diff --git a/2021/31xxx/CVE-2021-31693.json b/2021/31xxx/CVE-2021-31693.json index cc86a5de502..dd120a263c3 100644 --- a/2021/31xxx/CVE-2021-31693.json +++ b/2021/31xxx/CVE-2021-31693.json @@ -5,13 +5,57 @@ "CVE_data_meta": { "ID": "CVE-2021-31693", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.vmware.com/security/advisories/VMSA-2022-0029.html", + "url": "https://www.vmware.com/security/advisories/VMSA-2022-0029.html" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "VMware Tools for Windows (12.x.y prior to 12.1.5, 11.x.y and 10.x.y) contains a denial-of-service vulnerability in the VM3DMP driver. A malicious actor with local user privileges in the Windows guest OS, where VMware Tools is installed, can trigger a PANIC in the VM3DMP driver leading to a denial-of-service condition in the Windows guest OS." } ] } diff --git a/2022/36xxx/CVE-2022-36960.json b/2022/36xxx/CVE-2022-36960.json index 751a90a8fe3..0ca0bc3c5a6 100644 --- a/2022/36xxx/CVE-2022-36960.json +++ b/2022/36xxx/CVE-2022-36960.json @@ -1,18 +1,117 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@solarwinds.com", + "DATE_PUBLIC": "2022-11-22T15:06:00.000Z", "ID": "CVE-2022-36960", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "SolarWinds Platform Improper Input Validation" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SolarWinds Platform ", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2022.3 and prior versions", + "version_value": "2022.3" + } + ] + } + }, + { + "product_name": "Orion Platform", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2020.2.6 HF5 and prior versions", + "version_value": "2020.2.6 HF5" + } + ] + } + } + ] + }, + "vendor_name": "SolarWinds" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "SolarWinds would like to thank Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative for reporting on the issue in a responsible manner." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SolarWinds Platform was susceptible to Improper Input Validation. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to escalate user privileges." } ] + }, + "generator": { + "engine": "vulnogram 0.1.0-rc1" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287 Improper Authentication" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2022-36960", + "name": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2022-36960" + }, + { + "refsource": "MISC", + "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-4_release_notes.htm", + "name": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-4_release_notes.htm" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "All SolarWinds Platform customers are advised to upgrade to the latest version of the SolarWinds Platform version 2022.4" + } + ], + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36962.json b/2022/36xxx/CVE-2022-36962.json index f97f3babdca..aa2027f4557 100644 --- a/2022/36xxx/CVE-2022-36962.json +++ b/2022/36xxx/CVE-2022-36962.json @@ -1,18 +1,117 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@solarwinds.com", + "DATE_PUBLIC": "2022-11-22T16:29:00.000Z", "ID": "CVE-2022-36962", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "SolarWinds Platform Command Injection " }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SolarWinds Platform ", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2022.3 and prior versions", + "version_value": "2022.3" + } + ] + } + }, + { + "product_name": "Orion Platform", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2020.2.6 HF5 and prior versions", + "version_value": "2020.2.6 HF5" + } + ] + } + } + ] + }, + "vendor_name": "SolarWinds" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "SolarWinds would like to thank Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative for reporting on the issue in a responsible manner." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SolarWinds Platform was susceptible to Command Injection. This vulnerability allows a remote adversary with complete control over the SolarWinds database to execute arbitrary commands." } ] + }, + "generator": { + "engine": "vulnogram 0.1.0-rc1" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-4_release_notes.htm", + "name": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-4_release_notes.htm" + }, + { + "refsource": "MISC", + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2022-36962", + "name": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2022-36962" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "All SolarWinds Platform customers are advised to upgrade to the latest version of the SolarWinds Platform version 2022.4" + } + ], + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2022/36xxx/CVE-2022-36964.json b/2022/36xxx/CVE-2022-36964.json index 3332573440c..9e11762215b 100644 --- a/2022/36xxx/CVE-2022-36964.json +++ b/2022/36xxx/CVE-2022-36964.json @@ -1,18 +1,117 