CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-6022
An attacker is able to steal secrets and potentially gain remote code execution via CSRF using the open source Prefect web server's API.
https://huntr.com/bounties/dab47d99-551c-4355-9ab1-c99cb90235af
2023-11-08T09:13:35.541Z
2023-11-16T16:07:33.744Z
2023-11-30T12:20:49.243Z
{'Vendor': 'prefecthq', 'Product': 'prefecthq/prefect', 'Versions': 'unspecified'}
CVE-2023-6921
Blind SQL Injection vulnerability in PrestaShow Google Integrator (PrestaShop addon) allows for data extraction and modification. This attack is possible via command insertion in one of the cookies.
https://prestashow.pl/pl/moduly-prestashop/28-prestashop-google-integrator-ga4-gtm-ads-remarketing.html
2023-12-18T15:08:09.463Z
2024-01-08T11:34:19.799Z
2024-01-08T11:34:19.799Z
{'Vendor': 'PrestaShow', 'Product': 'PrestaShop Google Integrator', 'Versions': '0'}
CVE-2023-6130
Path Traversal: '\..\filename' in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.
https://huntr.com/bounties/22a27be9-f016-4daf-9887-c77eb3e1dc74
2023-11-14T16:19:10.880Z
2023-11-14T16:19:29.202Z
2023-11-14T16:19:29.202Z
{'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm', 'Versions': 'unspecified'}
CVE-2023-6560
An out-of-bounds memory access flaw was found in the io_uring SQ/CQ rings functionality in the Linux kernel. This issue could allow a local user to crash the system.
http://packetstormsecurity.com/files/176405/io_uring-__io_uaddr_map-Dangerous-Multi-Page-Handling.html
2023-12-06T15:58:00.683Z
2023-12-08T23:56:55.211Z
2024-01-23T02:07:14.972Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '6.7-rc5'}
CVE-2023-6976
This vulnerability is capable of writing arbitrary files into arbitrary locations on the remote filesystem in the context of the server process.
https://huntr.com/bounties/2408a52b-f05b-4cac-9765-4f74bac3f20f
2023-12-20T05:30:02.686Z
2023-12-20T05:30:08.540Z
2023-12-20T05:30:08.540Z
{'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'}
CVE-2023-6075
A vulnerability classified as problematic has been found in PHPGurukul Restaurant Table Booking System 1.0. Affected is an unknown function of the file index.php of the component Reservation Request Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-244944.
https://vuldb.com/?id.244944
2023-11-10T08:04:15.650Z
2023-11-10T15:00:07.649Z
2023-11-10T15:00:07.649Z
{'Vendor': 'PHPGurukul', 'Product': 'Restaurant Table Booking System', 'Versions': '1.0'}
CVE-2023-6425
A vulnerability has been discovered in BigProf Online Clinic Management System 2.2, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /clinic/medical_records_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products
2023-11-30T10:45:54.948Z
2023-11-30T13:49:37.332Z
2023-11-30T13:49:37.332Z
{'Vendor': 'BigProf ', 'Product': 'Online Clinic Management System', 'Versions': '2.2'}
CVE-2023-6649
A vulnerability has been found in PHPGurukul Teacher Subject Allocation Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file index.php. The manipulation of the argument searchdata with the input <script>alert(5)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-247342 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.247342
2023-12-09T17:12:34.420Z
2023-12-10T10:00:05.072Z
2023-12-10T10:00:05.072Z
{'Vendor': 'PHPGurukul', 'Product': 'Teacher Subject Allocation Management System', 'Versions': '1.0'}
CVE-2023-6219
The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation on the 'bookingpress_process_upload' function in versions up to, and including, 1.0.76. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
https://www.wordfence.com/threat-intel/vulnerabilities/id/710b8e4e-01de-4e99-8cf2-31abc2419b29?source=cve
2023-11-20T17:34:49.653Z
2023-11-28T02:37:20.309Z
2023-11-28T02:37:20.309Z
{'Vendor': 'reputeinfosystems', 'Product': 'BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin', 'Versions': '*'}
CVE-2023-6648
A vulnerability, which was classified as critical, was found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file password-recovery.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247341 was assigned to this vulnerability.
https://vuldb.com/?id.247341
2023-12-09T17:06:21.079Z
2023-12-10T08:31:03.969Z
2023-12-10T08:31:03.969Z
{'Vendor': 'PHPGurukul', 'Product': 'Nipah Virus Testing Management System', 'Versions': '1.0'}
CVE-2023-6218
In Progress MOVEit Transfer versions released before 2022.0.9 (14.0.9), 2022.1.10 (14.1.10), 2023.0.7 (15.0.7), a privilege escalation path associated with group administrators has been identified.  It is possible for a group administrator to elevate a group members permissions to the role of an organization administrator.
https://www.progress.com/moveit
2023-11-20T17:22:11.765Z
2023-11-29T16:14:17.324Z
2023-11-29T16:14:17.324Z
{'Vendor': 'Progress Software Corporation', 'Product': 'MOVEit Transfer', 'Versions': '2023.1.0(15.1.0), 2023.0.0 (15.0.0), 2022.1.0 (14.1.0), 2022.0.0 (14.0.0)'}
CVE-2023-6131
Code Injection in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.
https://huntr.com/bounties/5fa50b25-f6b1-408c-99df-4442c86c563f
2023-11-14T16:27:39.472Z
2023-11-14T16:27:57.047Z
2023-11-14T16:27:57.047Z
{'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm', 'Versions': 'unspecified'}
CVE-2023-6561
The Featured Image from URL (FIFU) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the featured image alt text in all versions up to, and including, 4.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d4d5ae93-000e-4001-adfa-c11058032469?source=cve
2023-12-06T16:15:28.901Z
2024-01-11T08:33:01.156Z
2024-01-11T08:33:01.156Z
{'Vendor': 'marceljm', 'Product': 'Featured Image from URL (FIFU)', 'Versions': '*'}
CVE-2023-6832
Business Logic Errors in GitHub repository microweber/microweber prior to 2.0.
