'Vendor': 'pkp', 'Product': 'pkp/pkp-lib', 'Versions': 'unspecified'}
CVE-2023-5284
A vulnerability classified as critical has been found in SourceCodester Engineers Online Portal 1.0. Affected is an unknown function of the file upload_save_student.php. The manipulation of the argument uploaded_file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240912.
https://vuldb.com/?id.240912
2023-09-29T09:49:26.885Z
2023-09-29T19:31:04.095Z
2023-10-24T21:35:24.022Z
{'Vendor': 'SourceCodester', 'Product': 'Engineers Online Portal', 'Versions': '1.0'}
CVE-2023-5791
A vulnerability, which was classified as problematic, was found in SourceCodester Sticky Notes App 1.0. This affects an unknown part of the file endpoint/add-note.php. The manipulation of the argument noteTitle/noteContent leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-243597 was assigned to this vulnerability.
https://vuldb.com/?id.243597
2023-10-26T07:15:04.620Z
2023-10-26T16:31:04.854Z
2023-10-26T16:31:04.854Z
{'Vendor': 'SourceCodester', 'Product': 'Sticky Notes App', 'Versions': '1.0'}
CVE-2023-5586
NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.3.0-DEV.
https://huntr.dev/bounties/d2a6ea71-3555-47a6-9b18-35455d103740
2023-10-15T00:27:58.982Z
2023-10-15T00:28:09.002Z
2023-10-15T00:28:09.002Z
{'Vendor': 'gpac', 'Product': 'gpac/gpac', 'Versions': 'unspecified'}
CVE-2023-5990
The Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor WordPress plugin before 3.4.2 does not have CSRF checks on some of its form actions such as deletion and duplication, which could allow attackers to make logged in admin perform such actions via CSRF attacks
https://wpscan.com/vulnerability/0a615ce3-93da-459d-a33f-a2a6e74a2f94
2023-11-07T11:41:14.856Z
2023-12-04T21:29:10.777Z
2023-12-04T21:29:10.777Z
{'Vendor': 'Unknown', 'Product': 'Interactive Contact Form and Multi Step Form Builder with Drag & Drop Editor', 'Versions': '0'}
CVE-2023-5139
Potential buffer overflow vulnerability at the following location in the Zephyr STM32 Crypto driver
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-rhrc-pcxp-4453
2023-09-22T23:08:46.735Z
2023-10-26T04:40:36.930Z
2023-10-26T04:40:36.930Z
{'Vendor': 'zephyrproject-rtos', 'Product': 'Zephyr', 'Versions': '*'}
CVE-2023-5640
The Article Analytics WordPress plugin does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection vulnerability.
https://wpscan.com/vulnerability/9a383ef5-0f1a-4894-8f78-845abcb5062d
2023-10-18T13:28:24.069Z
2023-11-20T18:55:11.955Z
2023-11-20T18:55:11.955Z
{'Vendor': 'Unknown', 'Product': 'Article analytics', 'Versions': '0'}
CVE-2023-5210
The AMP+ Plus WordPress plugin through 3.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/1c3ff47a-12a5-49c1-a166-2c57e5c0d0aa
2023-09-26T19:24:57.427Z
2023-12-04T21:28:59.242Z
2023-12-04T21:28:59.242Z
{'Vendor': 'Unknown', 'Product': 'AMP+ Plus', 'Versions': '0'}
CVE-2023-5705
The VK Filter Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'vk_filter_search' shortcode in all versions up to, and including, 2.3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/012946d4-82ce-48b9-9b9a-1fc49846dca6?source=cve
2023-10-22T17:38:39.588Z
2023-10-27T11:28:44.082Z
2023-10-27T11:28:44.082Z
{'Vendor': 'vektor-inc', 'Product': 'VK Filter Search', 'Versions': '*'}
CVE-2023-5355
The Awesome Support WordPress plugin before 6.1.5 does not sanitize file paths when deleting temporary attachment files, allowing a ticket submitter to delete arbitrary files on the server.
