CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-6204
On some systems—depending on the graphics settings and drivers—it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.
https://bugzilla.mozilla.org/show_bug.cgi?id=1841050
2023-11-20T13:33:20.318Z
2023-11-21T14:28:52.188Z
2023-11-22T16:46:25.566Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-6013
H2O is vulnerable to stored XSS vulnerability which can lead to a Local File Include attack.
https://huntr.com/bounties/9881569f-dc2a-437e-86b0-20d4b70ae7af
2023-11-08T09:09:04.324Z
2023-11-16T16:07:17.441Z
2023-11-16T16:07:17.441Z
{'Vendor': 'h2oai', 'Product': 'h2oai/h2o-3', 'Versions': 'unspecified'}
CVE-2023-6910
A vulnerable API method in M-Files Server before 23.12.13195.0 allows for uncontrolled resource consumption. Authenticated attacker can exhaust server storage space to a point where the server can no longer serve requests.
https://www.m-files.com/about/trust-center/security-advisories/cve-2023-6910
2023-12-18T07:52:44.859Z
2023-12-20T09:36:39.118Z
2023-12-20T09:36:39.118Z
{'Vendor': 'M-Files Corporation', 'Product': 'M-Files Server', 'Versions': '0'}
CVE-2023-6855
The Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions plugin for WordPress is vulnerable to unauthorized modification of membership levels created by the plugin due to an incorrectly implemented capability check in the pmpro_rest_api_get_permissions_check function in all versions up to 2.12.5 (inclusive). This makes it possible for unauthenticated attackers to change membership levels including prices.
https://www.wordfence.com/threat-intel/vulnerabilities/id/383c7837-e7b7-4608-9cdc-91b7dbc7f4e2?source=cve
2023-12-15T17:01:59.388Z
2024-01-11T08:32:31.855Z
2024-01-11T08:32:31.855Z
{'Vendor': 'strangerstudios', 'Product': 'Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions', 'Versions': '*'}
CVE-2023-6156
Improper neutralization of livestatus command delimiters in the availability timeline in Checkmk <= 2.0.0p39, < 2.1.0p37, and < 2.2.0p15 allows arbitrary livestatus command execution for authorized users.
https://checkmk.com/werk/16221
2023-11-15T16:38:31.845Z
2023-11-22T16:24:15.515Z
2023-11-22T16:24:15.515Z
{'Vendor': 'Checkmk GmbH', 'Product': 'Checkmk', 'Versions': '2.2.0, 2.1.0, 2.0.0'}
CVE-2023-6506
The WP 2FA – Two-factor authentication for WordPress plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.5.0 via the send_backup_codes_email due to missing validation on a user controlled key. This makes it possible for subscriber-level attackers to email arbitrary users on the site.
https://www.wordfence.com/threat-intel/vulnerabilities/id/caff9be6-4161-47a0-ba47-6c8fc0c4ab40?source=cve
2023-12-04T20:15:47.572Z
2024-01-11T06:49:33.842Z
2024-01-11T06:49:33.842Z
{'Vendor': 'melapress', 'Product': 'WP 2FA – Two-factor authentication for WordPress', 'Versions': '*'}
CVE-2023-6290
The SEOPress WordPress plugin before 7.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
https://wpscan.com/vulnerability/78a13958-cd12-4ea8-b326-1e3184da970b/
2023-11-24T17:02:02.306Z
2024-01-22T19:14:26.723Z
2024-01-22T19:14:26.723Z
{'Vendor': 'Unknown', 'Product': 'SEOPress', 'Versions': '0'}
CVE-2023-6414
A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via perfil.php in the id and user parameters. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script
2023-11-30T10:02:08.823Z
2023-11-30T13:12:19.434Z
2023-11-30T13:12:19.434Z
{'Vendor': 'Voovi Social Networking Script', 'Product': 'Voovi Social Networking Script', 'Versions': '1.0'}
CVE-2023-6044
A privilege escalation vulnerability was reported in Lenovo Vantage that could allow a local attacker with physical access to impersonate Lenovo Vantage Service and execute arbitrary code with elevated privileges.
https://support.lenovo.com/us/en/product_security/LEN-144736
2023-11-08T21:12:23.667Z
2024-01-19T20:09:05.706Z
2024-01-19T20:09:05.706Z
{'Vendor': 'Lenovo', 'Product': 'Vantage', 'Versions': ' '}
CVE-2023-6551
As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used. Developers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension. The README has been updated to include these guidelines.
https://cert.pl/posts/2024/01/CVE-2023-6551
2023-12-06T11:18:59.869Z
2024-01-04T16:04:34.995Z
2024-01-04T16:04:34.995Z
{'Vendor': 'class.upload.php', 'Product': 'class.upload.php', 'Versions': '0'}
CVE-2023-6101
A vulnerability, which was classified as problematic, has been found in Maiwei Safety Production Control Platform 4.1. This issue affects some unknown processing of the file /TC/V2.7/ha.html of the component Intelligent Monitoring. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-245063. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.245063
2023-11-13T10:18:42.374Z
2023-11-13T16:00:08.546Z
2023-11-13T16:00:08.546Z
{'Vendor': 'Maiwei', 'Product': 'Safety Production Control Platform', 'Versions': '4.1'}
CVE-2023-6802
An insertion of sensitive information into the log file in the audit log in GitHub Enterprise Server was identified that could allow an attacker to gain access to the management console. To exploit this, an attacker would need access to the log files for the GitHub Enterprise Server appliance, a backup archive created with GitHub Enterprise Server Backup Utilities, or a service which received streamed logs. This vulnerability affected all versions of GitHub Enterprise Server since 3.8 and was fixed in version 3.8.12, 3.9.7, 3.10.4, and 3.11.1. 
https://docs.github.com/en/[email protected]/admin/release-notes#3.8.12
2023-12-13T19:25:56.875Z
2023-12-21T20:45:24.749Z
2023-12-21T20:45:24.749Z
{'Vendor': 'GitHub', 'Product': 'Enterprise Server', 'Versions': '3.8.0, 3.9.0, 3.10.0, 3.11'}
CVE-2023-6228
An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer overflow leads to an application crash.
