CVE_ID
stringlengths 9
213
⌀ | Description
stringlengths 24
3.87k
⌀ | URL
stringlengths 12
306
⌀ | DateReserved
stringlengths 19
24
⌀ | DatePublished
stringlengths 19
75
⌀ | DateUpdated
stringlengths 19
61
⌀ | AffectedProducts
stringlengths 46
143k
⌀ |
---|---|---|---|---|---|---|
CVE-2023-6204 | On some systems—depending on the graphics settings and drivers—it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5. | https://bugzilla.mozilla.org/show_bug.cgi?id=1841050 | 2023-11-20T13:33:20.318Z | 2023-11-21T14:28:52.188Z | 2023-11-22T16:46:25.566Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-6013 | H2O is vulnerable to stored XSS vulnerability which can lead to a Local File Include attack. | https://huntr.com/bounties/9881569f-dc2a-437e-86b0-20d4b70ae7af | 2023-11-08T09:09:04.324Z | 2023-11-16T16:07:17.441Z | 2023-11-16T16:07:17.441Z | {'Vendor': 'h2oai', 'Product': 'h2oai/h2o-3', 'Versions': 'unspecified'} |
CVE-2023-6910 | A vulnerable API method in M-Files Server before 23.12.13195.0 allows for uncontrolled resource consumption. Authenticated attacker can exhaust server storage space to a point where the server can no longer serve requests. | https://www.m-files.com/about/trust-center/security-advisories/cve-2023-6910 | 2023-12-18T07:52:44.859Z | 2023-12-20T09:36:39.118Z | 2023-12-20T09:36:39.118Z | {'Vendor': 'M-Files Corporation', 'Product': 'M-Files Server', 'Versions': '0'} |
CVE-2023-6855 | The Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions plugin for WordPress is vulnerable to unauthorized modification of membership levels created by the plugin due to an incorrectly implemented capability check in the pmpro_rest_api_get_permissions_check function in all versions up to 2.12.5 (inclusive). This makes it possible for unauthenticated attackers to change membership levels including prices. | https://www.wordfence.com/threat-intel/vulnerabilities/id/383c7837-e7b7-4608-9cdc-91b7dbc7f4e2?source=cve | 2023-12-15T17:01:59.388Z | 2024-01-11T08:32:31.855Z | 2024-01-11T08:32:31.855Z | {'Vendor': 'strangerstudios', 'Product': 'Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions', 'Versions': '*'} |
CVE-2023-6156 | Improper neutralization of livestatus command delimiters in the availability timeline in Checkmk <= 2.0.0p39, < 2.1.0p37, and < 2.2.0p15 allows arbitrary livestatus command execution for authorized users. | https://checkmk.com/werk/16221 | 2023-11-15T16:38:31.845Z | 2023-11-22T16:24:15.515Z | 2023-11-22T16:24:15.515Z | {'Vendor': 'Checkmk GmbH', 'Product': 'Checkmk', 'Versions': '2.2.0, 2.1.0, 2.0.0'} |
CVE-2023-6506 | The WP 2FA – Two-factor authentication for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.5.0 via the send_backup_codes_email due to missing validation on a user controlled key. This makes it possible for subscriber-level attackers to email arbitrary users on the site. | https://www.wordfence.com/threat-intel/vulnerabilities/id/caff9be6-4161-47a0-ba47-6c8fc0c4ab40?source=cve | 2023-12-04T20:15:47.572Z | 2024-01-11T06:49:33.842Z | 2024-01-11T06:49:33.842Z | {'Vendor': 'melapress', 'Product': 'WP 2FA – Two-factor authentication for WordPress', 'Versions': '*'} |
CVE-2023-6290 | The SEOPress WordPress plugin before 7.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed | https://wpscan.com/vulnerability/78a13958-cd12-4ea8-b326-1e3184da970b/ | 2023-11-24T17:02:02.306Z | 2024-01-22T19:14:26.723Z | 2024-01-22T19:14:26.723Z | {'Vendor': 'Unknown', 'Product': 'SEOPress', 'Versions': '0'} |
CVE-2023-6414 | A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via perfil.php in the id and user parameters. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script | 2023-11-30T10:02:08.823Z | 2023-11-30T13:12:19.434Z | 2023-11-30T13:12:19.434Z | {'Vendor': 'Voovi Social Networking Script', 'Product': 'Voovi Social Networking Script', 'Versions': '1.0'} |
CVE-2023-6044 | A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker with physical access to impersonate Lenovo Vantage Service and execute arbitrary code with elevated privileges. | https://support.lenovo.com/us/en/product_security/LEN-144736 | 2023-11-08T21:12:23.667Z | 2024-01-19T20:09:05.706Z | 2024-01-19T20:09:05.706Z | {'Vendor': 'Lenovo', 'Product': 'Vantage', 'Versions': ' '} |
CVE-2023-6551 | As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used.
Developers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension.
The README has been updated to include these guidelines.
