Auto-Update: 2023-12-22T15:00:24.651577+00:00

This commit is contained in:
cad-safe-bot 2023-12-22 15:00:28 +00:00
parent 7a6fcf0e8c
commit 00fda99e09
61 changed files with 578 additions and 128 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-8343", "id": "CVE-2019-8343",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2019-02-15T07:29:00.553", "published": "2019-02-15T07:29:00.553",
"lastModified": "2019-02-15T13:52:11.560", "lastModified": "2023-12-22T13:15:08.127",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -101,6 +101,10 @@
"Issue Tracking", "Issue Tracking",
"Third Party Advisory" "Third Party Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202312-09",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-21528", "id": "CVE-2020-21528",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-08-22T19:16:13.803", "published": "2023-08-22T19:16:13.803",
"lastModified": "2023-08-25T18:05:21.120", "lastModified": "2023-12-22T13:15:08.300",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -77,6 +77,10 @@
"Issue Tracking", "Issue Tracking",
"Vendor Advisory" "Vendor Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202312-09",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-41617", "id": "CVE-2021-41617",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-09-26T19:15:07.263", "published": "2021-09-26T19:15:07.263",
"lastModified": "2023-11-07T03:38:59.313", "lastModified": "2023-12-22T13:15:08.413",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -282,6 +282,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5586",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.openssh.com/security.html", "url": "https://www.openssh.com/security.html",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-44370", "id": "CVE-2022-44370",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-03-29T20:15:07.250", "published": "2023-03-29T20:15:07.250",
"lastModified": "2023-06-06T13:41:58.380", "lastModified": "2023-12-22T13:15:08.587",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -78,6 +78,10 @@
"Issue Tracking", "Issue Tracking",
"Vendor Advisory" "Vendor Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202312-09",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1729", "id": "CVE-2023-1729",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-15T22:15:10.350", "published": "2023-05-15T22:15:10.350",
"lastModified": "2023-11-07T04:04:42.940", "lastModified": "2023-12-22T13:15:08.680",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -46,7 +46,7 @@
] ]
}, },
{ {
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749", "source": "secalert@redhat.com",
"type": "Secondary", "type": "Secondary",
"description": [ "description": [
{ {
@ -151,6 +151,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5ZJ3UBTJBZHNPJQFOSGM5L7WAHHE2GY/", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E5ZJ3UBTJBZHNPJQFOSGM5L7WAHHE2GY/",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-08",
"source": "secalert@redhat.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5412", "url": "https://www.debian.org/security/2023/dsa-5412",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20042", "id": "CVE-2023-20042",
"sourceIdentifier": "ykramarz@cisco.com", "sourceIdentifier": "ykramarz@cisco.com",
"published": "2023-11-01T18:15:08.843", "published": "2023-11-01T18:15:08.843",
"lastModified": "2023-11-14T15:56:45.287", "lastModified": "2023-12-22T15:00:05.587",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -21,20 +21,20 @@
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
"userInteraction": "NONE", "userInteraction": "NONE",
"scope": "UNCHANGED", "scope": "CHANGED",
"confidentialityImpact": "NONE", "confidentialityImpact": "NONE",
"integrityImpact": "NONE", "integrityImpact": "NONE",
"availabilityImpact": "HIGH", "availabilityImpact": "HIGH",
"baseScore": 7.5, "baseScore": 8.6,
"baseSeverity": "HIGH" "baseSeverity": "HIGH"
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 4.0
}, },
{ {
"source": "ykramarz@cisco.com", "source": "ykramarz@cisco.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-20169", "id": "CVE-2023-20169",
"sourceIdentifier": "ykramarz@cisco.com", "sourceIdentifier": "ykramarz@cisco.com",
"published": "2023-08-23T19:15:07.893", "published": "2023-08-23T19:15:07.893",
"lastModified": "2023-08-31T15:00:30.660", "lastModified": "2023-12-22T14:59:47.780",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -17,20 +17,20 @@
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK", "attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
"userInteraction": "NONE", "userInteraction": "NONE",
"scope": "UNCHANGED", "scope": "CHANGED",
"confidentialityImpact": "NONE", "confidentialityImpact": "NONE",
"integrityImpact": "NONE", "integrityImpact": "NONE",
"availabilityImpact": "HIGH", "availabilityImpact": "HIGH",
"baseScore": 6.5, "baseScore": 7.4,
"baseSeverity": "MEDIUM" "baseSeverity": "HIGH"
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 3.6 "impactScore": 4.0
}, },
{ {
"source": "ykramarz@cisco.com", "source": "ykramarz@cisco.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28531", "id": "CVE-2023-28531",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-03-17T04:15:14.553", "published": "2023-03-17T04:15:14.553",
"lastModified": "2023-07-21T19:21:51.437", "lastModified": "2023-12-22T13:15:08.797",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -105,6 +105,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5586",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.openwall.com/lists/oss-security/2023/03/15/8", "url": "https://www.openwall.com/lists/oss-security/2023/03/15/8",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4068", "id": "CVE-2023-4068",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.513", "published": "2023-08-03T01:15:11.513",
