CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-6022 | An attacker is able to steal secrets and potentially gain remote code execution via CSRF using the open source Prefect web server's API. | https://huntr.com/bounties/dab47d99-551c-4355-9ab1-c99cb90235af | 2023-11-08T09:13:35.541Z | 2023-11-16T16:07:33.744Z | 2023-11-30T12:20:49.243Z | {'Vendor': 'prefecthq', 'Product': 'prefecthq/prefect', 'Versions': 'unspecified'} |
CVE-2023-6921 | Blind SQL Injection vulnerability in PrestaShow Google Integrator (PrestaShop addon) allows for data extraction and modification. This attack is possible via command insertion in one of the cookies.
| https://prestashow.pl/pl/moduly-prestashop/28-prestashop-google-integrator-ga4-gtm-ads-remarketing.html | 2023-12-18T15:08:09.463Z | 2024-01-08T11:34:19.799Z | 2024-01-08T11:34:19.799Z | {'Vendor': 'PrestaShow', 'Product': 'PrestaShop Google Integrator', 'Versions': '0'} |
CVE-2023-6130 | Path Traversal: '\..\filename' in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2. | https://huntr.com/bounties/22a27be9-f016-4daf-9887-c77eb3e1dc74 | 2023-11-14T16:19:10.880Z | 2023-11-14T16:19:29.202Z | 2023-11-14T16:19:29.202Z | {'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm', 'Versions': 'unspecified'} |
CVE-2023-6560 | An out-of-bounds memory access flaw was found in the io_uring SQ/CQ rings functionality in the Linux kernel. This issue could allow a local user to crash the system. | http://packetstormsecurity.com/files/176405/io_uring-__io_uaddr_map-Dangerous-Multi-Page-Handling.html | 2023-12-06T15:58:00.683Z | 2023-12-08T23:56:55.211Z | 2024-01-23T02:07:14.972Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': '6.7-rc5'} |
CVE-2023-6976 | This vulnerability is capable of writing arbitrary files into arbitrary locations on the remote filesystem in the context of the server process. | https://huntr.com/bounties/2408a52b-f05b-4cac-9765-4f74bac3f20f | 2023-12-20T05:30:02.686Z | 2023-12-20T05:30:08.540Z | 2023-12-20T05:30:08.540Z | {'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'} |
CVE-2023-6075 | A vulnerability classified as problematic has been found in PHPGurukul Restaurant Table Booking System 1.0. Affected is an unknown function of the file index.php of the component Reservation Request Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-244944. | https://vuldb.com/?id.244944 | 2023-11-10T08:04:15.650Z | 2023-11-10T15:00:07.649Z | 2023-11-10T15:00:07.649Z | {'Vendor': 'PHPGurukul', 'Product': 'Restaurant Table Booking System', 'Versions': '1.0'} |
CVE-2023-6425 | A vulnerability has been discovered in BigProf Online Clinic Management System 2.2, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /clinic/medical_records_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products | 2023-11-30T10:45:54.948Z | 2023-11-30T13:49:37.332Z | 2023-11-30T13:49:37.332Z | {'Vendor': 'BigProf ', 'Product': 'Online Clinic Management System', 'Versions': '2.2'} |
CVE-2023-6649 | A vulnerability has been found in PHPGurukul Teacher Subject Allocation Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file index.php. The manipulation of the argument searchdata with the input <script>alert(5)</script> leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-247342 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.247342 | 2023-12-09T17:12:34.420Z | 2023-12-10T10:00:05.072Z | 2023-12-10T10:00:05.072Z | {'Vendor': 'PHPGurukul', 'Product': 'Teacher Subject Allocation Management System', 'Versions': '1.0'} |
CVE-2023-6219 | The BookingPress plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation on the 'bookingpress_process_upload' function in versions up to, and including, 1.0.76. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible. | https://www.wordfence.com/threat-intel/vulnerabilities/id/710b8e4e-01de-4e99-8cf2-31abc2419b29?source=cve | 2023-11-20T17:34:49.653Z | 2023-11-28T02:37:20.309Z | 2023-11-28T02:37:20.309Z | {'Vendor': 'reputeinfosystems', 'Product': 'BookingPress – Appointment Booking Calendar Plugin and Online Scheduling Plugin', 'Versions': '*'} |
CVE-2023-6648 | A vulnerability, which was classified as critical, was found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file password-recovery.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247341 was assigned to this vulnerability. | https://vuldb.com/?id.247341 | 2023-12-09T17:06:21.079Z | 2023-12-10T08:31:03.969Z | 2023-12-10T08:31:03.969Z | {'Vendor': 'PHPGurukul', 'Product': 'Nipah Virus Testing Management System', 'Versions': '1.0'} |
CVE-2023-6218 |
In Progress MOVEit Transfer versions released before 2022.0.9 (14.0.9), 2022.1.10 (14.1.10), 2023.0.7 (15.0.7), a privilege escalation path associated with group administrators has been identified. It is possible for a group administrator to elevate a group members permissions to the role of an organization administrator.
| https://www.progress.com/moveit | 2023-11-20T17:22:11.765Z | 2023-11-29T16:14:17.324Z | 2023-11-29T16:14:17.324Z | {'Vendor': 'Progress Software Corporation', 'Product': 'MOVEit Transfer', 'Versions': '2023.1.0(15.1.0), 2023.0.0 (15.0.0), 2022.1.0 (14.1.0), 2022.0.0 (14.0.0)'} |
CVE-2023-6131 | Code Injection in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2. | https://huntr.com/bounties/5fa50b25-f6b1-408c-99df-4442c86c563f | 2023-11-14T16:27:39.472Z | 2023-11-14T16:27:57.047Z | 2023-11-14T16:27:57.047Z | {'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm', 'Versions': 'unspecified'} |
CVE-2023-6561 | The Featured Image from URL (FIFU) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the featured image alt text in all versions up to, and including, 4.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/d4d5ae93-000e-4001-adfa-c11058032469?source=cve | 2023-12-06T16:15:28.901Z | 2024-01-11T08:33:01.156Z | 2024-01-11T08:33:01.156Z | {'Vendor': 'marceljm', 'Product': 'Featured Image from URL (FIFU)', 'Versions': '*'} |
CVE-2023-6832 | Business Logic Errors in GitHub repository microweber/microweber prior to 2.0. | https://huntr.com/bounties/53105a20-f4b1-45ad-a734-0349de6d7376 | 2023-12-15T00:00:12.303Z | 2023-12-15T00:00:34.102Z | 2023-12-15T00:00:34.102Z | {'Vendor': 'microweber', 'Product': 'microweber/microweber', 'Versions': 'unspecified'} |
CVE-2023-6998 | Improper privilege management vulnerability in CoolKit Technology eWeLink on Android and iOS allows application lockscreen bypass.This issue affects eWeLink before 5.2.0.