https://wpscan.com/vulnerability/d6f7faca-dacf-4455-a837-0404803d0f25
2023-10-03T12:25:54.894Z
2023-11-06T20:41:57.821Z
2023-11-06T20:41:57.821Z
{'Vendor': 'Unknown', 'Product': 'Awesome Support', 'Versions': '0'}
CVE-2023-5882
The Export any WordPress data to XML/CSV WordPress plugin before 1.4.0, WP All Export Pro WordPress plugin before 1.8.6 does not check nonce tokens early enough in the request lifecycle, allowing attackers to make logged in users perform unwanted actions leading to remote code execution.
https://wpscan.com/vulnerability/72be4b5c-21be-46af-a3f4-08b4c190a7e2
2023-10-31T14:23:44.548Z
2023-12-18T20:08:04.861Z
2023-12-18T20:08:04.861Z
{'Vendor': 'Unknown', 'Product': 'Export any WordPress data to XML/CSV', 'Versions': '0'}
CVE-2023-5928
A vulnerability was found in Campcodes Simple Student Information System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/departments/manage_department.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-244328.
https://vuldb.com/?id.244328
2023-11-02T13:00:43.506Z
2023-11-02T19:31:05.941Z
2023-11-02T19:31:05.941Z
{'Vendor': 'Campcodes', 'Product': 'Simple Student Information System', 'Versions': '1.0'}
CVE-2023-5181
The WP Discord Invite WordPress plugin before 2.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/564ad2b0-6ba6-4415-98d7-8d41bc1c3d44
2023-09-25T17:32:40.592Z
2023-11-06T20:41:32.307Z
2023-11-06T20:41:32.307Z
{'Vendor': 'Unknown', 'Product': 'WP Discord Invite', 'Versions': '0'}
CVE-2023-5494
A vulnerability was found in Beijing Baichuo Smart S45F Multi-Service Secure Gateway Intelligent Management Platform up to 20230928 and classified as critical. Affected by this issue is some unknown functionality of the file /log/download.php. The manipulation of the argument file leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-241646 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.241646
2023-10-10T07:19:28.529Z
2023-10-10T16:00:09.066Z
2023-10-10T16:00:09.066Z
{'Vendor': 'Beijing Baichuo', 'Product': 'Smart S45F Multi-Service Secure Gateway Intelligent Management Platform', 'Versions': '20230928'}
CVE-2023-5247
Malicious Code Execution Vulnerability due to External Control of File Name or Path in multiple Mitsubishi Electric FA Engineering Software Products allows a malicious attacker to execute a malicious code by having legitimate users open a specially crafted project file, which could result in information disclosure, tampering and deletion, or a denial-of-service (DoS) condition.
https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2023-016_en.pdf
2023-09-28T07:26:44.445Z
2023-11-30T03:57:30.083Z
2023-11-30T03:57:30.083Z
{'Vendor': 'Mitsubishi Electric Corporation', 'Product': 'GX Works3', 'Versions': 'all versions'}
CVE-2023-5302
A vulnerability, which was classified as problematic, has been found in SourceCodester Best Courier Management System 1.0. This issue affects some unknown processing of the component Manage Account Page. The manipulation of the argument First Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-240941 was assigned to this vulnerability.
https://vuldb.com/?id.240941
2023-09-29T16:17:41.561Z
2023-09-30T12:00:07.117Z
2023-10-25T05:00:37.220Z
{'Vendor': 'SourceCodester', 'Product': 'Best Courier Management System', 'Versions': '1.0'}
CVE-2023-5752
When installing a package from a Mercurial VCS URL (ie "pip install hg+...") with pip prior to v23.3, the specified Mercurial revision could be used to inject arbitrary configuration options to the "hg clone" call (ie "--config"). Controlling the Mercurial configuration can modify how and which repository is installed. This vulnerability does not affect users who aren't installing from Mercurial.
https://github.com/pypa/pip/pull/12306
2023-10-24T15:04:01.631Z
2023-10-24T20:56:05.469Z
2023-10-24T21:41:30.616Z
{'Vendor': 'Pip maintainers', 'Product': 'pip', 'Versions': '23.3'}
CVE-2023-5197
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. Addition and removal of rules from chain bindings within the same transaction causes leads to use-after-free. We recommend upgrading past commit f15f29fd4779be8a418b66e9d52979bb6d6c2325.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f15f29fd4779be8a418b66e9d52979bb6d6c2325
2023-09-26T09:43:24.384Z
2023-09-26T10:04:37.147Z
2023-09-26T10:04:37.147Z
{'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '5.9'}
CVE-2023-5894
Cross-site Scripting (XSS) - Stored in GitHub repository pkp/ojs prior to 3.3.0-16.
