diff --git a/2022/3xxx/CVE-2022-3082.json b/2022/3xxx/CVE-2022-3082.json index 9b76439faad..92eabef2b41 100644 --- a/2022/3xxx/CVE-2022-3082.json +++ b/2022/3xxx/CVE-2022-3082.json @@ -1,83 +1,88 @@ { - "CVE_data_meta": { - "ID": "CVE-2022-3082", - "ASSIGNER": "contact@wpscan.com", - "STATE": "PUBLIC", - "TITLE": "miniOrange Discord Integration < 2.1.6 - Subscriber+ App Disabling" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "generator": "WPScan CVE Generator", - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Unknown", - "product": { - "product_data": [ - { - "product_name": "miniOrange Discord Integration", - "version": { - "version_data": [ + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2022-3082", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The miniOrange Discord Integration WordPress plugin before 2.1.6 does not have authorisation and CSRF in some of its AJAX actions, allowing any logged in users, such as subscriber to call them, and disable the app for example" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ { - "version_affected": "<", - "version_name": "2.1.6", - "version_value": "2.1.6" + "lang": "eng", + "value": "CWE-862 Missing Authorization" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-352 Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "miniOrange Discord Integration", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "2.1.6" + } + ] + } + } + ] } - ] } - } ] - } } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The miniOrange Discord Integration WordPress plugin before 2.1.6 does not have authorisation and CSRF in some of its AJAX actions, allowing any logged in users, such as subscriber to call them, and disable the app for example" - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "MISC", - "url": "https://wpscan.com/vulnerability/a91d0501-c2a9-4c6c-b5da-b3fc29442a4f", - "name": "https://wpscan.com/vulnerability/a91d0501-c2a9-4c6c-b5da-b3fc29442a4f" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "value": "CWE-284 Improper Access Control", - "lang": "eng" - } + }, + "references": { + "reference_data": [ + { + "url": "https://wpscan.com/vulnerability/a91d0501-c2a9-4c6c-b5da-b3fc29442a4f", + "refsource": "MISC", + "name": "https://wpscan.com/vulnerability/a91d0501-c2a9-4c6c-b5da-b3fc29442a4f" + } ] - }, - { - "description": [ - { - "value": "CWE-352 Cross-Site Request Forgery (CSRF)", - "lang": "eng" - } - ] - } + }, + "generator": { + "engine": "WPScan CVE Generator" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Lana Codes" + }, + { + "lang": "en", + "value": "WPScan" + } ] - }, - "credit": [ - { - "lang": "eng", - "value": "Lana Codes" - } - ], - "source": { - "discovery": "EXTERNAL" - } } \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3206.json b/2022/3xxx/CVE-2022-3206.json index 0175fd34e1b..93cbd244793 100644 --- a/2022/3xxx/CVE-2022-3206.json +++ b/2022/3xxx/CVE-2022-3206.json @@ -1,75 +1,88 @@ { - "CVE_data_meta": { - "ID": "CVE-2022-3206", - "ASSIGNER": "contact@wpscan.com", - "STATE": "PUBLIC", - "TITLE": "Passster < 3.5.5.5.2 - Insecure Storage of Password" - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "generator": "WPScan CVE Generator", - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Unknown", - "product": { - "product_data": [ - { - "product_name": "Passster – Password Protection", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "3.5.5.5.2", - "version_value": "3.5.5.5.2" - } - ] - } - } - ] - } - } - ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The Passster WordPress plugin before 3.5.5.5.2 stores the password inside a cookie named \"passster\" using base64 encoding method which is easy to decode. This puts the password at risk in case the cookies get leaked." - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "MISC", - "url": "https://wpscan.com/vulnerability/a8963750-62bf-403e-a906-94f371ed2a7a", - "name": "https://wpscan.com/vulnerability/a8963750-62bf-403e-a906-94f371ed2a7a" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "value": "CWE-326 Inadequate Encryption Strength", - "lang": "eng" - } + "data_version": "4.0", + "data_type": "CVE", + "data_format": "MITRE", + "CVE_data_meta": { + "ID": "CVE-2022-3206", + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Passster WordPress plugin before 3.5.5.5.2 stores the password inside a cookie named \"passster\" using base64 encoding method which is easy to decode. This puts the password at risk in case the cookies get leaked." + } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-522 Insufficiently Protected Credentials" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "CWE-319 Cleartext Transmission of Sensitive Information" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Passster", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "3.5.5.5.