https://access.redhat.com/security/cve/CVE-2023-6228
2023-11-21T05:33:19.718Z
2023-12-18T13:43:08.775Z
2024-01-22T23:23:16.197Z
{'Vendor': 'n/a', 'Product': 'libtiff', 'Versions': ''}
CVE-2023-6697
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the map id parameter in all versions up to, and including, 9.0.28 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b3c3115b-8921-429d-b517-b946edab1cd5?source=cve
2023-12-11T19:01:21.306Z
2024-01-24T13:52:53.769Z
2024-01-24T13:52:53.769Z
{'Vendor': 'wpgmaps', 'Product': 'WP Go Maps (formerly WP Google Maps)', 'Versions': '*'}
CVE-2023-6052
A vulnerability classified as critical has been found in Tongda OA 2017 up to 11.9. Affected is an unknown function of the file general/system/censor_words/module/delete.php. The manipulation of the argument DELETE_STR leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-244872. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.244872
2023-11-09T12:35:16.999Z
2023-11-09T12:37:56.723Z
2023-11-09T12:37:56.723Z
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'}
CVE-2023-6402
A vulnerability, which was classified as critical, was found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file add-phlebotomist.php. The manipulation of the argument empid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246423.
https://vuldb.com/?id.246423
2023-11-30T09:01:51.048Z
2023-11-30T15:00:05.748Z
2023-11-30T15:00:05.748Z
{'Vendor': 'PHPGurukul', 'Product': 'Nipah Virus Testing Management System', 'Versions': '1.0'}
CVE-2023-6117
A possibility of unwanted server memory consumption was detected through the obsolete functionalities in the Rest API methods of the M-Files server before 23.11.13156.0 which allows attackers to execute DoS attacks.
https://www.m-files.com/about/trust-center/security-advisories/cve-2023-6117/
2023-11-14T07:16:15.847Z
2023-11-22T09:56:32.749Z
2023-11-22T09:56:32.749Z
{'Vendor': 'M-Files', 'Product': 'M-Files Server', 'Versions': '0'}
CVE-2023-6547
Mattermost fails to validate team membership when a user attempts to access a playbook, allowing a user with permissions to a playbook but no permissions to the team the playbook is on to access and modify the playbook. This can happen if the user was once a member of the team, got permissions to the playbook and was then removed from the team. 
https://mattermost.com/security-updates
2023-12-06T08:47:19.482Z
2023-12-12T08:22:41.419Z
2023-12-12T08:22:41.419Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 8.1.6, 9.2.2'}
CVE-2023-6394
A flaw was found in Quarkus. This issue occurs when receiving a request over websocket with no role-based permission specified on the GraphQL operation, Quarkus processes the request without authentication despite the endpoint being secured. This can allow an attacker to access information and functionality outside of normal granted API permissions.
https://access.redhat.com/errata/RHSA-2023:7612
2023-11-30T04:05:52.129Z
2023-12-09T01:26:52.908Z
2024-01-23T02:03:21.900Z
{'Vendor': 'n/a', 'Product': 'quarkus', 'Versions': '3.6.0'}
CVE-2023-6906
A vulnerability, which was classified as critical, was found in Totolink A7100RU 7.4cu.2313_B20191024. Affected is the function main of the file /cgi-bin/cstecgi.cgi?action=login of the component HTTP POST Request Handler. The manipulation of the argument flag with the input ie8 leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248268. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.248268
2023-12-17T08:31:17.379Z
2023-12-18T00:00:07.209Z
2023-12-18T00:00:07.209Z
{'Vendor': 'Totolink', 'Product': 'A7100RU', 'Versions': '7.4cu.2313_B20191024'}
CVE-2023-6005
The EventON WordPress plugin before 4.5.5, EventON WordPress plugin before 2.2.7 does not sanitize and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
https://wpscan.com/vulnerability/fa4eea26-0611-4fa8-a947-f78ddf46a56a/
2023-11-08T03:30:52.321Z
2024-01-16T15:57:01.802Z
2024-01-16T15:57:01.802Z
{'Vendor': 'Unknown', 'Product': 'EventON', 'Versions': '0'}
CVE-2023-6510
Use after free in Media Capture in Google Chrome prior to 120.0.6099.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: Medium)
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html
2023-12-04T22:53:19.881Z
2023-12-06T01:19:20.171Z
2023-12-06T01:19:20.171Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '120.0.6099.62'}
CVE-2023-6140
The Essential Real Estate WordPress plugin before 4.4.0 does not prevent users with limited privileges on the site, like subscribers, from momentarily uploading malicious PHP files disguised as ZIP archives, which may lead to remote code execution.
https://wpscan.com/vulnerability/c837eaf3-fafd-45a2-8f5e-03afb28a765b
2023-11-14T22:50:43.564Z
2024-01-08T19:00:36.658Z
2024-01-08T19:00:36.658Z
{'Vendor': 'Unknown', 'Product': 'Essential Real Estate', 'Versions': '0'}
CVE-2023-6843
The easy.jobs- Best Recruitment Plugin for Job Board Listing, Manager, Career Page for Elementor & Gutenberg WordPress plugin before 2.4.7 does not properly secure some of its AJAX actions, allowing any logged-in users to modify its settings.
https://wpscan.com/vulnerability/41508340-8caf-4dca-bd88-350b63b78ab0
2023-12-15T13:32:36.192Z
2024-01-15T15:10:39.949Z
2024-01-15T15:10:39.949Z
{'Vendor': 'Unknown', 'Product': 'easy.jobs- Best Recruitment Plugin for Job Board Listing, Manager, Career Page for Elementor & Gutenberg', 'Versions': '0'}
CVE-2023-6793
An improper privilege management vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-only administrator to revoke active XML API keys from the firewall and disrupt XML API usage.
https://security.paloaltonetworks.com/CVE-2023-6793
2023-12-13T17:27:26.408Z
2023-12-13T18:40:54.955Z
2023-12-13T18:40:54.955Z
{'Vendor': 'Palo Alto Networks', 'Product': 'PAN-OS', 'Versions': '8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 11.1'}
CVE-2023-6269
An argument injection vulnerability has been identified in the administrative web interface of the Atos Unify OpenScape products "Session Border Controller" (SBC) and "Branch", before version V10 R3.4.0, and OpenScape "BCF" before versions V10R10.12.00 and V10R11.05.02. This allows an unauthenticated attacker to gain root access to the appliance via SSH (scope change) and also bypass authentication for the administrative interface and gain access as an arbitrary (administrative) user.