| https://cert.pl/posts/2024/01/CVE-2023-6551 | 2023-12-06T11:18:59.869Z | 2024-01-04T16:04:34.995Z | 2024-01-04T16:04:34.995Z | {'Vendor': 'class.upload.php', 'Product': 'class.upload.php', 'Versions': '0'} |
CVE-2023-6101 | A vulnerability, which was classified as problematic, has been found in Maiwei Safety Production Control Platform 4.1. This issue affects some unknown processing of the file /TC/V2.7/ha.html of the component Intelligent Monitoring. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-245063. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.245063 | 2023-11-13T10:18:42.374Z | 2023-11-13T16:00:08.546Z | 2023-11-13T16:00:08.546Z | {'Vendor': 'Maiwei', 'Product': 'Safety Production Control Platform', 'Versions': '4.1'} |
CVE-2023-6802 | An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1. | https://docs.github.com/en/[email protected]/admin/release-notes#3.8.12 | 2023-12-13T19:25:56.875Z | 2023-12-21T20:45:24.749Z | 2023-12-21T20:45:24.749Z | {'Vendor': 'GitHub', 'Product': 'Enterprise Server', 'Versions': '3.8.0, 3.9.0, 3.10.0, 3.11'} |
CVE-2023-6228 | An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer overflow leads to an application crash. | https://access.redhat.com/security/cve/CVE-2023-6228 | 2023-11-21T05:33:19.718Z | 2023-12-18T13:43:08.775Z | 2024-01-22T23:23:16.197Z | {'Vendor': 'n/a', 'Product': 'libtiff', 'Versions': ''} |
CVE-2023-6697 | The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the map id parameter in all versions up to, and including, 9.0.28 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b3c3115b-8921-429d-b517-b946edab1cd5?source=cve | 2023-12-11T19:01:21.306Z | 2024-01-24T13:52:53.769Z | 2024-01-24T13:52:53.769Z | {'Vendor': 'wpgmaps', 'Product': 'WP Go Maps (formerly WP Google Maps)', 'Versions': '*'} |
CVE-2023-6052 | A vulnerability classified as critical has been found in Tongda OA 2017 up to 11.9. Affected is an unknown function of the file general/system/censor_words/module/delete.php. The manipulation of the argument DELETE_STR leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-244872. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.244872 | 2023-11-09T12:35:16.999Z | 2023-11-09T12:37:56.723Z | 2023-11-09T12:37:56.723Z | {'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'} |
CVE-2023-6402 | A vulnerability, which was classified as critical, was found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file add-phlebotomist.php. The manipulation of the argument empid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246423. | https://vuldb.com/?id.246423 | 2023-11-30T09:01:51.048Z | 2023-11-30T15:00:05.748Z | 2023-11-30T15:00:05.748Z | {'Vendor': 'PHPGurukul', 'Product': 'Nipah Virus Testing Management System', 'Versions': '1.0'} |
CVE-2023-6117 | A possibility of unwanted server memory consumption was detected through the obsolete functionalities in the Rest API methods of the M-Files server
before 23.11.13156.0 which allows attackers to execute DoS attacks. | https://www.m-files.com/about/trust-center/security-advisories/cve-2023-6117/ | 2023-11-14T07:16:15.847Z | 2023-11-22T09:56:32.749Z | 2023-11-22T09:56:32.749Z | {'Vendor': 'M-Files', 'Product': 'M-Files Server', 'Versions': '0'} |
CVE-2023-6547 | Mattermost fails to validate team membership when a user attempts to access a playbook, allowing a user with permissions to a playbook but no permissions to the team the playbook is on to access and modify the playbook. This can happen if the user was once a member of the team, got permissions to the playbook and was then removed from the team.
| https://mattermost.com/security-updates | 2023-12-06T08:47:19.482Z | 2023-12-12T08:22:41.419Z | 2023-12-12T08:22:41.419Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 8.1.6, 9.2.2'} |
CVE-2023-6394 | A flaw was found in Quarkus. This issue occurs when receiving a request over websocket with no role-based permission specified on the GraphQL operation, Quarkus processes the request without authentication despite the endpoint being secured. This can allow an attacker to access information and functionality outside of normal granted API permissions. | https://access.redhat.com/errata/RHSA-2023:7612 | 2023-11-30T04:05:52.129Z | 2023-12-09T01:26:52.908Z | 2024-01-23T02:03:21.900Z | {'Vendor': 'n/a', 'Product': 'quarkus', 'Versions': '3.6.0'} |
CVE-2023-6906 | A vulnerability, which was classified as critical, was found in Totolink A7100RU 7.4cu.2313_B20191024. Affected is the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. The manipulation of the argument flag with the input ie8 leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248268. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | https://vuldb.com/?id.248268 | 2023-12-17T08:31:17.379Z | 2023-12-18T00:00:07.209Z | 2023-12-18T00:00:07.209Z | {'Vendor': 'Totolink', 'Product': 'A7100RU', 'Versions': '7.4cu.2313_B20191024'} |
CVE-2023-6005 | The EventON WordPress plugin before 4.5.5, EventON WordPress plugin before 2.2.7 does not sanitize and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | https://wpscan.com/vulnerability/fa4eea26-0611-4fa8-a947-f78ddf46a56a/ | 2023-11-08T03:30:52.321Z | 2024-01-16T15:57:01.802Z | 2024-01-16T15:57:01.802Z | {'Vendor': 'Unknown', 'Product': 'EventON', 'Versions': '0'} |
CVE-2023-6510 | Use after free in Media Capture in Google Chrome prior to 120.0.6099.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium) | https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html | 2023-12-04T22:53:19.881Z | 2023-12-06T01:19:20.171Z | 2023-12-06T01:19:20.171Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '120.0.6099.62'} |
CVE-2023-6140 | The Essential Real Estate WordPress plugin before 4.4.0 does not prevent users with limited privileges on the site, like subscribers, from momentarily uploading malicious PHP files disguised as ZIP archives, which may lead to remote code execution. | https://wpscan.com/vulnerability/c837eaf3-fafd-45a2-8f5e-03afb28a765b | 2023-11-14T22:50:43.564Z | 2024-01-08T19:00:36.658Z | 2024-01-08T19:00:36.658Z | {'Vendor': 'Unknown', 'Product': 'Essential Real Estate', 'Versions': '0'} |
CVE-2023-6843 | The easy.jobs- Best Recruitment Plugin for Job Board Listing, Manager, Career Page for Elementor & Gutenberg WordPress plugin before 2.4.7 does not properly secure some of its AJAX actions, allowing any logged-in users to modify its settings. | https://wpscan.com/vulnerability/41508340-8caf-4dca-bd88-350b63b78ab0 | 2023-12-15T13:32:36.192Z | 2024-01-15T15:10:39.949Z | 2024-01-15T15:10:39.949Z | {'Vendor': 'Unknown', 'Product': 'easy.jobs- Best Recruitment Plugin for Job Board Listing, Manager, Career Page for Elementor & Gutenberg', 'Versions': '0'} |
CVE-2023-6793 | An improper privilege management vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-only administrator to revoke active XML API keys from the firewall and disrupt XML API usage. | https://security.paloaltonetworks.com/CVE-2023-6793 | 2023-12-13T17:27:26.408Z | 2023-12-13T18:40:54.955Z | 2023-12-13T18:40:54.955Z | {'Vendor': 'Palo Alto Networks', 'Product': 'PAN-OS', 'Versions': '8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 11.1'} |
CVE-2023-6269 | An argument injection vulnerability has been identified in the
administrative web interface of the Atos Unify OpenScape products "Session Border Controller" (SBC) and "Branch", before version V10 R3.4.0, and OpenScape "BCF" before versions V10R10.12.00 and V10R11.05.02. This allows an
unauthenticated attacker to gain root access to the appliance via SSH (scope change) and also bypass authentication for the administrative interface and gain
access as an arbitrary (administrative) user. | https://networks.unify.com/security/advisories/OBSO-2310-01.pdf | 2023-11-23T10:39:50.541Z | 2023-12-05T07:35:19.472Z | 2023-12-05T07:35:19.472Z | {'Vendor': 'Atos Unify', 'Product': 'OpenScape Session Border Controller (SBC)', 'Versions': '0'} |
CVE-2023-6137 | Cross-Site Request Forgery (CSRF) vulnerability in finnj Frontier Post allows Cross Site Request Forgery.This issue affects Frontier Post: from n/a through 6.1.
