CVE_ID
stringlengths
9
213
Description
stringlengths
24
3.87k
URL
stringlengths
12
306
DateReserved
stringlengths
19
24
DatePublished
stringlengths
19
75
DateUpdated
stringlengths
19
61
AffectedProducts
stringlengths
46
143k
CVE-2023-6303
A vulnerability was found in CSZCMS 1.3.0. It has been classified as problematic. This affects an unknown part of the file /admin/settings/ of the component Site Settings Page. The manipulation of the argument Additional Meta Tag with the input <svg><animate onbegin=alert(1) attributeName=x dur=1s> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246129 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.246129
2023-11-26T07:45:18.389Z
2023-11-27T00:00:08.280Z
2023-11-27T00:00:08.280Z
{'Vendor': 'n/a', 'Product': 'CSZCMS', 'Versions': '1.3.0'}
CVE-2023-6196
The Audio Merchant plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.0.4. This is due to missing or incorrect nonce validation on the function audio_merchant_add_audio_file function. This makes it possible for unauthenticated attackers to upload arbitrary files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/06513dfe-f263-48b7-ba01-2c205247095b?source=cve
2023-11-17T22:24:12.242Z
2023-11-20T14:34:21.461Z
2023-11-20T14:34:21.461Z
{'Vendor': 'Audio Merchant', 'Product': 'Audio Merchant', 'Versions': '*'}
CVE-2023-6895
A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been declared as critical. This vulnerability affects unknown code of the file /php/ping.php. The manipulation of the argument jsondata[ip] with the input netstat -ano leads to os command injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-248254 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.248254
2023-12-16T15:16:15.629Z
2023-12-17T08:00:05.112Z
2023-12-19T09:06:44.657Z
{'Vendor': 'Hikvision', 'Product': 'Intercom Broadcasting System', 'Versions': '3.0.3_20201113_RELEASE(HIK)'}
CVE-2023-6529
The WP VR WordPress plugin before 8.3.15 does not authorisation and CSRF in a function hooked to admin_init, allowing unauthenticated users to downgrade the plugin, thus leading to Reflected or Stored XSS, as previous versions have such vulnerabilities.
https://wpscan.com/vulnerability/c36314c1-a2c0-4816-93c9-e61f9cf7f27a
2023-12-05T16:45:09.724Z
2024-01-08T19:00:26.949Z
2024-01-08T19:00:26.949Z
{'Vendor': 'Unknown', 'Product': 'WP VR', 'Versions': '0'}
CVE-2023-6483
The vulnerability exists in ADiTaaS (Allied Digital Integrated Tool-as-a-Service) version 5.1 due to an improper authentication vulnerability in the ADiTaaS backend API. An unauthenticated remote attacker could exploit this vulnerability by sending specially crafted HTTP requests to the vulnerable platform. Successful exploitation of this vulnerability could allow the attacker to gain full access to the customers’ data and completely compromise the targeted platform.
https://cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0365
2023-12-04T10:23:22.916Z
2023-12-18T08:04:54.658Z
2023-12-18T08:04:54.658Z
{'Vendor': 'ADiTaaS', 'Product': 'Allied Digital Integrated Tool-as-a-Service', 'Versions': '0'}
CVE-2023-6179
Honeywell ProWatch, 4.5, including all Service Pack versions, contain a Vulnerability in Application Server's executable folder(s). A(n) attacker could potentially exploit this vulnerability, leading to a standard user to have arbitrary system code execution. Honeywell recommends updating to the most recent version of this product, service or offering (Pro-watch 6.0.2, 6.0, 5.5.2,5.0.5).
https://buildings.honeywell.com/us/en/brands/our-brands/security/support-and-resources/product-resources/eol-and-security-notices
2023-11-16T17:28:41.240Z
2023-11-17T17:03:32.853Z
2023-11-17T17:03:32.853Z
{'Vendor': 'Honeywell', 'Product': 'ProWatch', 'Versions': '4.5, 6.0.2, 6.0, 5.5.2, 5.0.5'}
CVE-2023-6250
The BestWebSoft's Like & Share WordPress plugin before 2.74 discloses the content of password protected posts to unauthenticated users via a meta tag
https://wpscan.com/vulnerability/6cad602b-7414-4867-8ae2-f0b846c4c8f0
2023-11-22T09:41:18.436Z
2023-12-26T18:33:11.036Z
2023-12-26T18:33:11.036Z
{'Vendor': 'Unknown', 'Product': "BestWebSoft's Like & Share", 'Versions': '0'}
CVE-2023-6600
The OMGF | GDPR/DSGVO Compliant, Faster Google Fonts. Easy. plugin for WordPress is vulnerable to unauthorized modification of data and Stored Cross-Site Scripting due to a missing capability check on the update_settings() function hooked via admin_init in all versions up to, and including, 5.7.9. This makes it possible for unauthenticated attackers to update the plugin's settings which can be used to inject Cross-Site Scripting payloads and delete entire directories. PLease note there were several attempted patched, and we consider 5.7.10 to be the most sufficiently patched.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4e835b97-c066-4e8f-b99f-1a930105af0c?source=cve
2023-12-08T00:04:00.899Z
2024-01-03T05:31:18.483Z
2024-01-03T05:31:18.483Z
{'Vendor': 'daanvandenbergh', 'Product': 'OMGF | GDPR/DSGVO Compliant, Faster Google Fonts. Easy.', 'Versions': '*'}
CVE-2023-6315
Out-of-bouds read vulnerability in FPWin Pro version 7.7.0.0 and all previous versions may allow attackers to execute arbitrary code via a specially crafted project file.
https://industry.panasonic.eu/products/automation-devices-solutions/programmable-logic-controllers-plc/plc-software/programming-software-control-fpwin-pro
2023-11-27T05:48:37.067Z
2023-12-19T00:25:12.122Z
2023-12-19T00:25:12.122Z
{'Vendor': 'Panasonic', 'Product': 'Control FPWIN Pro', 'Versions': 'n/a'}
CVE-2023-6084
A vulnerability was found in Tongda OA 2017 up to 11.9 and classified as critical. Affected by this issue is some unknown functionality of the file general/vehicle/checkup/delete.php. The manipulation of the argument VU_ID leads to sql injection. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. VDB-244994 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.244994
2023-11-11T17:22:24.534Z
2023-11-12T11:00:06.121Z
2023-11-12T11:00:06.121Z
{'Vendor': 'Tongda', 'Product': 'OA 2017', 'Versions': '11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 11.7, 11.8, 11.9'}
CVE-2023-6657
A vulnerability classified as critical has been found in SourceCodester Simple Student Attendance System 1.0. This affects an unknown part of the file /modals/student_form.php. The manipulation of the argument id leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-247365 was assigned to this vulnerability.