https://networks.unify.com/security/advisories/OBSO-2310-01.pdf
2023-11-23T10:39:50.541Z
2023-12-05T07:35:19.472Z
2023-12-05T07:35:19.472Z
{'Vendor': 'Atos Unify', 'Product': 'OpenScape Session Border Controller (SBC)', 'Versions': '0'}
CVE-2023-6137
Cross-Site Request Forgery (CSRF) vulnerability in finnj Frontier Post allows Cross Site Request Forgery.This issue affects Frontier Post: from n/a through 6.1.
https://patchstack.com/database/vulnerability/frontier-post/wordpress-frontier-post-plugin-6-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
2023-11-14T22:18:10.072Z
2023-11-30T12:50:03.408Z
2023-11-30T12:50:03.408Z
{'Vendor': 'finnj', 'Product': 'Frontier Post', 'Versions': 'n/a'}
CVE-2023-6567
The LearnPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order_by’ parameter in all versions up to, and including, 4.2.5.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
https://www.wordfence.com/threat-intel/vulnerabilities/id/6ab578cd-3a0b-43d3-aaa7-0a01f431a4e2?source=cve
2023-12-07T00:13:58.517Z
2024-01-11T08:32:37.107Z
2024-01-11T08:32:37.107Z
{'Vendor': 'thimpress', 'Product': 'LearnPress – WordPress LMS Plugin', 'Versions': '*'}
CVE-2023-6588
Offline mode is always enabled, even if permission disallows it, in Devolutions Server data source in Devolutions Workspace 2023.3.2.0 and earlier. This allows an attacker with access to the Workspace application to access credentials when offline.
https://devolutions.net/security/advisories/DEVO-2023-0022/
2023-12-07T15:41:50.627Z
2023-12-07T15:59:19.821Z
2023-12-07T15:59:19.821Z
{'Vendor': 'Devolutions', 'Product': 'Workspace', 'Versions': '0'}
CVE-2023-6422
A vulnerability has been discovered in BigProf Online Clinic Management System 2.2, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /clinic/patients_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products
2023-11-30T10:45:50.469Z
2023-11-30T13:48:15.442Z
2023-11-30T13:48:15.442Z
{'Vendor': 'BigProf ', 'Product': 'Online Clinic Management System', 'Versions': '2.2'}
CVE-2023-6971
The Backup Migration plugin for WordPress is vulnerable to Remote File Inclusion in versions 1.0.8 to 1.3.9 via the 'content-dir' HTTP header. This makes it possible for unauthenticated attackers to include remote files on the server, resulting in code execution. NOTE: Successful exploitation of this vulnerability requires that the target server's php.ini is configured with 'allow_url_include' set to 'on'. This feature is deprecated as of PHP 7.4 and is disabled by default, but can still be explicitly enabled in later versions of PHP.
https://www.wordfence.com/threat-intel/vulnerabilities/id/b380283c-0dbb-4d67-9f66-cb7c400c0427?source=cve
2023-12-19T22:32:50.041Z
2023-12-23T01:59:49.340Z
2023-12-23T01:59:49.340Z
{'Vendor': 'migrate', 'Product': 'Backup Migration', 'Versions': '1.0.8'}
CVE-2023-6619
A vulnerability was found in SourceCodester Simple Student Attendance System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /modals/class_form.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247256.
https://vuldb.com/?id.247256
2023-12-08T09:54:36.257Z
2023-12-08T17:31:03.703Z
2023-12-08T17:31:03.703Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Student Attendance System', 'Versions': '1.0'}
CVE-2023-6160
The LifterLMS – WordPress LMS Plugin for eLearning plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 7.4.2 via the maybe_serve_export function. This makes it possible for authenticated attackers, with administrator or LMS manager access and above, to read the contents of arbitrary CSV files on the server, which can contain sensitive information as well as removing those files from the server.
https://www.wordfence.com/threat-intel/vulnerabilities/id/6d0fcd82-6d4a-454f-8056-a896e8d41d00?source=cve
2023-11-15T18:07:13.273Z
2023-11-22T15:33:26.141Z
2023-11-22T15:33:26.141Z
{'Vendor': 'chrisbadgett', 'Product': 'LifterLMS – WordPress LMS Plugin for eLearning', 'Versions': '*'}
CVE-2023-6863
The `ShutdownObserver()` was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
https://bugzilla.mozilla.org/show_bug.cgi?id=1868901
2023-12-15T17:42:56.329Z
2023-12-19T13:38:44.181Z
2023-12-19T16:42:18.383Z
{'Vendor': 'Mozilla', 'Product': 'Firefox ESR', 'Versions': 'unspecified'}
CVE-2023-6926
There is an OS command injection vulnerability in Crestron AM-300 firmware version 1.4499.00018 which may enable a user of a limited-access SSH session to escalate their privileges to root-level access.
https://www.cisa.gov/news-events/ics-advisories/icsa-24-023-02
2023-12-18T15:44:37.002Z
2024-01-23T19:23:08.788Z
2024-01-23T19:23:08.788Z
{'Vendor': 'Crestron', 'Product': 'AM-300', 'Versions': ' 1.4499.00018'}
CVE-2023-6875
The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e675d64c-cbb8-4f24-9b6f-2597a97b49af?source=cve
2023-12-15T18:36:38.930Z
2024-01-11T08:33:06.214Z
2024-01-11T08:33:06.214Z
{'Vendor': 'wpexpertsio', 'Product': 'POST SMTP – The #1 WordPress SMTP Plugin with Advanced Email Logging and Delivery Failure Notifications', 'Versions': '*'}
CVE-2023-6176
A null pointer dereference flaw was found in the Linux kernel API for the cryptographic algorithm scatterwalk functionality. This issue occurs when a user constructs a malicious packet with specific socket configuration, which could allow a local user to crash the system or escalate their privileges on the system.