| https://cert.pl/en/posts/2023/12/CVE-2023-6998/ | 2023-12-20T14:04:20.543Z | 2023-12-30T18:32:07.452Z | 2023-12-30T18:34:47.199Z | {'Vendor': 'CoolKit Technology', 'Product': 'eWeLink - Smart Home', 'Versions': '0'} |
CVE-2023-6977 | This vulnerability enables malicious users to read sensitive files on the server. | https://huntr.com/bounties/fe53bf71-3687-4711-90df-c26172880aaf | 2023-12-20T05:36:51.333Z | 2023-12-20T05:37:12.654Z | 2023-12-20T05:37:12.654Z | {'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'} |
CVE-2023-6074 | A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0. It has been rated as critical. This issue affects some unknown processing of the file check-status.php of the component Booking Reservation Handler. The manipulation leads to sql injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-244943. | https://vuldb.com/?id.244943 | 2023-11-10T08:04:12.941Z | 2023-11-10T14:31:04.286Z | 2023-11-10T14:31:04.286Z | {'Vendor': 'PHPGurukul', 'Product': 'Restaurant Table Booking System', 'Versions': '1.0'} |
CVE-2023-6424 | A vulnerability has been discovered in BigProf Online Clinic Management System 2.2, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /clinic/disease_symptoms_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products | 2023-11-30T10:45:53.504Z | 2023-11-30T13:49:20.255Z | 2023-11-30T13:49:20.255Z | {'Vendor': 'BigProf ', 'Product': 'Online Clinic Management System', 'Versions': '2.2'} |
CVE-2023-6865 | `EncryptingOutputStream` was susceptible to exposing uninitialized data. This issue could only be abused in order to write data to a local disk which may have implications for private browsing mode. This vulnerability affects Firefox ESR < 115.6 and Firefox < 121. | https://bugzilla.mozilla.org/show_bug.cgi?id=1864123 | 2023-12-15T17:42:56.728Z | 2023-12-19T13:38:47.449Z | 2023-12-19T16:42:19.651Z | {'Vendor': 'Mozilla', 'Product': 'Firefox ESR', 'Versions': 'unspecified'} |
CVE-2023-6166 | The Quiz Maker WordPress plugin before 6.4.9.5 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting | https://wpscan.com/vulnerability/e6155d9b-f6bb-4607-ad64-1976a8afe907 | 2023-11-15T19:37:26.848Z | 2023-12-26T18:33:02.302Z | 2023-12-26T18:33:02.302Z | {'Vendor': 'Unknown', 'Product': 'Quiz Maker', 'Versions': '0'} |
CVE-2023-6189 |
Missing access permissions checks
in the M-Files server before 23.11.13156.0 allow attackers to perform data write and export
jobs using the M-Files API methods. | https://https://www.m-files.com/about/trust-center/security-advisories/cve-2023-6189/ | 2023-11-17T13:00:28.506Z | 2023-11-22T09:56:44.563Z | 2023-11-22T09:56:44.563Z | {'Vendor': 'M-Files', 'Product': 'M-Files Server', 'Versions': '0'} |
CVE-2023-6473 | A vulnerability, which was classified as problematic, was found in SourceCodester Online Quiz System 1.0. This affects an unknown part of the file take-quiz.php. The manipulation of the argument quiz_taker/year_section leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246639. | https://vuldb.com/?id.246639 | 2023-12-02T07:31:03.931Z | 2023-12-02T20:31:04.336Z | 2023-12-02T20:31:04.336Z | {'Vendor': 'SourceCodester', 'Product': 'Online Quiz System', 'Versions': '1.0'} |
CVE-2023-6023 | An attacker can read any file on the filesystem on the server hosting ModelDB through an LFI in the artifact_path URL parameter. | https://huntr.com/bounties/644ab868-db6d-4685-ab35-1a897632d2ca | 2023-11-08T09:13:49.918Z | 2023-11-16T16:03:08.827Z | 2023-11-16T16:03:08.827Z | {'Vendor': 'vertaai', 'Product': 'vertaai/modeldb', 'Versions': 'unspecified'} |
CVE-2023-6920 | null | null | 2023-12-18T15:01:50.951Z | null | 2023-12-18T16:23:43.555Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-6609 | A vulnerability was found in osCommerce 4. It has been classified as problematic. This affects an unknown part of the file /b2b-supermarket/catalog/all-products. The manipulation of the argument keywords with the input %27%22%3E%3Cimg%2Fsrc%3D1+onerror%3Dalert%28document.cookie%29%3E leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247245 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.247245 | 2023-12-08T08:02:56.375Z | 2023-12-08T14:31:05.304Z | 2023-12-08T14:31:05.304Z | {'Vendor': 'n/a', 'Product': 'osCommerce', 'Versions': '4'} |
CVE-2023-6520 | The WP 2FA – Two-factor authentication for WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.0. This is due to missing or incorrect nonce validation on the send_backup_codes_email function. This makes it possible for unauthenticated attackers to send emails with arbitrary content to registered users via a forged request granted they can trick a site administrator or other registered user into performing an action such as clicking on a link. While a nonce check is present, it is only executed if a nonce is set. By omitting a nonce from the request, the check can be bypassed. | https://www.wordfence.com/threat-intel/vulnerabilities/id/0af451be-2477-453c-a230-7f3fb804398b?source=cve | 2023-12-05T12:38:30.011Z | 2024-01-11T06:49:30.129Z | 2024-01-11T06:49:30.129Z | {'Vendor': 'melapress', 'Product': 'WP 2FA – Two-factor authentication for WordPress', 'Versions': '*'} |
CVE-2023-6873 | Memory safety bugs present in Firefox 120. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 121. | https://bugzilla.mozilla.org/buglist.cgi?bug_id=1855327%2C1862089%2C1862723 | 2023-12-15T17:42:58.233Z | 2023-12-19T13:38:56.039Z | 2023-12-19T13:38:56.039Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-6035 | The EazyDocs WordPress plugin before 2.3.4 does not properly sanitize and escape "data" parameter before using it in an SQL statement via an AJAX action, which could allow any authenticated users, such as subscribers, to perform SQL Injection attacks. | https://wpscan.com/vulnerability/44f5a29a-05f9-40d2-80f2-6fb2bda60d79 | 2023-11-08T16:43:36.470Z | 2023-12-11T19:22:37.842Z | 2023-12-11T19:22:37.842Z | {'Vendor': 'Unknown', 'Product': 'EazyDocs', 'Versions': '0'} |