https://huntr.com/bounties/53105a20-f4b1-45ad-a734-0349de6d7376
2023-12-15T00:00:12.303Z
2023-12-15T00:00:34.102Z
2023-12-15T00:00:34.102Z
{'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'}
CVE-2023-6998
Improper privilege management vulnerability in CoolKit Technology eWeLink on Android and iOS allows application lockscreen bypass.This issue affects eWeLink before 5.2.0.
https://cert.pl/en/posts/2023/12/CVE-2023-6998/
2023-12-20T14:04:20.543Z
2023-12-30T18:32:07.452Z
2023-12-30T18:34:47.199Z
{'Vendor': 'CoolKit Technology', 'Product': 'eWeLink - Smart Home', 'Versions': '0'}
CVE-2023-6977
This vulnerability enables malicious users to read sensitive files on the server.
https://huntr.com/bounties/fe53bf71-3687-4711-90df-c26172880aaf
2023-12-20T05:36:51.333Z
2023-12-20T05:37:12.654Z
2023-12-20T05:37:12.654Z
{'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'}
CVE-2023-6074
A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0. It has been rated as critical. This issue affects some unknown processing of the file check-status.php of the component Booking Reservation Handler. The manipulation leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-244943.
https://vuldb.com/?id.244943
2023-11-10T08:04:12.941Z
2023-11-10T14:31:04.286Z
2023-11-10T14:31:04.286Z
{'Vendor': 'PHPGurukul', 'Product': 'Restaurant Table Booking System', 'Versions': '1.0'}
CVE-2023-6424
A vulnerability has been discovered in BigProf Online Clinic Management System 2.2, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /clinic/disease_symptoms_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products
2023-11-30T10:45:53.504Z
2023-11-30T13:49:20.255Z
2023-11-30T13:49:20.255Z
{'Vendor': 'BigProf ', 'Product': 'Online Clinic Management System', 'Versions': '2.2'}
CVE-2023-6865
`EncryptingOutputStream` was susceptible to exposing uninitialized data. This issue could only be abused in order to write data to a local disk which may have implications for private browsing mode. This vulnerability affects Firefox ESR < 115.6 and Firefox < 121.
https://bugzilla.mozilla.org/show_bug.cgi?id=1864123
2023-12-15T17:42:56.728Z
2023-12-19T13:38:47.449Z
2023-12-19T16:42:19.651Z
{'Vendor': 'Mozilla', 'Product': 'Firefox ESR', 'Versions': 'unspecified'}
CVE-2023-6166
The Quiz Maker WordPress plugin before 6.4.9.5 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting
https://wpscan.com/vulnerability/e6155d9b-f6bb-4607-ad64-1976a8afe907
2023-11-15T19:37:26.848Z
2023-12-26T18:33:02.302Z
2023-12-26T18:33:02.302Z
{'Vendor': 'Unknown', 'Product': 'Quiz Maker', 'Versions': '0'}
CVE-2023-6189
Missing access permissions checks in the M-Files server before 23.11.13156.0 allow attackers to perform data write and export jobs using the M-Files API methods.
https://https://www.m-files.com/about/trust-center/security-advisories/cve-2023-6189/
2023-11-17T13:00:28.506Z
2023-11-22T09:56:44.563Z
2023-11-22T09:56:44.563Z
{'Vendor': 'M-Files', 'Product': 'M-Files Server', 'Versions': '0'}
CVE-2023-6473
A vulnerability, which was classified as problematic, was found in SourceCodester Online Quiz System 1.0. This affects an unknown part of the file take-quiz.php. The manipulation of the argument quiz_taker/year_section leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246639.
https://vuldb.com/?id.246639
2023-12-02T07:31:03.931Z
2023-12-02T20:31:04.336Z
2023-12-02T20:31:04.336Z
{'Vendor': 'SourceCodester', 'Product': 'Online Quiz System', 'Versions': '1.0'}
CVE-2023-6023
An attacker can read any file on the filesystem on the server hosting ModelDB through an LFI in the artifact_path URL parameter.
https://huntr.com/bounties/644ab868-db6d-4685-ab35-1a897632d2ca
2023-11-08T09:13:49.918Z
2023-11-16T16:03:08.827Z
2023-11-16T16:03:08.827Z
{'Vendor': 'vertaai', 'Product': 'vertaai/modeldb', 'Versions': 'unspecified'}
CVE-2023-6920
null
null
2023-12-18T15:01:50.951Z
null
2023-12-18T16:23:43.555Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-6609
A vulnerability was found in osCommerce 4. It has been classified as problematic. This affects an unknown part of the file /b2b-supermarket/catalog/all-products. The manipulation of the argument keywords with the input %27%22%3E%3Cimg%2Fsrc%3D1+onerror%3Dalert%28document.cookie%29%3E leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247245 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.247245
2023-12-08T08:02:56.375Z
2023-12-08T14:31:05.304Z
2023-12-08T14:31:05.304Z
{'Vendor': 'n/a', 'Product': 'osCommerce', 'Versions': '4'}
CVE-2023-6520
The WP 2FA – Two-factor authentication for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.0. This is due to missing or incorrect nonce validation on the send_backup_codes_email function. This makes it possible for unauthenticated attackers to send emails with arbitrary content to registered users via a forged request granted they can trick a site administrator or other registered user into performing an action such as clicking on a link. While a nonce check is present, it is only executed if a nonce is set. By omitting a nonce from the request, the check can be bypassed.
https://www.wordfence.com/threat-intel/vulnerabilities/id/0af451be-2477-453c-a230-7f3fb804398b?source=cve
2023-12-05T12:38:30.011Z
2024-01-11T06:49:30.129Z
2024-01-11T06:49:30.129Z
{'Vendor': 'melapress', 'Product': 'WP 2FA – Two-factor authentication for WordPress', 'Versions': '*'}
CVE-2023-6873
Memory safety bugs present in Firefox 120. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 121.