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://wpscan.com/vulnerability/a8963750-62bf-403e-a906-94f371ed2a7a", + "refsource": "MISC", + "name": "https://wpscan.com/vulnerability/a8963750-62bf-403e-a906-94f371ed2a7a" + } + ] + }, + "generator": { + "engine": "WPScan CVE Generator" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Raad Haddad of Cloudyrion GmbH" + }, + { + "lang": "en", + "value": "WPScan" + } ] - }, - "credit": [ - { - "lang": "eng", - "value": "Raad Haddad of Cloudyrion GmbH" - } - ], - "source": { - "discovery": "EXTERNAL" - } } \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3907.json b/2022/3xxx/CVE-2022-3907.json index 7a5e87bd8dd..8e13270800d 100644 --- a/2022/3xxx/CVE-2022-3907.json +++ b/2022/3xxx/CVE-2022-3907.json @@ -21,7 +21,7 @@ "description": [ { "lang": "eng", - "value": "CWE-200 Information Exposure" + "value": "CWE-203 Observable Discrepancy" } ] } @@ -39,8 +39,9 @@ "version": { "version_data": [ { - "version_value": "0", - "version_affected": "=" + "version_affected": "<", + "version_name": "0", + "version_value": "4.0.0" } ] } @@ -70,6 +71,10 @@ { "lang": "en", "value": "Francesco Carlucci" + }, + { + "lang": "en", + "value": "WPScan" } ] } \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2309.json b/2023/2xxx/CVE-2023-2309.json index 99b856795cb..8dfbe71be0d 100644 --- a/2023/2xxx/CVE-2023-2309.json +++ b/2023/2xxx/CVE-2023-2309.json @@ -1,18 +1,80 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-2309", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The wpForo Forum WordPress plugin before 2.1.9 does not escape some request parameters while in debug mode, leading to a Reflected Cross-Site Scripting vulnerability." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-Site Scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "wpForo Forum", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "2.1.9" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://wpscan.com/vulnerability/1b3f4558-ea41-4749-9aa2-d3971fc9ca0d", + "refsource": "MISC", + "name": "https://wpscan.com/vulnerability/1b3f4558-ea41-4749-9aa2-d3971fc9ca0d" + } + ] + }, + "generator": { + "engine": "WPScan CVE Generator" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Alex Sanford" + }, + { + "lang": "en", + "value": "WPScan" + } + ] } \ No newline at end of file diff --git a/2023/2xxx/CVE-2023-2761.json b/2023/2xxx/CVE-2023-2761.json index 7a4bbe9a57e..331f702011a 100644 --- a/2023/2xxx/CVE-2023-2761.json +++ b/2023/2xxx/CVE-2023-2761.json @@ -1,18 +1,80 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-2761", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The User Activity Log WordPress plugin before 1.6.3 does not properly sanitise and escape the `txtsearch` parameter before using it in a SQL statement in some admin pages, leading to a SQL injection exploitable by high privilege users such as admin." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 SQL Injection" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "User Activity Log", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "1.6.3" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://wpscan.com/vulnerability/8c82d317-f9f9-4e25-a7f1-43edb77e8aba", + "refsource": "MISC", + "name": "https://wpscan.com/vulnerability/8c82d317-f9f9-4e25-a7f1-43edb77e8aba" + } + ] + }, + "generator": { + "engine": "WPScan CVE Generator" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Ilyase Dehy and Aymane Mazguiti" + }, + { + "lang": "en", + "value": "WPScan" + } + ] } \ No newline at end of file diff --git a/2023/3xxx/CVE-2023-3248.json b/2023/3xxx/CVE-2023-3248.json index 157fdd31679..50f4d78ac7c 100644 --- a/2023/3xxx/CVE-2023-3248.json +++ b/2023/3xxx/CVE-2023-3248.json @@ -1,18 +1,80 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-3248", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The All-in-one Floating Contact Form WordPress plugin before 2.1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-Site Scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "All-in-one Floating Contact Form, Call, Chat, and 50+ Social Icon Tabs", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "2.1.