| https://patchstack.com/database/vulnerability/frontier-post/wordpress-frontier-post-plugin-6-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve | 2023-11-14T22:18:10.072Z | 2023-11-30T12:50:03.408Z | 2023-11-30T12:50:03.408Z | {'Vendor': 'finnj', 'Product': 'Frontier Post', 'Versions': 'n/a'} |
CVE-2023-6567 | The LearnPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order_by’ parameter in all versions up to, and including, 4.2.5.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | https://www.wordfence.com/threat-intel/vulnerabilities/id/6ab578cd-3a0b-43d3-aaa7-0a01f431a4e2?source=cve | 2023-12-07T00:13:58.517Z | 2024-01-11T08:32:37.107Z | 2024-01-11T08:32:37.107Z | {'Vendor': 'thimpress', 'Product': 'LearnPress – WordPress LMS Plugin', 'Versions': '*'} |
CVE-2023-6588 |
Offline mode is always enabled, even if permission disallows it, in
Devolutions Server data source in Devolutions Workspace 2023.3.2.0 and
earlier. This allows an attacker with access to the Workspace
application to access credentials when offline.
| https://devolutions.net/security/advisories/DEVO-2023-0022/ | 2023-12-07T15:41:50.627Z | 2023-12-07T15:59:19.821Z | 2023-12-07T15:59:19.821Z | {'Vendor': 'Devolutions', 'Product': 'Workspace', 'Versions': '0'} |
CVE-2023-6422 | A vulnerability has been discovered in BigProf Online Clinic Management System 2.2, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /clinic/patients_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products | 2023-11-30T10:45:50.469Z | 2023-11-30T13:48:15.442Z | 2023-11-30T13:48:15.442Z | {'Vendor': 'BigProf ', 'Product': 'Online Clinic Management System', 'Versions': '2.2'} |
CVE-2023-6971 | The Backup Migration plugin for WordPress is vulnerable to Remote File Inclusion in versions 1.0.8 to 1.3.9 via the 'content-dir' HTTP header. This makes it possible for unauthenticated attackers to include remote files on the server, resulting in code execution. NOTE: Successful exploitation of this vulnerability requires that the target server's php.ini is configured with 'allow_url_include' set to 'on'. This feature is deprecated as of PHP 7.4 and is disabled by default, but can still be explicitly enabled in later versions of PHP. | https://www.wordfence.com/threat-intel/vulnerabilities/id/b380283c-0dbb-4d67-9f66-cb7c400c0427?source=cve | 2023-12-19T22:32:50.041Z | 2023-12-23T01:59:49.340Z | 2023-12-23T01:59:49.340Z | {'Vendor': 'migrate', 'Product': 'Backup Migration', 'Versions': '1.0.8'} |
CVE-2023-6619 | A vulnerability was found in SourceCodester Simple Student Attendance System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /modals/class_form.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247256. | https://vuldb.com/?id.247256 | 2023-12-08T09:54:36.257Z | 2023-12-08T17:31:03.703Z | 2023-12-08T17:31:03.703Z | {'Vendor': 'SourceCodester', 'Product': 'Simple Student Attendance System', 'Versions': '1.0'} |
CVE-2023-6160 | The LifterLMS – WordPress LMS Plugin for eLearning plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 7.4.2 via the maybe_serve_export function. This makes it possible for authenticated attackers, with administrator or LMS manager access and above, to read the contents of arbitrary CSV files on the server, which can contain sensitive information as well as removing those files from the server. | https://www.wordfence.com/threat-intel/vulnerabilities/id/6d0fcd82-6d4a-454f-8056-a896e8d41d00?source=cve | 2023-11-15T18:07:13.273Z | 2023-11-22T15:33:26.141Z | 2023-11-22T15:33:26.141Z | {'Vendor': 'chrisbadgett', 'Product': 'LifterLMS – WordPress LMS Plugin for eLearning', 'Versions': '*'} |
CVE-2023-6863 | The `ShutdownObserver()` was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121. | https://bugzilla.mozilla.org/show_bug.cgi?id=1868901 | 2023-12-15T17:42:56.329Z | 2023-12-19T13:38:44.181Z | 2023-12-19T16:42:18.383Z | {'Vendor': 'Mozilla', 'Product': 'Firefox ESR', 'Versions': 'unspecified'} |
CVE-2023-6926 |
There is an OS command injection vulnerability in Crestron AM-300 firmware version 1.4499.00018 which may enable a user of a limited-access SSH session to escalate their privileges to root-level access.
