diff --git a/2020/28xxx/CVE-2020-28935.json b/2020/28xxx/CVE-2020-28935.json index bdec33444d9..21e3ccd20de 100644 --- a/2020/28xxx/CVE-2020-28935.json +++ b/2020/28xxx/CVE-2020-28935.json @@ -89,6 +89,11 @@ "refsource": "MLIST", "name": "[debian-lts-announce] 20210212 [SECURITY] [DLA 2556-1] unbound1.9 security update", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00017.html" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230329 [SECURITY] [DLA 3371-1] unbound security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00024.html" } ] } diff --git a/2022/30xxx/CVE-2022-30698.json b/2022/30xxx/CVE-2022-30698.json index 34df8ede3ba..0cec889a1c0 100644 --- a/2022/30xxx/CVE-2022-30698.json +++ b/2022/30xxx/CVE-2022-30698.json @@ -80,6 +80,11 @@ "refsource": "GENTOO", "name": "GLSA-202212-02", "url": "https://security.gentoo.org/glsa/202212-02" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230329 [SECURITY] [DLA 3371-1] unbound security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00024.html" } ] } diff --git a/2022/30xxx/CVE-2022-30699.json b/2022/30xxx/CVE-2022-30699.json index c1f8999cb91..c90ea1cb489 100644 --- a/2022/30xxx/CVE-2022-30699.json +++ b/2022/30xxx/CVE-2022-30699.json @@ -80,6 +80,11 @@ "refsource": "GENTOO", "name": "GLSA-202212-02", "url": "https://security.gentoo.org/glsa/202212-02" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230329 [SECURITY] [DLA 3371-1] unbound security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00024.html" } ] } diff --git a/2022/3xxx/CVE-2022-3204.json b/2022/3xxx/CVE-2022-3204.json index d74adf0ec0c..8c980263b84 100644 --- a/2022/3xxx/CVE-2022-3204.json +++ b/2022/3xxx/CVE-2022-3204.json @@ -85,6 +85,11 @@ "refsource": "GENTOO", "name": "GLSA-202212-02", "url": "https://security.gentoo.org/glsa/202212-02" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20230329 [SECURITY] [DLA 3371-1] unbound security update", + "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00024.html" } ] } diff --git a/2023/1xxx/CVE-2023-1575.json b/2023/1xxx/CVE-2023-1575.json index a6b3858d703..61b9c407c85 100644 --- a/2023/1xxx/CVE-2023-1575.json +++ b/2023/1xxx/CVE-2023-1575.json @@ -1,17 +1,84 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-1575", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Mega Main Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via some of its settings parameters in versions up to, and including, 2.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "MegaMain", + "product": { + "product_data": [ + { + "product_name": "Mega Main Menu", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "*", + "version_value": "2.2.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a44ce6a3-0a9d-4bce-9251-f3a38b000645?source=cve", + "refsource": "MISC", + "name": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a44ce6a3-0a9d-4bce-9251-f3a38b000645?source=cve" + }, + { + "url": "https://codecanyon.net/item/mega-main-menu-wordpress-menu-plugin/6135125", + "refsource": "MISC", + "name": "https://codecanyon.net/item/mega-main-menu-wordpress-menu-plugin/6135125" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Marco Wotschka" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/1xxx/CVE-2023-1680.json b/2023/1xxx/CVE-2023-1680.json index 5d12e27d35b..faa97d7158b 100644 --- a/2023/1xxx/CVE-2023-1680.json +++ b/2023/1xxx/CVE-2023-1680.json @@ -1,17 +1,99 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-1680", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as problematic, has been found in Xunrui CMS 4.61. This issue affects some unknown processing of the file /dayrui/My/View/main.html. The manipulation leads to information disclosure. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224237 was assigned to this vulnerability." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in Xunrui CMS 4.61 entdeckt. Sie wurde als problematisch eingestuft. Dies betrifft einen unbekannten Teil der Datei /dayrui/My/View/main.html. Mit der Manipulation mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-200 Information Disclosure", + "cweId": "CWE-200" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Xunrui", + "product": { + "product_data": [ + { + "product_name": "CMS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "4.61" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/2714925725/CMS-bug/blob/main/Informationdisclosure-1.md", + "refsource": "MISC", + "name": "https://github.com/2714925725/CMS-bug/blob/main/Informationdisclosure-1.md" + }, + { + "url": "https://vuldb.com/?id.224237", + "refsource": "MISC", + "name": "https://vuldb.com/?id.224237" + }, + { + "url": "https://vuldb.com/?ctiid.224237", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.224237" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 4.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 4.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 4, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseSeverity": "MEDIUM" } ] } diff --git a/2023/1xxx/CVE-2023-1699.json b/2023/1xxx/CVE-2023-1699.json new file mode 100644 index 00000000000..cc45ce4ac45 --- /dev/null +++ b/2023/1xxx/CVE-2023-1699.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1699", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1700.json b/2023/1xxx/CVE-2023-1700.json new file mode 100644 index 00000000000..05839b7e130 --- /dev/null +++ b/2023/1xxx/CVE-2023-1700.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1700", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1701.json b/2023/1xxx/CVE-2023-1701.json new file mode 100644 index 00000000000..63887df66f0 --- /dev/null +++ b/2023/1xxx/CVE-2023-1701.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1701", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1702.json b/2023/1xxx/CVE-2023-1702.json new file mode 100644 index 00000000000..ba9c965d8b6 --- /dev/null +++ b/2023/1xxx/CVE-2023-1702.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1702", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1703.json b/2023/1xxx/CVE-2023-1703.json new file mode 100644 index 00000000000..fc2c8acefe1 --- /dev/null +++ b/2023/1xxx/CVE-2023-1703.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1703", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1704.json b/2023/1xxx/CVE-2023-1704.json new file mode 100644 index 00000000000..f2b1edf68ef --- /dev/null +++ b/2023/1xxx/CVE-2023-1704.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1704", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/26xxx/CVE-2023-26982.json b/2023/26xxx/CVE-2023-26982.json index c74f004e168..5148e909c39 100644 --- a/2023/26xxx/CVE-2023-26982.json +++ b/2023/26xxx/CVE-2023-26982.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-26982", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-26982", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Trudesk v1.2.6 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Add Tags parameter under the Create Ticket function." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/polonel/trudesk/releases/tag/v1.2.6", + "refsource": "MISC", + "name": "https://github.com/polonel/trudesk/releases/tag/v1.2.6" + }, + { + "url": "https://trudesk.io/", + "refsource": "MISC", + "name": "https://trudesk.io/" + }, + { + "refsource": "MISC", + "name": "https://github.com/bypazs/CVE-2023-26982", + "url": "https://github.com/bypazs/CVE-2023-26982" } ] } diff --git a/2023/28xxx/CVE-2023-28892.json b/2023/28xxx/CVE-2023-28892.json index 000938e9058..0584feeb9c9 100644 --- a/2023/28xxx/CVE-2023-28892.json +++ b/2023/28xxx/CVE-2023-28892.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2023-28892", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2023-28892", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Malwarebytes AdwCleaner 8.4.0 runs as Administrator and performs an insecure file delete operation on C:\\AdwCleaner\\Logs\\AdwCleaner_Debug.log in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://malwarebytes.com", + "refsource": "MISC", + "name": "https://malwarebytes.com" + }, + { + "refsource": "MISC", + "name": "https://www.malwarebytes.com/secure/cves/cve-2023-28892", + "url": "https://www.malwarebytes.com/secure/cves/cve-2023-28892" } ] }