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://wpscan.com/vulnerability/90c7496b-552f-4566-b7ae-8c953c965352", + "refsource": "MISC", + "name": "https://wpscan.com/vulnerability/90c7496b-552f-4566-b7ae-8c953c965352" + } + ] + }, + "generator": { + "engine": "WPScan CVE Generator" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Dipak Panchal (th3.d1pak)" + }, + { + "lang": "en", + "value": "WPScan" + } + ] } \ No newline at end of file diff --git a/2023/3xxx/CVE-2023-3344.json b/2023/3xxx/CVE-2023-3344.json index 0df8496cef2..4b0818b507e 100644 --- a/2023/3xxx/CVE-2023-3344.json +++ b/2023/3xxx/CVE-2023-3344.json @@ -1,18 +1,80 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-3344", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "contact@wpscan.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Auto Location for WP Job Manager via Google WordPress plugin before 1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Cross-Site Scripting (XSS)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Unknown", + "product": { + "product_data": [ + { + "product_name": "Auto Location for WP Job Manager via Google", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "1.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://wpscan.com/vulnerability/d27bc628-3de1-421e-8a67-150e9d7a96dd", + "refsource": "MISC", + "name": "https://wpscan.com/vulnerability/d27bc628-3de1-421e-8a67-150e9d7a96dd" + } + ] + }, + "generator": { + "engine": "WPScan CVE Generator" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Bob Matyas" + }, + { + "lang": "en", + "value": "WPScan" + } + ] } \ No newline at end of file diff --git a/2023/3xxx/CVE-2023-3417.json b/2023/3xxx/CVE-2023-3417.json index 95852ee4bdc..95fdd3c554f 100644 --- a/2023/3xxx/CVE-2023-3417.json +++ b/2023/3xxx/CVE-2023-3417.json @@ -1,18 +1,75 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-3417", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@mozilla.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Thunderbird allowed the Text Direction Override Unicode Character in filenames. An email attachment could be incorrectly shown as being a document file, while in fact it was an executable file. Newer versions of Thunderbird will strip the character and show the correct file extension. This vulnerability affects Thunderbird < 115.0.1." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "File Extension Spoofing using the Text Direction Override Character" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Mozilla", + "product": { + "product_data": [ + { + "product_name": "Thunderbird", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "115.0.1" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1835582", + "refsource": "MISC", + "name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1835582" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-27/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2023-27/" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "\uc774\uc900\uc131 (Junsung Lee)" + } + ] } \ No newline at end of file diff --git a/2023/3xxx/CVE-2023-3600.json b/2023/3xxx/CVE-2023-3600.json index 138b64790d8..d4931492604 100644 --- a/2023/3xxx/CVE-2023-3600.json +++ b/2023/3xxx/CVE-2023-3600.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. This vulnerability affects Firefox < 115.0.2 and Firefox ESR < 115.0.2." + "value": "During the worker lifecycle, a use-after-free condition could have occured, which could have led to a potentially exploitable crash. This vulnerability affects Firefox < 115.0.2, Firefox ESR < 115.0.2, and Thunderbird < 115.0.1." } ] }, @@ -57,6 +57,18 @@ } ] } + }, + { + "product_name": "Thunderbird", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "unspecified", + "version_value": "115.0.1" + } + ] + } } ] } @@ -75,6 +87,11 @@ "url": "https://www.mozilla.org/security/advisories/mfsa2023-26/", "refsource": "MISC", "name": "https://www.mozilla.org/security/advisories/mfsa2023-26/" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-27/", + "refsource": "MISC", + "name": "https://www.mozilla.org/security/advisories/mfsa2023-27/" } ] },