| https://www.cisa.gov/news-events/ics-advisories/icsa-24-023-02 | 2023-12-18T15:44:37.002Z | 2024-01-23T19:23:08.788Z | 2024-01-23T19:23:08.788Z | {'Vendor': 'Crestron', 'Product': 'AM-300', 'Versions': ' 1.4499.00018'} |
CVE-2023-6875 | The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e675d64c-cbb8-4f24-9b6f-2597a97b49af?source=cve | 2023-12-15T18:36:38.930Z | 2024-01-11T08:33:06.214Z | 2024-01-11T08:33:06.214Z | {'Vendor': 'wpexpertsio', 'Product': 'POST SMTP – The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications', 'Versions': '*'} |
CVE-2023-6176 | A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system. | https://access.redhat.com/security/cve/CVE-2023-6176 | 2023-11-16T13:39:30.071Z | 2023-11-16T17:15:44.886Z | 2024-01-23T01:50:26.565Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''} |
CVE-2023-6033 | Improper neutralization of input in Jira integration configuration in GitLab CE/EE, affecting all versions from 15.10 prior to 16.6.1, 16.5 prior to 16.5.3, and 16.4 prior to 16.4.3 allows attacker to execute javascript in victim's browser. | https://gitlab.com/gitlab-org/gitlab/-/issues/431201 | 2023-11-08T13:01:15.229Z | 2023-12-01T07:01:38.124Z | 2023-12-01T07:01:38.124Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '15.10, 16.5, 16.6'} |
CVE-2023-6199 | Book Stack version 23.10.2 allows filtering local files on the server. This is possible because the application is vulnerable to SSRF.
| https://fluidattacks.com/advisories/imagination/ | 2023-11-18T08:49:55.083Z | 2023-11-20T22:21:04.992Z | 2023-11-20T22:21:04.992Z | {'Vendor': 'BookStack', 'Product': 'BookStack', 'Versions': '23.10.2'} |
CVE-2023-6463 | A vulnerability has been found in SourceCodester User Registration and Login System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /endpoint/add-user.php. The manipulation of the argument first_name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246613 was assigned to this vulnerability. | https://vuldb.com/?id.246613 | 2023-12-01T16:05:21.898Z | 2023-12-01T22:31:04.531Z | 2023-12-01T22:31:04.531Z | {'Vendor': 'SourceCodester', 'Product': 'User Registration and Login System', 'Versions': '1.0'} |
CVE-2023-6930 |
EuroTel ETL3100 versions v01c01 and v01x37 suffer from an unauthenticated configuration and log download vulnerability. This enables the attacker to disclose sensitive information and assist in authentication bypass, privilege escalation, and full system access.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05 | 2023-12-18T17:18:35.424Z | 2023-12-19T23:04:49.947Z | 2023-12-19T23:04:49.947Z | {'Vendor': 'EuroTel', 'Product': 'ETL3100', 'Versions': 'v01c01, v01x37'} |
CVE-2023-6208 | When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard.
*This bug only affects Firefox on X11. Other systems are unaffected.* This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5. | https://bugzilla.mozilla.org/show_bug.cgi?id=1855345 | 2023-11-20T13:33:36.430Z | 2023-11-21T14:28:53.494Z | 2023-11-22T16:46:27.087Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-6658 | A vulnerability classified as critical was found in SourceCodester Simple Student Attendance System 1.0. This vulnerability affects unknown code of the file ajax-api.php?action=save_attendance. The manipulation of the argument class_id leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-247366 is the identifier assigned to this vulnerability. | https://vuldb.com/?id.247366 | 2023-12-10T07:12:33.061Z | 2023-12-10T23:00:05.543Z | 2023-12-10T23:00:05.543Z | {'Vendor': 'SourceCodester', 'Product': 'Simple Student Attendance System', 'Versions': '1.0'} |
CVE-2023-6571 | Cross-site Scripting (XSS) - Reflected in kubeflow/kubeflow | https://huntr.com/bounties/f02781e7-2a53-4c66-aa32-babb16434632 | 2023-12-07T09:38:59.953Z | 2023-12-14T13:00:06.671Z | 2023-12-14T13:00:06.671Z | {'Vendor': 'kubeflow', 'Product': 'kubeflow/kubeflow', 'Versions': 'unspecified'} |
CVE-2023-6121 | An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg). | https://access.redhat.com/security/cve/CVE-2023-6121 | 2023-11-14T10:18:51.337Z | 2023-11-16T14:45:38.430Z | 2024-01-23T01:48:16.848Z | {'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': '6.7-rc3'} |
CVE-2023-6988 | The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's extend_builder_render_js shortcode in all versions up to, and including, 1.0.239 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | https://www.wordfence.com/threat-intel/vulnerabilities/id/300b24af-10a1-45b9-87ec-7c98dc94e76b?source=cve | 2023-12-20T09:38:11.029Z | 2024-01-11T08:32:30.935Z | 2024-01-11T08:32:30.935Z | {'Vendor': 'extendthemes', 'Product': 'Colibri Page Builder', 'Versions': '*'} |
CVE-2023-6434 | A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /inventory/sections_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products | 2023-11-30T10:46:08.551Z | 2023-11-30T13:55:47.489Z | 2023-11-30T13:55:47.489Z | {'Vendor': 'BigProf ', 'Product': 'Online Inventory Manager', 'Versions': '3.2'} |
CVE-2023-6064 | The PayHere Payment Gateway WordPress plugin before 2.2.12 automatically creates publicly-accessible log files containing sensitive information when transactions occur. | https://wpscan.com/vulnerability/423c8881-628b-4380-9677-65b3f5165efe | 2023-11-09T19:37:57.339Z | 2024-01-01T14:18:52.756Z | 2024-01-01T14:18:52.756Z | {'Vendor': 'Unknown', 'Product': 'PayHere Payment Gateway', 'Versions': '0'} |
CVE-2023-6789 | A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a malicious authenticated read-write administrator to store a JavaScript payload using the web interface. Then, when viewed by a properly authenticated administrator, the JavaScript payload executes and disguises all associated actions as performed by that unsuspecting authenticated administrator. | https://security.paloaltonetworks.com/CVE-2023-6789 | 2023-12-13T17:27:23.165Z | 2023-12-13T18:26:30.524Z | 2023-12-13T18:26:30.524Z | {'Vendor': 'Palo Alto Networks', 'Product': 'PAN-OS', 'Versions': '8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 11.1'} |
CVE-2023-6273 | Permission management vulnerability in the module for disabling Sound Booster. Successful exploitation of this vulnerability may cause features to perform abnormally. | https://consumer.huawei.com/en/support/bulletin/2023/12/ | 2023-11-24T07:33:43.681Z | 2023-12-06T09:07:24.345Z | 2023-12-06T09:07:24.345Z | {'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.0'} |
CVE-2023-6623 | The Essential Blocks WordPress plugin before 4.4.3 does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks. | https://wpscan.com/vulnerability/633c28e0-0c9e-4e68-9424-55c32789b41f | 2023-12-08T14:24:56.244Z | 2024-01-15T15:10:40.328Z | 2024-01-15T15:10:40.328Z | {'Vendor': 'Unknown', 'Product': 'Essential Blocks', 'Versions': '0'} |
CVE-2023-6336 | Improper Link Resolution Before File Access ('Link Following') vulnerability in HYPR Workforce Access on MacOS allows User-Controlled Filename.This issue affects Workforce Access: before 8.7.
