cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-6065,https://securityvulnerability.io/vulnerability/CVE-2023-6065,Quttera Web Malware Scanner < 3.4.2.1 - Directory Listing to Sensitive Data Exposure,"The Quttera Web Malware Scanner WordPress plugin before 3.4.2.1 doesn't restrict access to detailed scan logs, which allows a malicious actor to discover local paths and portions of the site's code",Wordpress,Quttera Web Malware Scanner,5.3,MEDIUM,0.0015699999639764428,false,,false,false,false,,false,false,2023-12-18T20:15:00.000Z,0 CVE-2023-6222,https://securityvulnerability.io/vulnerability/CVE-2023-6222,Quttera Web Malware Scanner < 3.4.2.1 - Admin+ Path Traversal,"The Quttera Web Malware Scanner WordPress plugin fails to properly validate user input in a file path, which creates a vulnerability for users with admin roles. This flaw can potentially allow admins to execute unauthorized file access, exploiting the pathway to sensitive files on the server. Prompt updates to version 3.4.2.1 or later are necessary to mitigate this risk and secure your WordPress site against potential threats.",Wordpress,Quttera Web Malware Scanner,7.2,HIGH,0.0011699999449774623,false,,false,false,false,,false,false,2023-12-18T20:15:00.000Z,0