"-Synchronized-Data."

This commit is contained in:
CVE Team 2024-06-14 02:00:29 +00:00
parent 251d258a99
commit a07ab747c3
No known key found for this signature in database
GPG Key ID: BC5FD8F2443B23B7
19 changed files with 1480 additions and 146 deletions

View File

@ -1,17 +1,122 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-29174",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Missing Authorization vulnerability in NervyThemes SKU Label Changer For WooCommerce.This issue affects SKU Label Changer For WooCommerce: from n/a through 3.0."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862 Missing Authorization",
"cweId": "CWE-862"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "NervyThemes",
"product": {
"product_data": [
{
"product_name": "SKU Label Changer For WooCommerce",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "3.0.1",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.0",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/woo-sku-label-changer/wordpress-sku-label-changer-for-woocommerce-plugin-3-0-broken-access-control-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/woo-sku-label-changer/wordpress-sku-label-changer-for-woocommerce-plugin-3-0-broken-access-control-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to 3.0.1 or a higher version."
}
],
"value": "Update to 3.0.1 or a higher version."
}
],
"credits": [
{
"lang": "en",
"value": "Yuki Haruma (Patchstack Alliance)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,94 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-35040",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Missing Authorization vulnerability in SendPress SendPress Newsletters.This issue affects SendPress Newsletters: from n/a through 1.23.11.6."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862 Missing Authorization",
"cweId": "CWE-862"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SendPress",
"product": {
"product_data": [
{
"product_name": "SendPress Newsletters",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "n/a",
"version_value": "1.23.11.6"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/sendpress/wordpress-sendpress-newsletters-plugin-1-22-3-31-broken-access-control-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/sendpress/wordpress-sendpress-newsletters-plugin-1-22-3-31-broken-access-control-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Mika (Patchstack Alliance)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,122 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-35045",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Missing Authorization vulnerability in Fat Rat Fat Rat Collect.This issue affects Fat Rat Collect: from n/a through 2.6.7."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862 Missing Authorization",
"cweId": "CWE-862"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Fat Rat",
"product": {
"product_data": [
{
"product_name": "Fat Rat Collect",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "2.6.8",
"status": "unaffected"
}
],
"lessThanOrEqual": "2.6.7",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/fat-rat-collect/wordpress-fat-rat-collect-plugin-2-6-1-broken-access-control-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/fat-rat-collect/wordpress-fat-rat-collect-plugin-2-6-1-broken-access-control-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to 2.6.8 or a higher version."
}
],
"value": "Update to 2.6.8 or a higher version."
}
],
"credits": [
{
"lang": "en",
"value": "Abdi Pranata (Patchstack Alliance)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,94 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-36504",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Missing Authorization vulnerability in BBS e-Theme BBS e-Popup.This issue affects BBS e-Popup: from n/a through 2.4.5."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862 Missing Authorization",
"cweId": "CWE-862"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "BBS e-Theme",
"product": {
"product_data": [
{
"product_name": "BBS e-Popup",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "n/a",
"version_value": "2.4.5"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/bbs-e-popup/wordpress-bbs-e-popup-plugin-2-4-5-broken-access-control-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/bbs-e-popup/wordpress-bbs-e-popup-plugin-2-4-5-broken-access-control-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Abdi Pranata (Patchstack Alliance)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,94 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-36694",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Missing Authorization vulnerability in Bryan Lee Kingkong Board.This issue affects Kingkong Board: from n/a through 2.1.0.2."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862 Missing Authorization",
"cweId": "CWE-862"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Bryan Lee",
"product": {
"product_data": [
{
"product_name": "Kingkong Board",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "n/a",
"version_value": "2.1.0.2"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/kingkong-board/wordpress-kingkong-board-plugin-2-1-0-2-broken-access-control-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/kingkong-board/wordpress-kingkong-board-plugin-2-1-0-2-broken-access-control-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Abdi Pranata (Patchstack Alliance)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,122 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-36695",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Missing Authorization vulnerability in Maxime Schoeni Sublanguage.This issue affects Sublanguage: from n/a through 2.9."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862 Missing Authorization",
"cweId": "CWE-862"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Maxime Schoeni",
"product": {
"product_data": [
{
"product_name": "Sublanguage",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "2.10",
"status": "unaffected"
}
],
"lessThanOrEqual": "2.9",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/sublanguage/wordpress-sublanguage-plugin-2-9-broken-access-control-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/sublanguage/wordpress-sublanguage-plugin-2-9-broken-access-control-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to 2.10 or a higher version."
}
],
"value": "Update to 2.10 or a higher version."
}
],
"credits": [
{
"lang": "en",
"value": "Abdi Pranata (Patchstack Alliance)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,122 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-37394",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Missing Authorization vulnerability in Deepak anand WP Dummy Content Generator.This issue affects WP Dummy Content Generator: from n/a through 2.3.0."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862 Missing Authorization",
"cweId": "CWE-862"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Deepak anand",
"product": {
"product_data": [
{
"product_name": "WP Dummy Content Generator",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "3.0.0",
"status": "unaffected"
}
],
"lessThanOrEqual": "2.3.0",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/wp-dummy-content-generator/wordpress-wp-dummy-content-generator-plugin-2-3-0-broken-access-control-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/wp-dummy-content-generator/wordpress-wp-dummy-content-generator-plugin-2-3-0-broken-access-control-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to 3.0.0 or a higher version."
}
],
"value": "Update to 3.0.0 or a higher version."
}
],
"credits": [
{
"lang": "en",
"value": "thiennv (Patchstack Alliance)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,122 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-51507",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Missing Authorization vulnerability in ExpressTech Quiz And Survey Master.This issue affects Quiz And Survey Master: from n/a through 8.1.16."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862 Missing Authorization",
"cweId": "CWE-862"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "ExpressTech",
"product": {
"product_data": [
{
"product_name": "Quiz And Survey Master",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "8.1.17",
"status": "unaffected"
}
],
"lessThanOrEqual": "8.1.16",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-8-1-16-broken-access-control-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-8-1-16-broken-access-control-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to 8.1.17 or a higher version."
}
],
"value": "Update to 8.1.17 or a higher version."
}
],
"credits": [
{
"lang": "en",
"value": "Revan Arifio (Patchstack Alliance)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,122 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-51516",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Missing Authorization vulnerability in Business Directory Team Business Directory Plugin.This issue affects Business Directory Plugin: from n/a through 6.3.9."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862 Missing Authorization",
"cweId": "CWE-862"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Business Directory Team",
"product": {
"product_data": [
{
"product_name": "Business Directory Plugin",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "6.3.10",
"status": "unaffected"
}
],
"lessThanOrEqual": "6.3.9",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/business-directory-plugin/wordpress-business-directory-plugin-easy-listing-directories-for-wordpress-plugin-6-3-9-broken-access-control-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/business-directory-plugin/wordpress-business-directory-plugin-easy-listing-directories-for-wordpress-plugin-6-3-9-broken-access-control-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to 6.3.10 or a higher version."
}
],
"value": "Update to 6.3.10 or a higher version."
}
],
"credits": [
{
"lang": "en",
"value": "thiennv (Patchstack Alliance)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,122 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-51523",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Missing Authorization vulnerability in WriterSystem WooCommerce Easy Duplicate Product.This issue affects WooCommerce Easy Duplicate Product: from n/a through 0.3.0.7."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-862 Missing Authorization",
"cweId": "CWE-862"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "WriterSystem",
"product": {
"product_data": [
{
"product_name": "WooCommerce Easy Duplicate Product",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "0.3.0.8",
"status": "unaffected"
}
],
"lessThanOrEqual": "0.3.0.7",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/woo-easy-duplicate-product/wordpress-woocommerce-easy-duplicate-product-plugin-0-3-0-7-broken-access-control-csrf-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/woo-easy-duplicate-product/wordpress-woocommerce-easy-duplicate-product-plugin-0-3-0-7-broken-access-control-csrf-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to 0.3.0.8 or a higher version."
}
],
"value": "Update to 0.3.0.8 or a higher version."
}
],
"credits": [
{
"lang": "en",
"value": "Abdi Pranata (Patchstack Alliance)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
}
]
}