CVE-2023-6465 | A vulnerability was found in PHPGurukul Nipah Virus Testing Management System 1.0. It has been classified as problematic. This affects an unknown part of the file registered-user-testing.php. The manipulation of the argument regmobilenumber leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246615. | https://vuldb.com/?id.246615 | 2023-12-01T16:09:13.483Z | 2023-12-02T12:00:07.228Z | 2023-12-02T12:00:07.228Z | {'Vendor': 'PHPGurukul', 'Product': 'Nipah Virus Testing Management System', 'Versions': '1.0'} |
CVE-2023-6824 | The WP Customer Area WordPress plugin before 8.2.1 does not properly validates user capabilities in some of its AJAX actions, allowing any users to retrieve other user's account address. | https://wpscan.com/vulnerability/a224b984-770a-4534-b689-0701b582b388/ | 2023-12-14T18:06:39.012Z | 2024-01-16T15:57:00.656Z | 2024-01-16T15:57:00.656Z | {'Vendor': 'Unknown', 'Product': 'WP Customer Area', 'Versions': '0'} |
CVE-2023-6577 | A vulnerability was found in Beijing Baichuo PatrolFlow 2530Pro up to 20231126. It has been rated as problematic. This issue affects some unknown processing of the file /log/mailsendview.php. The manipulation of the argument file with the input /boot/phpConfig/tb_admin.txt leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247157 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.247157 | 2023-12-07T12:48:58.073Z | 2023-12-07T20:31:05.203Z | 2023-12-07T20:31:05.203Z | {'Vendor': 'Beijing Baichuo', 'Product': 'PatrolFlow 2530Pro', 'Versions': '20231126'} |
CVE-2023-6127 | Unrestricted Upload of File with Dangerous Type in GitHub repository salesagility/suitecrm prior to 7.14.2, 7.12.14, 8.4.2. | https://huntr.com/bounties/bf10c72b-5d2e-4c9a-9bd6-d77bdf31027d | 2023-11-14T16:01:38.918Z | 2023-11-14T16:01:57.316Z | 2023-11-14T16:01:57.316Z | {'Vendor': 'salesagility', 'Product': 'salesagility/suitecrm', 'Versions': 'unspecified'} |
CVE-2023-6432 | A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /inventory/items_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products | 2023-11-30T10:46:05.642Z | 2023-11-30T13:55:08.870Z | 2023-11-30T13:55:08.870Z | {'Vendor': 'BigProf ', 'Product': 'Online Inventory Manager', 'Versions': '3.2'} |
CVE-2023-6598 | The SpeedyCache plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the speedycache_save_varniship, speedycache_img_update_settings, speedycache_preloading_add_settings, and speedycache_preloading_delete_resource functions in all versions up to, and including, 1.1.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to update plugin options. | https://www.wordfence.com/threat-intel/vulnerabilities/id/db8cfdba-f3b2-45dc-9be7-6f6374fd5f39?source=cve | 2023-12-07T21:32:43.325Z | 2024-01-11T08:33:02.864Z | 2024-01-11T08:33:02.864Z | {'Vendor': 'softaculous', 'Product': 'SpeedyCache – Cache, Optimization, Performance', 'Versions': '*'} |
CVE-2023-6062 |
An arbitrary file write vulnerability exists where an authenticated, remote attacker with administrator privileges on the Nessus application could alter Nessus Rules variables to overwrite arbitrary files on the remote host, which could lead to a denial of service condition.
| https://www.tenable.com/security/tns-2023-39 | 2023-11-09T19:09:17.998Z | 2023-11-20T20:20:04.927Z | 2023-11-20T20:20:04.927Z | {'Vendor': 'Tenable', 'Product': 'Nessus', 'Versions': '0, 10.5.7'} |
CVE-2023-6275 | A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input "><script>alert(document.domain)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.7.1-231128, 1.8.0-231127 and 1.8.1-231127 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-246104. | https://vuldb.com/?id.246104 | 2023-11-24T07:39:50.362Z | 2023-11-24T15:00:06.295Z | 2023-12-15T05:35:00.447Z | {'Vendor': 'TOTVS', 'Product': 'Fluig Platform', 'Versions': '1.6.x, 1.7.x, 1.8.0, 1.8.1'} |
CVE-2023-6625 | The Product Enquiry for WooCommerce WordPress plugin before 3.1 does not have a CSRF check in place when deleting inquiries, which could allow attackers to make a logged in admin delete them via a CSRF attack | https://wpscan.com/vulnerability/d483f7ce-cb3f-4fcb-b060-005cec0ea10f/ | 2023-12-08T15:04:16.836Z | 2024-01-22T19:14:24.183Z | 2024-01-22T19:14:24.183Z | {'Vendor': 'Unknown', 'Product': 'Product Enquiry for WooCommerce', 'Versions': '0'} |
CVE-2023-6760 | A vulnerability classified as critical was found in Thecosy IceCMS up to 2.0.1. This vulnerability affects unknown code. The manipulation leads to manage user sessions. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247888. | https://vuldb.com/?id.247888 | 2023-12-13T07:39:58.964Z | 2023-12-13T15:31:03.924Z | 2023-12-13T15:31:03.924Z | {'Vendor': 'Thecosy', 'Product': 'IceCMS', 'Versions': '2.0.0, 2.0.1'} |
CVE-2023-6449 | The Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'validate' function and insufficient blocklisting on the 'wpcf7_antiscript_file_name' function in versions up to, and including, 5.8.3. This makes it possible for authenticated attackers with editor-level capabilities or above to upload arbitrary files on the affected site's server, but due to the htaccess configuration, remote code cannot be executed in most cases. By default, the file will be deleted from the server immediately. However, in some cases, other plugins may make it possible for the file to live on the server longer. This can make remote code execution possible when combined with another vulnerability, such as local file inclusion. | https://www.wordfence.com/threat-intel/vulnerabilities/id/5d7fb020-6acb-445e-a46b-bdb5aaf8f2b6?source=cve | 2023-11-30T21:43:37.083Z | 2023-12-01T11:00:06.019Z | 2023-12-01T11:00:06.019Z | {'Vendor': 'takayukister', 'Product': 'Contact Form 7', 'Versions': '*'} |