https://huntr.com/bounties/aba3ba5b-aa6b-4076-b663-4237b4a0761d
2023-11-01T00:00:06.923Z
2023-11-01T00:00:18.898Z
2023-11-01T00:00:18.898Z
{'Vendor': 'pkp', 'Product': 'pkp/ojs', 'Versions': 'unspecified'}
CVE-2023-5178
A use-after-free vulnerability was found in drivers/nvme/target/tcp.c` in `nvmet_tcp_free_crypto` due to a logical bug in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a malicious user to cause a use-after-free and double-free problem, which may permit remote code execution or lead to local privilege escalation problem.
https://access.redhat.com/errata/RHSA-2023:7370
2023-09-25T16:38:10.637Z
2023-11-01T16:32:20.350Z
2024-01-25T19:45:46.845Z
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': '6.6-rc7'}
CVE-2023-5482
Insufficient data validation in USB in Google Chrome prior to 119.0.6045.105 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
2023-10-10T00:12:40.892Z
2023-11-01T17:13:59.713Z
2023-11-01T17:13:59.713Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.105'}
CVE-2023-5528
A security issue was discovered in Kubernetes where a user that can create pods and persistent volumes on Windows nodes may be able to escalate to admin privileges on those nodes. Kubernetes clusters are only affected if they are using an in-tree storage plugin for Windows nodes.
https://github.com/kubernetes/kubernetes/issues/121879
2023-10-11T16:12:14.212Z
2023-11-14T20:32:08.411Z
2023-11-14T20:32:08.411Z
{'Vendor': 'Kubernetes', 'Product': 'kubelet', 'Versions': 'v1.28.0, v1.27.0, v1.26.0, 0, v1.28.4, v1.27.8, v1.26.11, v1.25.16'}
CVE-2023-5601
The WooCommerce Ninja Forms Product Add-ons WordPress plugin before 1.7.1 does not validate the file to be uploaded, allowing any unauthenticated users to upload arbitrary files to the server, leading to RCE.
https://wpscan.com/vulnerability/0035ec5e-d405-4eb7-8fe4-29dd0c71e4bc
2023-10-16T11:56:41.635Z
2023-11-06T20:41:49.307Z
2023-11-06T20:41:49.307Z
{'Vendor': 'Unknown', 'Product': 'WooCommerce Ninja Forms Product Add-ons', 'Versions': '0'}
CVE-2023-5251
The Grid Plus plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the 'grid_plus_save_layout_callback' and 'grid_plus_delete_callback' functions in versions up to, and including, 1.3.2. This makes it possible for authenticated attackers with subscriber privileges or above, to add, update or delete grid layout.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d2d34c84-473c-49f8-b55c-c869b5479974?source=cve
2023-09-28T12:38:09.118Z
2023-10-30T13:49:02.343Z
2023-10-30T13:49:02.343Z
{'Vendor': 'g5theme', 'Product': 'Grid Plus – Unlimited grid layout', 'Versions': '*'}
CVE-2023-5744
The Very Simple Google Maps plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'vsgmap' shortcode in all versions up to, and including, 2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/fca7837c-ad24-44ce-b073-7df3f8bc4300?source=cve
2023-10-24T01:32:07.580Z
2023-10-24T13:53:01.122Z
2023-10-24T13:53:01.122Z
{'Vendor': 'masterk', 'Product': 'Very Simple Google Maps', 'Versions': '*'}
CVE-2023-5314
The WP EXtra plugin for WordPress is vulnerable to unauthorized access to restricted functionality due to a missing capability check on the 'test-email' section of the register() function in versions up to, and including, 6.2. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to send emails with arbitrary content to arbitrary locations from the affected site's mail server.
