mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-07 11:06:39 +00:00
Adds CVEs
This commit is contained in:
parent
73f9dbc9b5
commit
ae1aeb992f
@ -1,18 +1,75 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-1323",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-1323",
|
"TITLE": "Discy < 5.0 - Subscriber+ Broken Access Control to change settings"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Discy",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<",
|
||||||
|
"version_name": "5.0",
|
||||||
|
"version_value": "5.0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The Discy WordPress theme before 5.0 lacks authorization checks then processing ajax requests to the discy_update_options action, allowing any logged in users (with privileges as low as Subscriber,) to change Theme options by sending a crafted POST request."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/2d8020e1-6489-4555-9956-2dc190aaa61b",
|
||||||
|
"name": "https://wpscan.com/vulnerability/2d8020e1-6489-4555-9956-2dc190aaa61b"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-284 Improper Access Control",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Veshraj Ghimire"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -3,7 +3,7 @@
|
|||||||
"ID": "CVE-2022-1757",
|
"ID": "CVE-2022-1757",
|
||||||
"ASSIGNER": "contact@wpscan.com",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"STATE": "PUBLIC",
|
"STATE": "PUBLIC",
|
||||||
"TITLE": "Pagebar <= 2.65 - Arbitrary Settings Update via CSRF to Stored XSS"
|
"TITLE": "Pagebar < 2.70 - Arbitrary Settings Update via CSRF to Stored XSS"
|
||||||
},
|
},
|
||||||
"data_format": "MITRE",
|
"data_format": "MITRE",
|
||||||
"data_type": "CVE",
|
"data_type": "CVE",
|
||||||
@ -21,9 +21,9 @@
|
|||||||
"version": {
|
"version": {
|
||||||
"version_data": [
|
"version_data": [
|
||||||
{
|
{
|
||||||
"version_affected": "<=",
|
"version_affected": "<",
|
||||||
"version_name": "2.65",
|
"version_name": "2.70",
|
||||||
"version_value": "2.65"
|
"version_value": "2.70"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
@ -38,7 +38,7 @@
|
|||||||
"description_data": [
|
"description_data": [
|
||||||
{
|
{
|
||||||
"lang": "eng",
|
"lang": "eng",
|
||||||
"value": "The Pagebar WordPress plugin through 2.65 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack. Furthermore, due to the lack of sanitisation in some of them, it could also lead to Stored XSS issues"
|
"value": "The pagebar WordPress plugin before 2.70 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack. Furthermore, due to the lack of sanitisation in some of them, it could also lead to Stored XSS issues"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -60,6 +60,14 @@
|
|||||||
"lang": "eng"
|
"lang": "eng"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-79 Cross-Site Scripting (XSS)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
@ -1,18 +1,80 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2046",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2046",
|
"TITLE": "Directorist - Business Directory Plugin < 7.2.3 - Admin+ Arbitrary File Upload"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Directorist – WordPress Business Directory Plugin with Classified Ads Listings",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<",
|
||||||
|
"version_name": "7.2.3",
|
||||||
|
"version_value": "7.2.3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The Directorist WordPress plugin before 7.2.3 allows administrators to download other plugins from the same vendor directly to the site, but does not check the URL domain it gets the zip files from. This could allow administrators to run code on the server, which is a problem in multisite configurations."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807",
|
||||||
|
"name": "https://wpscan.com/vulnerability/03a04eab-be47-4195-af77-0df2a32eb807"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"refsource": "CONFIRM",
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/2752034/directorist?contextall=1&old=2731298&old_path=%2Fdirectorist",
|
||||||
|
"name": "https://plugins.trac.wordpress.org/changeset/2752034/directorist?contextall=1&old=2731298&old_path=%2Fdirectorist"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-434 Unrestricted Upload of File with Dangerous Type",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Rafie Muhammad"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,75 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2269",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2269",
|
"TITLE": "Website File Changes Monitor < 1.8.3 - Admin+ SQLi"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Website File Changes Monitor",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<",
|
||||||
|
"version_name": "1.8.3",
|
||||||
|
"version_value": "1.8.3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The Website File Changes Monitor WordPress plugin before 1.8.3 does not sanitise and escape user input before using it in a SQL statement via an action available to users with the manage_options capability (by default admins), leading to an SQL injection"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65",