| https://www.hypr.com/security-advisories | 2023-11-27T18:05:05.008Z | 2024-01-16T19:42:09.035Z | 2024-01-16T19:42:09.035Z | {'Vendor': 'HYPR', 'Product': 'Workforce Access', 'Versions': '0'} |
CVE-2023-6766 | A vulnerability classified as problematic has been found in PHPGurukul Teacher Subject Allocation Management System 1.0. Affected is an unknown function of the file /admin/course.php of the component Delete Course Handler. The manipulation of the argument delid leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247896. | https://vuldb.com/?id.247896 | 2023-12-13T09:28:25.970Z | 2023-12-13T17:31:05.176Z | 2023-12-13T17:31:05.176Z | {'Vendor': 'PHPGurukul', 'Product': 'Teacher Subject Allocation Management System', 'Versions': '1.0'} |
CVE-2023-6859 | A use-after-free condition affected TLS socket creation when under memory pressure. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121. | https://bugzilla.mozilla.org/show_bug.cgi?id=1840144 | 2023-12-15T17:42:55.537Z | 2023-12-19T13:38:39.872Z | 2023-12-19T13:38:39.872Z | {'Vendor': 'Mozilla', 'Product': 'Firefox ESR', 'Versions': 'unspecified'} |
CVE-2023-6048 | The Estatik Real Estate Plugin WordPress plugin before 4.1.1 does not prevent user with low privileges on the site, like subscribers, from setting any of the site's options to 1, which could be used to break sites and lead to DoS when certain options are reset | https://wpscan.com/vulnerability/74cb07fe-fc82-472f-8c52-859c176d9e51 | 2023-11-09T10:03:23.827Z | 2024-01-15T15:10:40.683Z | 2024-01-15T15:10:40.683Z | {'Vendor': 'Unknown', 'Product': 'Estatik Real Estate Plugin', 'Versions': '0'} |
CVE-2023-6418 | A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via videos.php in the id parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script | 2023-11-30T10:02:14.100Z | 2023-11-30T13:14:19.950Z | 2023-11-30T13:14:19.950Z | {'Vendor': 'Voovi Social Networking Script', 'Product': 'Voovi Social Networking Script', 'Versions': '1.0'} |
CVE-2023-6377 | A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved. | http://www.openwall.com/lists/oss-security/2023/12/13/1 | 2023-11-29T07:38:35.722Z | 2023-12-13T06:27:40.758Z | 2024-01-02T14:56:53.997Z | {'Vendor': 'n/a', 'Product': 'xorg-server', 'Versions': '21.1.10'} |
CVE-2023-6727 | Mattermost fails to perform correct authorization checks when creating a playbook action, allowing users without access to the playbook to create playbook actions. If the playbook action created is to post a message in a channel based on specific keywords in a post, some playbook information, like the name, can be leaked.
| https://mattermost.com/security-updates | 2023-12-12T10:48:31.631Z | 2023-12-12T10:53:02.127Z | 2023-12-12T10:53:02.127Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 8.1.6, 9.2.2'} |
CVE-2023-6265 | ** UNSUPPORTED WHEN ASSIGNED ** Draytek Vigor2960 v1.5.1.4 and v1.5.1.5 are vulnerable to directory traversal via the mainfunction.cgi dumpSyslog 'option' parameter allowing an authenticated attacker with access to the web management interface to delete arbitrary files. Vigor2960 is no longer supported. | https://github.com/xxy1126/Vuln/blob/main/Draytek/4.md | 2023-11-22T19:31:54.376Z | 2023-11-22T19:47:07.692Z | 2023-12-19T21:00:05.632Z | {'Vendor': 'DrayTek', 'Product': 'Vigor2960', 'Versions': '1.5.1.4, 1.5.1.5'} |
CVE-2023-6009 | The UserPro plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.1.4 due to insufficient restriction on the 'userpro_update_user_profile' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wp_capabilities' parameter during a profile update. | https://www.wordfence.com/threat-intel/vulnerabilities/id/e8bed9c0-dae3-405e-a946-5f28a3c30851?source=cve | 2023-11-08T05:32:13.517Z | 2023-11-22T15:33:37.741Z | 2023-11-22T15:33:37.741Z | {'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'} |
CVE-2023-6459 | Mattermost is grouping calls in the /metrics endpoint by id and reports that id in the response. Since this id is the channelID, the public /metrics endpoint is revealing channelIDs.
| https://mattermost.com/security-updates | 2023-12-01T10:14:04.973Z | 2023-12-06T08:11:36.417Z | 2023-12-06T08:11:36.417Z | {'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 8.1.5, 7.8.14'} |
CVE-2023-6972 | The Backup Migration plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.3.9 via the 'content-backups' and 'content-name', 'content-manifest', or 'content-bmitmp' and 'content-identy' HTTP headers. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible. | https://www.wordfence.com/threat-intel/vulnerabilities/id/0a3ae696-f67d-4ed2-b307-d2f36b6f188c?source=cve | 2023-12-20T01:43:10.286Z | 2023-12-23T01:59:46.751Z | 2023-12-23T01:59:46.751Z | {'Vendor': 'migrate', 'Product': 'Backup Migration', 'Versions': '*'} |
CVE-2023-6071 |
An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. This is possible as the input isn't correctly sanitized when adding a new data source.