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "psirt@solarwinds.com", + "DATE_PUBLIC": "2022-11-22T16:33:00.000Z", "ID": "CVE-2022-36964", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC", + "TITLE": "SolarWinds Platform Deserialization of Untrusted Data" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "SolarWinds Platform ", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2022.3 and prior versions", + "version_value": "2022.3" + } + ] + } + }, + { + "product_name": "Orion Platform", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "2020.2.6 HF5 and prior versions", + "version_value": "2020.2.6 HF5" + } + ] + } + } + ] + }, + "vendor_name": "SolarWinds" + } + ] + } + }, + "credit": [ + { + "lang": "eng", + "value": "SolarWinds would like to thank Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative for reporting on the issue in a responsible manner." + } + ], + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SolarWinds Platform was susceptible to the Deserialization of Untrusted Data. This vulnerability allows a remote adversary with valid access to SolarWinds Web Console to execute arbitrary commands." } ] + }, + "generator": { + "engine": "vulnogram 0.1.0-rc1" + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-502 Deserialization of Untrusted Data" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "url": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-4_release_notes.htm", + "name": "https://documentation.solarwinds.com/en/success_center/orionplatform/content/release_notes/solarwinds_platform_2022-4_release_notes.htm" + }, + { + "refsource": "MISC", + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2022-36964", + "name": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2022-36964" + } + ] + }, + "solution": [ + { + "lang": "eng", + "value": "All SolarWinds Platform customers are advised to upgrade to the latest version of the SolarWinds Platform version 2022.4" + } + ], + "source": { + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3361.json b/2022/3xxx/CVE-2022-3361.json index c430993c4bc..c7a37303d32 100644 --- a/2022/3xxx/CVE-2022-3361.json +++ b/2022/3xxx/CVE-2022-3361.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-3361", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Ultimate Member plugin for WordPress is vulnerable to directory traversal in versions up to, and including 2.5.0 due to insufficient input validation on the 'template' attribute used in shortcodes. This makes it possible for attackers with administrative privileges to supply arbitrary paths using traversal (../../) to access and include files outside of the intended directory. If an attacker can successfully upload a php file then remote code execution via inclusion may also be possible. Note: for users with less than administrative capabilities, /wp-admin access needs to be enabled for that user in order for this to be exploitable by those users." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "ultimatemember", + "product": { + "product_data": [ + { + "product_name": "Ultimate Member \u2013 User Profile, User Registration, Login & Membership Plugin", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.yuque.com/docs/share/23f988ad-1402-42f2-b8d2-c7a87a4022bd", + "refsource": "MISC", + "name": "https://www.yuque.com/docs/share/23f988ad-1402-42f2-b8d2-c7a87a4022bd" + }, + { + "url": "https://github.com/H4de5-7/vulnerabilities/blob/main/CVE-2022-3361.md", + "refsource": "MISC", + "name": "https://github.com/H4de5-7/vulnerabilities/blob/main/CVE-2022-3361.md" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3361", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3361" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2805393%40ultimate-member&new=2805393%40ultimate-member&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2805393%40ultimate-member&new=2805393%40ultimate-member&sfp_email=&sfph_mail=" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Ruijie Li" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/A:N/I:N/C:L/S:U/UI:N/PR:L/AC:L/AV:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" } ] } diff --git a/2022/3xxx/CVE-2022-3383.json b/2022/3xxx/CVE-2022-3383.json index ea5a16409b3..13fe916bee0 100644 --- a/2022/3xxx/CVE-2022-3383.json +++ b/2022/3xxx/CVE-2022-3383.