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1855327%2C1862089%2C1862723
2023-12-15T17:42:58.233Z
2023-12-19T13:38:56.039Z
2023-12-19T13:38:56.039Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-6035
The EazyDocs WordPress plugin before 2.3.4 does not properly sanitize and escape "data" parameter before using it in an SQL statement via an AJAX action, which could allow any authenticated users, such as subscribers, to perform SQL Injection attacks.
https://wpscan.com/vulnerability/44f5a29a-05f9-40d2-80f2-6fb2bda60d79
2023-11-08T16:43:36.470Z
2023-12-11T19:22:37.842Z
2023-12-11T19:22:37.842Z
{'Vendor': 'Unknown', 'Product': 'EazyDocs', 'Versions': '0'}
CVE-2023-6465
A vulnerability was found in PHPGurukul Nipah Virus Testing Management System 1.0. It has been classified as problematic. This affects an unknown part of the file registered-user-testing.php. The manipulation of the argument regmobilenumber leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246615.
https://vuldb.com/?id.246615
2023-12-01T16:09:13.483Z
2023-12-02T12:00:07.228Z
2023-12-02T12:00:07.228Z
{'Vendor': 'PHPGurukul', 'Product': 'Nipah Virus Testing Management System', 'Versions': '1.0'}
CVE-2023-6824
The WP Customer Area WordPress plugin before 8.2.1 does not properly validates user capabilities in some of its AJAX actions, allowing any users to retrieve other user's account address.
https://wpscan.com/vulnerability/a224b984-770a-4534-b689-0701b582b388/
2023-12-14T18:06:39.012Z
2024-01-16T15:57:00.656Z
2024-01-16T15:57:00.656Z
{'Vendor': 'Unknown', 'Product': 'WP Customer Area', 'Versions': '0'}
CVE-2023-6577
A vulnerability was found in Beijing Baichuo PatrolFlow 2530Pro up to 20231126. It has been rated as problematic. This issue affects some unknown processing of the file /log/mailsendview.php. The manipulation of the argument file with the input /boot/phpConfig/tb_admin.txt leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.247157
2023-12-07T12:48:58.073Z
2023-12-07T20:31:05.203Z
2023-12-07T20:31:05.203Z
{'Vendor': 'Beijing Baichuo', 'Product': 'PatrolFlow 2530Pro', 'Versions': '20231126'}
CVE-2023-6127
Unrestricted Upload of File with Dangerous Type in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2.
https://huntr.com/bounties/bf10c72b-5d2e-4c9a-9bd6-d77bdf31027d
2023-11-14T16:01:38.918Z
2023-11-14T16:01:57.316Z
2023-11-14T16:01:57.316Z
{'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm', 'Versions': 'unspecified'}
CVE-2023-6432
A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /inventory/items_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products
2023-11-30T10:46:05.642Z
2023-11-30T13:55:08.870Z
2023-11-30T13:55:08.870Z
{'Vendor': 'BigProf ', 'Product': 'Online Inventory Manager', 'Versions': '3.2'}
CVE-2023-6598
The SpeedyCache plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the speedycache_save_varniship, speedycache_img_update_settings, speedycache_preloading_add_settings, and speedycache_preloading_delete_resource functions in all versions up to, and including, 1.1.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to update plugin options.
https://www.wordfence.com/threat-intel/vulnerabilities/id/db8cfdba-f3b2-45dc-9be7-6f6374fd5f39?source=cve
2023-12-07T21:32:43.325Z
2024-01-11T08:33:02.864Z
2024-01-11T08:33:02.864Z
{'Vendor': 'softaculous', 'Product': 'SpeedyCache – Cache, Optimization, Performance', 'Versions': '*'}
CVE-2023-6062
An arbitrary file write vulnerability exists where an authenticated, remote attacker with administrator privileges on the Nessus application could alter Nessus Rules variables to overwrite arbitrary files on the remote host, which could lead to a denial of service condition.
https://www.tenable.com/security/tns-2023-39
2023-11-09T19:09:17.998Z
2023-11-20T20:20:04.927Z
2023-11-20T20:20:04.927Z
{'Vendor': 'Tenable', 'Product': 'Nessus', 'Versions': '0, 10.5.7'}
CVE-2023-6275
A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input "><script>alert(document.domain)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.7.1-231128, 1.8.0-231127 and 1.8.1-231127 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-246104.
https://vuldb.com/?id.246104
2023-11-24T07:39:50.362Z
2023-11-24T15:00:06.295Z
2023-12-15T05:35:00.447Z
{'Vendor': 'TOTVS', 'Product': 'Fluig Platform', 'Versions': '1.6.x, 1.7.x, 1.8.0, 1.8.1'}
CVE-2023-6625
The Product Enquiry for WooCommerce WordPress plugin before 3.1 does not have a CSRF check in place when deleting inquiries, which could allow attackers to make a logged in admin delete them via a CSRF attack
https://wpscan.com/vulnerability/d483f7ce-cb3f-4fcb-b060-005cec0ea10f/
2023-12-08T15:04:16.836Z
2024-01-22T19:14:24.183Z
2024-01-22T19:14:24.183Z
{'Vendor': 'Unknown', 'Product': 'Product Enquiry for WooCommerce', 'Versions': '0'}
CVE-2023-6760
A vulnerability classified as critical was found in Thecosy IceCMS up to 2.0.1. This vulnerability affects unknown code. The manipulation leads to manage user sessions. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247888.