https://access.redhat.com/security/cve/CVE-2023-6176
2023-11-16T13:39:30.071Z
2023-11-16T17:15:44.886Z
2024-01-23T01:50:26.565Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''}
CVE-2023-6033
Improper neutralization of input in Jira integration configuration in GitLab CE/EE, affecting all versions from 15.10 prior to 16.6.1, 16.5 prior to 16.5.3, and 16.4 prior to 16.4.3 allows attacker to execute javascript in victim's browser.
https://gitlab.com/gitlab-org/gitlab/-/issues/431201
2023-11-08T13:01:15.229Z
2023-12-01T07:01:38.124Z
2023-12-01T07:01:38.124Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '15.10, 16.5, 16.6'}
CVE-2023-6199
Book Stack version 23.10.2 allows filtering local files on the server. This is possible because the application is vulnerable to SSRF.
https://fluidattacks.com/advisories/imagination/
2023-11-18T08:49:55.083Z
2023-11-20T22:21:04.992Z
2023-11-20T22:21:04.992Z
{'Vendor': 'BookStack', 'Product': 'BookStack', 'Versions': '23.10.2'}
CVE-2023-6463
A vulnerability has been found in SourceCodester User Registration and Login System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /endpoint/add-user.php. The manipulation of the argument first_name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246613 was assigned to this vulnerability.
https://vuldb.com/?id.246613
2023-12-01T16:05:21.898Z
2023-12-01T22:31:04.531Z
2023-12-01T22:31:04.531Z
{'Vendor': 'SourceCodester', 'Product': 'User Registration and Login System', 'Versions': '1.0'}
CVE-2023-6930
EuroTel ETL3100 versions v01c01 and v01x37 suffer from an unauthenticated configuration and log download vulnerability. This enables the attacker to disclose sensitive information and assist in authentication bypass, privilege escalation, and full system access.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05
2023-12-18T17:18:35.424Z
2023-12-19T23:04:49.947Z
2023-12-19T23:04:49.947Z
{'Vendor': 'EuroTel', 'Product': 'ETL3100', 'Versions': 'v01c01, v01x37'}
CVE-2023-6208
When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard. *This bug only affects Firefox on X11. Other systems are unaffected.* This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.
https://bugzilla.mozilla.org/show_bug.cgi?id=1855345
2023-11-20T13:33:36.430Z
2023-11-21T14:28:53.494Z
2023-11-22T16:46:27.087Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-6658
A vulnerability classified as critical was found in SourceCodester Simple Student Attendance System 1.0. This vulnerability affects unknown code of the file ajax-api.php?action=save_attendance. The manipulation of the argument class_id leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-247366 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.247366
2023-12-10T07:12:33.061Z
2023-12-10T23:00:05.543Z
2023-12-10T23:00:05.543Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Student Attendance System', 'Versions': '1.0'}
CVE-2023-6571
Cross-site Scripting (XSS) - Reflected in kubeflow/kubeflow
https://huntr.com/bounties/f02781e7-2a53-4c66-aa32-babb16434632
2023-12-07T09:38:59.953Z
2023-12-14T13:00:06.671Z
2023-12-14T13:00:06.671Z
{'Vendor': 'kubeflow', 'Product': 'kubeflow/kubeflow', 'Versions': 'unspecified'}
CVE-2023-6121
An out-of-bounds read vulnerability was found in the NVMe-oF/TCP subsystem in the Linux kernel. This issue may allow a remote attacker to send a crafted TCP packet, triggering a heap-based buffer overflow that results in kmalloc data being printed and potentially leaked to the kernel ring buffer (dmesg).
https://access.redhat.com/security/cve/CVE-2023-6121
2023-11-14T10:18:51.337Z
2023-11-16T14:45:38.430Z
2024-01-23T01:48:16.848Z
{'Vendor': 'n/a', 'Product': 'Kernel', 'Versions': '6.7-rc3'}
CVE-2023-6988
The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's extend_builder_render_js shortcode in all versions up to, and including, 1.0.239 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/300b24af-10a1-45b9-87ec-7c98dc94e76b?source=cve
2023-12-20T09:38:11.029Z
2024-01-11T08:32:30.935Z
2024-01-11T08:32:30.935Z
{'Vendor': 'extendthemes', 'Product': 'Colibri Page Builder', 'Versions': '*'}
CVE-2023-6434
A vulnerability has been discovered in BigProf Online Invoicing System 2.6, which does not sufficiently encode user-controlled input, resulting in persistent XSS through /inventory/sections_view.php, in the FirstRecord parameter. Exploitation of this vulnerability could allow an attacking user to store dangerous JavaScript payloads on the system that will be triggered when the page loads.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-xss-vulnerabilities-bigprof-products
2023-11-30T10:46:08.551Z
2023-11-30T13:55:47.489Z
2023-11-30T13:55:47.489Z
{'Vendor': 'BigProf ', 'Product': 'Online Inventory Manager', 'Versions': '3.2'}
CVE-2023-6064
The PayHere Payment Gateway WordPress plugin before 2.2.12 automatically creates publicly-accessible log files containing sensitive information when transactions occur.
https://wpscan.com/vulnerability/423c8881-628b-4380-9677-65b3f5165efe
2023-11-09T19:37:57.339Z
2024-01-01T14:18:52.756Z
2024-01-01T14:18:52.756Z
{'Vendor': 'Unknown', 'Product': 'PayHere Payment Gateway', 'Versions': '0'}
CVE-2023-6789
A cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a malicious authenticated read-write administrator to store a JavaScript payload using the web interface. Then, when viewed by a properly authenticated administrator, the JavaScript payload executes and disguises all associated actions as performed by that unsuspecting authenticated administrator.
https://security.paloaltonetworks.com/CVE-2023-6789
2023-12-13T17:27:23.165Z
2023-12-13T18:26:30.524Z
2023-12-13T18:26:30.524Z
{'Vendor': 'Palo Alto Networks', 'Product': 'PAN-OS', 'Versions': '8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 11.1'}
CVE-2023-6273
Permission management vulnerability in the module for disabling Sound Booster. Successful exploitation of this vulnerability may cause features to perform abnormally.
