{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T07:47:37.165","vulnerabilities":[{"cve":{"id":"CVE-2023-6142","sourceIdentifier":"help@fluidattacks.com","published":"2023-11-21T00:15:07.160","lastModified":"2025-05-19T14:15:21.667","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Dev blog v1.0 allows to exploit an XSS through an unrestricted file upload, together with a bad entropy of filenames. With this an attacker can upload a malicious HTML file, then guess the filename of the uploaded file and send it to a potential victim."},{"lang":"es","value":"Dev blog v1.0 permite explotar un XSS mediante la carga de archivos sin restricciones, junto con una mala entropía de los nombres de archivos. Con esto, un atacante puede cargar un archivo HTML malicioso, luego adivinar el nombre del archivo cargado y enviarlo a una víctima potencial."}],"metrics":{"cvssMetricV31":[{"source":"help@fluidattacks.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"help@fluidattacks.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:armanidrisi:dev_blog:1.0:*:*:*:*:*:*:*","matchCriteriaId":"1162BD8D-9C61-475A-A24C-526DF7E1E025"}]}]}],"references":[{"url":"https://fluidattacks.com/advisories/bunny/","source":"help@fluidattacks.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/Armanidrisi/devblog/","source":"help@fluidattacks.com","tags":["Product"]},{"url":"https://fluidattacks.com/advisories/bunny/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/Armanidrisi/devblog/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}