https://vuldb.com/?id.247365
2023-12-10T07:10:32.946Z
2023-12-10T21:00:05.308Z
2023-12-10T21:00:05.308Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Student Attendance System', 'Versions': '1.0'}
CVE-2023-6207
Ownership mismanagement led to a use-after-free in ReadableByteStreams This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.
https://bugzilla.mozilla.org/show_bug.cgi?id=1861344
2023-11-20T13:33:34.297Z
2023-11-21T14:28:53.190Z
2023-11-22T16:46:26.740Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-6342
Tyler Technologies Court Case Management Plus allows a remote attacker to authenticate as any user by manipulating at least the 'CmWebSearchPfp/Login.aspx?xyzldk=' and 'payforprint_CM/Redirector.ashx?userid=' parameters. The vulnerable "pay for print" feature was removed on or around 2023-11-01.
https://www.tylertech.com/solutions/courts-public-safety/courts-justice
2023-11-27T22:29:22.709Z
2023-11-30T17:41:13.229Z
2023-11-30T20:51:30.039Z
{'Vendor': 'Tyler Technologies', 'Product': 'Court Case Management Plus', 'Versions': '0'}
CVE-2023-6155
The Quiz Maker WordPress plugin before 6.4.9.5 does not adequately authorize the `ays_quiz_author_user_search` AJAX action, allowing an unauthenticated attacker to perform a search for users of the system, ultimately leaking user email addresses.
https://wpscan.com/vulnerability/c62be802-e91a-4bcf-990d-8fd8ef7c9a28
2023-11-15T15:48:16.975Z
2023-12-26T18:33:11.835Z
2023-12-26T18:33:11.835Z
{'Vendor': 'Unknown', 'Product': 'Quiz Maker', 'Versions': '0'}
CVE-2023-6505
The Migrate WordPress Website & Backups WordPress plugin before 1.9.3 does not prevent directory listing in sensitive directories containing export files.
https://wpscan.com/vulnerability/eca6f099-6af0-4f42-aade-ab61dd792629
2023-12-04T19:46:49.264Z
2024-01-08T19:00:38.801Z
2024-01-08T19:00:38.801Z
{'Vendor': 'Unknown', 'Product': 'Migrate WordPress Website & Backups', 'Versions': '0'}
CVE-2023-6856
The WebGL `DrawElementsInstanced` method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver. This issue could allow an attacker to perform remote code execution and sandbox escape. This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
https://bugzilla.mozilla.org/show_bug.cgi?id=1843782
2023-12-15T17:42:54.919Z
2023-12-19T13:38:36.493Z
2023-12-19T16:42:14.178Z
{'Vendor': 'Mozilla', 'Product': 'Firefox ESR', 'Versions': 'unspecified'}
CVE-2023-6913
A session hijacking vulnerability has been detected in the Imou Life application affecting version 6.7.0. This vulnerability could allow an attacker to hijack user accounts due to the QR code functionality not properly filtering codes when scanning a new device and directly running WebView without prompting or displaying it to the user. This vulnerability could trigger phishing attacks.
https://www.incibe.es/en/incibe-cert/notices/aviso/session-hijacking-imou-life-app
2023-12-18T09:51:26.413Z
2023-12-19T14:49:48.766Z
2023-12-19T15:03:31.788Z
{'Vendor': 'Imou', 'Product': 'Imou Life app', 'Versions': '6.7.0'}
CVE-2023-6010
null
null
2023-11-08T05:44:55.728Z
null
2023-11-13T23:40:24.212Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-6440
A vulnerability was found in SourceCodester Book Borrower System 1.0 and classified as problematic. This issue affects some unknown processing of the file endpoint/add-book.php. The manipulation of the argument Book Title/Book Author leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246443.
https://vuldb.com/?id.246443
2023-11-30T12:53:59.129Z
2023-11-30T20:31:04.624Z
2023-11-30T20:31:04.624Z
{'Vendor': 'SourceCodester', 'Product': 'Book Borrower System', 'Versions': '1.0'}
CVE-2023-6293
Prototype Pollution in GitHub repository robinbuschmann/sequelize-typescript prior to 2.1.6.
https://huntr.com/bounties/36a7ecbf-4d3d-462e-86a3-cda7b1ec64e2
2023-11-24T19:51:40.808Z
2023-11-24T19:51:55.099Z
2023-11-24T19:51:55.099Z
{'Vendor': 'robinbuschmann', 'Product': 'robinbuschmann/sequelize-typescript', 'Versions': 'unspecified'}
CVE-2023-6769
Stored XSS vulnerability in Amazing Little Poll, affecting versions 1.3 and 1.4. This vulnerability allows a remote attacker to store a malicious JavaScript payload in the "lp_admin.php" file in the "question" and "item" parameters. This vulnerability could lead to malicious JavaScript execution while the page is loading.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amazing-little-poll
2023-12-13T11:43:04.671Z
2023-12-20T09:50:44.480Z
2023-12-20T09:50:44.480Z
{'Vendor': 'Amazing Little poll', 'Product': 'Amazing Little poll', 'Versions': '1.3, 1.4'}
CVE-2023-6339
Google Nest WiFi Pro root code-execution & user-data compromise
https://support.google.com/product-documentation/answer/14273332?hl=en&ref_topic=12974021&sjid=4533873659772963473-NA
2023-11-27T22:21:29.137Z
2024-01-02T21:44:05.703Z
2024-01-02T21:44:05.703Z
{'Vendor': 'Google', 'Product': 'Wifi Pro', 'Versions': '14150'}
CVE-2023-6801
The RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 4.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/a713d897-c549-4e0d-9cb3-7002ef2b127f?source=cve
2023-12-13T18:41:30.912Z
2024-01-06T09:38:25.778Z
2024-01-06T09:38:25.778Z
{'Vendor': 'themeisle', 'Product': 'RSS Aggregator by Feedzy – Feed to Post, Autoblogging, News & YouTube Video Feeds Aggregator', 'Versions': '*'}
CVE-2023-6552
Lack of "current" GET parameter validation during the action of changing a language leads to an open redirect vulnerability.