https://consumer.huawei.com/en/support/bulletin/2023/12/
2023-11-24T07:33:43.681Z
2023-12-06T09:07:24.345Z
2023-12-06T09:07:24.345Z
{'Vendor': 'Huawei', 'Product': 'HarmonyOS', 'Versions': '4.0.0, 3.1.0, 3.0.0, 2.1.0, 2.0.0'}
CVE-2023-6623
The Essential Blocks WordPress plugin before 4.4.3 does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks.
https://wpscan.com/vulnerability/633c28e0-0c9e-4e68-9424-55c32789b41f
2023-12-08T14:24:56.244Z
2024-01-15T15:10:40.328Z
2024-01-15T15:10:40.328Z
{'Vendor': 'Unknown', 'Product': 'Essential Blocks', 'Versions': '0'}
CVE-2023-6336
Improper Link Resolution Before File Access ('Link Following') vulnerability in HYPR Workforce Access on MacOS allows User-Controlled Filename.This issue affects Workforce Access: before 8.7.
https://www.hypr.com/security-advisories
2023-11-27T18:05:05.008Z
2024-01-16T19:42:09.035Z
2024-01-16T19:42:09.035Z
{'Vendor': 'HYPR', 'Product': 'Workforce Access', 'Versions': '0'}
CVE-2023-6766
A vulnerability classified as problematic has been found in PHPGurukul Teacher Subject Allocation Management System 1.0. Affected is an unknown function of the file /admin/course.php of the component Delete Course Handler. The manipulation of the argument delid leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247896.
https://vuldb.com/?id.247896
2023-12-13T09:28:25.970Z
2023-12-13T17:31:05.176Z
2023-12-13T17:31:05.176Z
{'Vendor': 'PHPGurukul', 'Product': 'Teacher Subject Allocation Management System', 'Versions': '1.0'}
CVE-2023-6859
A use-after-free condition affected TLS socket creation when under memory pressure. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
https://bugzilla.mozilla.org/show_bug.cgi?id=1840144
2023-12-15T17:42:55.537Z
2023-12-19T13:38:39.872Z
2023-12-19T13:38:39.872Z
{'Vendor': 'Mozilla', 'Product': 'Firefox ESR', 'Versions': 'unspecified'}
CVE-2023-6048
The Estatik Real Estate Plugin WordPress plugin before 4.1.1 does not prevent user with low privileges on the site, like subscribers, from setting any of the site's options to 1, which could be used to break sites and lead to DoS when certain options are reset
https://wpscan.com/vulnerability/74cb07fe-fc82-472f-8c52-859c176d9e51
2023-11-09T10:03:23.827Z
2024-01-15T15:10:40.683Z
2024-01-15T15:10:40.683Z
{'Vendor': 'Unknown', 'Product': 'Estatik Real Estate Plugin', 'Versions': '0'}
CVE-2023-6418
A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via videos.php in the id parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script
2023-11-30T10:02:14.100Z
2023-11-30T13:14:19.950Z
2023-11-30T13:14:19.950Z
{'Vendor': 'Voovi Social Networking Script', 'Product': 'Voovi Social Networking Script', 'Versions': '1.0'}
CVE-2023-6377
A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.
http://www.openwall.com/lists/oss-security/2023/12/13/1
2023-11-29T07:38:35.722Z
2023-12-13T06:27:40.758Z
2024-01-02T14:56:53.997Z
{'Vendor': 'n/a', 'Product': 'xorg-server', 'Versions': '21.1.10'}
CVE-2023-6727
Mattermost fails to perform correct authorization checks when creating a playbook action, allowing users without access to the playbook to create playbook actions. If the playbook action created is to post a message in a channel based on specific keywords in a post, some playbook information, like the name, can be leaked. 
https://mattermost.com/security-updates
2023-12-12T10:48:31.631Z
2023-12-12T10:53:02.127Z
2023-12-12T10:53:02.127Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 8.1.6, 9.2.2'}
CVE-2023-6265
** UNSUPPORTED WHEN ASSIGNED ** Draytek Vigor2960 v1.5.1.4 and v1.5.1.5 are vulnerable to directory traversal via the mainfunction.cgi dumpSyslog 'option' parameter allowing an authenticated attacker with access to the web management interface to delete arbitrary files. Vigor2960 is no longer supported.
https://github.com/xxy1126/Vuln/blob/main/Draytek/4.md
2023-11-22T19:31:54.376Z
2023-11-22T19:47:07.692Z
2023-12-19T21:00:05.632Z
{'Vendor': 'DrayTek', 'Product': 'Vigor2960', 'Versions': '1.5.1.4, 1.5.1.5'}
CVE-2023-6009
The UserPro plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.1.4 due to insufficient restriction on the 'userpro_update_user_profile' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to modify their user role by supplying the 'wp_capabilities' parameter during a profile update.
https://www.wordfence.com/threat-intel/vulnerabilities/id/e8bed9c0-dae3-405e-a946-5f28a3c30851?source=cve
2023-11-08T05:32:13.517Z
2023-11-22T15:33:37.741Z
2023-11-22T15:33:37.741Z
{'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'}
CVE-2023-6459
Mattermost is grouping calls in the /metrics endpoint by id and reports that id in the response. Since this id is the channelID, the public /metrics endpoint is revealing channelIDs.
https://mattermost.com/security-updates
2023-12-01T10:14:04.973Z
2023-12-06T08:11:36.417Z
2023-12-06T08:11:36.417Z
{'Vendor': 'Mattermost', 'Product': 'Mattermost', 'Versions': '0, 0, 8.1.5, 7.8.14'}
CVE-2023-6972
The Backup Migration plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.3.9 via the 'content-backups' and 'content-name', 'content-manifest', or 'content-bmitmp' and 'content-identy' HTTP headers. This makes it possible for unauthenticated attackers to delete arbitrary files, including the wp-config.php file, which can make site takeover and remote code execution possible.
https://www.wordfence.com/threat-intel/vulnerabilities/id/0a3ae696-f67d-4ed2-b307-d2f36b6f188c?source=cve
2023-12-20T01:43:10.286Z
2023-12-23T01:59:46.751Z
2023-12-23T01:59:46.751Z
{'Vendor': 'migrate', 'Product': 'Backup Migration', 'Versions': '*'}
CVE-2023-6071
An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. This is possible as the input isn't correctly sanitized when adding a new data source.