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-3383", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Ultimate Member plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 2.5.0 via the get_option_value_from_callback function that accepts user supplied input and passes it through call_user_func(). This makes it possible for authenticated attackers, with administrative capabilities, to execute code on the server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-94 Improper Control of Generation of Code ('Code Injection')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "ultimatemember", + "product": { + "product_data": [ + { + "product_name": "Ultimate Member \u2013 User Profile, User Registration, Login & Membership Plugin", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2805393%40ultimate-member&new=2805393%40ultimate-member&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2805393%40ultimate-member&new=2805393%40ultimate-member&sfp_email=&sfph_mail=" + }, + { + "url": "https://www.yuque.com/docs/share/8796eef9-ac4c-4339-96b4-6c21313ecf3e", + "refsource": "MISC", + "name": "https://www.yuque.com/docs/share/8796eef9-ac4c-4339-96b4-6c21313ecf3e" + }, + { + "url": "https://github.com/H4de5-7/vulnerabilities/blob/main/CVE-2022-3383%20%26%26%20CVE-2022-3384.md", + "refsource": "MISC", + "name": "https://github.com/H4de5-7/vulnerabilities/blob/main/CVE-2022-3383%20%26%26%20CVE-2022-3384.md" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3383", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3383" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Ruijie Li" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/A:H/I:H/C:H/S:U/UI:N/PR:H/AC:L/AV:N", + "baseScore": 7.2, + "baseSeverity": "HIGH" } ] } diff --git a/2022/3xxx/CVE-2022-3384.json b/2022/3xxx/CVE-2022-3384.json index ade79a005d1..15f9f1254cc 100644 --- a/2022/3xxx/CVE-2022-3384.json +++ b/2022/3xxx/CVE-2022-3384.json @@ -1,17 +1,93 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-3384", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Ultimate Member plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 2.5.0 via the populate_dropdown_options function that accepts user supplied input and passes it through call_user_func(). This is restricted to non-parameter PHP functions like phpinfo(); since user supplied parameters are not passed through the function. This makes it possible for authenticated attackers, with administrative privileges, to execute code on the server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-94 Improper Control of Generation of Code ('Code Injection')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "ultimatemember", + "product": { + "product_data": [ + { + "product_name": "Ultimate Member \u2013 User Profile, User Registration, Login & Membership Plugin", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2805393%40ultimate-member&new=2805393%40ultimate-member&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2805393%40ultimate-member&new=2805393%40ultimate-member&sfp_email=&sfph_mail=" + }, + { + "url": "https://www.yuque.com/docs/share/8796eef9-ac4c-4339-96b4-6c21313ecf3e", + "refsource": "MISC", + "name": "https://www.yuque.com/docs/share/8796eef9-ac4c-4339-96b4-6c21313ecf3e" + }, + { + "url": "https://github.com/H4de5-7/vulnerabilities/blob/main/CVE-2022-3383%20%26%26%20CVE-2022-3384.md", + "refsource": "MISC", + "name": "https://github.com/H4de5-7/vulnerabilities/blob/main/CVE-2022-3383%20%26%26%20CVE-2022-3384.md" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3384", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3384" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Ruijie Li" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/A:H/I:H/C:H/S:U/UI:N/PR:H/AC:L/AV:N", + "baseScore": 7.2, + "baseSeverity": "HIGH" } ] } diff --git a/2022/3xxx/CVE-2022-3747.json b/2022/3xxx/CVE-2022-3747.json index a3406a4cc4f..70c0a71101c 100644 --- a/2022/3xxx/CVE-2022-3747.json +++ b/2022/3xxx/CVE-2022-3747.json @@ -1,17 +1,88 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-3747", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Becustom plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.5.2. This is due to missing nonce validation when saving the plugin's settings. This makes it possible for unauthenticated attackers to update the plugin's settings like betheme_url_slug, replaced_theme_author, and betheme_label to name a few, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352 Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "MuffinGroup", + "product": { + "product_data": [ + { + "product_name": "Becustom", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://muffingroup.com/betheme/features/be-custom/", + "refsource": "MISC", + "name": "https://muffingroup.com/betheme/features/be-custom/" + }, + { + "url": "https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3747.txt", + "refsource": "MISC", + "name": "https://github.com/MrTuxracer/advisories/blob/master/CVEs/CVE-2022-3747.txt" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3747", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3747" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Julien Ahrens" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/A:H/I:H/C:H/S:U/UI:R/PR:N/AC:L/AV:N", + "baseScore": 8.8, + "baseSeverity": "HIGH" } ] } diff --git a/2022/3xxx/CVE-2022-3751.json b/2022/3xxx/CVE-2022-3751.json index e230b6404f8..96d31a5f7c7 100644 --- a/2022/3xxx/CVE-2022-3751.json +++ b/2022/3xxx/CVE-2022-3751.json @@ -1,89 +1,89 