https://vuldb.com/?id.247888
2023-12-13T07:39:58.964Z
2023-12-13T15:31:03.924Z
2023-12-13T15:31:03.924Z
{'Vendor': 'Thecosy', 'Product': 'IceCMS', 'Versions': '2.0.0, 2.0.1'}
CVE-2023-6449
The Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'validate' function and insufficient blocklisting on the 'wpcf7_antiscript_file_name' function in versions up to, and including, 5.8.3. This makes it possible for authenticated attackers with editor-level capabilities or above to upload arbitrary files on the affected site's server, but due to the htaccess configuration, remote code cannot be executed in most cases. By default, the file will be deleted from the server immediately. However, in some cases, other plugins may make it possible for the file to live on the server longer. This can make remote code execution possible when combined with another vulnerability, such as local file inclusion.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5d7fb020-6acb-445e-a46b-bdb5aaf8f2b6?source=cve
2023-11-30T21:43:37.083Z
2023-12-01T11:00:06.019Z
2023-12-01T11:00:06.019Z
{'Vendor': 'takayukister', 'Product': 'Contact Form 7', 'Versions': '*'}
CVE-2023-6019
A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe
2023-11-08T09:12:47.118Z
2023-11-16T16:12:07.652Z
2023-12-06T20:19:06.833Z
{'Vendor': 'ray-project', 'Product': 'ray-project/ray', 'Versions': 'unspecified'}
CVE-2023-6222
IThe Quttera Web Malware Scanner WordPress plugin before 3.4.2.1 does not validate user input used in a path, which could allow users with an admin role to perform path traversal attacks
https://wpscan.com/vulnerability/df892e99-c0f6-42b8-a834-fc55d1bde130
2023-11-20T18:52:52.004Z
2023-12-18T20:07:54.232Z
2023-12-18T20:07:54.232Z
{'Vendor': 'Unknown', 'Product': 'Quttera Web Malware Scanner', 'Versions': '0'}
CVE-2023-6737
The Enable Media Replace plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the SHORTPIXEL_DEBUG parameter in all versions up to, and including, 4.1.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Exploiting this vulnerability requires the attacker to know the ID of an attachment uploaded by the user they are attacking.
https://www.wordfence.com/threat-intel/vulnerabilities/id/c37d8218-6059-46f2-a5d9-d7c22486211e?source=cve
2023-12-12T15:30:51.325Z
2024-01-11T08:32:57.215Z
2024-01-11T08:32:57.215Z
{'Vendor': 'shortpixel', 'Product': 'Enable Media Replace', 'Versions': '*'}
CVE-2023-6367
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within Roles.   If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
https://www.progress.com/network-monitoring
2023-11-28T15:36:12.824Z
2023-12-14T16:05:50.619Z
2023-12-14T16:05:50.619Z
{'Vendor': 'Progress Software Corporation', 'Product': 'WhatsUp Gold', 'Versions': '2023.0, 2022.0'}
CVE-2023-6721
An XEE vulnerability has been found in Repox, which allows a remote attacker to interfere with the application's XML data processing in the fileupload function, resulting in interaction between the attacker and the server's file system.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-repox
2023-12-12T08:04:46.692Z
2023-12-13T10:06:55.214Z
2023-12-13T10:06:55.214Z
{'Vendor': 'Repox', 'Product': 'Repox', 'Versions': '0'}
CVE-2023-6263
An issue was discovered by IPVM team in Network Optix NxCloud before 23.1.0.40440. It was possible to add a fake VMS server to NxCloud by using the exact identification of a legitimate VMS server. As result, it was possible to retrieve authorization headers from legitimate users when the legitimate client connects to the fake VMS server.
https://networkoptix.atlassian.net/wiki/spaces/CHS/blog/2023/09/22/3074195467/vulnerability+2023-09-21+-+Server+Spoofing
2023-11-22T17:55:39.783Z
2023-11-22T17:56:56.711Z
2023-12-18T14:31:16.795Z
{'Vendor': 'Network Optix', 'Product': 'NxCloud', 'Versions': '0'}
CVE-2023-6776
The 3D FlipBook plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘Ready Function’ field in all versions up to, and including, 1.15.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/500fd8aa-9ad1-41ee-bbeb-cda9c80c4fcb?source=cve
2023-12-13T13:14:21.117Z
2024-01-11T08:32:34.765Z
2024-01-11T08:32:34.765Z
{'Vendor': 'iberezansky', 'Product': '3D FlipBook – PDF Flipbook WordPress', 'Versions': '*'}
CVE-2023-6849
A vulnerability was found in kalcaddle kodbox up to 1.48. It has been rated as critical. Affected by this issue is the function cover of the file plugins/fileThumb/app.php. The manipulation of the argument path leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.48.04 is able to address this issue. The patch is identified as 63a4d5708d210f119c24afd941d01a943e25334c. It is recommended to upgrade the affected component. VDB-248210 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.248210
2023-12-15T16:15:59.331Z
2023-12-16T08:00:06.005Z
2023-12-16T08:00:06.005Z
{'Vendor': 'kalcaddle', 'Product': 'kodbox', 'Versions': '1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12, 1.13, 1.14, 1.15, 1.16, 1.17, 1.18, 1.19, 1.20, 1.21, 1.22, 1.23, 1.24, 1.25, 1.26, 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, 1.33, 1.34, 1.35, 1.36, 1.37, 1.38, 1.39, 1.40, 1.41, 1.42, 1.43, 1.44, 1.45, 1.46, 1.47, 1.48'}
CVE-2023-6994
The List category posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'catlist' shortcode in all versions up to, and including, 0.89.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/611871cc-737f-44e3-baf5-dbaa8bd8eb81?source=cve
2023-12-20T11:46:09.403Z
2024-01-11T08:32:36.170Z
2024-01-11T08:32:36.170Z
{'Vendor': 'fernandobt', 'Product': 'List category posts', 'Versions': '*'}
CVE-2023-6097
A SQL injection vulnerability has been found in ICS Business Manager, affecting version 7.06.0028.7089. This vulnerability could allow a remote user to send a specially crafted SQL query and retrieve all the information stored in the database. The data could also be modified or deleted, causing the application to malfunction.