https://github.com/TasmoAdmin/TasmoAdmin/pull/1039
2023-12-06T12:37:34.641Z
2024-01-08T12:19:58.358Z
2024-01-08T12:19:58.358Z
{'Vendor': 'TasmoAdmin', 'Product': 'TasmoAdmin', 'Versions': '0'}
CVE-2023-6102
A vulnerability, which was classified as problematic, was found in Maiwei Safety Production Control Platform 4.1. Affected is an unknown function of the file /Content/Plugins/uploader/FileChoose.html?fileUrl=/Upload/File/Pics/&parent. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-245064. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.245064
2023-11-13T10:18:46.183Z
2023-11-13T17:31:05.080Z
2023-11-13T17:31:05.080Z
{'Vendor': 'Maiwei', 'Product': 'Safety Production Control Platform', 'Versions': '4.1'}
CVE-2023-6417
A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via update.php in the id parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script
2023-11-30T10:02:12.628Z
2023-11-30T13:13:57.356Z
2023-11-30T13:13:57.356Z
{'Vendor': 'Voovi Social Networking Script', 'Product': 'Voovi Social Networking Script', 'Versions': '1.0'}
CVE-2023-6944
A flaw was found in the Red Hat Developer Hub (RHDH). The catalog-import function leaks GitLab access tokens on the frontend when the base64 encoded GitLab token includes a newline at the end of the string. The sanitized error can display on the frontend, including the raw access token. Upon gaining access to this token and depending on permissions, an attacker could push malicious code to repositories, delete resources in Git, revoke or generate new keys, and sign code illegitimately.
https://access.redhat.com/security/cve/CVE-2023-6944
2023-12-19T10:23:24.260Z
2024-01-04T10:02:38.088Z
2024-01-25T15:15:43.602Z
{'Vendor': 'n/a', 'Product': 'rhdh', 'Versions': '1.21.0'}
CVE-2023-6381
Improper input validation vulnerability in Newsletter Software SuperMailer affecting version 11.20.0.2204. An attacker could exploit this vulnerability by sending a malicious configuration file (file with SMB extension) to a user via a link or email attachment and persuade the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to crash the application when attempting to load the malicious file.
https://www.incibe.es/en/incibe-cert/notices/aviso/improper-input-validation-newsletter-software-supermailer
2023-11-29T10:30:55.426Z
2023-12-13T10:46:12.511Z
2023-12-13T10:46:12.511Z
{'Vendor': 'SuperMailer', 'Product': 'Newsletter Software', 'Versions': '11.20.0.2204'}
CVE-2023-6114
The Duplicator WordPress plugin before 1.5.7.1, Duplicator Pro WordPress plugin before 4.5.14.2 does not disallow listing the `backups-dup-lite/tmp` directory (or the `backups-dup-pro/tmp` directory in the Pro version), which temporarily stores files containing sensitive data. When directory listing is enabled in the web server, this allows unauthenticated attackers to discover and access these sensitive files, which include a full database dump and a zip archive of the site.
https://wpscan.com/vulnerability/5c5d41b9-1463-4a9b-862f-e9ee600ef8e1
2023-11-13T21:20:03.399Z
2023-12-26T18:33:12.631Z
2023-12-26T18:33:12.631Z
{'Vendor': 'Unknown', 'Product': 'Duplicator', 'Versions': '0'}
CVE-2023-6817
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free. We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a
2023-12-14T11:29:13.252Z
2023-12-18T14:37:05.986Z
2023-12-18T14:37:05.986Z
{'Vendor': 'Linux', 'Product': 'Kernel', 'Versions': '5.6'}
CVE-2023-6051
An issue has been discovered in GitLab CE/EE affecting all versions before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. File integrity may be compromised when source code or installation packages are pulled from a specific tag.
https://gitlab.com/gitlab-org/gitlab/-/issues/431345
2023-11-09T12:30:30.298Z
2023-12-15T16:02:50.265Z
2024-01-02T08:48:08.197Z
{'Vendor': 'GitLab', 'Product': 'GitLab', 'Versions': '0, 16.5, 16.6'}
CVE-2023-6401
A vulnerability classified as problematic was found in NotePad++ up to 8.1. Affected by this vulnerability is an unknown functionality of the file dbghelp.exe. The manipulation leads to uncontrolled search path. An attack has to be approached locally. The identifier VDB-246421 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.246421
2023-11-30T08:54:27.940Z
2023-11-30T14:31:04.006Z
2023-11-30T14:31:04.006Z
{'Vendor': 'n/a', 'Product': 'NotePad++', 'Versions': '8.0, 8.1'}
CVE-2023-6378
A serialization vulnerability in logback receiver component part of logback version 1.4.11 allows an attacker to mount a Denial-Of-Service attack by sending poisoned data.
https://logback.qos.ch/news.html#1.3.12
2023-11-29T10:18:07.523Z
2023-11-29T12:02:37.496Z
2023-12-05T08:57:52.168Z
{'Vendor': 'QOS.CH Sarl', 'Product': 'logback', 'Versions': '1.4.12, 1.3.12, 1.2.13'}
CVE-2023-6456
The WP Review Slider WordPress plugin before 13.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
https://wpscan.com/vulnerability/30f31412-8f94-4d5e-a080-3f6f669703cd/
2023-12-01T09:44:48.353Z
2024-01-22T19:14:27.567Z
2024-01-22T19:14:27.567Z
{'Vendor': 'Unknown', 'Product': 'WP Review Slider', 'Versions': '0'}
CVE-2023-6006
This vulnerability potentially allows local attackers to escalate privileges on affected installations of PaperCut NG. An attacker must be able to write into the local C Drive. In addition, the attacker must have admin privileges to enable Print Archiving or encounter a misconfigured system. This vulnerability does not apply to PaperCut NG installs that have Print Archiving enabled and configured as per the recommended set up procedure. This specific flaw exists within the pc-pdl-to-image process. The process loads an executable from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM
https://www.papercut.com/kb/Main/Security-Bulletin-November-2023/
2023-11-08T04:55:38.051Z
2023-11-14T04:04:03.280Z
2023-11-21T06:39:19.561Z
{'Vendor': 'PaperCut', 'Product': 'PaperCut MF, PaperCut NG', 'Versions': '0'}
CVE-2023-6905
A vulnerability, which was classified as problematic, has been found in Jahastech NxFilter 4.3.2.5. This issue affects some unknown processing of the file user,adap.jsp?actionFlag=test&id=1 of the component Bind Request Handler. The manipulation leads to ldap injection. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-248267. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.248267
2023-12-17T08:25:42.529Z
2023-12-17T23:31:04.083Z
2023-12-17T23:31:04.083Z
{'Vendor': 'Jahastech', 'Product': 'NxFilter', 'Versions': '4.3.2.5'}
CVE-2023-6790
A DOM-Based cross-site scripting (XSS) vulnerability in Palo Alto Networks PAN-OS software enables a remote attacker to execute a JavaScript payload in the context of an administrator’s browser when they view a specifically crafted link to the PAN-OS web interface.