CVE-2023-6019 | A command injection existed in Ray's cpu_profile URL parameter allowing attackers to execute os commands on the system running the ray dashboard remotely without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023 | https://huntr.com/bounties/d0290f3c-b302-4161-89f2-c13bb28b4cfe | 2023-11-08T09:12:47.118Z | 2023-11-16T16:12:07.652Z | 2023-12-06T20:19:06.833Z | {'Vendor': 'ray-project', 'Product': 'ray-project/ray', 'Versions': 'unspecified'} |
CVE-2023-6222 | IThe Quttera Web Malware Scanner WordPress plugin before 3.4.2.1 does not validate user input used in a path, which could allow users with an admin role to perform path traversal attacks | https://wpscan.com/vulnerability/df892e99-c0f6-42b8-a834-fc55d1bde130 | 2023-11-20T18:52:52.004Z | 2023-12-18T20:07:54.232Z | 2023-12-18T20:07:54.232Z | {'Vendor': 'Unknown', 'Product': 'Quttera Web Malware Scanner', 'Versions': '0'} |
CVE-2023-6737 | The Enable Media Replace plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the SHORTPIXEL_DEBUG parameter in all versions up to, and including, 4.1.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Exploiting this vulnerability requires the attacker to know the ID of an attachment uploaded by the user they are attacking. | https://www.wordfence.com/threat-intel/vulnerabilities/id/c37d8218-6059-46f2-a5d9-d7c22486211e?source=cve | 2023-12-12T15:30:51.325Z | 2024-01-11T08:32:57.215Z | 2024-01-11T08:32:57.215Z | {'Vendor': 'shortpixel', 'Product': 'Enable Media Replace', 'Versions': '*'} |
CVE-2023-6367 |
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within Roles.
If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
| https://www.progress.com/network-monitoring | 2023-11-28T15:36:12.824Z | 2023-12-14T16:05:50.619Z | 2023-12-14T16:05:50.619Z | {'Vendor': 'Progress Software Corporation', 'Product': 'WhatsUp Gold', 'Versions': '2023.0, 2022.0'} |
CVE-2023-6721 | An XEE vulnerability has been found in Repox, which allows a remote attacker to interfere with the application's XML data processing in the fileupload function, resulting in interaction between the attacker and the server's file system. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-repox | 2023-12-12T08:04:46.692Z | 2023-12-13T10:06:55.214Z | 2023-12-13T10:06:55.214Z | {'Vendor': 'Repox', 'Product': 'Repox', 'Versions': '0'} |
CVE-2023-6263 | An issue was discovered by IPVM team in Network Optix NxCloud before 23.1.0.40440. It was possible to add a fake VMS server to NxCloud by using the exact identification of a legitimate VMS server. As result, it was possible to retrieve authorization headers from legitimate users when the legitimate client connects to the fake VMS server.
| https://networkoptix.atlassian.net/wiki/spaces/CHS/blog/2023/09/22/3074195467/vulnerability+2023-09-21+-+Server+Spoofing | 2023-11-22T17:55:39.783Z | 2023-11-22T17:56:56.711Z | 2023-12-18T14:31:16.795Z | {'Vendor': 'Network Optix', 'Product': 'NxCloud', 'Versions': '0'} |
CVE-2023-6776 | The 3D FlipBook plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘Ready Function’ field in all versions up to, and including, 1.15.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/500fd8aa-9ad1-41ee-bbeb-cda9c80c4fcb?source=cve | 2023-12-13T13:14:21.117Z | 2024-01-11T08:32:34.765Z | 2024-01-11T08:32:34.765Z | {'Vendor': 'iberezansky', 'Product': '3D FlipBook – PDF Flipbook WordPress', 'Versions': '*'} |
CVE-2023-6849 | A vulnerability was found in kalcaddle kodbox up to 1.48. It has been rated as critical. Affected by this issue is the function cover of the file plugins/fileThumb/app.php. The manipulation of the argument path leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.48.04 is able to address this issue. The patch is identified as 63a4d5708d210f119c24afd941d01a943e25334c. It is recommended to upgrade the affected component. VDB-248210 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.248210 | 2023-12-15T16:15:59.331Z | 2023-12-16T08:00:06.005Z | 2023-12-16T08:00:06.005Z | {'Vendor': 'kalcaddle', 'Product': 'kodbox', 'Versions': '1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 1.10, 1.11, 1.12, 1.13, 1.14, 1.15, 1.16, 1.17, 1.18, 1.19, 1.20, 1.21, 1.22, 1.23, 1.24, 1.25, 1.26, 1.27, 1.28, 1.29, 1.30, 1.31, 1.32, 1.33, 1.34, 1.35, 1.36, 1.37, 1.38, 1.39, 1.40, 1.41, 1.42, 1.43, 1.44, 1.45, 1.46, 1.47, 1.48'} |
CVE-2023-6994 | The List category posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'catlist' shortcode in all versions up to, and including, 0.89.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/611871cc-737f-44e3-baf5-dbaa8bd8eb81?source=cve | 2023-12-20T11:46:09.403Z | 2024-01-11T08:32:36.170Z | 2024-01-11T08:32:36.170Z | {'Vendor': 'fernandobt', 'Product': 'List category posts', 'Versions': '*'} |
CVE-2023-6097 | A SQL injection vulnerability has been found in ICS Business Manager, affecting version 7.06.0028.7089. This vulnerability could allow a remote user to send a specially crafted SQL query and retrieve all the information stored in the database. The data could also be modified or deleted, causing the application to malfunction. | https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-icssolution-ics-business-manager | 2023-11-13T09:53:08.477Z | 2023-11-13T13:11:01.674Z | 2023-11-13T13:11:01.674Z | {'Vendor': 'ICSSolution', 'Product': 'ICS Business Manager', 'Versions': '7.06.0028.7089, 7.06.0028.7066, 7.06.0028.2802'} |