View File

@ -41,7 +41,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -52,7 +52,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -63,7 +63,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -74,7 +74,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -85,7 +85,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -96,7 +96,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -107,7 +107,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -118,7 +118,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -129,7 +129,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -140,7 +140,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -151,7 +151,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -162,7 +162,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -173,7 +173,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -184,7 +184,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -195,7 +195,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -206,7 +206,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -217,7 +217,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -228,7 +228,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}

View File

@ -41,7 +41,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -52,7 +52,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -63,7 +63,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -74,7 +74,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -85,7 +85,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -96,7 +96,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -107,7 +107,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -118,7 +118,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -129,7 +129,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -140,7 +140,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -151,7 +151,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -162,7 +162,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -173,7 +173,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -184,7 +184,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -195,7 +195,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -206,7 +206,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -217,7 +217,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -228,7 +228,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}

View File

@ -41,7 +41,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -52,7 +52,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -63,7 +63,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -74,7 +74,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -85,7 +85,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -96,7 +96,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -107,7 +107,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -118,7 +118,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -129,7 +129,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -140,7 +140,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -151,7 +151,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -162,7 +162,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -173,7 +173,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -184,7 +184,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -195,7 +195,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -206,7 +206,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -217,7 +217,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -228,7 +228,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}

View File

@ -41,7 +41,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -52,7 +52,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -63,7 +63,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -74,7 +74,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -85,7 +85,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -96,7 +96,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -107,7 +107,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -118,7 +118,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -129,7 +129,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -140,7 +140,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -151,7 +151,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -162,7 +162,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -173,7 +173,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -184,7 +184,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -195,7 +195,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -206,7 +206,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -217,7 +217,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -228,7 +228,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}

View File

@ -41,7 +41,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -52,7 +52,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -63,7 +63,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -74,7 +74,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -85,7 +85,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -96,7 +96,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -107,7 +107,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -118,7 +118,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -129,7 +129,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -140,7 +140,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -151,7 +151,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -162,7 +162,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -173,7 +173,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -184,7 +184,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -195,7 +195,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -206,7 +206,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -217,7 +217,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}
@ -228,7 +228,7 @@
"version_data": [
{
"version_affected": "=",
"version_value": "all versions"
"version_value": "The first 5 digits of serial No. \"26061\" and prior"
}
]
}