https://security.paloaltonetworks.com/CVE-2023-6790
2023-12-13T17:27:24.529Z
2023-12-13T18:15:48.142Z
2023-12-13T18:15:48.142Z
{'Vendor': 'Palo Alto Networks', 'Product': 'PAN-OS', 'Versions': '8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 11.1'}
CVE-2023-6791
A credential disclosure vulnerability in Palo Alto Networks PAN-OS software enables an authenticated read-only administrator to obtain the plaintext credentials of stored external system integrations such as LDAP, SCP, RADIUS, TACACS+, and SNMP from the web interface.
https://security.paloaltonetworks.com/CVE-2023-6791
2023-12-13T17:27:25.212Z
2023-12-13T18:30:17.115Z
2023-12-13T18:30:17.115Z
{'Vendor': 'Palo Alto Networks', 'Product': 'PAN-OS', 'Versions': '8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 11.1'}
CVE-2023-6512
Inappropriate implementation in Web Browser UI in Google Chrome prior to 120.0.6099.62 allowed a remote attacker to potentially spoof the contents of an iframe dialog context menu via a crafted HTML page. (Chromium security severity: Low)
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html
2023-12-04T22:53:20.253Z
2023-12-06T01:19:20.768Z
2023-12-06T01:19:20.768Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '120.0.6099.62'}
CVE-2023-6142
Dev blog v1.0 allows to exploit an XSS through an unrestricted file upload, together with a bad entropy of filenames. With this an attacker can upload a malicious HTML file, then guess the filename of the uploaded file and send it to a potential victim.
https://fluidattacks.com/advisories/bunny/
2023-11-14T23:06:49.462Z
2023-11-20T23:24:48.652Z
2023-11-20T23:24:48.652Z
{'Vendor': 'Dev Blog', 'Product': 'Dev Blog', 'Versions': '1.0'}
CVE-2023-6457
Incorrect Default Permissions vulnerability in Hitachi Tuning Manager on Windows (Hitachi Tuning Manager server component) allows local users to read and write specific files.This issue affects Hitachi Tuning Manager: before 8.8.5-04.
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-104/index.html
2023-12-01T09:47:55.353Z
2024-01-16T01:00:33.447Z
2024-01-16T01:00:33.447Z
{'Vendor': 'Hitachi', 'Product': 'Hitachi Tuning Manager', 'Versions': '0'}
CVE-2023-6007
The UserPro plugin for WordPress is vulnerable to unauthorized access of data, modification of data, loss of data due to a missing capability check on multiple functions in all versions up to, and including, 5.1.1. This makes it possible for unauthenticated attackers to add, modify, or delete user meta and plugin options.
https://www.wordfence.com/threat-intel/vulnerabilities/id/6c4f8798-c0f9-4d05-808e-375864a0ad95?source=cve
2023-11-08T05:31:49.918Z
2023-11-22T15:33:25.681Z
2023-11-22T15:33:25.681Z
{'Vendor': 'n/a', 'Product': 'UserPro - Community and User Profile WordPress Plugin', 'Versions': '*'}
CVE-2023-6904
A vulnerability classified as problematic was found in Jahastech NxFilter 4.3.2.5. This vulnerability affects unknown code of the file /config,admin.jsp. The manipulation of the argument admin_name leads to cross-site request forgery. The attack can be initiated remotely. VDB-248266 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.248266
2023-12-17T08:25:40.481Z
2023-12-17T23:00:05.941Z
2023-12-17T23:00:05.941Z
{'Vendor': 'Jahastech', 'Product': 'NxFilter', 'Versions': '4.3.2.5'}
CVE-2023-6683
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
https://access.redhat.com/security/cve/CVE-2023-6683
2023-12-11T14:45:48.417Z
2024-01-12T19:01:25.542Z
2024-01-23T02:10:35.816Z
{'Vendor': 'n/a', 'Product': 'qemu', 'Versions': ''}
CVE-2023-6379
Cross-site scripting (XSS) vulnerability in Alkacon Software Open CMS, affecting versions 14 and 15 of the 'Mercury' template. This vulnerability could allow a remote attacker to send a specially crafted JavaScript payload to a victim and partially take control of their browsing session.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-alkacon-software-opencms
2023-11-29T10:30:51.994Z
2023-12-13T10:52:01.743Z
2023-12-13T10:52:01.743Z
{'Vendor': 'Alkacon', 'Product': 'Open CMS', 'Versions': '14, 15'}
CVE-2023-6115
null
null
2023-11-13T23:28:42.360Z
null
2023-11-13T23:29:48.822Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-6545
The package authelia-bhf included in Beckhoffs TwinCAT/BSD is prone to an open redirect that allows a remote unprivileged attacker to redirect a user to another site. This may have limited impact to integrity and does solely affect anthelia-bhf the Beckhoff fork of authelia.
https://cert.vde.com/en/advisories/VDE-2023-067/
2023-12-06T06:40:12.397Z
2023-12-14T14:09:13.652Z
2023-12-14T14:09:13.652Z
{'Vendor': 'Beckhoff', 'Product': 'authelia-bhf of TwinCAT/BSD', 'Versions': '0'}
CVE-2023-6816
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
http://www.openwall.com/lists/oss-security/2024/01/18/1
2023-12-14T04:34:38.017Z
2024-01-18T04:31:07.908Z
2024-01-22T14:33:58.721Z
{'Vendor': 'n/a', 'Product': 'xorg-server', 'Versions': '21.1.11'}
CVE-2023-6050
The Estatik Real Estate Plugin WordPress plugin before 4.1.1 does not sanitise and escape various parameters and generated URLs before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
https://wpscan.com/vulnerability/c08e0f24-bd61-4e83-a555-363568cf0e6e
2023-11-09T10:37:49.942Z
2024-01-15T15:10:42.097Z
2024-01-15T15:10:42.097Z
{'Vendor': 'Unknown', 'Product': 'Estatik Real Estate Plugin', 'Versions': '0'}
CVE-2023-6380
Open redirect vulnerability has been found in the Open CMS product affecting versions 14 and 15 of the 'Mercury' template. An attacker could create a specially crafted URL and send it to a specific user to redirect them to a malicious site and compromise them. Exploitation of this vulnerability is possible due to the fact that there is no proper sanitization of the 'URI' parameter.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-alkacon-software-opencms
2023-11-29T10:30:53.961Z
2023-12-13T10:54:35.693Z
2023-12-13T10:54:35.693Z
{'Vendor': 'Alkacon', 'Product': 'Open CMS', 'Versions': '14, 15'}
CVE-2023-6553
The Backup Migration plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.7 via the /includes/backup-heart.php file. This is due to an attacker being able to control the values passed to an include, and subsequently leverage that to achieve remote code execution. This makes it possible for unauthenticated attackers to easily execute code on the server.