https://kcm.trellix.com/corporate/index?page=content&id=SB10413
2023-11-10T05:17:18.636Z
2023-11-30T12:48:51.618Z
2023-11-30T12:48:51.618Z
{'Vendor': 'Trellix', 'Product': 'ESM', 'Versions': 'Prior to version 11.6.9'}
CVE-2023-6421
The Download Manager WordPress plugin before 3.2.83 does not protect file download's passwords, leaking it upon receiving an invalid one.
https://wpscan.com/vulnerability/244c7c00-fc8d-4a73-bbe0-7865c621d410
2023-11-30T10:31:42.688Z
2024-01-01T14:18:53.519Z
2024-01-01T14:18:53.519Z
{'Vendor': 'Unknown', 'Product': 'Download Manager', 'Versions': '0'}
CVE-2023-6134
A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.
https://access.redhat.com/errata/RHSA-2023:7854
2023-11-14T18:50:13.535Z
2023-12-14T21:42:12.160Z
2024-01-23T01:49:08.934Z
{'Vendor': 'n/a', 'Product': 'keycloak-core', 'Versions': ''}
CVE-2023-6837
Multiple WSO2 products have been identified as vulnerable to perform user impersonatoin using JIT provisioning. In order for this vulnerability to have any impact on your deployment, following conditions must be met: * An IDP configured for federated authentication and JIT provisioning enabled with the "Prompt for username, password and consent" option. * A service provider that uses the above IDP for federated authentication and has the "Assert identity using mapped local subject identifier" flag enabled. Attacker should have: * A fresh valid user account in the federated IDP that has not been used earlier. * Knowledge of the username of a valid user in the local IDP. When all preconditions are met, a malicious actor could use JIT provisioning flow to perform user impersonation.
https://security.docs.wso2.com/en/latest/security-announcements/security-advisories/2022/WSO2-2021-1573/
2023-12-15T09:40:50.666Z
2023-12-15T09:41:22.719Z
2023-12-15T09:41:22.719Z
{'Vendor': 'WSO2', 'Product': 'WSO2 API Manager', 'Versions': '0, 2.5.0.0, 2.6.0.0, 3.0.0.0, 3.1.0.0, 3.2.0.0, 4.0.0.0'}
CVE-2023-6476
A flaw was found in CRI-O that involves an experimental annotation leading to a container being unconfined. This may allow a pod to specify and get any amount of memory/cpu, circumventing the kubernetes scheduler and potentially resulting in a denial of service in the node.
https://access.redhat.com/errata/RHSA-2024:0195
2023-12-04T06:23:22.231Z
2024-01-09T21:32:03.407Z
2024-01-23T02:03:51.555Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''}
CVE-2023-6026
A Path traversal vulnerability has been reported in elijaa/phpmemcachedadmin affecting version 1.3.0. This vulnerability allows an attacker to delete files stored on the server due to lack of proper verification of user-supplied input.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-phpmemcachedadmin
2023-11-08T09:59:42.089Z
2023-11-30T13:37:23.292Z
2023-11-30T13:39:03.457Z
{'Vendor': 'PHPMemcachedAdmin ', 'Product': 'PHPMemcachedAdmin ', 'Versions': '1.3.0'}
CVE-2023-6860
The `VideoBridge` allowed any content process to use textures produced by remote decoders. This could be abused to escape the sandbox. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
https://bugzilla.mozilla.org/show_bug.cgi?id=1854669
2023-12-15T17:42:55.731Z
2023-12-19T13:38:40.956Z
2023-12-19T16:42:16.140Z
{'Vendor': 'Mozilla', 'Product': 'Firefox ESR', 'Versions': 'unspecified'}
CVE-2023-6163
The WP Crowdfunding WordPress plugin before 2.1.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/7ed6de4d-0a37-497f-971d-b6711893c557
2023-11-15T18:15:05.982Z
2024-01-15T15:10:41.014Z
2024-01-15T15:10:41.014Z
{'Vendor': 'Unknown', 'Product': 'WP Crowdfunding', 'Versions': '0'}
CVE-2023-6899
A vulnerability classified as problematic was found in rmountjoy92 DashMachine 0.5-4. Affected by this vulnerability is an unknown functionality of the file /settings/save_config of the component Config Handler. The manipulation of the argument value_template leads to code injection. The exploit has been disclosed to the public and may be used. The identifier VDB-248257 was assigned to this vulnerability.
https://vuldb.com/?id.248257
2023-12-16T19:38:05.199Z
2023-12-17T12:31:04.408Z
2023-12-17T12:31:04.408Z
{'Vendor': 'rmountjoy92', 'Product': 'DashMachine', 'Versions': '0.5-4'}
CVE-2023-6460
A potential logging of the firestore key via logging within nodejs-firestore exists - Developers who were logging objects through this._settings would be logging the firestore key as well potentially exposing it to anyone with logs read access. We recommend upgrading to version 6.1.0 to avoid this issue
https://github.com/googleapis/nodejs-firestore/pull/1742
2023-12-01T11:10:57.359Z
2023-12-04T12:26:29.505Z
2023-12-04T12:26:29.505Z
{'Vendor': 'Google', 'Product': 'nodejs-firestore', 'Versions': '0'}
CVE-2023-6088
null
null
2023-11-12T23:11:45.388Z
null
2023-11-13T23:33:48.845Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-6572
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository gradio-app/gradio prior to main.
https://huntr.com/bounties/21d2ff0c-d43a-4afd-bb4d-049ee8da5b5c
2023-12-07T09:39:35.019Z
2023-12-14T13:14:16.804Z
2023-12-14T13:14:16.804Z
{'Vendor': 'gradio-app', 'Product': 'gradio-app/gradio', 'Versions': 'unspecified'}
CVE-2023-6122
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in İstanbul Soft Informatics and Consultancy Limited Company Softomi Gelişmiş C2C Pazaryeri Yazılımı allows Reflected XSS.This issue affects Softomi Gelişmiş C2C Pazaryeri Yazılımı: before 12122023.