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-icssolution-ics-business-manager
2023-11-13T09:53:08.477Z
2023-11-13T13:11:01.674Z
2023-11-13T13:11:01.674Z
{'Vendor': 'ICSSolution', 'Product': 'ICS Business Manager', 'Versions': '7.06.0028.7089, 7.06.0028.7066, 7.06.0028.2802'}
CVE-2023-6428
A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /invoicing/app/items_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products
2023-11-30T10:45:59.186Z
2023-11-30T13:53:42.237Z
2023-11-30T13:53:42.237Z
{'Vendor': 'BigProf ', 'Product': 'Online Invoicing System', 'Versions': '2.6'}
CVE-2023-6582
The ElementsKit Elementor addons plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.0.3 via the ekit_widgetarea_content function. This makes it possible for unauthenticated attackers to obtain contents of posts in draft, private or pending review status that should not be visible to the general public. This applies to posts created with Elementor only.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ff4ae5c8-d164-4c2f-9bf3-83934c22cf4c?source=cve
2023-12-07T13:32:34.116Z
2024-01-11T08:33:11.987Z
2024-01-11T08:33:11.987Z
{'Vendor': 'xpeedstudio', 'Product': 'ElementsKit Elementor addons', 'Versions': '*'}
CVE-2023-6351
Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html
2023-11-28T02:43:37.730Z
2023-11-29T12:02:05.266Z
2023-11-29T12:02:05.266Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.199'}
CVE-2023-6869
A `&lt;dialog>` element could have been manipulated to paint content outside of a sandboxed iframe. This could allow untrusted content to display under the guise of trusted content. This vulnerability affects Firefox < 121.
https://bugzilla.mozilla.org/show_bug.cgi?id=1799036
2023-12-15T17:42:57.488Z
2023-12-19T13:38:51.751Z
2023-12-19T16:42:21.244Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-6886
A vulnerability was found in xnx3 wangmarket 6.1. It has been rated as critical. Affected by this issue is some unknown functionality of the component Role Management Page. The manipulation leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248246 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.248246
2023-12-16T07:59:24.148Z
2023-12-17T00:00:07.384Z
2023-12-17T00:00:07.384Z
{'Vendor': 'xnx3', 'Product': 'wangmarket', 'Versions': '6.1'}
CVE-2023-6185
Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins. In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.
https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185
2023-11-17T09:15:06.687Z
2023-12-11T11:52:06.388Z
2023-12-11T11:52:06.388Z
{'Vendor': 'The Document Foundation', 'Product': 'LibreOffice', 'Versions': '7.5, 7.6'}
CVE-2023-6756
A vulnerability was found in Thecosy IceCMS 2.0.1. It has been classified as problematic. Affected is an unknown function of the file /login of the component Captcha Handler. The manipulation leads to improper restriction of excessive authentication attempts. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247884.
https://vuldb.com/?id.247884
2023-12-13T07:39:44.413Z
2023-12-13T13:31:03.944Z
2023-12-13T13:31:03.944Z
{'Vendor': 'Thecosy', 'Product': 'IceCMS', 'Versions': '2.0.1'}
CVE-2023-6306
A vulnerability classified as critical has been found in SourceCodester Free and Open Source Inventory Management System 1.0. Affected is an unknown function of the file /ample/app/ajax/member_data.php. The manipulation of the argument columns leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246132.
https://vuldb.com/?id.246132
2023-11-26T07:59:52.916Z
2023-11-27T01:00:05.795Z
2023-11-27T01:00:05.795Z
{'Vendor': 'SourceCodester', 'Product': 'Free and Open Source Inventory Management System', 'Versions': '1.0'}
CVE-2023-6613
A vulnerability classified as problematic has been found in Typecho 1.2.1. Affected is an unknown function of the file /admin/options-theme.php of the component Logo Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247248. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.247248
2023-12-08T09:16:29.351Z
2023-12-08T15:31:05.710Z
2023-12-08T15:31:05.710Z
{'Vendor': 'n/a', 'Product': 'Typecho', 'Versions': '1.2.1'}
CVE-2023-6193
quiche v. 0.15.0 through 0.19.0 was discovered to be vulnerable to unbounded queuing of path validation messages, which could lead to excessive resource consumption. QUIC path validation (RFC 9000 Section 8.2) requires that the recipient of a PATH_CHALLENGE frame responds by sending a PATH_RESPONSE. An unauthenticated remote attacker can exploit the vulnerability by sending PATH_CHALLENGE frames and manipulating the connection (e.g. by restricting the peer's congestion window size) so that PATH_RESPONSE frames can only be sent at the slower rate than they are received; leading to storage of path validation data in an unbounded queue. Quiche versions greater than 0.19.0 address this problem.
https://github.com/cloudflare/quiche/security/advisories/GHSA-w3vp-jw9m-f9pm
2023-11-17T14:39:07.534Z
2023-12-12T13:32:03.183Z
2023-12-12T13:32:03.183Z
{'Vendor': 'Cloudflare', 'Product': 'quiche', 'Versions': '0.15.0'}
CVE-2023-6039
A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches.
https://access.redhat.com/security/cve/CVE-2023-6039
2023-11-08T19:23:55.857Z
2023-11-09T15:08:03.326Z
2024-01-23T01:47:14.794Z
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': '6.5-rc5'}
CVE-2023-6890
Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.17.
https://huntr.com/bounties/2cf11678-8793-4fa1-b21a-f135564a105d
2023-12-16T08:57:21.686Z
2023-12-16T08:57:31.033Z
2023-12-18T10:14:03.656Z
{'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'}
CVE-2023-6310
A vulnerability has been found in SourceCodester Loan Management System 1.0 and classified as critical. This vulnerability affects the function delete_borrower of the file deleteBorrower.php. The manipulation of the argument borrower_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246136.