https://www.wordfence.com/threat-intel/vulnerabilities/id/3511ba64-56a3-43d7-8ab8-c6e40e3b686e?source=cve
2023-12-06T12:56:43.963Z
2023-12-15T10:59:46.387Z
2023-12-15T10:59:46.387Z
{'Vendor': 'migrate', 'Product': 'Backup Migration', 'Versions': '*'}
CVE-2023-6103
A vulnerability has been found in Intelbras RX 1500 1.1.9 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /WiFi.html of the component SSID Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-245065 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.245065
2023-11-13T10:23:52.210Z
2023-11-13T17:31:06.305Z
2023-11-13T17:31:06.305Z
{'Vendor': 'Intelbras', 'Product': 'RX 1500', 'Versions': '1.1.9'}
CVE-2023-6416
A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via signup2.php in the emailadd parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script
2023-11-30T10:02:11.377Z
2023-11-30T13:13:33.939Z
2023-11-30T13:13:33.939Z
{'Vendor': 'Voovi Social Networking Script', 'Product': 'Voovi Social Networking Script', 'Versions': '1.0'}
CVE-2023-6046
The EventON WordPress plugin before 2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored HTML Injection attacks even when the unfiltered_html capability is disallowed.
https://wpscan.com/vulnerability/97f1d403-ae96-4c90-8d47-9822f4d68033/
2023-11-09T03:06:30.565Z
2024-01-16T15:54:15.535Z
2024-01-16T15:54:15.535Z
{'Vendor': 'Unknown', 'Product': 'EventON', 'Versions': '0'}
CVE-2023-6945
A vulnerability has been found in SourceCodester Online Student Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file edit-student-detail.php. The manipulation of the argument notmsg leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-248377 was assigned to this vulnerability.
https://vuldb.com/?id.248377
2023-12-19T10:48:03.298Z
2023-12-19T10:57:27.291Z
2023-12-19T10:57:27.291Z
{'Vendor': 'SourceCodester', 'Product': 'Online Student Management System', 'Versions': '1.0'}
CVE-2023-6292
The Ecwid Ecommerce Shopping Cart WordPress plugin before 6.12.5 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.
https://wpscan.com/vulnerability/d4cf799e-2571-4b96-a303-78dcafbfcf40/
2023-11-24T19:20:50.532Z
2024-01-16T15:57:34.872Z
2024-01-16T15:57:34.872Z
{'Vendor': 'Unknown', 'Product': 'Ecwid Ecommerce Shopping Cart', 'Versions': '0'}
CVE-2023-6768
Authentication bypass vulnerability in Amazing Little Poll affecting versions 1.3 and 1.4. This vulnerability could allow an unauthenticated user to access the admin panel without providing any credentials by simply accessing the "lp_admin.php?adminstep=" parameter.
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-amazing-little-poll
2023-12-13T11:43:03.826Z
2023-12-20T09:49:36.723Z
2023-12-20T09:49:36.723Z
{'Vendor': 'Amazing Little poll', 'Product': 'Amazing Little poll', 'Versions': '1.3, 1.4'}
CVE-2023-6338
Uncontrolled search path vulnerabilities were reported in the Lenovo Universal Device Client (UDC) that could allow an attacker with local access to execute code with elevated privileges.
https://support.lenovo.com/us/en/product_security/LEN-121183
2023-11-27T20:02:30.052Z
2024-01-03T21:00:26.988Z
2024-01-03T21:00:26.988Z
{'Vendor': 'Lenovo', 'Product': 'Universal Device Client (UDC)', 'Versions': ' '}
CVE-2023-6504
The User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the wppb_toolbox_usermeta_handler function in all versions up to, and including, 3.10.7. This makes it possible for authenticated attackers, with contributor-level access and above, to expose sensitive information within user metadata.
https://www.wordfence.com/threat-intel/vulnerabilities/id/f515ccf8-7231-4728-b155-c47049087d42?source=cve
2023-12-04T19:37:21.737Z
2024-01-11T08:33:08.576Z
2024-01-11T08:33:08.576Z
{'Vendor': 'reflectionmedia', 'Product': 'User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor', 'Versions': '*'}
CVE-2023-6857
When resolving a symlink, a race may occur where the buffer passed to `readlink` may actually be smaller than necessary. *This bug only affects Firefox on Unix-based operating systems (Android, Linux, MacOS). Windows is unaffected.* This vulnerability affects Firefox ESR < 115.6, Thunderbird < 115.6, and Firefox < 121.
https://bugzilla.mozilla.org/show_bug.cgi?id=1796023
2023-12-15T17:42:55.146Z
2023-12-19T13:38:37.621Z
2023-12-19T13:38:37.621Z
{'Vendor': 'Mozilla', 'Product': 'Firefox ESR', 'Versions': 'unspecified'}
CVE-2023-6912
Lack of protection against brute force attacks in M-Files Server before 23.12.13205.0 allows an attacker unlimited authentication attempts, potentially compromising targeted M-Files user accounts by guessing passwords.
https://www.m-files.com/about/trust-center/security-advisories/cve-2023-6912/
2023-12-18T08:33:42.158Z
2023-12-20T09:35:46.232Z
2023-12-20T09:35:46.232Z
{'Vendor': 'M-Files Corporation', 'Product': 'M-Files Server', 'Versions': '0'}
CVE-2023-6011
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in DECE Software Geodi allows Stored XSS.This issue affects Geodi: before 8.0.0.27396.
https://www.usom.gov.tr/bildirim/tr-23-0650
2023-11-08T07:46:59.031Z
2023-11-22T09:06:44.398Z
2023-11-22T09:07:37.945Z
{'Vendor': 'DECE Software', 'Product': 'Geodi', 'Versions': '0'}
CVE-2023-6656
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability was found in DeepFaceLab pretrained DF.wf.288res.384.92.72.22. It has been rated as critical. Affected by this issue is some unknown functionality of the file DFLIMG/DFLJPG.py. The manipulation leads to deserialization. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The identifier of this vulnerability is VDB-247364. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
https://vuldb.com/?id.247364
2023-12-10T07:07:57.476Z
2023-12-10T20:31:04.738Z
2023-12-10T20:31:04.738Z
{'Vendor': 'n/a', 'Product': 'DeepFaceLab', 'Versions': 'pretrained DF.wf.288res.384.92.72.22'}
CVE-2023-6206
The black fade animation when exiting fullscreen is roughly the length of the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear. This vulnerability affects Firefox < 120, Firefox ESR < 115.5.0, and Thunderbird < 115.5.