https://www.usom.gov.tr/bildirim/tr-23-0724
2023-11-14T12:15:33.254Z
2023-12-21T13:53:57.101Z
2023-12-21T13:53:57.101Z
{'Vendor': 'İstanbul Soft Informatics and Consultancy Limited Company', 'Product': 'Softomi Gelişmiş C2C Pazaryeri Yazılımı', 'Versions': '0'}
CVE-2023-6335
Improper Link Resolution Before File Access ('Link Following') vulnerability in HYPR Workforce Access on Windows allows User-Controlled Filename.This issue affects Workforce Access: before 8.7.
https://www.hypr.com/security-advisories
2023-11-27T18:04:52.332Z
2024-01-16T19:42:02.665Z
2024-01-16T19:42:02.665Z
{'Vendor': 'HYPR', 'Product': 'Workforce Access', 'Versions': '0'}
CVE-2023-6765
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been rated as critical. This issue affects the function prepare of the file email_setup.php. The manipulation of the argument name leads to sql injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-247895.
https://vuldb.com/?id.247895
2023-12-13T09:22:54.205Z
2023-12-13T17:31:04.162Z
2023-12-13T17:31:04.162Z
{'Vendor': 'SourceCodester', 'Product': 'Online Tours & Travels Management System', 'Versions': '1.0'}
CVE-2023-6270
A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. The aoecmd_cfg_pkts() function improperly updates the refcnt on `struct net_device`, and a use-after-free can be triggered by racing between the free on the struct and the access through the `skbtxq` global queue. This could lead to a denial of service condition or potential code execution.
https://access.redhat.com/security/cve/CVE-2023-6270
2023-11-23T14:31:28.637Z
2024-01-04T17:01:51.165Z
2024-01-23T02:00:09.306Z
{'Vendor': 'n/a', 'Product': 'kernel', 'Versions': ''}
CVE-2023-6620
The POST SMTP Mailer WordPress plugin before 2.8.7 does not properly sanitise and escape several parameters before using them in SQL statements, leading to a SQL injection exploitable by high privilege users such as admin.
https://wpscan.com/vulnerability/ab5c42ca-ee7d-4344-bd88-0d727ed3d9c4
2023-12-08T10:30:24.389Z
2024-01-15T15:10:41.386Z
2024-01-15T15:10:41.386Z
{'Vendor': 'Unknown', 'Product': 'POST SMTP Mailer', 'Versions': '0'}
CVE-2023-6509
Use after free in Side Panel Search in Google Chrome prior to 120.0.6099.62 allowed a remote attacker who convinced a user to engage in specific UI interaction to potentially exploit heap corruption via specific UI interaction. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html
2023-12-04T22:53:19.729Z
2023-12-06T01:19:19.993Z
2023-12-06T01:19:19.993Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '120.0.6099.62'}
CVE-2023-6159
An issue has been discovered in GitLab CE/EE affecting all versions from 12.7 prior to 16.6.6, 16.7 prior to 16.7.4, and 16.8 prior to 16.8.1 It was possible for an attacker to trigger a Regular Expression Denial of Service via a `Cargo.toml` containing maliciously crafted input.
https://about.gitlab.com/releases/2024/01/25/critical-security-release-gitlab-16-8-1-released/
2023-11-15T18:00:57.865Z
2024-01-26T02:02:29.909Z
2024-01-26T02:02:29.909Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '12.7, 16.7, 16.8'}
CVE-2023-6732
The Ultimate Maps by Supsystic WordPress plugin before 1.2.16 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed
https://wpscan.com/vulnerability/aaf91707-f03b-4f25-bca9-9fac4945002a/
2023-12-12T14:57:41.642Z
2024-01-16T15:57:02.536Z
2024-01-16T15:57:02.536Z
{'Vendor': 'Unknown', 'Product': 'Ultimate Maps by Supsystic', 'Versions': '0'}
CVE-2023-6548
Improper Control of Generation of Code ('Code Injection') in NetScaler ADC and NetScaler Gateway allows an attacker with access to NSIP, CLIP or SNIP with management interface to perform Authenticated (low privileged) remote code execution on Management Interface.
https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549
2023-12-06T11:01:54.643Z
2024-01-17T20:11:18.462Z
2024-01-18T01:12:54.917Z
{'Vendor': 'Cloud Software Group', 'Product': 'NetScaler ADC\u202f', 'Versions': '14.1, 13.1, 13.0 , 13.1-FIPS, 12.1-FIPS, 12.1-NDcPP'}
CVE-2023-6118
Path Traversal: '/../filedir' vulnerability in Neutron IP Camera allows Absolute Path Traversal.This issue affects IP Camera: before b1130.1.0.1.
https://www.usom.gov.tr/bildirim/tr-23-0658
2023-11-14T07:38:37.052Z
2023-11-23T14:24:24.001Z
2023-11-24T07:44:36.259Z
{'Vendor': 'Neutron', 'Product': 'IP Camera', 'Versions': '0'}
CVE-2023-6289
The Swift Performance Lite WordPress plugin before 2.3.6.15 does not prevent users from exporting the plugin's settings, which may include sensitive information such as Cloudflare API tokens.
https://wpscan.com/vulnerability/8c83dd57-9291-4dfc-846d-5ad47534e2ad
2023-11-24T15:07:37.011Z
2023-12-18T20:08:00.760Z
2023-12-18T20:08:00.760Z
{'Vendor': 'Unknown', 'Product': 'Swift Performance Lite', 'Versions': '0'}
CVE-2023-6773
A vulnerability has been found in CodeAstro POS and Inventory Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /accounts_con/register_account of the component User Creation Handler. The manipulation of the argument account_type with the input Admin leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247909 was assigned to this vulnerability.
https://vuldb.com/?id.247909
2023-12-13T12:26:44.757Z
2023-12-13T19:31:04.385Z
2023-12-13T19:31:04.385Z
{'Vendor': 'CodeAstro', 'Product': 'POS and Inventory Management System', 'Versions': '1.0'}
CVE-2023-6636
The Greenshift – animation and page builder blocks plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation on the 'gspb_save_files' function in versions up to, and including, 7.6.2. This makes it possible for authenticated attackers with administrator-level capabilities or above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
https://www.wordfence.com/threat-intel/vulnerabilities/id/821462d6-970e-4e3e-b91d-e7153296ba9f?source=cve
2023-12-08T19:39:49.083Z
2024-01-11T08:32:41.439Z
2024-01-11T08:32:41.439Z
{'Vendor': 'wpsoul', 'Product': 'Greenshift – animation and page builder blocks', 'Versions': '*'}
CVE-2023-6266
The Backup Migration plugin for WordPress is vulnerable to unauthorized access of data due to insufficient path and file validation on the BMI_BACKUP case of the handle_downloading function in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to download back-up files which can contain sensitive information such as user passwords, PII, database credentials, and much more.
