{"vulnerability": "cve-2023-6947", "sightings": [{"uuid": "79803ace-8f67-412a-ac09-3bd9fdcf0d59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6947", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113626903742328158", "content": "", "creation_timestamp": "2024-12-10T05:35:56.617950Z"}, {"uuid": "2afd2e9c-a5eb-4a73-b1ab-ffaab24e263e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-6947", "type": "seen", "source": "https://t.me/cvedetector/12483", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-6947 - FooGallery Directory Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-6947 \nPublished : Dec. 10, 2024, 6:15 a.m. | 41\u00a0minutes ago \nDescription : The Best WordPress Gallery Plugin \u2013 FooGallery plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.4.26. This makes it possible for authenticated attackers, with contributor level or higher to read the contents of arbitrary folders on the server, which can contain sensitive information such as folder structure. \nSeverity: 7.7 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-10T08:16:32.000000Z"}]}