https://bugzilla.mozilla.org/show_bug.cgi?id=1857430
2023-11-20T13:33:29.870Z
2023-11-21T14:28:52.832Z
2023-11-22T16:46:26.360Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-6343
Tyler Technologies Court Case Management Plus allows a remote, unauthenticated attacker to enumerate and access sensitive files using the tiffserver/tssp.aspx 'FN' and 'PN' parameters. This behavior is related to the use of a deprecated version of Aquaforest TIFF Server, possibly 2.x. The vulnerable Aquaforest TIFF Server feature was removed on or around 2023-11-01. Insecure configuration issues in Aquaforest TIFF Server are identified separately as CVE-2023-6352. CVE-2023-6343 is similar to CVE-2020-9323. CVE-2023-6343 is related to or partially caused by CVE-2023-6352.
https://www.tylertech.com/solutions/courts-public-safety/courts-justice
2023-11-27T22:29:25.861Z
2023-11-30T17:47:54.613Z
2023-11-30T20:51:58.422Z
{'Vendor': 'Tyler Technologies', 'Product': 'Court Case Management Plus', 'Versions': '0'}
CVE-2023-6085
null
null
2023-11-12T21:06:06.114Z
null
2023-11-13T23:38:05.122Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-6986
The EmbedPress – Embed PDF, YouTube, Google Docs, Vimeo, Wistia Videos, Audios, Maps & Any Documents in Gutenberg & Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's embed_oembed_html shortcode in all versions up to 3.9.5 (exclusive) due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/ceae0115-268c-401b-876b-3477d10c10e6?source=cve
2023-12-20T09:18:33.273Z
2024-01-03T06:41:25.300Z
2024-01-03T06:41:25.300Z
{'Vendor': 'wpdevteam', 'Product': 'EmbedPress – Embed PDF, YouTube, Google Docs, Vimeo, Wistia Videos, Audios, Maps & Any Documents in Gutenberg & Elementor', 'Versions': '*'}
CVE-2023-6251
Cross-site Request Forgery (CSRF) in Checkmk < 2.2.0p15, < 2.1.0p37, <= 2.0.0p39 allow an authenticated attacker to delete user-messages for individual users.
https://checkmk.com/werk/16224
2023-11-22T10:39:14.993Z
2023-11-24T08:16:23.663Z
2023-11-24T08:16:23.663Z
{'Vendor': 'Checkmk GmbH', 'Product': 'Checkmk', 'Versions': '2.0.0, 2.1.0, 2.2.0'}
CVE-2023-6314
Stack-based buffer overflow in FPWin Pro version 7.7.0.0 and all previous versions may allow attackers to execute arbitrary code via a specially crafted project file.
https://industry.panasonic.eu/products/automation-devices-solutions/programmable-logic-controllers-plc/plc-software/programming-software-control-fpwin-pro
2023-11-27T05:48:34.594Z
2023-12-19T00:24:37.946Z
2023-12-19T00:24:37.946Z
{'Vendor': 'Panasonic', 'Product': 'Control FPWIN Pro', 'Versions': 'n/a'}
CVE-2023-6744
The Divi theme for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'et_pb_text' shortcode in all versions up to, and including, 4.23.1 due to insufficient input sanitization and output escaping on user supplied custom field data. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/999475c5-5f17-47fa-a0d0-47cb5a8a0eb4?source=cve
2023-12-12T16:35:51.832Z
2023-12-23T09:35:54.946Z
2023-12-23T09:35:54.946Z
{'Vendor': 'Elegant Themes', 'Product': 'Divi', 'Versions': '*'}
CVE-2023-6197
The Audio Merchant plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.0.4. This is due to missing or incorrect nonce validation on the audio_merchant_save_settings function. This makes it possible for unauthenticated attackers to modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/d7911337-57fa-4268-8366-d37ff13fae86?source=cve
2023-11-17T22:41:47.816Z
2023-11-20T14:34:22.011Z
2023-11-20T14:34:22.011Z
{'Vendor': 'Audio Merchant', 'Product': 'Audio Merchant', 'Versions': '*'}
CVE-2023-6894
A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been classified as problematic. This affects an unknown part of the file access/html/system.html of the component Log File Handler. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-248253 was assigned to this vulnerability.
https://vuldb.com/?id.248253
2023-12-16T15:16:07.046Z
2023-12-17T07:31:03.712Z
2023-12-19T09:06:40.842Z
{'Vendor': 'Hikvision', 'Product': 'Intercom Broadcasting System', 'Versions': '3.0.3_20201113_RELEASE(HIK)'}
CVE-2023-6528
The Slider Revolution WordPress plugin before 6.6.19 does not prevent users with at least the Author role from unserializing arbitrary content when importing sliders, potentially leading to Remote Code Execution.
https://wpscan.com/vulnerability/36ced447-84ea-4162-80d2-6df226cb53cb
2023-12-05T16:15:44.670Z
2024-01-08T19:00:34.654Z
2024-01-08T19:00:34.654Z
{'Vendor': 'Unknown', 'Product': 'Slider Revolution', 'Versions': '0'}
CVE-2023-6482
Use of encryption key derived from static information in Synaptics Fingerprint Driver allows an attacker to set up a TLS session with the fingerprint sensor and send restricted commands to the fingerprint sensor. This may allow an attacker, who has physical access to the sensor, to enroll a fingerprint into the template database.
https://www.synaptics.com/sites/default/files/2024-01/fingerprint-driver-encryption-key-security-brief-2024-01-26.pdf
2023-12-04T09:46:38.305Z
2024-01-27T00:19:15.351Z
2024-01-27T00:19:15.351Z
{'Vendor': 'Synaptics', 'Product': 'Synaptics Fingerprint Driver', 'Versions': '6.0.0.1103'}
CVE-2023-6178
An arbitrary file write vulnerability exists where an authenticated attacker with privileges on the managing application could alter Nessus Rules variables to overwrite arbitrary files on the remote host, which could lead to a denial of service condition.
https://www.tenable.com/security/tns-2023-41
2023-11-16T16:44:00.280Z
2023-11-20T20:35:55.499Z
2023-11-20T20:35:55.499Z
{'Vendor': 'Tenable', 'Product': 'Nessus Agent', 'Versions': '0'}
CVE-2023-6617
A vulnerability was found in SourceCodester Simple Student Attendance System 1.0. It has been classified as critical. Affected is an unknown function of the file attendance.php. The manipulation of the argument class_id leads to sql injection. The exploit has been disclosed to the public and may be used. VDB-247254 is the identifier assigned to this vulnerability.