|
||||||
|
"name": "https://wpscan.com/vulnerability/bb348c92-d7e3-4a75-98aa-dd1c463bfd65"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-89 SQL Injection",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Nicolas VIDAL from TEHTRIS"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,75 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2355",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2355",
|
"TITLE": "Easy Username Updater < 1.0.5 - Arbitrary Username Update via CSRF"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Easy Username Updater",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<",
|
||||||
|
"version_name": "1.0.5",
|
||||||
|
"version_value": "1.0.5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The Easy Username Updater WordPress plugin before 1.0.5 does not implement CSRF checks, which could allow attackers to make a logged in admin change any user's username includes the admin"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/426b5a0f-c16d-429a-9396-b3aea7922826",
|
||||||
|
"name": "https://wpscan.com/vulnerability/426b5a0f-c16d-429a-9396-b3aea7922826"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-352 Cross-Site Request Forgery (CSRF)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Raad Haddad"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,75 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2356",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2356",
|
"TITLE": "User Private Files < 1.1.3 - Subscriber+ Arbitrary File Upload"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Frontend File Manager & Sharing – User Private Files",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<",
|
||||||
|
"version_name": "1.1.3",
|
||||||
|
"version_value": "1.1.3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The Frontend File Manager & Sharing WordPress plugin before 1.1.3 does not filter file extensions when letting users upload files on the server, which may lead to malicious code being uploaded."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/67f3948e-27d4-47a8-8572-616143b9cf43",
|
||||||
|
"name": "https://wpscan.com/vulnerability/67f3948e-27d4-47a8-8572-616143b9cf43"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-434 Unrestricted Upload of File with Dangerous Type",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Raad Haddad"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,75 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2357",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2357",
|
"TITLE": "WSM Downloader <= 1.4.0 - Unauthenticated Arbitrary File Download"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "WSM Downloader",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<=",
|
||||||
|
"version_name": "1.4.0",
|
||||||
|
"version_value": "1.4.0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The WSM Downloader WordPress plugin through 1.4.0 allows any visitor to use its remote file download feature to download any local files, including sensitive ones like wp-config.php."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/42499b84-684e-42e1-b7f0-de206d4da553",
|
||||||
|
"name": "https://wpscan.com/vulnerability/42499b84-684e-42e1-b7f0-de206d4da553"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-552 Files or Directories Accessible to External Parties",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Raad Haddad"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,75 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2367",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2367",
|
"TITLE": "WSM Downloader <= 1.4.0 - Domain Name Restriction Bypass"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "WSM Downloader",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<=",
|
||||||
|
"version_name": "1.4.0",
|
||||||
|
"version_value": "1.4.0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
}
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The WSM Downloader WordPress plugin through 1.4.0 allows only specific popular websites to download images/files from, this can be bypassed due to the lack of good \"link\" parameter validation"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/46afb0c6-2d0c-4a20-a9de-48f35ca93f0f",
|
||||||
|
"name": "https://wpscan.com/vulnerability/46afb0c6-2d0c-4a20-a9de-48f35ca93f0f"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-639 Authorization Bypass Through User-Controlled Key",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Raad Haddad"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -1,18 +1,75 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2371",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2371",
|
"TITLE": "YaySMTP < 2.2.1 - Subscriber+ Stored Cross-Site Scripting"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "YaySMTP – Simple WP SMTP Mail",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<",
|
||||||
|
"version_name": "2.2.1",
|
||||||
|