https://www.wordfence.com/threat-intel/vulnerabilities/id/93c10a58-c5f2-440b-a88e-5314143fdd90?source=cve
2023-09-29T20:40:57.343Z
2023-11-22T15:33:31.574Z
2023-11-22T15:33:31.574Z
{'Vendor': 'wpvncom', 'Product': 'WP EXtra', 'Versions': '*'}
CVE-2023-5969
Mattermost fails to properly sanitize the request to /api/v4/redirect_location allowing an attacker, sending a specially crafted request to /api/v4/redirect_location, to fill up the memory due to caching large items.
https://mattermost.com/security-updates
2023-11-06T15:45:39.602Z
2023-11-06T15:48:23.590Z
2023-11-06T15:48:23.590Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 7.8.12, 8.0.4, 8.1.3, 9.0.1'}
CVE-2023-5590
NULL Pointer Dereference in GitHub repository seleniumhq/selenium prior to 4.14.0.
https://huntr.dev/bounties/e268cd68-4f34-49bd-878b-82b96dcc0c99
2023-10-15T22:13:53.229Z
2023-10-15T22:14:03.767Z
2023-10-15T22:14:03.767Z
{'Vendor': 'seleniumhq', 'Product': 'seleniumhq/selenium', 'Versions': 'unspecified'}
CVE-2023-5085
The Advanced Menu Widget plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'advMenu' shortcode in versions up to, and including, 0.4.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5da2dac6-940c-419e-853f-6cfd5d53d427?source=cve
2023-09-20T12:20:30.669Z
2023-10-24T13:52:59.223Z
2023-10-24T13:52:59.223Z
{'Vendor': 'johnnypea', 'Product': 'Advanced Menu Widget', 'Versions': '*'}
CVE-2023-5986
A CWE-601 URL Redirection to Untrusted Site vulnerability exists that could cause an openredirect vulnerability leading to a cross site scripting attack. By providing a URL-encoded input attackers can cause the software’s web application to redirect to the chosen domain after a successful login is performed.
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-318-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-318-02.pdf
2023-11-07T10:57:54.715Z
2023-11-15T03:47:17.684Z
2023-11-15T03:47:17.684Z
{'Vendor': 'Schneider Electric', 'Product': 'EcoStruxure Power Monitoring Expert (PME)', 'Versions': 'Version 2020 CU2 and prior, Version 2021 CU1 and prior'}
CVE-2023-5656
null
null
2023-10-19T13:37:41.454Z
2023-10-20T07:29:25.188Z
2024-01-23T22:32:20.323Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-5343
The Popup box WordPress plugin before 3.7.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed.
https://wpscan.com/vulnerability/74613b38-48f2-43d5-bae5-25c89ba7db6e
2023-10-02T16:46:08.810Z
2023-11-20T18:55:12.772Z
2023-11-20T18:55:12.772Z
{'Vendor': 'Unknown', 'Product': 'Popup box', 'Versions': '0'}
CVE-2023-5713
The System Dashboard plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the sd_option_value() function hooked via an AJAX action in all versions up to, and including, 2.8.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to retrieve potentially sensitive option values, and deserialize the content of those values.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e9d1a33b-2518-48f7-90b6-a94a34473d1e?source=cve
2023-10-23T00:43:23.424Z
2023-12-07T02:00:07.318Z
2023-12-07T02:00:07.318Z
{'Vendor': 'qriouslad', 'Product': 'System Dashboard', 'Versions': '*'}
CVE-2023-28348
An issue was discovered in Faronics Insight 10.0.19045 on Windows. A suitably positioned attacker could perform a man-in-the-middle attack on either a connected student or teacher, enabling them to intercept student keystrokes or modify executable files being sent from teachers to students.
https://research.nccgroup.com/?research=Technical%20advisories
2023-03-14T00:00:00
2023-05-30T00:00:00
2023-05-30T00:00:00
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28718
Osprey Pump Controller version 1.01 allows users to perform certain actions via HTTP requests without performing any checks to verify the requests. This may allow an attacker to perform certain actions with administrative privileges if a logged-in user visits a malicious website.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-082-06
2023-03-21T21:17:06.902Z
2023-03-28T20:09:15.958Z
2023-03-28T20:09:15.958Z
{'Vendor': 'ProPump and Controls, Inc.', 'Product': 'Osprey Pump Controller', 'Versions': '1.01'}
CVE-2023-28574
Memory corruption in core services when Diag handler receives a command to configure event listeners.