https://vuldb.com/?id.247254
2023-12-08T09:54:29.222Z
2023-12-08T17:00:07.961Z
2023-12-08T17:00:07.961Z
{'Vendor': 'SourceCodester', 'Product': 'Simple Student Attendance System', 'Versions': '1.0'}
CVE-2023-6752
null
null
2023-12-12T20:54:20.482Z
null
2024-01-02T19:15:58.809Z
{'Vendor': 'NA', 'Product': 'NA', 'Versions': ''}
CVE-2023-6302
A vulnerability was found in CSZCMS 1.3.0 and classified as critical. Affected by this issue is some unknown functionality of the file \views\templates of the component File Manager Page. The manipulation leads to permission issues. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246128. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
https://vuldb.com/?id.246128
2023-11-26T07:45:16.420Z
2023-11-27T00:00:06.970Z
2023-11-27T00:00:06.970Z
{'Vendor': 'n/a', 'Product': 'CSZCMS', 'Versions': '1.3.0'}
CVE-2023-6928
EuroTel ETL3100 versions v01c01 and v01x37 does not limit the number of attempts to guess administrative credentials in remote password attacks to gain full control of the system.
https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-05
2023-12-18T17:18:31.806Z
2023-12-19T22:58:50.824Z
2023-12-19T22:58:50.824Z
{'Vendor': 'EuroTel', 'Product': 'ETL3100', 'Versions': 'v01c01, v01x37'}
CVE-2023-6882
The Simple Membership plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘environment_mode’ parameter in all versions up to, and including, 4.3.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
https://www.wordfence.com/threat-intel/vulnerabilities/id/366165fe-93e5-49ab-b2e5-1de624f22286?source=cve
2023-12-16T00:20:20.527Z
2024-01-11T08:32:31.384Z
2024-01-11T08:32:31.384Z
{'Vendor': 'mra13', 'Product': 'Simple Membership', 'Versions': '*'}
CVE-2023-6181
An oversight in BCB handling of reboot reason that allows for persistent code execution
https://source.android.com/docs/security/bulletin/chromecast/2023-12-01
2023-11-16T19:53:59.529Z
2023-12-11T05:17:05.043Z
2023-12-11T05:17:05.043Z
{'Vendor': 'Google', 'Product': 'Android', 'Versions': 'Android SoC'}
CVE-2023-6210
When an https: web page created a pop-up from a "javascript:" URL, that pop-up was incorrectly allowed to load blockable content such as iframes from insecure http: URLs This vulnerability affects Firefox < 120.
https://bugzilla.mozilla.org/show_bug.cgi?id=1801501
2023-11-20T13:33:39.495Z
2023-11-21T14:28:54.144Z
2023-11-23T13:34:13.542Z
{'Vendor': 'Mozilla', 'Product': 'Firefox', 'Versions': 'unspecified'}
CVE-2023-6355
Incorrect selection of fuse values in the Controller 7000 platform allows an attacker to bypass some protection mechanisms to enable local debug. This issue affects: Gallagher Controller 7000 9.00 prior to vCR9.00.231204b (distributed in 9.00.1507 (MR1)), 8.90 prior to vCR8.90.231204a (distributed in 8.90.1620 (MR2)), 8.80 prior to vCR8.80.231204a (distributed in 8.80.1369 (MR3)), 8.70 prior to vCR8.70.231204a (distributed in 8.70.2375 (MR5)).
https://security.gallagher.com/Security-Advisories/CVE-2023-6355
2023-11-28T03:08:23.484Z
2023-12-18T21:55:58.148Z
2023-12-18T21:55:58.148Z
{'Vendor': 'Gallagher', 'Product': 'Controller 7000', 'Versions': '9.00, 8.90, 8.80, 8.70'}
CVE-2023-6705
Use after free in WebRTC in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
2023-12-11T23:27:50.603Z
2023-12-14T21:48:42.098Z
2023-12-14T21:48:42.098Z
{'Vendor': 'Google', 'Product': 'Chrome', 'Versions': '120.0.6099.109'}
CVE-2023-6990
The Weaver Xtreme theme for WordPress is vulnerable to Stored Cross-Site Scripting via custom post meta in all versions up to, and including, 6.3.0 due to insufficient input sanitization and output escaping on user supplied meta (page-head-code). This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
https://www.wordfence.com/threat-intel/vulnerabilities/id/bc7384d7-c2fd-4d63-9b80-bb5bde9a23d5?source=cve
2023-12-20T10:10:45.837Z
2024-01-11T08:32:54.265Z
2024-01-11T08:32:54.265Z
{'Vendor': 'wpweaver', 'Product': 'Weaver Xtreme', 'Versions': '*'}
CVE-2023-6093
A clickjacking vulnerability has been identified in OnCell G3150A-LTE Series firmware versions v1.3 and prior. This vulnerability is caused by incorrectly restricts frame objects, which can lead to user confusion about which interface the user is interacting with. This vulnerability may lead the attacker to trick the user into interacting with the application.
https://www.moxa.com/en/support/product-support/security-advisory/oncell-g3150a-lte-series-multiple-web-application-vulnerabilities-and-security-enhancement
2023-11-13T02:17:35.853Z
2023-12-31T09:53:04.790Z
2024-01-04T14:59:17.638Z
{'Vendor': 'Moxa', 'Product': 'OnCell G3150A-LTE Series', 'Versions': '1.0'}
CVE-2023-6569
External Control of File Name or Path in h2oai/h2o-3
https://huntr.com/bounties/a5d003dc-c23e-4c98-8dcf-35ba9252fa3c
2023-12-07T09:31:22.686Z
2023-12-14T12:59:46.487Z
2023-12-14T12:59:46.487Z
{'Vendor': 'h2oai', 'Product': 'h2oai/h2o-3', 'Versions': 'unspecified'}
CVE-2023-6139
The Essential Real Estate WordPress plugin before 4.4.0 does not apply proper capability checks on its AJAX actions, which among other things, allow attackers with a subscriber account to conduct Denial of Service attacks.
https://wpscan.com/vulnerability/96396a22-f523-4c51-8b72-52be266988aa
2023-11-14T22:49:59.613Z
2024-01-08T19:00:31.085Z
2024-01-08T19:00:31.085Z
{'Vendor': 'Unknown', 'Product': 'Essential Real Estate', 'Versions': '0'}
CVE-2023-6908
A vulnerability, which was classified as problematic, was found in DFIRKuiper Kuiper 2.3.4. This affects the function unzip_file of the file kuiper/app/controllers/case_management.py of the component TAR Archive Handler. The manipulation of the argument dst_path leads to path traversal. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 2.3.5 is able to address this issue. The identifier of the patch is 94fa135153002f651f5526c55a7240e083db8d73. It is recommended to upgrade the affected component. The identifier VDB-248277 was assigned to this vulnerability.
https://vuldb.com/?id.248277
2023-12-17T15:00:32.234Z
2023-12-18T01:00:06.254Z
2023-12-18T01:00:06.254Z
{'Vendor': 'DFIRKuiper', 'Product': 'Kuiper', 'Versions': '2.3.4'}
CVE-2023-6288
Code injection in Remote Desktop Manager 2023.3.9.3 and earlier on macOS allows an attacker to execute code via the DYLIB_INSERT_LIBRARIES environment variable.