CVE-2023-6428 | A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /invoicing/app/items_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products | 2023-11-30T10:45:59.186Z | 2023-11-30T13:53:42.237Z | 2023-11-30T13:53:42.237Z | {'Vendor': 'BigProf ', 'Product': 'Online Invoicing System', 'Versions': '2.6'} |
CVE-2023-6582 | The ElementsKit Elementor addons plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.0.3 via the ekit_widgetarea_content function. This makes it possible for unauthenticated attackers to obtain contents of posts in draft, private or pending review status that should not be visible to the general public. This applies to posts created with Elementor only. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ff4ae5c8-d164-4c2f-9bf3-83934c22cf4c?source=cve | 2023-12-07T13:32:34.116Z | 2024-01-11T08:33:11.987Z | 2024-01-11T08:33:11.987Z | {'Vendor': 'xpeedstudio', 'Product': 'ElementsKit Elementor addons', 'Versions': '*'} |
CVE-2023-6351 | Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html | 2023-11-28T02:43:37.730Z | 2023-11-29T12:02:05.266Z | 2023-11-29T12:02:05.266Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.199'} |
CVE-2023-6869 | A `<dialog>` element could have been manipulated to paint content outside of a sandboxed iframe. This could allow untrusted content to display under the guise of trusted content. This vulnerability affects Firefox < 121. | https://bugzilla.mozilla.org/show_bug.cgi?id=1799036 | 2023-12-15T17:42:57.488Z | 2023-12-19T13:38:51.751Z | 2023-12-19T16:42:21.244Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-6886 | A vulnerability was found in xnx3 wangmarket 6.1. It has been rated as critical. Affected by this issue is some unknown functionality of the component Role Management Page. The manipulation leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-248246 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.248246 | 2023-12-16T07:59:24.148Z | 2023-12-17T00:00:07.384Z | 2023-12-17T00:00:07.384Z | {'Vendor': 'xnx3', 'Product': 'wangmarket', 'Versions': '6.1'} |
CVE-2023-6185 | Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins.
In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.
| https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185 | 2023-11-17T09:15:06.687Z | 2023-12-11T11:52:06.388Z | 2023-12-11T11:52:06.388Z | {'Vendor': 'The Document Foundation', 'Product': 'LibreOffice', 'Versions': '7.5, 7.6'} |
CVE-2023-6756 | A vulnerability was found in Thecosy IceCMS 2.0.1. It has been classified as problematic. Affected is an unknown function of the file /login of the component Captcha Handler. The manipulation leads to improper restriction of excessive authentication attempts. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247884. | https://vuldb.com/?id.247884 | 2023-12-13T07:39:44.413Z | 2023-12-13T13:31:03.944Z | 2023-12-13T13:31:03.944Z | {'Vendor': 'Thecosy', 'Product': 'IceCMS', 'Versions': '2.0.1'} |
CVE-2023-6306 | A vulnerability classified as critical has been found in SourceCodester Free and Open Source Inventory Management System 1.0. Affected is an unknown function of the file /ample/app/ajax/member_data.php. The manipulation of the argument columns leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246132. | https://vuldb.com/?id.246132 | 2023-11-26T07:59:52.916Z | 2023-11-27T01:00:05.795Z | 2023-11-27T01:00:05.795Z | {'Vendor': 'SourceCodester', 'Product': 'Free and Open Source Inventory Management System', 'Versions': '1.0'} |
CVE-2023-6613 | A vulnerability classified as problematic has been found in Typecho 1.2.1. Affected is an unknown function of the file /admin/options-theme.php of the component Logo Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247248. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.247248 | 2023-12-08T09:16:29.351Z | 2023-12-08T15:31:05.710Z | 2023-12-08T15:31:05.710Z | {'Vendor': 'n/a', 'Product': 'Typecho', 'Versions': '1.2.1'} |
CVE-2023-6193 | quiche v. 0.15.0 through 0.19.0 was discovered to be vulnerable to unbounded queuing of path validation messages, which could lead to excessive resource consumption.
QUIC path validation (RFC 9000 Section 8.2) requires that the recipient of a PATH_CHALLENGE frame responds by sending a PATH_RESPONSE. An unauthenticated remote attacker can exploit the vulnerability by sending PATH_CHALLENGE frames and manipulating the connection (e.g. by restricting the peer's congestion window size) so that PATH_RESPONSE frames can only be sent at the slower rate than they are received; leading to storage of path validation data in an unbounded queue.
Quiche versions greater than 0.19.0 address this problem. | https://github.com/cloudflare/quiche/security/advisories/GHSA-w3vp-jw9m-f9pm | 2023-11-17T14:39:07.534Z | 2023-12-12T13:32:03.183Z | 2023-12-12T13:32:03.183Z | {'Vendor': 'Cloudflare', 'Product': 'quiche', 'Versions': '0.15.0'} |
CVE-2023-6039 | A use-after-free flaw was found in lan78xx_disconnect in drivers/net/usb/lan78xx.c in the network sub-component, net/usb/lan78xx in the Linux Kernel. This flaw allows a local attacker to crash the system when the LAN78XX USB device detaches. | https://access.redhat.com/security/cve/CVE-2023-6039 | 2023-11-08T19:23:55.857Z | 2023-11-09T15:08:03.326Z | 2024-01-23T01:47:14.794Z | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': '6.5-rc5'} |
CVE-2023-6890 | Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.17.