https://vuldb.com/?id.246136
2023-11-26T15:18:57.226Z
2023-11-27T02:00:05.747Z
2023-11-27T02:00:05.747Z
{'Vendor': 'SourceCodester', 'Product': 'Loan Management System', 'Versions': '1.0'}
CVE-2023-6740
Privilege escalation in jar_signature agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges
https://checkmk.com/werk/16163
2023-12-12T15:55:03.221Z
2024-01-12T07:50:20.076Z
2024-01-12T14:04:33.614Z
{'Vendor': 'Checkmk GmbH', 'Product': 'Checkmk', 'Versions': '2.2.0, 2.1.0, 2.0.0'}
CVE-2023-6828
The Contact Form, Survey & Popup Form Plugin for WordPress – ARForms Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘ arf_http_referrer_url’ parameter in all versions up to, and including, 1.5.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/6e349cae-a996-4a32-807a-a98ebcb01edd?source=cve
2023-12-14T19:17:20.651Z
2024-01-11T08:32:37.581Z
2024-01-11T08:32:37.581Z
{'Vendor': 'reputeinfosystems', 'Product': 'Contact Form, Survey & Popup Form Plugin for WordPress – ARForms Form Builder', 'Versions': '*'}
CVE-2023-6594
The WordPress Button Plugin MaxButtons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 9.7.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Administrators can give button creation privileges to users with lower levels (contributor+) which would allow those lower-privileged users to carry out attacks.
https://www.wordfence.com/threat-intel/vulnerabilities/id/cfe2cabd-98f6-4ebc-8a02-e6951202aa88?source=cve
2023-12-07T20:05:24.068Z
2024-01-09T02:34:50.547Z
2024-01-09T02:34:50.547Z
{'Vendor': 'maxfoundry', 'Product': 'WordPress Button Plugin MaxButtons', 'Versions': '*'}
CVE-2023-6347
Use after free in Mojo in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html
2023-11-28T01:12:09.557Z
2023-11-29T12:02:04.687Z
2023-11-29T12:02:04.687Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.199'}
CVE-2023-6652
A vulnerability was found in code-projects Matrimonial Site 1.0. It has been declared as critical. Affected by this vulnerability is the function register of the file /register.php. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247345 was assigned to this vulnerability.
https://vuldb.com/?id.247345
2023-12-09T17:27:06.367Z
2023-12-10T12:00:04.524Z
2023-12-10T12:00:04.524Z
{'Vendor': 'code-projects', 'Product': 'Matrimonial Site', 'Versions': '1.0'}
CVE-2023-6202
Mattermost fails to perform proper authorization in the /plugins/focalboard/api/v2/users endpoint allowing an attacker who is a guest user and knows the ID of another user to get their information (e.g. name, surname, nickname) via Mattermost Boards.
https://mattermost.com/security-updates
2023-11-20T12:24:12.551Z
2023-11-27T09:12:04.786Z
2023-11-27T09:12:04.786Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 9.0.2, 9.1.1, 7.8.13, 8.1.4'}
CVE-2023-6015
MLflow allowed arbitrary files to be PUT onto the server.
https://huntr.com/bounties/43e6fb72-676e-4670-a225-15d6836f65d3
2023-11-08T09:11:38.951Z
2023-11-16T16:06:11.032Z
2023-11-16T16:06:11.032Z
{'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'}
CVE-2023-6150
Improper Privilege Management vulnerability in ESKOM Computer e-municipality module allows Collect Data as Provided by Users.This issue affects e-municipality module: before v.105.
https://www.usom.gov.tr/bildirim/tr-23-0664
2023-11-15T11:52:29.743Z
2023-11-28T09:25:50.738Z
2023-12-05T06:18:21.136Z
{'Vendor': 'ESKOM Computer', 'Product': 'e-municipality module', 'Versions': '0'}
CVE-2023-6853
A vulnerability classified as critical was found in kalcaddle KodExplorer up to 4.51.03. Affected by this vulnerability is the function index of the file plugins/officeLive/app.php. The manipulation of the argument path leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.52.01 is able to address this issue. The identifier of the patch is 5cf233f7556b442100cf67b5e92d57ceabb126c6. It is recommended to upgrade the affected component. The identifier VDB-248221 was assigned to this vulnerability.
https://vuldb.com/?id.248221
2023-12-15T16:38:25.000Z
2023-12-16T12:00:05.380Z
2023-12-16T12:00:05.380Z
{'Vendor': 'kalcaddle', 'Product': 'KodExplorer', 'Versions': '4.51.03'}
CVE-2023-6629
The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘msg’ parameter in all versions up to, and including, 2.8.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/7681f984-d488-4da7-afe1-988e5ad012f2?source=cve
2023-12-08T16:05:50.184Z
2024-01-03T04:29:33.793Z
2024-01-03T04:29:33.793Z
{'Vendor': 'wpexpertsio', 'Product': 'POST SMTP – The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications', 'Versions': '*'}
CVE-2023-6296
A vulnerability was found in osCommerce 4. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /catalog/compare of the component Instant Message Handler. The manipulation of the argument compare with the input 40dz4iq"><script>alert(1)</script>zohkx leads to cross site scripting. The attack may be launched remotely. VDB-246122 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.246122
2023-11-26T07:20:43.976Z
2023-11-26T21:31:04.142Z
2023-11-26T21:31:04.142Z
{'Vendor': 'n/a', 'Product': 'osCommerce', 'Versions': '4'}
CVE-2023-6412
A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via photo.php in multiple parameters. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script
2023-11-30T10:02:05.793Z
2023-11-30T13:11:34.854Z
2023-11-30T13:11:34.854Z
{'Vendor': 'Voovi Social Networking Script', 'Product': 'Voovi Social Networking Script', 'Versions': '1.0'}
CVE-2023-6042
Any unauthenticated user may send e-mail from the site with any title or content to the admin
https://wpscan.com/vulnerability/56a1c050-67b5-43bc-b5b6-28d9a5a59eba
2023-11-08T20:57:10.685Z
2024-01-08T19:00:28.796Z
2024-01-08T19:00:28.796Z
{'Vendor': 'Unknown', 'Product': 'Getwid', 'Versions': '0'}
CVE-2023-6941
The Keap Official Opt-in Forms WordPress plugin through 1.0.11 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup).