"version_value": "2.2.1"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The YaySMTP WordPress plugin before 2.2.1 does not have proper authorisation when saving its settings, allowing users with a role as low as subscriber to change them, and use that to conduct Stored Cross-Site Scripting attack due to the lack of escaping in them as well."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/31405f1e-fc07-43f5-afc1-9cfbaf6911b7",
|
||||||
|
"name": "https://wpscan.com/vulnerability/31405f1e-fc07-43f5-afc1-9cfbaf6911b7"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-79 Cross-Site Scripting (XSS)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Rafshanzani Suhada"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,75 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2372",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2372",
|
"TITLE": "YaySMTP < 2.2.2 - Admin+ Stored Cross-Site Scripting"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "YaySMTP – Simple WP SMTP Mail",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<",
|
||||||
|
"version_name": "2.2.2",
|
||||||
|
"version_value": "2.2.2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The YaySMTP WordPress plugin before 2.2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45",
|
||||||
|
"name": "https://wpscan.com/vulnerability/941fadb6-0009-4751-b979-88e87ebb1e45"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-79 Cross-Site Scripting (XSS)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Rafshanzani Suhada"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,75 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2386",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2386",
|
"TITLE": "Crowdsignal Polls & Ratings < 3.0.8 - Reflected Cross-Site Scripting"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Crowdsignal Dashboard – Polls, Surveys & more",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<",
|
||||||
|
"version_name": "3.0.8",
|
||||||
|
"version_value": "3.0.8"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The Crowdsignal Dashboard WordPress plugin before 3.0.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/47855d4b-9f6a-4fc7-b231-4337f51c8886",
|
||||||
|
"name": "https://wpscan.com/vulnerability/47855d4b-9f6a-4fc7-b231-4337f51c8886"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-79 Cross-Site Scripting (XSS)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "ZhongFu Su(JrXnm) of WuHan University"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,75 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2391",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2391",
|
"TITLE": "Inspiro Pro < 7.2.3 - Contributor+ Stored Cross-Site Scripting"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Inspiro PRO",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<",
|
||||||
|
"version_name": "7.2.3",
|
||||||
|
"version_value": "7.2.3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
}
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The Inspiro PRO WordPress plugin does not sanitize the portfolio slider description, allowing users with privileges as low as Contributor to inject JavaScript into the description."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/dd6ebf6b-209b-437c-9fe4-527ab9e3b9e3",
|
||||||
|
"name": "https://wpscan.com/vulnerability/dd6ebf6b-209b-437c-9fe4-527ab9e3b9e3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-79 Cross-Site Scripting (XSS)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Fortune Sam Okon"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -1,18 +1,75 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2395",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2395",
|
"TITLE": "weForms < 1.6.14 - Admin+ Stored Cross-Site Scripting"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "weForms – Easy Drag & Drop Contact Form Builder For WordPress",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<",
|
||||||
|
"version_name": "1.6.14",
|
||||||
|
"version_value": "1.6.14"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The weForms WordPress plugin before 1.6.14 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/5e442dd9-a49d-4a8e-959b-199a8689da4b",
|
||||||
|
"name": "https://wpscan.com/vulnerability/5e442dd9-a49d-4a8e-959b-199a8689da4b"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-79 Cross-site Scripting (XSS)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Tri Wanda Septian"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,75 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2398",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2398",
|
"TITLE": "WP Comments Fields < 4.1 - Admin+ Stored Cross-Site Scripting"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "WordPress Comments Fields",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<",
|
||||||
|
"version_name": "4.1",
|
||||||
|
"version_value": "4.1"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
}
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The WordPress Comments Fields WordPress plugin before 4.1 does not escape Field Error Message, which could allow high-privileged users to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/0a218789-9a78-49ca-b919-fa61d33d5672",
|
||||||
|