| https://huntr.com/bounties/2cf11678-8793-4fa1-b21a-f135564a105d | 2023-12-16T08:57:21.686Z | 2023-12-16T08:57:31.033Z | 2023-12-18T10:14:03.656Z | {'Vendor': 'thorsten', 'Product': 'thorsten/phpmyfaq', 'Versions': 'unspecified'} |
CVE-2023-6310 | A vulnerability has been found in SourceCodester Loan Management System 1.0 and classified as critical. This vulnerability affects the function delete_borrower of the file deleteBorrower.php. The manipulation of the argument borrower_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246136. | https://vuldb.com/?id.246136 | 2023-11-26T15:18:57.226Z | 2023-11-27T02:00:05.747Z | 2023-11-27T02:00:05.747Z | {'Vendor': 'SourceCodester', 'Product': 'Loan Management System', 'Versions': '1.0'} |
CVE-2023-6740 | Privilege escalation in jar_signature agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges | https://checkmk.com/werk/16163 | 2023-12-12T15:55:03.221Z | 2024-01-12T07:50:20.076Z | 2024-01-12T14:04:33.614Z | {'Vendor': 'Checkmk GmbH', 'Product': 'Checkmk', 'Versions': '2.2.0, 2.1.0, 2.0.0'} |
CVE-2023-6828 | The Contact Form, Survey & Popup Form Plugin for WordPress – ARForms Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘ arf_http_referrer_url’ parameter in all versions up to, and including, 1.5.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/6e349cae-a996-4a32-807a-a98ebcb01edd?source=cve | 2023-12-14T19:17:20.651Z | 2024-01-11T08:32:37.581Z | 2024-01-11T08:32:37.581Z | {'Vendor': 'reputeinfosystems', 'Product': 'Contact Form, Survey & Popup Form Plugin for WordPress – ARForms Form Builder', 'Versions': '*'} |
CVE-2023-6594 | The WordPress Button Plugin MaxButtons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 9.7.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Administrators can give button creation privileges to users with lower levels (contributor+) which would allow those lower-privileged users to carry out attacks. | https://www.wordfence.com/threat-intel/vulnerabilities/id/cfe2cabd-98f6-4ebc-8a02-e6951202aa88?source=cve | 2023-12-07T20:05:24.068Z | 2024-01-09T02:34:50.547Z | 2024-01-09T02:34:50.547Z | {'Vendor': 'maxfoundry', 'Product': 'WordPress Button Plugin MaxButtons', 'Versions': '*'} |
CVE-2023-6347 | Use after free in Mojo in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html | 2023-11-28T01:12:09.557Z | 2023-11-29T12:02:04.687Z | 2023-11-29T12:02:04.687Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '119.0.6045.199'} |
CVE-2023-6652 | A vulnerability was found in code-projects Matrimonial Site 1.0. It has been declared as critical. Affected by this vulnerability is the function register of the file /register.php. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247345 was assigned to this vulnerability. | https://vuldb.com/?id.247345 | 2023-12-09T17:27:06.367Z | 2023-12-10T12:00:04.524Z | 2023-12-10T12:00:04.524Z | {'Vendor': 'code-projects', 'Product': 'Matrimonial Site', 'Versions': '1.0'} |
CVE-2023-6202 | Mattermost fails to perform proper authorization in the /plugins/focalboard/api/v2/users endpoint allowing an attacker who is a guest user and knows the ID of another user to get their information (e.g. name, surname, nickname) via Mattermost Boards.
| https://mattermost.com/security-updates | 2023-11-20T12:24:12.551Z | 2023-11-27T09:12:04.786Z | 2023-11-27T09:12:04.786Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 9.0.2, 9.1.1, 7.8.13, 8.1.4'} |
CVE-2023-6015 | MLflow allowed arbitrary files to be PUT onto the server. | https://huntr.com/bounties/43e6fb72-676e-4670-a225-15d6836f65d3 | 2023-11-08T09:11:38.951Z | 2023-11-16T16:06:11.032Z | 2023-11-16T16:06:11.032Z | {'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'} |
CVE-2023-6150 | Improper Privilege Management vulnerability in ESKOM Computer e-municipality module allows Collect Data as Provided by Users.This issue affects e-municipality module: before v.105.
| https://www.usom.gov.tr/bildirim/tr-23-0664 | 2023-11-15T11:52:29.743Z | 2023-11-28T09:25:50.738Z | 2023-12-05T06:18:21.136Z | {'Vendor': 'ESKOM Computer', 'Product': 'e-municipality module', 'Versions': '0'} |
CVE-2023-6853 | A vulnerability classified as critical was found in kalcaddle KodExplorer up to 4.51.03. Affected by this vulnerability is the function index of the file plugins/officeLive/app.php. The manipulation of the argument path leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.52.01 is able to address this issue. The identifier of the patch is 5cf233f7556b442100cf67b5e92d57ceabb126c6. It is recommended to upgrade the affected component. The identifier VDB-248221 was assigned to this vulnerability. | https://vuldb.com/?id.248221 | 2023-12-15T16:38:25.000Z | 2023-12-16T12:00:05.380Z | 2023-12-16T12:00:05.380Z | {'Vendor': 'kalcaddle', 'Product': 'KodExplorer', 'Versions': '4.51.03'} |
CVE-2023-6629 | The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘msg’ parameter in all versions up to, and including, 2.8.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/7681f984-d488-4da7-afe1-988e5ad012f2?source=cve | 2023-12-08T16:05:50.184Z | 2024-01-03T04:29:33.793Z | 2024-01-03T04:29:33.793Z | {'Vendor': 'wpexpertsio', 'Product': 'POST SMTP – The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications', 'Versions': '*'} |
CVE-2023-6296 | A vulnerability was found in osCommerce 4. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /catalog/compare of the component Instant Message Handler. The manipulation of the argument compare with the input 40dz4iq"><script>alert(1)</script>zohkx leads to cross site scripting. The attack may be launched remotely. VDB-246122 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.246122 | 2023-11-26T07:20:43.976Z | 2023-11-26T21:31:04.142Z | 2023-11-26T21:31:04.142Z | {'Vendor': 'n/a', 'Product': 'osCommerce', 'Versions': '4'} |
CVE-2023-6412 | A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via photo.php in multiple parameters. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script | 2023-11-30T10:02:05.793Z | 2023-11-30T13:11:34.854Z | 2023-11-30T13:11:34.854Z | {'Vendor': 'Voovi Social Networking Script', 'Product': 'Voovi Social Networking Script', 'Versions': '1.0'} |
CVE-2023-6042 | Any unauthenticated user may send e-mail from the site with any title or content to the admin | https://wpscan.com/vulnerability/56a1c050-67b5-43bc-b5b6-28d9a5a59eba | 2023-11-08T20:57:10.685Z | 2024-01-08T19:00:28.796Z | 2024-01-08T19:00:28.796Z | {'Vendor': 'Unknown', 'Product': 'Getwid', 'Versions': '0'} |
CVE-2023-6941 | The Keap Official Opt-in Forms WordPress plugin through 1.0.11 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example, in multisite setup). | https://wpscan.com/vulnerability/58f7c9aa-5e59-468f-aba9-b15e7942fd37/ | 2023-12-19T03:40:00.849Z | 2024-01-15T15:10:38.764Z | 2024-01-15T15:10:38.764Z | {'Vendor': 'Unknown', 'Product': 'Keap Official Opt-in Forms', 'Versions': '0'} |
CVE-2023-6804 | Improper privilege management allowed arbitrary workflows to be committed and run using an improperly scoped PAT. To exploit this, a workflow must have already existed in the target repo. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1.