https://wpscan.com/vulnerability/58f7c9aa-5e59-468f-aba9-b15e7942fd37/
2023-12-19T03:40:00.849Z
2024-01-15T15:10:38.764Z
2024-01-15T15:10:38.764Z
{'Vendor': 'Unknown', 'Product': 'Keap Official Opt-in Forms', 'Versions': '0'}
CVE-2023-6804
Improper privilege management allowed arbitrary workflows to be committed and run using an improperly scoped PAT. To exploit this, a workflow must have already existed in the target repo. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
https://docs.github.com/en/[email protected]/admin/release-notes#3.8.12
2023-12-13T19:26:47.233Z
2023-12-21T20:45:34.098Z
2023-12-21T20:45:34.098Z
{'Vendor': 'GitHub', 'Product': 'Enterprise Server', 'Versions': '3.8.0, 3.9.0, 3.10.0, 3.11'}
CVE-2023-6107
null
null
2023-11-13T15:25:04.993Z
null
2023-11-13T23:37:02.937Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-6384
The WP User Profile Avatar WordPress plugin before 1.0.1 does not properly check for authorisation, allowing authors to delete and update arbitrary avatar
https://wpscan.com/vulnerability/fbdefab4-614b-493b-a9ae-c5aeff8323ef/
2023-11-29T16:13:10.279Z
2024-01-22T19:14:24.990Z
2024-01-22T19:14:24.990Z
{'Vendor': 'Unknown', 'Product': 'WP User Profile Avatar', 'Versions': '0'}
CVE-2023-6691
Cambium ePMP Force 300-25 version 4.7.0.1 is vulnerable to a code injection vulnerability that could allow an attacker to perform remote code execution and gain root privileges.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-348-01
2023-12-11T17:10:52.940Z
2023-12-18T17:52:12.574Z
2023-12-18T17:52:12.574Z
{'Vendor': 'Cambium ', 'Product': 'ePMP Force 300-25', 'Versions': '4.7.0.1'}
CVE-2023-6054
A vulnerability, which was classified as critical, was found in Tongda OA 2017 up to 11.9. This affects an unknown part of the file general/wiki/cp/manage/lock.php. The manipulation of the argument TERM_ID_STR leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-244875. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.244875
2023-11-09T12:44:43.533Z
2023-11-09T19:00:07.653Z
2023-11-09T19:00:07.653Z
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'}
CVE-2023-6111
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_trans_gc_catchall did not remove the catchall set element from the catchall_list when the argument sync is true, making it possible to free a catchall set element many times. We recommend upgrading past commit 93995bf4af2c5a99e2a87f0cd5ce547d31eb7630.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93995bf4af2c5a99e2a87f0cd5ce547d31eb7630
2023-11-13T20:25:06.272Z
2023-11-14T14:05:35.216Z
2023-11-14T14:05:35.216Z
{'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '6.6'}
CVE-2023-6238
A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel. An unprivileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing random kernel crashes and memory corruption.
https://access.redhat.com/security/cve/CVE-2023-6238
2023-11-21T11:09:27.301Z
2023-11-21T20:21:20.625Z
2024-01-23T01:59:41.194Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''}
CVE-2023-6687
An issue was discovered by Elastic whereby Elastic Agent would log a raw event in its own logs at the WARN or ERROR level if ingesting that event to Elasticsearch failed with any 4xx HTTP status code except 409 or 429. Depending on the nature of the event that Elastic Agent attempted to ingest, this could lead to the insertion of sensitive or private information in the Elastic Agent logs. Elastic has released 8.11.3 and 7.17.16 that prevents this issue by limiting these types of logs to DEBUG level logging, which is disabled by default.
https://discuss.elastic.co/t/beats-and-elastic-agent-8-11-3-7-17-16-security-update-esa-2023-30/349180
2023-12-11T16:20:50.242Z
2023-12-12T18:28:06.423Z
2023-12-12T18:28:06.423Z
{'Vendor': 'Elastic', 'Product': 'Elastic Agent', 'Versions': '7.0.0, 8.0.0'}
CVE-2023-6900
A vulnerability, which was classified as critical, has been found in rmountjoy92 DashMachine 0.5-4. Affected by this issue is some unknown functionality of the file /settings/delete_file. The manipulation of the argument file leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. VDB-248258 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.248258
2023-12-16T19:38:07.417Z
2023-12-17T13:31:04.489Z
2023-12-17T13:31:04.489Z
{'Vendor': 'rmountjoy92', 'Product': 'DashMachine', 'Versions': '0.5-4'}
CVE-2023-6845
The CommentTweets WordPress plugin through 0.6 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks
https://wpscan.com/vulnerability/cbdaf158-f277-4be4-b022-68d18dae4c55
2023-12-15T14:26:23.314Z
2024-01-08T19:00:38.284Z
2024-01-08T19:00:38.284Z
{'Vendor': 'Unknown', 'Product': 'CommentTweets', 'Versions': '0'}
CVE-2023-6146
A Qualys web application was found to have a stored XSS vulnerability resulting from the absence of HTML encoding in the presentation of logging information to users. This vulnerability allowed a user with login access to the application to introduce XSS payload via browser details. 
https://www.qualys.com/security-advisories/
2023-11-15T10:10:22.335Z
2023-12-08T14:21:56.577Z
2023-12-08T14:21:56.577Z
{'Vendor': 'Qualys', 'Product': 'Qualysguard', 'Versions': ' '}
CVE-2023-6795
An OS command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall.