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@huntr.dev", - "ID": "CVE-2022-3751", - "STATE": "PUBLIC", - "TITLE": " SQL Injection in owncast/owncast" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "owncast/owncast", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_value": "0.0.13" - } - ] + "CVE_data_meta": { + "ASSIGNER": "security@huntr.dev", + "ID": "CVE-2022-3751", + "STATE": "PUBLIC", + "TITLE": " SQL Injection in owncast/owncast" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "owncast/owncast", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_value": "0.0.13" + } + ] + } + } + ] + }, + "vendor_name": "owncast" } - } ] - }, - "vendor_name": "owncast" } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": " SQL Injection in GitHub repository owncast/owncast prior to 0.0.13." - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command" - } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SQL Injection in GitHub repository owncast/owncast prior to 0.0.13." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://huntr.dev/bounties/a04cff99-5d53-45e5-a882-771b0fad62c9", - "refsource": "CONFIRM", - "url": "https://huntr.dev/bounties/a04cff99-5d53-45e5-a882-771b0fad62c9" - }, - { - "name": "https://github.com/owncast/owncast/commit/23b6e5868d5501726c27a3fabbecf49000968591", - "refsource": "MISC", - "url": "https://github.com/owncast/owncast/commit/23b6e5868d5501726c27a3fabbecf49000968591" - } - ] - }, - "source": { - "advisory": "a04cff99-5d53-45e5-a882-771b0fad62c9", - "discovery": "EXTERNAL" - } + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://huntr.dev/bounties/a04cff99-5d53-45e5-a882-771b0fad62c9", + "refsource": "CONFIRM", + "url": "https://huntr.dev/bounties/a04cff99-5d53-45e5-a882-771b0fad62c9" + }, + { + "name": "https://github.com/owncast/owncast/commit/23b6e5868d5501726c27a3fabbecf49000968591", + "refsource": "MISC", + "url": "https://github.com/owncast/owncast/commit/23b6e5868d5501726c27a3fabbecf49000968591" + } + ] + }, + "source": { + "advisory": "a04cff99-5d53-45e5-a882-771b0fad62c9", + "discovery": "EXTERNAL" + } } \ No newline at end of file diff --git a/2022/3xxx/CVE-2022-3896.json b/2022/3xxx/CVE-2022-3896.json index 61e1793f17c..54b3b959908 100644 --- a/2022/3xxx/CVE-2022-3896.json +++ b/2022/3xxx/CVE-2022-3896.json @@ -1,17 +1,83 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-3896", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WP Affiliate Platform plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via $_SERVER[\"REQUEST_URI\"] in versions up to, and including, 6.3.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This is unlikely to work in modern browsers." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "tipsandtrickshq", + "product": { + "product_data": [ + { + "product_name": "WP Affiliate Platform", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.tipsandtricks-hq.com/wordpress-affiliate-platform-plugin-simple-affiliate-program-for-wordpress-blogsite-1474", + "refsource": "MISC", + "name": "https://www.tipsandtricks-hq.com/wordpress-affiliate-platform-plugin-simple-affiliate-program-for-wordpress-blogsite-1474" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3896", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3896" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Marco Wotschka" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" } ] } diff --git a/2022/3xxx/CVE-2022-3897.json b/2022/3xxx/CVE-2022-3897.json index f0084f84ce8..6c9800eacb2 100644 --- a/2022/3xxx/CVE-2022-3897.json +++ b/2022/3xxx/CVE-2022-3897.json @@ -1,17 +1,83 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-3897", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WP Affiliate Platform plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters in versions up to, and including, 6.3.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "tipsandtrickshq", + "product": { + "product_data": [ + { + "product_name": "WP Affiliate Platform", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.tipsandtricks-hq.com/wordpress-affiliate-platform-plugin-simple-affiliate-program-for-wordpress-blogsite-1474", + "refsource": "MISC", + "name": "https://www.tipsandtricks-hq.com/wordpress-affiliate-platform-plugin-simple-affiliate-program-for-wordpress-blogsite-1474" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3897", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3897" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Marco Wotschka" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" } ] } diff --git a/2022/3xxx/CVE-2022-3898.json b/2022/3xxx/CVE-2022-3898.json index 0e825481a47..0d5b313ce7d 100644 --- a/2022/3xxx/CVE-2022-3898.json +++ b/2022/3xxx/CVE-2022-3898.json @@ -1,17 +1,83 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-3898", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WP Affiliate Platform plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 