| https://docs.github.com/en/[email protected]/admin/release-notes#3.8.12 | 2023-12-13T19:26:47.233Z | 2023-12-21T20:45:34.098Z | 2023-12-21T20:45:34.098Z | {'Vendor': 'GitHub', 'Product': 'Enterprise Server', 'Versions': '3.8.0, 3.9.0, 3.10.0, 3.11'} |
CVE-2023-6107 | null | null | 2023-11-13T15:25:04.993Z | null | 2023-11-13T23:37:02.937Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-6384 | The WP User Profile Avatar WordPress plugin before 1.0.1 does not properly check for authorisation, allowing authors to delete and update arbitrary avatar | https://wpscan.com/vulnerability/fbdefab4-614b-493b-a9ae-c5aeff8323ef/ | 2023-11-29T16:13:10.279Z | 2024-01-22T19:14:24.990Z | 2024-01-22T19:14:24.990Z | {'Vendor': 'Unknown', 'Product': 'WP User Profile Avatar', 'Versions': '0'} |
CVE-2023-6691 |
Cambium ePMP Force 300-25 version 4.7.0.1 is vulnerable to a code injection vulnerability that could allow an attacker to perform remote code execution and gain root privileges.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-348-01 | 2023-12-11T17:10:52.940Z | 2023-12-18T17:52:12.574Z | 2023-12-18T17:52:12.574Z | {'Vendor': 'Cambium ', 'Product': 'ePMP Force 300-25', 'Versions': '4.7.0.1'} |
CVE-2023-6054 | A vulnerability, which was classified as critical, was found in Tongda OA 2017 up to 11.9. This affects an unknown part of the file general/wiki/cp/manage/lock.php. The manipulation of the argument TERM_ID_STR leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-244875. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.244875 | 2023-11-09T12:44:43.533Z | 2023-11-09T19:00:07.653Z | 2023-11-09T19:00:07.653Z | {'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'} |
CVE-2023-6111 | A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation.
The function nft_trans_gc_catchall did not remove the catchall set element from the catchall_list when the argument sync is true, making it possible to free a catchall set element many times.
We recommend upgrading past commit 93995bf4af2c5a99e2a87f0cd5ce547d31eb7630.
| https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93995bf4af2c5a99e2a87f0cd5ce547d31eb7630 | 2023-11-13T20:25:06.272Z | 2023-11-14T14:05:35.216Z | 2023-11-14T14:05:35.216Z | {'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '6.6'} |
CVE-2023-6238 | A buffer overflow vulnerability was found in the NVM Express (NVMe) driver in the Linux kernel. An unprivileged user could specify a small meta buffer and let the device perform larger Direct Memory Access (DMA) into the same buffer, overwriting unrelated kernel memory, causing random kernel crashes and memory corruption. | https://access.redhat.com/security/cve/CVE-2023-6238 | 2023-11-21T11:09:27.301Z | 2023-11-21T20:21:20.625Z | 2024-01-23T01:59:41.194Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''} |
CVE-2023-6687 | An issue was discovered by Elastic whereby Elastic Agent would log a raw event in its own logs at the WARN or ERROR level if ingesting that event to Elasticsearch failed with any 4xx HTTP status code except 409 or 429. Depending on the nature of the event that Elastic Agent attempted to ingest, this could lead to the insertion of sensitive or private information in the Elastic Agent logs. Elastic has released 8.11.3 and 7.17.16 that prevents this issue by limiting these types of logs to DEBUG level logging, which is disabled by default. | https://discuss.elastic.co/t/beats-and-elastic-agent-8-11-3-7-17-16-security-update-esa-2023-30/349180 | 2023-12-11T16:20:50.242Z | 2023-12-12T18:28:06.423Z | 2023-12-12T18:28:06.423Z | {'Vendor': 'Elastic', 'Product': 'Elastic Agent', 'Versions': '7.0.0, 8.0.0'} |
CVE-2023-6900 | A vulnerability, which was classified as critical, has been found in rmountjoy92 DashMachine 0.5-4. Affected by this issue is some unknown functionality of the file /settings/delete_file. The manipulation of the argument file leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. VDB-248258 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.248258 | 2023-12-16T19:38:07.417Z | 2023-12-17T13:31:04.489Z | 2023-12-17T13:31:04.489Z | {'Vendor': 'rmountjoy92', 'Product': 'DashMachine', 'Versions': '0.5-4'} |
CVE-2023-6845 | The CommentTweets WordPress plugin through 0.6 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks | https://wpscan.com/vulnerability/cbdaf158-f277-4be4-b022-68d18dae4c55 | 2023-12-15T14:26:23.314Z | 2024-01-08T19:00:38.284Z | 2024-01-08T19:00:38.284Z | {'Vendor': 'Unknown', 'Product': 'CommentTweets', 'Versions': '0'} |
CVE-2023-6146 |
A Qualys web application was found to have a stored XSS vulnerability resulting from the absence of HTML encoding in the presentation of logging information to users. This vulnerability allowed a user with login access to the application to introduce XSS payload via browser details.