https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin
2023-03-17T11:41:45.850Z
2023-11-07T05:26:45.653Z
2023-11-07T05:26:45.653Z
{'Vendor': 'Qualcomm, Inc.', 'Product': 'Snapdragon', 'Versions': 'AR8035, FastConnect 6700, FastConnect 6900, FastConnect 7800, QAM8255P, QAM8650P, QAM8775P, QAMSRV1H, QCA6310, QCA6320, QCA6595, QCA6595AU, QCA6696, QCA6698AQ, QCA6797AQ, QCA8081, QCA8337, QCC710, QCM4490, QCM8550, QCN6024, QCN6224, QCN6274, QCN9024, QCS4490, QCS8550, QDU1000, QDU1010, QDU1110, QDU1210, QDX1010, QDX1011, QFW7114, QFW7124, QRU1032, QRU1052, QRU1062, SA8255P, SA8650P, SA9000P, SC8380XP, SD835, SG8275P, SM8550P, Snapdragon 4 Gen 2 Mobile Platform, Snapdragon 8 Gen 2 Mobile Platform, Snapdragon 8+ Gen 2 Mobile Platform, Snapdragon 835 Mobile PC Platform, Snapdragon AR2 Gen 1 Platform, Snapdragon X65 5G Modem-RF System, Snapdragon X70 Modem-RF System, Snapdragon X75 5G Modem-RF System, SRV1H, SSG2115P, SSG2125P, SXR1230P, SXR2230P, WCD9335, WCD9340, WCD9341, WCD9370, WCD9380, WCD9385, WCD9390, WCD9395, WCN3950, WCN3988, WCN3990, WSA8810, WSA8815, WSA8830, WSA8832, WSA8835, WSA8840, WSA8845, WSA8845H'}
CVE-2023-28124
Improper usage of symmetric encryption in UI Desktop for Windows (Version 0.59.1.71 and earlier) could allow users with access to UI Desktop configuration files to decrypt their content.This vulnerability is fixed in Version 0.62.3 and later.
https://community.ui.com/releases/Security-Advisory-Bulletin-029-029/a47c68f2-1f3a-47c3-b577-eb70599644e4
2023-03-10T00:00:00
2023-04-19T00:00:00
2023-04-19T00:00:00
{'Vendor': 'n/a', 'Product': 'UI Desktop for Windows', 'Versions': 'Fixed on Version 0.62.3 or later.'}
CVE-2023-28431
Frontier is an Ethereum compatibility layer for Substrate. Frontier's `modexp` precompile uses `num-bigint` crate under the hood. In the implementation prior to pull request 1017, the cases for modulus being even and modulus being odd are treated separately. Odd modulus uses the fast Montgomery multiplication, and even modulus uses the slow plain power algorithm. This gas cost discrepancy was not accounted for in the `modexp` precompile, leading to possible denial of service attacks. No fixes for `num-bigint` are currently available, and thus this issue is fixed in the short term by raising the gas costs for even modulus, and in the long term fixing it in `num-bigint` or switching to another modexp implementation. The short-term fix for Frontier is deployed at pull request 1017. There are no known workarounds aside from applying the fix.
https://github.com/paritytech/frontier/security/advisories/GHSA-fcmm-54jp-7vf6
2023-03-15T15:59:10.051Z
2023-03-22T20:11:43.772Z
2023-03-22T20:11:43.772Z
{'Vendor': 'paritytech', 'Product': 'frontier', 'Versions': '<= 0.1.0'}
CVE-2023-28061
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities
2023-03-10T05:06:06.441Z
2023-06-23T09:19:23.540Z
2023-06-23T09:19:23.540Z
{'Vendor': 'Dell', 'Product': 'CPG BIOS', 'Versions': 'All Versions'}
CVE-2023-28962
An Improper Authentication vulnerability in upload-file.php, used by the J-Web component of Juniper Networks Junos OS allows an unauthenticated, network-based attacker to upload arbitrary files to temporary folders on the device. This issue affects Juniper Networks Junos OS: All versions prior to 19.4R3-S11; 20.1 version 20.1R1 and later versions; 20.2 versions prior to 20.2R3-S7; 20.3 version 20.3R1 and later versions; 20.4 versions prior to 20.4R3-S6; 21.1 version 21.1R1 and later versions; 21.2 versions prior to 21.2R3-S4; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S3; 22.1 versions prior to 22.1R3-S1; 22.2 versions prior to 22.2R2-S1, 22.2R3; 22.3 versions prior to 22.3R1-S2, 22.3R2.