6.3.9. This is due to missing or incorrect nonce validation on various functions including the affiliates_menu method. This makes it possible for unauthenticated attackers to delete affiliate records, via forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-352 Cross-Site Request Forgery (CSRF)" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "tipsandtrickshq", + "product": { + "product_data": [ + { + "product_name": "WP Affiliate Platform", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.tipsandtricks-hq.com/wordpress-affiliate-platform-plugin-simple-affiliate-program-for-wordpress-blogsite-1474", + "refsource": "MISC", + "name": "https://www.tipsandtricks-hq.com/wordpress-affiliate-platform-plugin-simple-affiliate-program-for-wordpress-blogsite-1474" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3898", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3898" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Marco Wotschka" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH" } ] } diff --git a/2022/3xxx/CVE-2022-3991.json b/2022/3xxx/CVE-2022-3991.json index 7d17c4f71c6..33fd2261af9 100644 --- a/2022/3xxx/CVE-2022-3991.json +++ b/2022/3xxx/CVE-2022-3991.json @@ -1,17 +1,83 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-3991", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Photospace Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via its settings parameters saved via the update() function in versions up to, and including, 2.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "deanoakley", + "product": { + "product_data": [ + { + "product_name": "Photospace Gallery", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://plugins.trac.wordpress.org/browser/photospace/trunk/photospace.php#L87", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/browser/photospace/trunk/photospace.php#L87" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3991", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3991" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Marco Wotschka" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" } ] } diff --git a/2022/3xxx/CVE-2022-3995.json b/2022/3xxx/CVE-2022-3995.json index 14242a1e24b..79152f61151 100644 --- a/2022/3xxx/CVE-2022-3995.json +++ b/2022/3xxx/CVE-2022-3995.json @@ -1,17 +1,83 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-3995", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The TeraWallet plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 1.4.3. This is due to insufficient validation of the user-controlled key on the lock_unlock_terawallet AJAX action. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to lock/unlock other users wallets." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-639 Authorization Bypass Through User-Controlled Key" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "subratamal", + "product": { + "product_data": [ + { + "product_name": "TeraWallet \u2013 For WooCommerce", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/2817824/woo-wallet/trunk?contextall=1&old=2816610&old_path=%2Fwoo-wallet%2Ftrunk", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset/2817824/woo-wallet/trunk?contextall=1&old=2816610&old_path=%2Fwoo-wallet%2Ftrunk" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3995", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-3995" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Marco Wotschka" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/A:N/I:L/C:N/S:U/UI:N/PR:L/AC:L/AV:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" } ] } diff --git a/2022/40xxx/CVE-2022-40282.json b/2022/40xxx/CVE-2022-40282.json index 3b42342b54d..2131e3b4639 100644 --- a/2022/40xxx/CVE-2022-40282.json +++ b/2022/40xxx/CVE-2022-40282.json @@ -56,6 +56,11 @@ "url": "https://www.belden.com/support/security-assurance", "refsource": "MISC", "name": "https://www.belden.com/support/security-assurance" + }, + { + "refsource": "FULLDISC", + "name": "20221129 CyberDanube Security Research 20221124-0 | Authenticated Command Injection Hirschmann BAT-C2", + "url": "http://seclists.org/fulldisclosure/2022/Nov/19" } ] } diff --git a/2022/4xxx/CVE-2022-4027.json b/2022/4xxx/CVE-2022-4027.json index 85cefd879e8..950891a0dc3 100644 --- a/2022/4xxx/CVE-2022-4027.json +++ b/2022/4xxx/CVE-2022-4027.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4027", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Simple:Press plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'postitem' parameter manipulated during a forum response in versions up to, and including, 6.8 due to insufficient input sanitization and output escaping that makes injecting object and embed tags possible. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages when responding to forum threads that will execute whenever a user accesses an injected page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "simplepress", + "product": { + "product_data": [ + { + "product_name": "Simple:Press \u2013 WordPress Forum Plugin", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2804020%40simplepress&new=2804020%40simplepress&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2804020%40simplepress&new=2804020%40simplepress&sfp_email=&sfph_mail=" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4027", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4027" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Luca Greeb" + }, + { + "lang": "en", + "value": "Andreas Kr\u00fcger" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/A:N/I:L/C:L/S:C/UI:N/PR:N/AC:L/AV:N", + "baseScore": 7.2, + "baseSeverity": "HIGH" } ] } diff --git a/2022/4xxx/CVE-2022-4028.json b/2022/4xxx/CVE-2022-4028.json index 5a17f2993c3..7a1ee831653 100644 --- a/2022/4xxx/CVE-2022-4028.json +++ b/2022/4xxx/CVE-2022-4028.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4028", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Simple:Press plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'postitem' parameter manipulated during the profile-save action when modifying a profile signature in versions up to, and including, 6.8 due to insufficient input sanitization and output escaping that makes injecting object and embed tags possible. This makes it possible for authenticated attackers, with minimal permissions, such as a subscriber to inject arbitrary web scripts in pages when modifying a profile signature that will execute whenever a user accesses an injected page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "simplepress", + "product": { + "product_data": [ + { + "product_name": "Simple:Press \u2013 WordPress Forum Plugin", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2804020%40simplepress&new=2804020%40simplepress&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2804020%40simplepress&new=2804020%40simplepress&sfp_email=&sfph_mail=" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4028", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4028" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Luca Greeb" + }, + { + "lang": "en", + "value": "Andreas Kr\u00fcger" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/A:N/I:L/C:L/S:C/UI:N/PR:L/AC:L/AV:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" } ] } diff --git a/2022/4xxx/CVE-2022-4029.json b/2022/4xxx/CVE-2022-4029.json index 37b2bab1768..c77506a0bd9 100644 --- a/2022/4xxx/CVE-2022-4029.json +++ b/2022/4xxx/CVE-2022-4029.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4029", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Simple:Press plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sforum_[md5 hash of the WordPress URL]' cookie value in versions up to, and including, 6.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. This would be highly complex to exploit as it would require the attacker to set the cookie a cookie for the targeted user." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "simplepress", + "product": { + "product_data": [ + { + "product_name": "Simple:Press \u2013 WordPress Forum Plugin", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2804020%40simplepress&new=2804020%40simplepress&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2804020%40simplepress&new=2804020%40simplepress&sfp_email=&sfph_mail=" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4029", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4029" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Luca Greeb" + }, + { + "lang": "en", + "value": "Andreas Kr\u00fcger" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/A:N/I:L/C:L/S:C/UI:R/PR:N/AC:H/AV:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" } ] } diff --git a/2022/4xxx/CVE-2022-4030.json b/2022/4xxx/CVE-2022-4030.json index 7f8f156ffed..4bbd88239b0 100644 --- a/2022/4xxx/CVE-2022-4030.json +++ b/2022/4xxx/CVE-2022-4030.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4030", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Simple:Press plugin for WordPress is vulnerable to Path Traversal in versions up to, and including, 6.8 via the 'file' parameter which can be manipulated during user avatar deletion. This makes it possible with attackers, with minimal permissions such as a subscriber, to supply paths to arbitrary files on the server that will subsequently be deleted. This can be used to delete the wp-config.php file that can allow an attacker to configure the site and achieve remote code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "simplepress", + "product": { + "product_data": [ + { + "product_name": "Simple:Press \u2013 WordPress Forum Plugin", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2804020%40simplepress&new=2804020%40simplepress&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2804020%40simplepress&new=2804020%40simplepress&sfp_email=&sfph_mail=" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4030", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4030" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Luca Greeb" + }, + { + "lang": "en", + "value": "Andreas Kr\u00fcger" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/A:H/I:H/C:N/S:U/UI:N/PR:L/AC:L/AV:N", + "baseScore": 8.1, + "baseSeverity": "HIGH" } ] } diff --git a/2022/4xxx/CVE-2022-4031.json b/2022/4xxx/CVE-2022-4031.json index 3643f9b0c82..a899bcfa804 100644 --- a/2022/4xxx/CVE-2022-4031.json +++ b/2022/4xxx/CVE-2022-4031.