"name": "https://wpscan.com/vulnerability/0a218789-9a78-49ca-b919-fa61d33d5672"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-79 Cross-Site Scripting (XSS)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Rafshanzani Suhada"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
@ -1,18 +1,75 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2409",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2409",
|
"TITLE": "Rough Chart <= 1.0.0 - Admin+ Stored Cross-Site Scripting"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Rough Chart",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<=",
|
||||||
|
"version_name": "1.0.0",
|
||||||
|
"version_value": "1.0.0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The Rough Chart WordPress plugin through 1.0.0 does not properly escape chart data label, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/fbf474d1-4ac2-4ed2-943c-497a4d5e9cea",
|
||||||
|
"name": "https://wpscan.com/vulnerability/fbf474d1-4ac2-4ed2-943c-497a4d5e9cea"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-79 Cross-Site Scripting (XSS)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Siddhant Suresh Ughade"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,79 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2410",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2410",
|
"TITLE": "mTouch Quiz <= 3.1.3 - Admin+ Stored Cross Site Scripting"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "mTouch Quiz",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<=",
|
||||||
|
"version_name": "3.1.3",
|
||||||
|
"version_value": "3.1.3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The mTouch Quiz WordPress plugin through 3.1.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/c7cd55c1-e28b-4287-bab7-eb36483e0b18",
|
||||||
|
"name": "https://wpscan.com/vulnerability/c7cd55c1-e28b-4287-bab7-eb36483e0b18"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-79 Cross-Site Scripting (XSS)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Vinay Varma Mudunuri"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Krishna Harsha Kondaveeti"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,79 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2411",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2411",
|
"TITLE": "Auto More Tag <= 4.0.0 - Admin+ Stored Cross-Site Scripting"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Auto More Tag",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<=",
|
||||||
|
"version_name": "4.0.0",
|
||||||
|
"version_value": "4.0.0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The Auto More Tag WordPress plugin through 4.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/72e83ffb-14e4-4e32-9516-083447dc8294",
|
||||||
|
"name": "https://wpscan.com/vulnerability/72e83ffb-14e4-4e32-9516-083447dc8294"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-79 Cross-Site Scripting (XSS)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Vinay Varma Mudunuri"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Krishna Harsha Kondaveeti"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,79 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2412",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2412",
|
"TITLE": "Better Tag Cloud <= 0.99.5 - Admin+ Stored Cross-Site Scripting"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Better Tag Cloud",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<=",
|
||||||
|
"version_name": "0.99.5",
|
||||||
|
"version_value": "0.99.5"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The Better Tag Cloud WordPress plugin through 0.99.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/fc384cea-ae44-473c-8aa9-a84a2821bdc6",
|
||||||
|
"name": "https://wpscan.com/vulnerability/fc384cea-ae44-473c-8aa9-a84a2821bdc6"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-79 Cross-Site Scripting (XSS)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Vinay Varma Mudunuri"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Krishna Harsha Kondaveeti"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,79 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2423",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2423",
|
"TITLE": "DW Promobar <= 1.0.4 - Admin+ Stored Cross-Site Scripting"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "DW Promobar",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<=",
|
||||||
|
"version_name": "1.0.4",
|
||||||
|
"version_value": "1.0.4"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The DW Promobar WordPress plugin through 1.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/714b4f2b-3f17-4730-8c25-21d8da4cb8d2",
|
||||||
|
"name": "https://wpscan.com/vulnerability/714b4f2b-3f17-4730-8c25-21d8da4cb8d2"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-79 Cross-Site Scripting (XSS)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Vinay Varma Mudunuri"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Krishna Harsha Kondaveeti"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,79 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2424",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2424",
|
"TITLE": "Google Maps Anywhere <= 1.2.6.3 - Admin+ Stored Cross-Site Scripting"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Google Maps Anywhere",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<=",