https://www.wordfence.com/threat-intel/vulnerabilities/id/08801f53-3c57-41a3-a637-4b52637cc612?source=cve
2023-11-22T20:45:16.590Z
2024-01-11T08:32:27.689Z
2024-01-11T08:32:27.689Z
{'Vendor': 'migrate', 'Product': 'Backup Migration', 'Versions': '*'}
CVE-2023-6909
Path Traversal: '\..\filename' in GitHub repository mlflow/mlflow prior to 2.9.2.
https://huntr.com/bounties/11209efb-0f84-482f-add0-587ea6b7e850
2023-12-18T00:00:12.436Z
2023-12-18T00:00:31.984Z
2023-12-18T00:00:31.984Z
{'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'}
CVE-2023-6991
The JSM file_get_contents() Shortcode WordPress plugin before 2.7.1 does not validate one of its shortcode's parameters before making a request to it, which could allow users with contributor role and above to perform SSRF attacks.
https://wpscan.com/vulnerability/0b92becb-8a47-48fd-82e8-f7641cf5c9bc
2023-12-20T10:11:55.989Z
2024-01-15T15:10:41.733Z
2024-01-15T15:10:41.733Z
{'Vendor': 'Unknown', 'Product': 'JSM file_get_contents() Shortcode', 'Versions': '0'}
CVE-2023-6092
null
null
2023-11-13T01:54:03.590Z
null
2023-11-13T23:31:52.729Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-6568
Cross-site Scripting (XSS) - Reflected in GitHub repository mlflow/mlflow prior to 2.9.0.
https://huntr.com/bounties/816bdaaa-8153-4732-951e-b0d92fddf709
2023-12-07T04:53:51.571Z
2023-12-07T04:54:10.377Z
2023-12-07T04:54:10.377Z
{'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'}
CVE-2023-6211
If an attacker needed a user to load an insecure http: page and knew that user had enabled HTTPS-only mode, the attacker could have tricked the user into clicking to grant an HTTPS-only exception if they could get the user to participate in a clicking game. This vulnerability affects Firefox < 120.
https://bugzilla.mozilla.org/show_bug.cgi?id=1850200
2023-11-20T13:33:41.215Z
2023-11-21T14:28:54.446Z
2023-11-21T14:28:54.446Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-6354
Tyler Technologies Magistrate Court Case Management Plus allows an unauthenticated, remote attacker to upload, delete, and view files by manipulating the PDFViewer.aspx 'filename' parameter.
https://www.tylertech.com/solutions/courts-public-safety/courts-justice
2023-11-28T02:57:10.860Z
2023-11-30T17:53:26.147Z
2023-11-30T20:54:04.031Z
{'Vendor': 'Tyler Technologies', 'Product': 'Magistrate Court Case Management Plus', 'Versions': '0'}
CVE-2023-6704
Use after free in libavif in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted image file. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
2023-12-11T23:27:50.399Z
2023-12-14T21:48:41.823Z
2023-12-14T21:48:41.823Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '120.0.6099.109'}
CVE-2023-6929
EuroTel ETL3100 versions v01c01 and v01x37 are vulnerable to insecure direct object references that occur when the application provides direct access to objects based on user-supplied input. As a result of this vulnerability, attackers can bypass authorization, access the hidden resources on the system, and execute privileged functionalities.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05
2023-12-18T17:18:33.176Z
2023-12-19T23:02:08.432Z
2023-12-19T23:02:08.432Z
{'Vendor': 'EuroTel', 'Product': 'ETL3100', 'Versions': 'v01c01, v01x37'}
CVE-2023-6883
The Easy Social Feed plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in all versions up to, and including, 6.5.2. This makes it possible for authenticated attackers, with subscriber-level access and above, to perform unauthorized actions, such as modifying the plugin's Facebook and Instagram access tokens and updating group IDs.
https://www.wordfence.com/threat-intel/vulnerabilities/id/3deee9b5-2e36-447d-a492-e22e3dc6a5ab?source=cve
2023-12-16T01:00:05.114Z
2024-01-11T06:49:32.594Z
2024-01-11T06:49:32.594Z
{'Vendor': 'sjaved', 'Product': 'Easy Social Feed – Social Photos Gallery – Post Feed – Like Box', 'Versions': '*'}
CVE-2023-6180
The tokio-boring library in version 4.0.0 is affected by a memory leak issue that can lead to excessive resource consumption and potential DoS by resource exhaustion. The set_ex_data function used by the library did not deallocate memory used by pre-existing data in memory each time after completing a TLS connection causing the program to consume more resources with each new connection.
https://github.com/cloudflare/boring/security/advisories/GHSA-pjrj-h4fg-6gm4
2023-11-16T19:15:23.367Z
2023-12-05T15:02:40.007Z
2023-12-05T15:02:40.007Z
{'Vendor': 'Cloudflare', 'Product': 'tokio-boring', 'Versions': '4.0.0'}
CVE-2023-6616
A vulnerability was found in SourceCodester Simple Student Attendance System 1.0 and classified as problematic. This issue affects some unknown processing of the file index.php. The manipulation of the argument page leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-247253 was assigned to this vulnerability.
https://vuldb.com/?id.247253
2023-12-08T09:54:27.116Z
2023-12-08T16:31:05.055Z
2023-12-08T16:31:05.055Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Student Attendance System', 'Versions': '1.0'}
CVE-2023-6753
Path Traversal in GitHub repository mlflow/mlflow prior to 2.9.2.
https://huntr.com/bounties/b397b83a-527a-47e7-b912-a12a17a6cfb4
2023-12-13T00:00:11.046Z
2023-12-13T00:00:31.196Z
2023-12-13T00:00:31.196Z
{'Vendor': 'mlflow', 'Product': 'mlflow/mlflow', 'Versions': 'unspecified'}