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4031", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Simple:Press plugin for WordPress is vulnerable to arbitrary file modifications in versions up to, and including, 6.8 via the 'file' parameter which does not properly restrict files to be edited in the context of the plugin. This makes it possible with attackers, with high-level permissions such as an administrator, to supply paths to arbitrary files on the server that can be modified outside of the intended scope of the plugin." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "simplepress", + "product": { + "product_data": [ + { + "product_name": "Simple:Press \u2013 WordPress Forum Plugin", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2804020%40simplepress&new=2804020%40simplepress&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2804020%40simplepress&new=2804020%40simplepress&sfp_email=&sfph_mail=" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4031", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4031" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Luca Greeb" + }, + { + "lang": "en", + "value": "Andreas Kr\u00fcger" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/A:L/I:L/C:N/S:U/UI:N/PR:H/AC:L/AV:N", + "baseScore": 3.8, + "baseSeverity": "LOW" } ] } diff --git a/2022/4xxx/CVE-2022-4032.json b/2022/4xxx/CVE-2022-4032.json index 778e65562cf..810c90a3fbc 100644 --- a/2022/4xxx/CVE-2022-4032.json +++ b/2022/4xxx/CVE-2022-4032.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4032", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Quiz and Survey Master plugin for WordPress is vulnerable to iFrame Injection via the 'question[id]' parameter in versions up to, and including, 8.0.4 due to insufficient input sanitization and output escaping that allowed iframe tags to be injected. This makes it possible for unauthenticated attackers to inject iFrames in pages that will execute whenever a user accesses an injected page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "expresstech", + "product": { + "product_data": [ + { + "product_name": "Quiz And Survey Master \u2013 Best Quiz, Exam and Survey Plugin for WordPress", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2801761%40quiz-master-next&new=2801761%40quiz-master-next&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2801761%40quiz-master-next&new=2801761%40quiz-master-next&sfp_email=&sfph_mail=" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4032", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4032" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Luca Greeb" + }, + { + "lang": "en", + "value": "Andreas Kr\u00fcger" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/A:N/I:L/C:L/S:C/UI:N/PR:N/AC:L/AV:N", + "baseScore": 7.2, + "baseSeverity": "HIGH" } ] } diff --git a/2022/4xxx/CVE-2022-4033.json b/2022/4xxx/CVE-2022-4033.json index 8c2bdf23cdb..5839cc6f441 100644 --- a/2022/4xxx/CVE-2022-4033.json +++ b/2022/4xxx/CVE-2022-4033.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4033", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Quiz and Survey Master plugin for WordPress is vulnerable to input validation bypass via the 'question[id]' parameter in versions up to, and including, 8.0.4 due to insufficient input validation that allows attackers to inject content other than the specified value (i.e. a number, file path, etc..). This makes it possible attackers to submit values other than the intended input type." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-20 Improper Input Validation" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "expresstech", + "product": { + "product_data": [ + { + "product_name": "Quiz And Survey Master \u2013 Best Quiz, Exam and Survey Plugin for WordPress", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2801761%40quiz-master-next&new=2801761%40quiz-master-next&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2801761%40quiz-master-next&new=2801761%40quiz-master-next&sfp_email=&sfph_mail=" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4033", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4033" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Luca Greeb" + }, + { + "lang": "en", + "value": "Andreas Kr\u00fcger" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/A:N/I:L/C:N/S:U/UI:N/PR:N/AC:L/AV:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" } ] } diff --git a/2022/4xxx/CVE-2022-4034.json b/2022/4xxx/CVE-2022-4034.json index a6dcad10776..6f5ea068246 100644 --- a/2022/4xxx/CVE-2022-4034.json +++ b/2022/4xxx/CVE-2022-4034.