View File

@ -1,17 +1,109 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-5981",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in itsourcecode Online House Rental System 1.0. It has been classified as critical. Affected is an unknown function of the file manage_user.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-268458 is the identifier assigned to this vulnerability."
},
{
"lang": "deu",
"value": "Es wurde eine kritische Schwachstelle in itsourcecode Online House Rental System 1.0 ausgemacht. Dabei betrifft es einen unbekannter Codeteil der Datei manage_user.php. Durch die Manipulation des Arguments id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "itsourcecode",
"product": {
"product_data": [
{
"product_name": "Online House Rental System",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.268458",
"refsource": "MISC",
"name": "https://vuldb.com/?id.268458"
},
{
"url": "https://vuldb.com/?ctiid.268458",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.268458"
},
{
"url": "https://vuldb.com/?submit.356163",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.356163"
},
{
"url": "https://github.com/LiuYongXiang-git/cve/issues/1",
"refsource": "MISC",
"name": "https://github.com/LiuYongXiang-git/cve/issues/1"
}
]
},
"credits": [
{
"lang": "en",
"value": "dlss (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}

View File

@ -1,17 +1,109 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-5983",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file bookPerPub.php. The manipulation of the argument pubid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-268459."
},
{
"lang": "deu",
"value": "In itsourcecode Online Bookstore 1.0 wurde eine kritische Schwachstelle ausgemacht. Hierbei betrifft es unbekannten Programmcode der Datei bookPerPub.php. Durch Manipulation des Arguments pubid mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "itsourcecode",
"product": {
"product_data": [
{
"product_name": "Online Bookstore",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.268459",
"refsource": "MISC",
"name": "https://vuldb.com/?id.268459"
},
{
"url": "https://vuldb.com/?ctiid.268459",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.268459"
},
{
"url": "https://vuldb.com/?submit.356164",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.356164"
},
{
"url": "https://github.com/LiuYongXiang-git/cve/issues/2",
"refsource": "MISC",
"name": "https://github.com/LiuYongXiang-git/cve/issues/2"
}
]
},
"credits": [
{
"lang": "en",
"value": "dlss (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}

View File

@ -1,17 +1,109 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-5984",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability was found in itsourcecode Online Bookstore 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file book.php. The manipulation of the argument bookisbn leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-268460."
},
{
"lang": "deu",
"value": "Eine kritische Schwachstelle wurde in itsourcecode Online Bookstore 1.0 ausgemacht. Davon betroffen ist unbekannter Code der Datei book.php. Mittels dem Manipulieren des Arguments bookisbn mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "itsourcecode",
"product": {
"product_data": [
{
"product_name": "Online Bookstore",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.268460",
"refsource": "MISC",
"name": "https://vuldb.com/?id.268460"
},
{
"url": "https://vuldb.com/?ctiid.268460",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.268460"
},
{
"url": "https://vuldb.com/?submit.356177",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.356177"
},
{
"url": "https://github.com/LiuYongXiang-git/cve/issues/3",
"refsource": "MISC",
"name": "https://github.com/LiuYongXiang-git/cve/issues/3"
}
]
},
"credits": [
{
"lang": "en",
"value": "dlss (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}

View File

@ -1,17 +1,109 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-5985",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "cna@vuldb.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "A vulnerability classified as critical has been found in SourceCodester Best Online News Portal 1.0. This affects an unknown part of the file /admin/index.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-268461 was assigned to this vulnerability."
},
{
"lang": "deu",
"value": "Es wurde eine Schwachstelle in SourceCodester Best Online News Portal 1.0 entdeckt. Sie wurde als kritisch eingestuft. Hiervon betroffen ist ein unbekannter Codeblock der Datei /admin/index.php. Mittels Manipulieren des Arguments username mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk angegangen werden. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 SQL Injection",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SourceCodester",
"product": {
"product_data": [
{
"product_name": "Best Online News Portal",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.0"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://vuldb.com/?id.268461",
"refsource": "MISC",
"name": "https://vuldb.com/?id.268461"
},
{
"url": "https://vuldb.com/?ctiid.268461",
"refsource": "MISC",
"name": "https://vuldb.com/?ctiid.268461"
},
{
"url": "https://vuldb.com/?submit.356239",
"refsource": "MISC",
"name": "https://vuldb.com/?submit.356239"
},
{
"url": "https://github.com/CveSecLook/cve/issues/45",
"refsource": "MISC",
"name": "https://github.com/CveSecLook/cve/issues/45"
}
]
},
"credits": [
{
"lang": "en",
"value": "xuanluansec (VulDB User)"
}
],
"impact": {
"cvss": [
{
"version": "3.1",
"baseScore": 6.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "3.0",
"baseScore": 6.3,
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseSeverity": "MEDIUM"
},
{
"version": "2.0",
"baseScore": 6.5,
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P"
}
]
}