https://security.paloaltonetworks.com/CVE-2023-6795
2023-12-13T17:27:27.372Z
2023-12-13T18:17:43.368Z
2023-12-13T18:17:43.368Z
{'Vendor': 'Palo Alto Networks', 'Product': 'PAN-OS', 'Versions': '8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 11.1'}
CVE-2023-6280
An XXE (XML External Entity) vulnerability has been detected in 52North WPS affecting versions prior to 4.0.0-beta.11. This vulnerability allows the use of external entities in its WebProcessingService servlet for an attacker to retrieve files by making HTTP requests to the internal network.
https://www.incibe.es/en/incibe-cert/notices/aviso/xml-external-entity-reference-52north-wps
2023-11-24T11:48:26.685Z
2023-12-19T15:00:07.403Z
2023-12-19T15:04:37.619Z
{'Vendor': '52North', 'Product': '52North WPS', 'Versions': '0'}
CVE-2023-6008
The UserPro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.1.1. This is due to missing or incorrect nonce validation on multiple functions. This makes it possible for unauthenticated attackers to add, modify, or delete user meta and plugin options.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ed6e2b9e-3d70-4c07-a779-45164816b89c?source=cve
2023-11-08T05:32:01.025Z
2023-11-22T15:33:38.202Z
2023-11-22T15:33:38.202Z
{'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'}
CVE-2023-6458
Mattermost webapp fails to validate route parameters in/<TEAM_NAME>/channels/<CHANNEL_NAME> allowing an attacker to perform a client-side path traversal.
https://mattermost.com/security-updates
2023-12-01T10:06:07.237Z
2023-12-06T08:10:18.481Z
2023-12-06T08:10:18.481Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 9.1.2, 9.0.3, 8.1.5, 7.8.14'}
CVE-2023-6634
The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.
https://www.wordfence.com/threat-intel/vulnerabilities/id/21291ed7-cdc0-4698-9ec4-8417160845ed?source=cve
2023-12-08T19:29:09.184Z
2024-01-11T08:32:28.636Z
2024-01-11T08:32:28.636Z
{'Vendor': 'thimpress', 'Product': 'LearnPress – WordPress LMS Plugin', 'Versions': '*'}
CVE-2023-6264
Information leak in Content-Security-Policy header in Devolutions Server 2023.3.7.0 allows an unauthenticated attacker to list the configured Devolutions Gateways endpoints.
https://devolutions.net/security/advisories/DEVO-2023-0020/
2023-11-22T18:34:42.184Z
2023-11-22T18:39:21.629Z
2023-11-22T18:39:21.629Z
{'Vendor': 'Devolutions', 'Product': 'Server', 'Versions': '0'}
CVE-2023-6771
A vulnerability, which was classified as critical, has been found in SourceCodester Simple Student Attendance System 1.0. This issue affects the function save_attendance of the file actions.class.php. The manipulation of the argument sid leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247907.
https://vuldb.com/?id.247907
2023-12-13T12:19:14.140Z
2023-12-13T18:31:03.593Z
2023-12-13T18:31:03.593Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Student Attendance System', 'Versions': '1.0'}
CVE-2023-6376
Henschen & Associates court document management software does not sufficiently randomize file names of cached documents, allowing a remote, unauthenticated attacker to access restricted documents.
https://www.henschen.com/government
2023-11-29T04:02:44.663Z
2023-11-30T17:55:13.992Z
2023-11-30T20:55:04.245Z
{'Vendor': 'Henschen & Associates', 'Product': 'court document management software', 'Versions': '0'}
CVE-2023-6049
The Estatik Real Estate Plugin WordPress plugin before 4.1.1 unserializes user input via some of its cookies, which could allow unauthenticated users to perform PHP Object Injection when a suitable gadget chain is present on the blog
https://wpscan.com/vulnerability/8cfd8c1f-2834-4a94-a3fa-c0cfbe78a8b7
2023-11-09T10:03:27.377Z
2024-01-15T15:10:39.151Z
2024-01-15T15:10:39.151Z
{'Vendor': 'Unknown', 'Product': 'Estatik Real Estate Plugin', 'Versions': '0'}
CVE-2023-6419
A vulnerability has been reported in Voovi Social Networking Script version 1.0 that allows a XSS via editprofile.php in multiple parameters, the exploitation of which could allow a remote attacker to send a specially crafted JavaScript payload and partially take over the browser session of an authenticated user.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script
2023-11-30T10:02:15.643Z
2023-11-30T13:17:24.799Z
2023-11-30T13:17:24.799Z
{'Vendor': 'Voovi Social Networking Script', 'Product': 'Voovi Social Networking Script', 'Versions': '1.0'}
CVE-2023-6225
The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's su_meta shortcode combined with post meta data in all versions up to, and including, 5.13.3 due to insufficient input sanitization and output escaping on user supplied meta values. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/558e36f6-4678-46a2-8154-42770fbb5574?source=cve
2023-11-20T21:47:42.883Z
2023-11-28T04:31:51.706Z
2023-11-28T04:31:51.706Z
{'Vendor': 'gn_themes', 'Product': 'WP Shortcodes Plugin — Shortcodes Ultimate', 'Versions': '*'}
CVE-2023-6730
Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36.
https://huntr.com/bounties/423611ee-7a2a-442a-babb-3ed2f8385c16
2023-12-12T14:03:55.138Z
2023-12-19T12:11:20.729Z
2023-12-19T12:11:20.729Z
{'Vendor': 'huggingface', 'Product': 'huggingface/transformers', 'Versions': 'unspecified'}
CVE-2023-6360
The 'My Calendar' WordPress Plugin, version < 3.4.22 is affected by an unauthenticated SQL injection vulnerability in the 'from' and 'to' parameters in the '/my-calendar/v1/events' rest route.
https://www.tenable.com/security/research/tra-2023-40
2023-11-28T10:28:13.482Z
2023-11-30T15:17:14.959Z
2023-11-30T15:17:14.959Z
{'Vendor': '', 'Product': '', 'Versions': '0'}