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4034", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Appointment Hour Booking Plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 1.3.72. This makes it possible for unauthenticated attackers to embed untrusted input into content during booking creation that may be exported as a CSV file when a site's administrator exports booking details. This can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1236 Improper Neutralization of Formula Elements in a CSV File" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "codepeople", + "product": { + "product_data": [ + { + "product_name": "Appointment Hour Booking \u2013 WordPress Booking Plugin", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2803896%40appointment-hour-booking&new=2803896%40appointment-hour-booking&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2803896%40appointment-hour-booking&new=2803896%40appointment-hour-booking&sfp_email=&sfph_mail=" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4034", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4034" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Luca Greeb" + }, + { + "lang": "en", + "value": "Andreas Kr\u00fcger" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/A:L/I:L/C:L/S:C/UI:R/PR:N/AC:H/AV:N", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" } ] } diff --git a/2022/4xxx/CVE-2022-4035.json b/2022/4xxx/CVE-2022-4035.json index 175c7b72156..032f5c0a13e 100644 --- a/2022/4xxx/CVE-2022-4035.json +++ b/2022/4xxx/CVE-2022-4035.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4035", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Appointment Hour Booking plugin for WordPress is vulnerable to iFrame Injection via the \u2018email\u2019 or general field parameters in versions up to, and including, 1.3.72 due to insufficient input sanitization and output escaping that makes injecting iFrame tags possible. This makes it possible for unauthenticated attackers to inject iFrames when submitting a booking that will execute whenever a user accesses the injected booking details page." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "codepeople", + "product": { + "product_data": [ + { + "product_name": "Appointment Hour Booking \u2013 WordPress Booking Plugin", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2803896%40appointment-hour-booking&new=2803896%40appointment-hour-booking&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2803896%40appointment-hour-booking&new=2803896%40appointment-hour-booking&sfp_email=&sfph_mail=" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4035", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4035" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Luca Greeb" + }, + { + "lang": "en", + "value": "Andreas Kr\u00fcger" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/A:N/I:L/C:L/S:C/UI:N/PR:N/AC:L/AV:N", + "baseScore": 7.2, + "baseSeverity": "HIGH" } ] } diff --git a/2022/4xxx/CVE-2022-4036.json b/2022/4xxx/CVE-2022-4036.json index 812a2a9c15b..f0bc8a9567b 100644 --- a/2022/4xxx/CVE-2022-4036.json +++ b/2022/4xxx/CVE-2022-4036.json @@ -1,17 +1,87 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-4036", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@wordfence.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Appointment Hour Booking plugin for WordPress is vulnerable to CAPTCHA bypass in versions up to, and including, 1.3.72. This is due to the use of insufficiently strong hashing algorithm on the CAPTCHA secret that is also displayed to the user via a cookie." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-804 Guessable CAPTCHA" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "codepeople", + "product": { + "product_data": [ + { + "product_name": "Appointment Hour Booking \u2013 WordPress Booking Plugin", + "version": { + "version_data": [ + { + "version_value": "*", + "version_affected": "=" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2803896%40appointment-hour-booking&new=2803896%40appointment-hour-booking&sfp_email=&sfph_mail=", + "refsource": "MISC", + "name": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2803896%40appointment-hour-booking&new=2803896%40appointment-hour-booking&sfp_email=&sfph_mail=" + }, + { + "url": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4036", + "refsource": "MISC", + "name": "https://www.wordfence.com/vulnerability-advisories-continued/#CVE-2022-4036" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Luca Greeb" + }, + { + "lang": "en", + "value": "Andreas Kr\u00fcger" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/A:N/I:N/C:L/S:U/UI:N/PR:N/AC:L/AV:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" } ] }