https://devolutions.net/security/advisories/DEVO-2023-0021/
2023-11-24T14:18:48.424Z
2023-12-06T13:49:50.204Z
2023-12-06T13:49:50.204Z
{'Vendor': 'Devolutions', 'Product': 'Remote Desktop Manager', 'Versions': '0'}
CVE-2023-6772
A vulnerability, which was classified as critical, was found in OTCMS 7.01. Affected is an unknown function of the file /admin/ind_backstage.php. The manipulation of the argument sqlContent leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-247908.
https://vuldb.com/?id.247908
2023-12-13T12:23:34.610Z
2023-12-13T19:00:06.215Z
2023-12-13T19:00:06.215Z
{'Vendor': 'n/a', 'Product': 'OTCMS', 'Versions': '7.01'}
CVE-2023-6637
The CAOS | Host Google Analytics Locally plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_settings' function in versions up to, and including, 4.7.14. This makes it possible for unauthenticated attackers to update plugin settings.
https://www.wordfence.com/threat-intel/vulnerabilities/id/5ec1fd03-f865-4f58-b63b-e70c0c7e701d?source=cve
2023-12-08T19:40:32.987Z
2024-01-11T08:32:35.681Z
2024-01-11T08:32:35.681Z
{'Vendor': 'daanvandenbergh', 'Product': 'CAOS | Host Google Analytics Locally', 'Versions': '*'}
CVE-2023-6267
A flaw was found in the json payload. If annotation based security is used to secure a REST resource, the JSON body that the resource may consume is being processed (deserialized) prior to the security constraints being evaluated and applied. This does not happen with configuration based security.
https://access.redhat.com/security/cve/CVE-2023-6267
2023-11-23T06:34:22.287Z
2024-01-25T18:12:44.771Z
2024-01-25T20:00:04.352Z
{'Vendor': 'n/a', 'Product': 'quarkus', 'Versions': ''}
CVE-2023-6549
Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service
https://support.citrix.com/article/CTX584986/netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20236548-and-cve20236549
2023-12-06T11:01:58.256Z
2024-01-17T20:15:53.345Z
2024-01-18T01:19:12.450Z
{'Vendor': 'Cloud Software Group', 'Product': 'NetScaler ADC\u202f', 'Versions': '14.1, 13.1, 13.0 , 13.1-FIPS, 12.1-FIPS, 12.1-NDcPP'}
CVE-2023-6119
An Improper Privilege Management vulnerability in Trellix GetSusp prior to version 5.0.0.27 allows a local, low privilege attacker to gain access to files that usually require a higher privilege level. This is caused by GetSusp not correctly protecting a directory that it creates during execution, allowing an attacker to take over file handles used by GetSusp. As this runs with high privileges, the attacker gains elevated permissions. The file handles are opened as read-only.
https://kcm.trellix.com/corporate/index?page=content&id=SB10412
2023-11-14T09:37:31.829Z
2023-11-16T09:39:30.357Z
2023-11-16T09:39:30.357Z
{'Vendor': 'Trellix', 'Product': 'GetSusp', 'Versions': 'Prior to 5.0.0.27'}
CVE-2023-6375
Tyler Technologies Court Case Management Plus may store backups in a location that can be accessed by a remote, unauthenticated attacker. Backups may contain sensitive information such as database credentials.
https://www.tylertech.com/solutions/courts-public-safety/courts-justice
2023-11-29T04:02:43.335Z
2023-11-30T17:54:25.462Z
2023-11-30T20:54:37.073Z
{'Vendor': 'Tyler Technologies', 'Product': 'Court Case Management Plus', 'Versions': '0'}
CVE-2023-6660
When a program running on an affected system appends data to a file via an NFS client mount, the bug can cause the NFS client to fail to copy in the data to be written but proceed as though the copy operation had succeeded. This means that the data to be written is instead replaced with whatever data had been in the packet buffer previously. Thus, an unprivileged user with access to an affected system may abuse the bug to trigger disclosure of sensitive information. In particular, the leak is limited to data previously stored in mbufs, which are used for network transmission and reception, and for certain types of inter-process communication. The bug can also be triggered unintentionally by system applications, in which case the data written by the application to an NFS mount may be corrupted. Corrupted data is written over the network to the NFS server, and thus also susceptible to being snooped by other hosts on the network. Note that the bug exists only in the NFS client; the version and implementation of the server has no effect on whether a given system is affected by the problem.
https://security.freebsd.org/advisories/FreeBSD-SA-23:18.nfsclient.asc
2023-12-11T02:57:26.026Z
2023-12-13T08:23:40.149Z
2023-12-13T08:23:40.149Z
{'Vendor': 'FreeBSD', 'Product': 'FreeBSD', 'Versions': '14.0-RELEASE, 13.2-RELEASE'}
CVE-2023-6733
The WP-Members Membership Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.4.8 via the wpmem_field shortcode. This makes it possible for authenticated attackers, with contributor access and above, to extract sensitive data including user emails, password hashes, usernames, and more.
https://www.wordfence.com/threat-intel/vulnerabilities/id/46c61f38-553e-43b2-a666-b160db40e66d?source=cve
2023-12-12T15:18:41.225Z
2024-01-04T03:30:12.554Z
2024-01-04T03:30:12.554Z
{'Vendor': 'cbutlerjr', 'Product': 'WP-Members Membership Plugin', 'Versions': '*'}
CVE-2023-6699
The WP Compress – Image Optimizer [All-In-One] plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 6.10.33 via the css parameter. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
https://www.wordfence.com/threat-intel/vulnerabilities/id/defb87dd-bf5f-411f-b948-699337d05d44?source=cve
2023-12-11T20:57:21.244Z
2024-01-11T06:49:34.348Z
2024-01-11T06:49:34.348Z
{'Vendor': 'smartersite', 'Product': 'WP Compress – Image Optimizer [All-In-One]', 'Versions': '*'}
CVE-2023-6226
The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.13.3 via the su_meta shortcode due to missing validation on the user controlled keys 'key' and 'post_id'. This makes it possible for authenticated attackers, with contributor-level access and above, to retrieve arbitrary post meta values which may contain sensitive information when combined with another plugin.
https://www.wordfence.com/threat-intel/vulnerabilities/id/4d936a48-b300-4a41-8d28-ba34cb3c5cb7?source=cve
2023-11-20T22:00:59.798Z
2023-11-28T04:31:51.116Z
2023-11-28T04:31:51.116Z
{'Vendor': 'gn_themes', 'Product': 'WP Shortcodes Plugin — Shortcodes Ultimate', 'Versions': '*'}