https://supportportal.juniper.net/JSA70587
2023-03-29T00:00:00
2023-04-17T00:00:00
2023-04-17T00:00:00
{'Vendor': 'Juniper Networks', 'Product': 'Junos OS', 'Versions': 'unspecified, 20.1R1, 20.2, 20.3R1, 20.4, 21.1R1, 21.2, 21.3, 21.4, 22.1, 22.2, 22.3'}
CVE-2023-28173
Cross-Site Request Forgery (CSRF) vulnerability in Amit Agarwal Google XML Sitemap for Images plugin <= 2.1.3 versions.
https://patchstack.com/database/vulnerability/google-image-sitemap/wordpress-google-xml-sitemap-for-images-plugin-2-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-03-13T14:15:16.910Z
2023-11-12T22:19:58.654Z
2023-11-12T22:19:58.654Z
{'Vendor': 'Amit Agarwal', 'Product': 'Google XML Sitemap for Images', 'Versions': 'n/a'}
CVE-2023-28489
A vulnerability has been identified in CP-8031 MASTER MODULE (All versions < CPCI85 V05), CP-8050 MASTER MODULE (All versions < CPCI85 V05). Affected devices are vulnerable to command injection via the web server port 443/tcp, if the parameter “Remote Operation” is enabled. The parameter is disabled by default. The vulnerability could allow an unauthenticated remote attacker to perform arbitrary code execution on the device.
https://cert-portal.siemens.com/productcert/pdf/ssa-472454.pdf
2023-03-16T10:14:37.883Z
2023-04-11T09:03:04.302Z
2023-04-11T09:03:04.302Z
{'Vendor': 'Siemens', 'Product': 'CP-8031 MASTER MODULE', 'Versions': 'All versions < CPCI85 V05'}
CVE-2023-28523
IBM Informix Dynamic Server 12.10 and 14.10 onsmsync is vulnerable to a heap buffer overflow, caused by improper bounds checking which could allow an attacker to execute arbitrary code. IBM X-Force ID: 250753.
https://www.ibm.com/support/pages/node/7070188
2023-03-16T21:05:56.575Z
2023-12-09T02:24:19.177Z
2023-12-09T02:24:19.177Z
{'Vendor': 'IBM', 'Product': 'Informix Dynamic Server', 'Versions': '12.10, 14.10'}
CVE-2023-28870
Insecure File Permissions in Support Assistant in NCP Secure Enterprise Client before 12.22 allow attackers to write to configuration files from low-privileged user accounts.
https://herolab.usd.de/en/security-advisories/usd-2022-0004/
2023-03-27T00:00:00
2023-12-09T00:00:00
2023-12-09T06:30:27.740635
{'Vendor': 'n/a', 'Product': 'n/a', 'Versions': 'n/a'}
CVE-2023-28935
** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Apache Software Foundation Apache UIMA DUCC. When using the "Distributed UIMA Cluster Computing" (DUCC) module of Apache UIMA, an authenticated user that has the permissions to modify core entities can cause command execution as the system user that runs the web process. As the "Distributed UIMA Cluster Computing" module for UIMA is retired, we do not plan to release a fix for this issue. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://lists.apache.org/thread/r19z14b9rrfxv72r93q5trq5tyffo75g
2023-03-28T11:32:41.873Z
2023-03-30T09:10:11.178Z
2023-03-30T09:10:11.178Z
{'Vendor': 'Apache Software Foundation', 'Product': 'Apache UIMA DUCC', 'Versions': '0'}