"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-11-22 20:00:34 +00:00
parent 15fc38fc29
commit fc7f300cd3
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
38 changed files with 678 additions and 96 deletions

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "DrayTek Vigor2960 v1.5.1.4 allows an authenticated attacker with network access to the web management interface to inject operating system commands via the mainfunction.cgi 'parameter' parameter."
"value": "** UNSUPPORTED WHEN ASSIGNED ** DrayTek Vigor2960 v1.5.1.4 allows an authenticated attacker with network access to the web management interface to inject operating system commands via the mainfunction.cgi 'parameter' parameter. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
]
},
@ -76,6 +76,11 @@
"refsource": "MISC",
"name": "https://www.draytek.com/support/knowledge-base/5465",
"url": "https://www.draytek.com/support/knowledge-base/5465"
},
{
"refsource": "MISC",
"name": "https://www.draytek.com/about/newsroom/2021/2021/end-of-life-notification-vigor2960",
"url": "https://www.draytek.com/about/newsroom/2021/2021/end-of-life-notification-vigor2960"
}
]
}

View File

@ -1,17 +1,122 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-30496",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MagePeople Team WpBusTicketly plugin <=\u00a05.2.5 versions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "MagePeople Team",
"product": {
"product_data": [
{
"product_name": "WpBusTicketly",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "5.2.6",
"status": "unaffected"
}
],
"lessThanOrEqual": "5.2.5",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/bus-ticket-booking-with-seat-reservation/wordpress-bus-ticket-booking-with-seat-reservation-plugin-5-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/bus-ticket-booking-with-seat-reservation/wordpress-bus-ticket-booking-with-seat-reservation-plugin-5-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to&nbsp;5.2.6 or a higher version."
}
],
"value": "Update to\u00a05.2.6 or a higher version."
}
],
"credits": [
{
"lang": "en",
"value": "Ivy - TOOR, LISA (Patchstack Alliance)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -257,7 +257,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -281,7 +281,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -293,7 +293,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -317,7 +317,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -65,7 +65,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -77,7 +77,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}

View File

@ -53,7 +53,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -65,7 +65,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -233,7 +233,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -257,7 +257,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -89,7 +89,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -77,7 +77,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -89,7 +89,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -77,7 +77,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -89,7 +89,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -41,7 +41,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -65,7 +65,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -101,7 +101,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19041.3693"
"version_value": "10.0.19043.3693"
}
]
}
@ -137,7 +137,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}
@ -149,7 +149,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.2715"
"version_value": "10.0.22631.2715"
}
]
}

View File

@ -1,17 +1,122 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47759",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Premio Chaty plugin <=\u00a03.1.2 versions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Premio",
"product": {
"product_data": [
{
"product_name": "Chaty",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "3.1.3",
"status": "unaffected"
}
],
"lessThanOrEqual": "3.1.2",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/chaty/wordpress-chaty-plugin-3-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/chaty/wordpress-chaty-plugin-3-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to&nbsp;3.1.3 or a higher version."
}
],
"value": "Update to\u00a03.1.3 or a higher version."
}
],
"credits": [
{
"lang": "en",
"value": "emad (Patchstack Alliance)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,122 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47824",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Cross-Site Request Forgery (CSRF) vulnerability in wpWax Legal Pages \u2013 Privacy Policy, Terms & Conditions, GDPR, CCPA, and Cookie Notice Generator plugin <=\u00a01.3.8 versions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)",
"cweId": "CWE-352"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "wpWax",
"product": {
"product_data": [
{
"product_name": "Legal Pages \u2013 Privacy Policy, Terms & Conditions, GDPR, CCPA, and Cookie Notice Generator",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "1.3.9",
"status": "unaffected"
}
],
"lessThanOrEqual": "1.3.8",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/legal-pages/wordpress-legal-pages-plugin-1-3-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/legal-pages/wordpress-legal-pages-plugin-1-3-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to&nbsp;1.3.9 or a higher version."
}
],
"value": "Update to\u00a01.3.9 or a higher version."
}
],
"credits": [
{
"lang": "en",
"value": "Brandon Roldan (Patchstack Alliance)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
}
]
}

View File

@ -1,17 +1,122 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-47825",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "audit@patchstack.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Cross-Site Request Forgery (CSRF) vulnerability in TienCOP WP EXtra plugin <=\u00a06.4 versions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-352 Cross-Site Request Forgery (CSRF)",
"cweId": "CWE-352"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "TienCOP",
"product": {
"product_data": [
{
"product_name": "WP EXtra",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "6.5",
"status": "unaffected"
}
],
"lessThanOrEqual": "6.4",
"status": "affected",
"version": "n/a",
"versionType": "custom"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://patchstack.com/database/vulnerability/wp-extra/wordpress-wp-extra-plugin-6-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"refsource": "MISC",
"name": "https://patchstack.com/database/vulnerability/wp-extra/wordpress-wp-extra-plugin-6-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Update to&nbsp;6.5 or a higher version."
}
],
"value": "Update to\u00a06.5 or a higher version."
}
],
"credits": [
{
"lang": "en",
"value": "Huynh Tien Si (Patchstack Alliance)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
}
]
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-49145",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,103 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-6265",
"ASSIGNER": "cve@mitre.org",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** UNSUPPPORTED WHEN ASSIGNED ** Draytek Vigor2960 v1.5.1.4 and v1.5.1.5 are vulnerable to directory traversal via the mainfunction.cgi dumpSyslog 'option' parameter allowing an authenticated attacker with access to the web management interface to delete arbitrary files. Vigor2960 is no longer supported."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-22 Path Traversal",
"cweId": "CWE-22"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "DrayTek",
"product": {
"product_data": [
{
"product_name": "Vigor2960",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.5.1.4"
},
{
"version_affected": "=",
"version_value": "1.5.1.5"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://github.com/xxy1126/Vuln/blob/main/Draytek/4.md",
"refsource": "MISC",
"name": "https://github.com/xxy1126/Vuln/blob/main/Draytek/4.md"
},
{
"url": "https://www.draytek.com/products/vigor2960/",
"refsource": "MISC",
"name": "https://www.draytek.com/products/vigor2960/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Tmotfl (VulDB User)"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0066",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2024-0067",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}