| https://kcm.trellix.com/corporate/index?page=content&id=SB10413 | 2023-11-10T05:17:18.636Z | 2023-11-30T12:48:51.618Z | 2023-11-30T12:48:51.618Z | {'Vendor': 'Trellix', 'Product': 'ESM', 'Versions': 'Prior to version 11.6.9'} |
CVE-2023-6421 | The Download Manager WordPress plugin before 3.2.83 does not protect file download's passwords, leaking it upon receiving an invalid one. | https://wpscan.com/vulnerability/244c7c00-fc8d-4a73-bbe0-7865c621d410 | 2023-11-30T10:31:42.688Z | 2024-01-01T14:18:53.519Z | 2024-01-01T14:18:53.519Z | {'Vendor': 'Unknown', 'Product': 'Download Manager', 'Versions': '0'} |
CVE-2023-6134 | A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748. | https://access.redhat.com/errata/RHSA-2023:7854 | 2023-11-14T18:50:13.535Z | 2023-12-14T21:42:12.160Z | 2024-01-23T01:49:08.934Z | {'Vendor': 'n/a', 'Product': 'keycloak-core', 'Versions': ''} |
CVE-2023-6837 | Multiple WSO2 products have been identified as vulnerable to perform user impersonatoin using JIT provisioning. In order for this vulnerability to have any impact on your deployment, following conditions must be met:
* An IDP configured for federated authentication and JIT provisioning enabled with the "Prompt for username, password and consent" option.
* A service provider that uses the above IDP for federated authentication and has the "Assert identity using mapped local subject identifier" flag enabled.
Attacker should have:
* A fresh valid user account in the federated IDP that has not been used earlier.
* Knowledge of the username of a valid user in the local IDP.
When all preconditions are met, a malicious actor could use JIT provisioning flow to perform user impersonation.
| https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1573/ | 2023-12-15T09:40:50.666Z | 2023-12-15T09:41:22.719Z | 2023-12-15T09:41:22.719Z | {'Vendor': 'WSO2', 'Product': 'WSO2 API Manager', 'Versions': '0, 2.5.0.0, 2.6.0.0, 3.0.0.0, 3.1.0.0, 3.2.0.0, 4.0.0.0'} |
CVE-2023-6476 | A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node. | https://access.redhat.com/errata/RHSA-2024:0195 | 2023-12-04T06:23:22.231Z | 2024-01-09T21:32:03.407Z | 2024-01-23T02:03:51.555Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''} |
CVE-2023-6026 | A Path traversal vulnerability has been reported in elijaa/phpmemcachedadmin affecting version 1.3.0. This vulnerability allows an attacker to delete files stored on the server due to lack of proper verification of user-supplied input. | https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-phpmemcachedadmin | 2023-11-08T09:59:42.089Z | 2023-11-30T13:37:23.292Z | 2023-11-30T13:39:03.457Z | {'Vendor': 'PHPMemcachedAdmin ', 'Product': 'PHPMemcachedAdmin ', 'Versions': '1.3.0'} |
CVE-2023-6860 | The `VideoBridge` allowed any content process to use textures produced by remote decoders. This could be abused to escape the sandbox. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121. | https://bugzilla.mozilla.org/show_bug.cgi?id=1854669 | 2023-12-15T17:42:55.731Z | 2023-12-19T13:38:40.956Z | 2023-12-19T16:42:16.140Z | {'Vendor': 'Mozilla', 'Product': 'Firefox ESR', 'Versions': 'unspecified'} |
CVE-2023-6163 | The WP Crowdfunding WordPress plugin before 2.1.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | https://wpscan.com/vulnerability/7ed6de4d-0a37-497f-971d-b6711893c557 | 2023-11-15T18:15:05.982Z | 2024-01-15T15:10:41.014Z | 2024-01-15T15:10:41.014Z | {'Vendor': 'Unknown', 'Product': 'WP Crowdfunding', 'Versions': '0'} |
CVE-2023-6899 | A vulnerability classified as problematic was found in rmountjoy92 DashMachine 0.5-4. Affected by this vulnerability is an unknown functionality of the file /settings/save_config of the component Config Handler. The manipulation of the argument value_template leads to code injection. The exploit has been disclosed to the public and may be used. The identifier VDB-248257 was assigned to this vulnerability. | https://vuldb.com/?id.248257 | 2023-12-16T19:38:05.199Z | 2023-12-17T12:31:04.408Z | 2023-12-17T12:31:04.408Z | {'Vendor': 'rmountjoy92', 'Product': 'DashMachine', 'Versions': '0.5-4'} |
CVE-2023-6460 | A potential logging of the firestore key via logging within nodejs-firestore exists - Developers who were logging objects through this._settings would be logging the firestore key as well potentially exposing it to anyone with logs read access. We recommend upgrading to version 6.1.0 to avoid this issue | https://github.com/googleapis/nodejs-firestore/pull/1742 | 2023-12-01T11:10:57.359Z | 2023-12-04T12:26:29.505Z | 2023-12-04T12:26:29.505Z | {'Vendor': 'Google', 'Product': 'nodejs-firestore', 'Versions': '0'} |
CVE-2023-6088 | null | null | 2023-11-12T23:11:45.388Z | null | 2023-11-13T23:33:48.845Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-6572 | Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository gradio-app/gradio prior to main. | https://huntr.com/bounties/21d2ff0c-d43a-4afd-bb4d-049ee8da5b5c | 2023-12-07T09:39:35.019Z | 2023-12-14T13:14:16.804Z | 2023-12-14T13:14:16.804Z | {'Vendor': 'gradio-app', 'Product': 'gradio-app/gradio', 'Versions': 'unspecified'} |
CVE-2023-6122 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in İstanbul Soft Informatics and Consultancy Limited Company Softomi Gelişmiş C2C Pazaryeri Yazılımı allows Reflected XSS.This issue affects Softomi Gelişmiş C2C Pazaryeri Yazılımı: before 12122023.