|
||||||
|
"version_name": "1.2.6.3",
|
||||||
|
"version_value": "1.2.6.3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The Google Maps Anywhere WordPress plugin through 1.2.6.3 does not sanitise and escape any of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/2f9d3256-85c0-44fa-b0be-faa8989a1909",
|
||||||
|
"name": "https://wpscan.com/vulnerability/2f9d3256-85c0-44fa-b0be-faa8989a1909"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-79 Cross-Site Scripting (XSS)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Vinay Varma Mudunuri"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Krishna Harsha Kondaveeti"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,79 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2425",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2425",
|
"TITLE": "WP DS Blog Map <= 3.1.3 - Admin+ Stored Cross-Site Scripting"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "WP DS Blog Map",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<=",
|
||||||
|
"version_name": "3.1.3",
|
||||||
|
"version_value": "3.1.3"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The WP DS Blog Map WordPress plugin through 3.1.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks when the unfiltered_html capability is disallowed (for example in multisite setup)"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/ca684a25-28ba-4337-a6d4-9477b1643c9d",
|
||||||
|
"name": "https://wpscan.com/vulnerability/ca684a25-28ba-4337-a6d4-9477b1643c9d"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-79 Cross-Site Scripting (XSS)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Vinay Varma Mudunuri"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Krishna Harsha Kondaveeti"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,75 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2426",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2426",
|
"TITLE": "Thinkific Uploader <= 1.0.0 - Admin+ Stored Cross-Site Scripting"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "Thinkific Uploader",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<=",
|
||||||
|
"version_name": "1.0.0",
|
||||||
|
"version_value": "1.0.0"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The Thinkific Uploader WordPress plugin through 1.0.0 does not sanitise and escape its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks against other administrators."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/00e36ad9-b55b-4d17-96fb-e415eec47422",
|
||||||
|
"name": "https://wpscan.com/vulnerability/00e36ad9-b55b-4d17-96fb-e415eec47422"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-79 Cross-Site Scripting (XSS)",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "Raad Haddad"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
@ -1,18 +1,75 @@
|
|||||||
{
|
{
|
||||||
"data_type": "CVE",
|
"CVE_data_meta": {
|
||||||
"data_format": "MITRE",
|
"ID": "CVE-2022-2460",
|
||||||
"data_version": "4.0",
|
"ASSIGNER": "contact@wpscan.com",
|
||||||
"CVE_data_meta": {
|
"STATE": "PUBLIC",
|
||||||
"ID": "CVE-2022-2460",
|
"TITLE": "WPDating <= 7.1.9 - Multiple SQL Injection Issues"
|
||||||
"ASSIGNER": "cve@mitre.org",
|
},
|
||||||
"STATE": "RESERVED"
|
"data_format": "MITRE",
|
||||||
},
|
"data_type": "CVE",
|
||||||
"description": {
|
"data_version": "4.0",
|
||||||
"description_data": [
|
"generator": "WPScan CVE Generator",
|
||||||
{
|
"affects": {
|
||||||
"lang": "eng",
|
"vendor": {
|
||||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
"vendor_data": [
|
||||||
}
|
{
|
||||||
]
|
"vendor_name": "Unknown",
|
||||||
|
"product": {
|
||||||
|
"product_data": [
|
||||||
|
{
|
||||||
|
"product_name": "WPDating",
|
||||||
|
"version": {
|
||||||
|
"version_data": [
|
||||||
|
{
|
||||||
|
"version_affected": "<=",
|
||||||
|
"version_name": "7.1.9",
|
||||||
|
"version_value": "7.1.9"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
}
|
}
|
||||||
|
},
|
||||||
|
"description": {
|
||||||
|
"description_data": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "The WPDating WordPress plugin through 7.1.9 does not properly escape user input before concatenating it to certain SQL queries, leading to multiple SQL injection vulnerabilities."
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": {
|
||||||
|
"reference_data": [
|
||||||
|
{
|
||||||
|
"refsource": "MISC",
|
||||||
|
"url": "https://wpscan.com/vulnerability/694b6dfd-2424-41b4-8595-b6c305c390db",
|
||||||
|
"name": "https://wpscan.com/vulnerability/694b6dfd-2424-41b4-8595-b6c305c390db"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"problemtype": {
|
||||||
|
"problemtype_data": [
|
||||||
|
{
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"value": "CWE-89 SQL Injection",
|
||||||
|
"lang": "eng"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"credit": [
|
||||||
|
{
|
||||||
|
"lang": "eng",
|
||||||
|
"value": "WPScanTeam"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"source": {
|
||||||
|
"discovery": "EXTERNAL"
|
||||||
|
}
|
||||||
}
|
}
|
Loading…
x
Reference in New Issue
Block a user