| https://www.qualys.com/security-advisories/ | 2023-11-15T10:10:22.335Z | 2023-12-08T14:21:56.577Z | 2023-12-08T14:21:56.577Z | {'Vendor': 'Qualys', 'Product': 'Qualysguard', 'Versions': ' '} |
CVE-2023-6795 | An OS command injection vulnerability in Palo Alto Networks PAN-OS software enables an authenticated administrator to disrupt system processes and potentially execute arbitrary code with limited privileges on the firewall. | https://security.paloaltonetworks.com/CVE-2023-6795 | 2023-12-13T17:27:27.372Z | 2023-12-13T18:17:43.368Z | 2023-12-13T18:17:43.368Z | {'Vendor': 'Palo Alto Networks', 'Product': 'PAN-OS', 'Versions': '8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 11.1'} |
CVE-2023-6280 | An XXE (XML External Entity) vulnerability has been detected in 52North WPS affecting versions prior to 4.0.0-beta.11. This vulnerability allows the use of external entities in its WebProcessingService servlet for an attacker to retrieve files by making HTTP requests to the internal network. | https://www.incibe.es/en/incibe-cert/notices/aviso/xml-external-entity-reference-52north-wps | 2023-11-24T11:48:26.685Z | 2023-12-19T15:00:07.403Z | 2023-12-19T15:04:37.619Z | {'Vendor': '52North', 'Product': '52North WPS', 'Versions': '0'} |
CVE-2023-6008 | The UserPro plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.1.1. This is due to missing or incorrect nonce validation on multiple functions. This makes it possible for unauthenticated attackers to add, modify, or delete user meta and plugin options. | https://www.wordfence.com/threat-intel/vulnerabilities/id/ed6e2b9e-3d70-4c07-a779-45164816b89c?source=cve | 2023-11-08T05:32:01.025Z | 2023-11-22T15:33:38.202Z | 2023-11-22T15:33:38.202Z | {'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'} |
CVE-2023-6458 | Mattermost webapp fails to validate route parameters in/<TEAM_NAME>/channels/<CHANNEL_NAME> allowing an attacker to perform a client-side path traversal.
| https://mattermost.com/security-updates | 2023-12-01T10:06:07.237Z | 2023-12-06T08:10:18.481Z | 2023-12-06T08:10:18.481Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 0, 0, 9.1.2, 9.0.3, 8.1.5, 7.8.14'} |
CVE-2023-6634 | The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution. | https://www.wordfence.com/threat-intel/vulnerabilities/id/21291ed7-cdc0-4698-9ec4-8417160845ed?source=cve | 2023-12-08T19:29:09.184Z | 2024-01-11T08:32:28.636Z | 2024-01-11T08:32:28.636Z | {'Vendor': 'thimpress', 'Product': 'LearnPress – WordPress LMS Plugin', 'Versions': '*'} |
CVE-2023-6264 | Information leak in Content-Security-Policy header in Devolutions Server 2023.3.7.0 allows an unauthenticated attacker to list the configured Devolutions Gateways endpoints.
| https://devolutions.net/security/advisories/DEVO-2023-0020/ | 2023-11-22T18:34:42.184Z | 2023-11-22T18:39:21.629Z | 2023-11-22T18:39:21.629Z | {'Vendor': 'Devolutions', 'Product': 'Server', 'Versions': '0'} |
CVE-2023-6771 | A vulnerability, which was classified as critical, has been found in SourceCodester Simple Student Attendance System 1.0. This issue affects the function save_attendance of the file actions.class.php. The manipulation of the argument sid leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247907. | https://vuldb.com/?id.247907 | 2023-12-13T12:19:14.140Z | 2023-12-13T18:31:03.593Z | 2023-12-13T18:31:03.593Z | {'Vendor': 'SourceCodester', 'Product': 'Simple Student Attendance System', 'Versions': '1.0'} |
CVE-2023-6376 | Henschen & Associates court document management software does not sufficiently randomize file names of cached documents, allowing a remote, unauthenticated attacker to access restricted documents.
| https://www.henschen.com/government | 2023-11-29T04:02:44.663Z | 2023-11-30T17:55:13.992Z | 2023-11-30T20:55:04.245Z | {'Vendor': 'Henschen & Associates', 'Product': 'court document management software', 'Versions': '0'} |
CVE-2023-6049 | The Estatik Real Estate Plugin WordPress plugin before 4.1.1 unserializes user input via some of its cookies, which could allow unauthenticated users to perform PHP Object Injection when a suitable gadget chain is present on the blog | https://wpscan.com/vulnerability/8cfd8c1f-2834-4a94-a3fa-c0cfbe78a8b7 | 2023-11-09T10:03:27.377Z | 2024-01-15T15:10:39.151Z | 2024-01-15T15:10:39.151Z | {'Vendor': 'Unknown', 'Product': 'Estatik Real Estate Plugin', 'Versions': '0'} |
CVE-2023-6419 | A vulnerability has been reported in Voovi Social Networking Script version 1.0 that allows a XSS via editprofile.php in multiple parameters, the exploitation of which could allow a remote attacker to send a specially crafted JavaScript payload and partially take over the browser session of an authenticated user. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script | 2023-11-30T10:02:15.643Z | 2023-11-30T13:17:24.799Z | 2023-11-30T13:17:24.799Z | {'Vendor': 'Voovi Social Networking Script', 'Product': 'Voovi Social Networking Script', 'Versions': '1.0'} |
CVE-2023-6225 | The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's su_meta shortcode combined with post meta data in all versions up to, and including, 5.13.3 due to insufficient input sanitization and output escaping on user supplied meta values. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/558e36f6-4678-46a2-8154-42770fbb5574?source=cve | 2023-11-20T21:47:42.883Z | 2023-11-28T04:31:51.706Z | 2023-11-28T04:31:51.706Z | {'Vendor': 'gn_themes', 'Product': 'WP Shortcodes Plugin — Shortcodes Ultimate', 'Versions': '*'} |
CVE-2023-6730 | Deserialization of Untrusted Data in GitHub repository huggingface/transformers prior to 4.36. | https://huntr.com/bounties/423611ee-7a2a-442a-babb-3ed2f8385c16 | 2023-12-12T14:03:55.138Z | 2023-12-19T12:11:20.729Z | 2023-12-19T12:11:20.729Z | {'Vendor': 'huggingface', 'Product': 'huggingface/transformers', 'Versions': 'unspecified'} |
CVE-2023-6360 | The 'My Calendar' WordPress Plugin, version < 3.4.22 is affected by an unauthenticated SQL injection vulnerability in the 'from' and 'to' parameters in the '/my-calendar/v1/events' rest route. | https://www.tenable.com/security/research/tra-2023-40 | 2023-11-28T10:28:13.482Z | 2023-11-30T15:17:14.959Z | 2023-11-30T15:17:14.959Z | {'Vendor': '', 'Product': '', 'Versions': '0'} |
Subsets and Splits