| https://www.usom.gov.tr/bildirim/tr-23-0724 | 2023-11-14T12:15:33.254Z | 2023-12-21T13:53:57.101Z | 2023-12-21T13:53:57.101Z | {'Vendor': 'İstanbul Soft Informatics and Consultancy Limited Company', 'Product': 'Softomi Gelişmiş C2C Pazaryeri Yazılımı', 'Versions': '0'} |
CVE-2023-6335 | Improper Link Resolution Before File Access ('Link Following') vulnerability in HYPR Workforce Access on Windows allows User-Controlled Filename.This issue affects Workforce Access: before 8.7.
| https://www.hypr.com/security-advisories | 2023-11-27T18:04:52.332Z | 2024-01-16T19:42:02.665Z | 2024-01-16T19:42:02.665Z | {'Vendor': 'HYPR', 'Product': 'Workforce Access', 'Versions': '0'} |
CVE-2023-6765 | A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been rated as critical. This issue affects the function prepare of the file email_setup.php. The manipulation of the argument name leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247895. | https://vuldb.com/?id.247895 | 2023-12-13T09:22:54.205Z | 2023-12-13T17:31:04.162Z | 2023-12-13T17:31:04.162Z | {'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'} |
CVE-2023-6270 | A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution. | https://access.redhat.com/security/cve/CVE-2023-6270 | 2023-11-23T14:31:28.637Z | 2024-01-04T17:01:51.165Z | 2024-01-23T02:00:09.306Z | {'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''} |
CVE-2023-6620 | The POST SMTP Mailer WordPress plugin before 2.8.7 does not properly sanitise and escape several parameters before using them in SQL statements, leading to a SQL injection exploitable by high privilege users such as admin. | https://wpscan.com/vulnerability/ab5c42ca-ee7d-4344-bd88-0d727ed3d9c4 | 2023-12-08T10:30:24.389Z | 2024-01-15T15:10:41.386Z | 2024-01-15T15:10:41.386Z | {'Vendor': 'Unknown', 'Product': 'POST SMTP Mailer', 'Versions': '0'} |
CVE-2023-6509 | Use after free in Side Panel Search in Google Chrome prior to 120.0.6099.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html | 2023-12-04T22:53:19.729Z | 2023-12-06T01:19:19.993Z | 2023-12-06T01:19:19.993Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '120.0.6099.62'} |
CVE-2023-6159 | An issue has been discovered in GitLab CE/EE affecting all versions from 12.7 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1 It was possible for an attacker to trigger a Regular Expression Denial of Service via a `Cargo.toml` containing maliciously crafted input. | https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16-8-1-released/ | 2023-11-15T18:00:57.865Z | 2024-01-26T02:02:29.909Z | 2024-01-26T02:02:29.909Z | {'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '12.7, 16.7, 16.8'} |
CVE-2023-6732 | The Ultimate Maps by Supsystic WordPress plugin before 1.2.16 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed | https://wpscan.com/vulnerability/aaf91707-f03b-4f25-bca9-9fac4945002a/ | 2023-12-12T14:57:41.642Z | 2024-01-16T15:57:02.536Z | 2024-01-16T15:57:02.536Z | {'Vendor': 'Unknown', 'Product': 'Ultimate Maps by Supsystic', 'Versions': '0'} |
CVE-2023-6548 | Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface. | https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549 | 2023-12-06T11:01:54.643Z | 2024-01-17T20:11:18.462Z | 2024-01-18T01:12:54.917Z | {'Vendor': 'Cloud Software Group', 'Product': 'NetScaler ADC\u202f', 'Versions': '14.1, 13.1, 13.0 , 13.1-FIPS, 12.1-FIPS, 12.1-NDcPP'} |
CVE-2023-6118 | Path Traversal: '/../filedir' vulnerability in Neutron IP Camera allows Absolute Path Traversal.This issue affects IP Camera: before b1130.1.0.1.
| https://www.usom.gov.tr/bildirim/tr-23-0658 | 2023-11-14T07:38:37.052Z | 2023-11-23T14:24:24.001Z | 2023-11-24T07:44:36.259Z | {'Vendor': 'Neutron', 'Product': 'IP Camera', 'Versions': '0'} |
CVE-2023-6289 | The Swift Performance Lite WordPress plugin before 2.3.6.15 does not prevent users from exporting the plugin's settings, which may include sensitive information such as Cloudflare API tokens. | https://wpscan.com/vulnerability/8c83dd57-9291-4dfc-846d-5ad47534e2ad | 2023-11-24T15:07:37.011Z | 2023-12-18T20:08:00.760Z | 2023-12-18T20:08:00.760Z | {'Vendor': 'Unknown', 'Product': 'Swift Performance Lite', 'Versions': '0'} |
CVE-2023-6773 | A vulnerability has been found in CodeAstro POS and Inventory Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /accounts_con/register_account of the component User Creation Handler. The manipulation of the argument account_type with the input Admin leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247909 was assigned to this vulnerability. | https://vuldb.com/?id.247909 | 2023-12-13T12:26:44.757Z | 2023-12-13T19:31:04.385Z | 2023-12-13T19:31:04.385Z | {'Vendor': 'CodeAstro', 'Product': 'POS and Inventory Management System', 'Versions': '1.0'} |
CVE-2023-6636 | The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation on the 'gspb_save_files' function in versions up to, and including, 7.6.2. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible. | https://www.wordfence.com/threat-intel/vulnerabilities/id/821462d6-970e-4e3e-b91d-e7153296ba9f?source=cve | 2023-12-08T19:39:49.083Z | 2024-01-11T08:32:41.439Z | 2024-01-11T08:32:41.439Z | {'Vendor': 'wpsoul', 'Product': 'Greenshift – animation and page builder blocks', 'Versions': '*'} |
