From 0499c4d05c264b7cfb82a69f5317f46abfc511c7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 2 May 2023 02:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2013/10xxx/CVE-2013-10026.json | 136 ++++++++++++++++++++++++++++++- 2014/125xxx/CVE-2014-125100.json | 96 +++++++++++++++++++++- 2 files changed, 224 insertions(+), 8 deletions(-) diff --git a/2013/10xxx/CVE-2013-10026.json b/2013/10xxx/CVE-2013-10026.json index c296a0b0640..be02ad8426d 100644 --- a/2013/10xxx/CVE-2013-10026.json +++ b/2013/10xxx/CVE-2013-10026.json @@ -1,17 +1,145 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2013-10026", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as problematic, has been found in Mail Subscribe List Plugin up to 2.0.10 on WordPress. This issue affects some unknown processing of the file index.php. The manipulation of the argument sml_name/sml_email leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 2.1 is able to address this issue. The name of the patch is 484970ef8285cae51d2de3bd4e4684d33c956c28. It is recommended to upgrade the affected component. The identifier VDB-227765 was assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in Mail Subscribe List Plugin bis 2.0.10 f\u00fcr WordPress entdeckt. Sie wurde als problematisch eingestuft. Davon betroffen ist unbekannter Code der Datei index.php. Durch Beeinflussen des Arguments sml_name/sml_email mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Ein Aktualisieren auf die Version 2.1 vermag dieses Problem zu l\u00f6sen. Der Patch wird als 484970ef8285cae51d2de3bd4e4684d33c956c28 bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross Site Scripting", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Mail Subscribe List Plugin", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2.0.0" + }, + { + "version_affected": "=", + "version_value": "2.0.1" + }, + { + "version_affected": "=", + "version_value": "2.0.2" + }, + { + "version_affected": "=", + "version_value": "2.0.3" + }, + { + "version_affected": "=", + "version_value": "2.0.4" + }, + { + "version_affected": "=", + "version_value": "2.0.5" + }, + { + "version_affected": "=", + "version_value": "2.0.6" + }, + { + "version_affected": "=", + "version_value": "2.0.7" + }, + { + "version_affected": "=", + "version_value": "2.0.8" + }, + { + "version_affected": "=", + "version_value": "2.0.9" + }, + { + "version_affected": "=", + "version_value": "2.0.10" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.227765", + "refsource": "MISC", + "name": "https://vuldb.com/?id.227765" + }, + { + "url": "https://vuldb.com/?ctiid.227765", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.227765" + }, + { + "url": "https://github.com/wp-plugins/mail-subscribe-list/commit/484970ef8285cae51d2de3bd4e4684d33c956c28", + "refsource": "MISC", + "name": "https://github.com/wp-plugins/mail-subscribe-list/commit/484970ef8285cae51d2de3bd4e4684d33c956c28" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "VulDB GitHub Commit Analyzer" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.5, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseSeverity": "MEDIUM" } ] } diff --git a/2014/125xxx/CVE-2014-125100.json b/2014/125xxx/CVE-2014-125100.json index 2b9135b63b6..e1af1ecfa2f 100644 --- a/2014/125xxx/CVE-2014-125100.json +++ b/2014/125xxx/CVE-2014-125100.json @@ -1,17 +1,105 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2014-125100", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as problematic was found in BestWebSoft Job Board Plugin 1.0.0 on WordPress. This vulnerability affects unknown code. The manipulation leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.0.1 is able to address this issue. The name of the patch is dbb71deee071422ce3e663fbcdce3ad24886f940. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227764." + }, + { + "lang": "deu", + "value": "In BestWebSoft Job Board Plugin 1.0.0 f\u00fcr WordPress wurde eine Schwachstelle entdeckt. Sie wurde als problematisch eingestuft. Hierbei betrifft es unbekannten Programmcode. Durch das Beeinflussen mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Ein Aktualisieren auf die Version 1.0.1 vermag dieses Problem zu l\u00f6sen. Der Patch wird als dbb71deee071422ce3e663fbcdce3ad24886f940 bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross Site Scripting", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "BestWebSoft", + "product": { + "product_data": [ + { + "product_name": "Job Board Plugin", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.227764", + "refsource": "MISC", + "name": "https://vuldb.com/?id.227764" + }, + { + "url": "https://vuldb.com/?ctiid.227764", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.227764" + }, + { + "url": "https://github.com/wp-plugins/job-board/commit/dbb71deee071422ce3e663fbcdce3ad24886f940", + "refsource": "MISC", + "name": "https://github.com/wp-plugins/job-board/commit/dbb71deee071422ce3e663fbcdce3ad24886f940" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "VulDB GitHub Commit Analyzer" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 3.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "3.0", + "baseScore": 3.5, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseSeverity": "LOW" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseSeverity": "MEDIUM" } ] }