CVE-2023-6266 | The Backup Migration plugin for WordPress is vulnerable to unauthorized access of data due to insufficient path and file validation on the BMI_BACKUP case of the handle_downloading function in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to download back-up files which can contain sensitive information such as user passwords, PII, database credentials, and much more. | https://www.wordfence.com/threat-intel/vulnerabilities/id/08801f53-3c57-41a3-a637-4b52637cc612?source=cve | 2023-11-22T20:45:16.590Z | 2024-01-11T08:32:27.689Z | 2024-01-11T08:32:27.689Z | {'Vendor': 'migrate', 'Product': 'Backup Migration', 'Versions': '*'} |
CVE-2023-6909 | Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2. | https://huntr.com/bounties/11209efb-0f84-482f-add0-587ea6b7e850 | 2023-12-18T00:00:12.436Z | 2023-12-18T00:00:31.984Z | 2023-12-18T00:00:31.984Z | {'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'} |
CVE-2023-6991 | The JSM file_get_contents() Shortcode WordPress plugin before 2.7.1 does not validate one of its shortcode's parameters before making a request to it, which could allow users with contributor role and above to perform SSRF attacks. | https://wpscan.com/vulnerability/0b92becb-8a47-48fd-82e8-f7641cf5c9bc | 2023-12-20T10:11:55.989Z | 2024-01-15T15:10:41.733Z | 2024-01-15T15:10:41.733Z | {'Vendor': 'Unknown', 'Product': 'JSM file_get_contents() Shortcode', 'Versions': '0'} |
CVE-2023-6092 | null | null | 2023-11-13T01:54:03.590Z | null | 2023-11-13T23:31:52.729Z | {'Vendor': 'NA', 'Product': 'NA', 'Versions': ''} |
CVE-2023-6568 | Cross-site Scripting (XSS) - Reflected in GitHub repository mlflow/mlflow prior to 2.9.0. | https://huntr.com/bounties/816bdaaa-8153-4732-951e-b0d92fddf709 | 2023-12-07T04:53:51.571Z | 2023-12-07T04:54:10.377Z | 2023-12-07T04:54:10.377Z | {'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'} |
CVE-2023-6211 | If an attacker needed a user to load an insecure http: page and knew that user had enabled HTTPS-only mode, the attacker could have tricked the user into clicking to grant an HTTPS-only exception if they could get the user to participate in a clicking game. This vulnerability affects Firefox < 120. | https://bugzilla.mozilla.org/show_bug.cgi?id=1850200 | 2023-11-20T13:33:41.215Z | 2023-11-21T14:28:54.446Z | 2023-11-21T14:28:54.446Z | {'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'} |
CVE-2023-6354 | Tyler Technologies Magistrate Court Case Management Plus allows an unauthenticated, remote attacker to upload, delete, and view files by manipulating the PDFViewer.aspx 'filename' parameter.
| https://www.tylertech.com/solutions/courts-public-safety/courts-justice | 2023-11-28T02:57:10.860Z | 2023-11-30T17:53:26.147Z | 2023-11-30T20:54:04.031Z | {'Vendor': 'Tyler Technologies', 'Product': 'Magistrate Court Case Management Plus', 'Versions': '0'} |
CVE-2023-6704 | Use after free in libavif in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted image file. (Chromium security severity: High) | https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html | 2023-12-11T23:27:50.399Z | 2023-12-14T21:48:41.823Z | 2023-12-14T21:48:41.823Z | {'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '120.0.6099.109'} |
CVE-2023-6929 |
EuroTel ETL3100 versions v01c01 and v01x37 are vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers can bypass authorization, access the hidden resources on the system, and execute privileged functionalities.
| https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05 | 2023-12-18T17:18:33.176Z | 2023-12-19T23:02:08.432Z | 2023-12-19T23:02:08.432Z | {'Vendor': 'EuroTel', 'Product': 'ETL3100', 'Versions': 'v01c01, v01x37'} |
CVE-2023-6883 | The Easy Social Feed plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in all versions up to, and including, 6.5.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform unauthorized actions, such as modifying the plugin's Facebook and Instagram access tokens and updating group IDs. | https://www.wordfence.com/threat-intel/vulnerabilities/id/3deee9b5-2e36-447d-a492-e22e3dc6a5ab?source=cve | 2023-12-16T01:00:05.114Z | 2024-01-11T06:49:32.594Z | 2024-01-11T06:49:32.594Z | {'Vendor': 'sjaved', 'Product': 'Easy Social Feed – Social Photos Gallery – Post Feed – Like Box', 'Versions': '*'} |
CVE-2023-6180 | The tokio-boring library in version 4.0.0 is affected by a memory leak issue that can lead to excessive resource consumption and potential DoS by resource exhaustion. The set_ex_data function used by the library did not deallocate memory used by pre-existing data in memory each time after completing a TLS connection causing the program to consume more resources with each new connection.
| https://github.com/cloudflare/boring/security/advisories/GHSA-pjrj-h4fg-6gm4 | 2023-11-16T19:15:23.367Z | 2023-12-05T15:02:40.007Z | 2023-12-05T15:02:40.007Z | {'Vendor': 'Cloudflare', 'Product': 'tokio-boring', 'Versions': '4.0.0'} |
CVE-2023-6616 | A vulnerability was found in SourceCodester Simple Student Attendance System 1.0 and classified as problematic. This issue affects some unknown processing of the file index.php. The manipulation of the argument page leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247253 was assigned to this vulnerability. | https://vuldb.com/?id.247253 | 2023-12-08T09:54:27.116Z | 2023-12-08T16:31:05.055Z | 2023-12-08T16:31:05.055Z | {'Vendor': 'SourceCodester', 'Product': 'Simple Student Attendance System', 'Versions': '1.0'} |
CVE-2023-6753 | Path Traversal in GitHub repository mlflow/mlflow prior to 2.9.2. | https://huntr.com/bounties/b397b83a-527a-47e7-b912-a12a17a6cfb4 | 2023-12-13T00:00:11.046Z | 2023-12-13T00:00:31.196Z | 2023-12-13T00:00:31.196Z | {'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'} |
Subsets and Splits