"lastModified": "2023-11-25T11:15:19.940", "lastModified": "2023-12-22T13:15:09.043",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5467", "url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4069", "id": "CVE-2023-4069",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.583", "published": "2023-08-03T01:15:11.583",
"lastModified": "2023-11-25T11:15:20.020", "lastModified": "2023-12-22T13:15:09.140",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5467", "url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4070", "id": "CVE-2023-4070",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.647", "published": "2023-08-03T01:15:11.647",
"lastModified": "2023-11-25T11:15:20.090", "lastModified": "2023-12-22T13:15:09.207",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5467", "url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4071", "id": "CVE-2023-4071",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.710", "published": "2023-08-03T01:15:11.710",
"lastModified": "2023-11-25T11:15:20.153", "lastModified": "2023-12-22T13:15:09.273",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5467", "url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4072", "id": "CVE-2023-4072",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.773", "published": "2023-08-03T01:15:11.773",
"lastModified": "2023-11-25T11:15:20.220", "lastModified": "2023-12-22T13:15:09.327",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -92,6 +92,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5467", "url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4073", "id": "CVE-2023-4073",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.840", "published": "2023-08-03T01:15:11.840",
"lastModified": "2023-11-25T11:15:20.290", "lastModified": "2023-12-22T13:15:09.387",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -129,6 +129,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5467", "url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4074", "id": "CVE-2023-4074",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.903", "published": "2023-08-03T01:15:11.903",
"lastModified": "2023-11-25T11:15:20.420", "lastModified": "2023-12-22T13:15:09.453",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5467", "url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4075", "id": "CVE-2023-4075",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:11.973", "published": "2023-08-03T01:15:11.973",
"lastModified": "2023-11-25T11:15:20.500", "lastModified": "2023-12-22T13:15:09.517",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5467", "url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4076", "id": "CVE-2023-4076",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:12.037", "published": "2023-08-03T01:15:12.037",
"lastModified": "2023-11-25T11:15:20.693", "lastModified": "2023-12-22T13:15:09.583",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5467", "url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4077", "id": "CVE-2023-4077",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:12.100", "published": "2023-08-03T01:15:12.100",
"lastModified": "2023-11-25T11:15:20.787", "lastModified": "2023-12-22T13:15:09.647",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5467", "url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4078", "id": "CVE-2023-4078",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-08-03T01:15:12.167", "published": "2023-08-03T01:15:12.167",
"lastModified": "2023-11-25T11:15:20.857", "lastModified": "2023-12-22T13:15:09.707",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -88,6 +88,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5467", "url": "https://www.debian.org/security/2023/dsa-5467",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-47787", "id": "CVE-2023-47787",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-18T16:15:10.097", "published": "2023-12-18T16:15:10.097",
"lastModified": "2023-12-18T17:24:19.373", "lastModified": "2023-12-22T14:32:43.010",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce WooCommerce Bookings.This issue affects WooCommerce Bookings: from n/a through 2.0.3.\n\n" "value": "Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce WooCommerce Bookings.This issue affects WooCommerce Bookings: from n/a through 2.0.3.\n\n"
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WooCommerce WooCommerce Bookings. Este problema afecta a WooCommerce Bookings: desde n/a hasta 2.0.3."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -46,10 +70,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automattic:woocommerce_bookings:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.4",
"matchCriteriaId": "47B0C969-F9BB-490A-A421-BC2959DFE43A"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://patchstack.com/database/vulnerability/woocommerce-bookings/wordpress-woocommerce-bookings-plugin-2-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/woocommerce-bookings/wordpress-woocommerce-bookings-plugin-2-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com" "source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-47789", "id": "CVE-2023-47789",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-18T16:15:10.313", "published": "2023-12-18T16:15:10.313",
"lastModified": "2023-12-18T17:24:19.373", "lastModified": "2023-12-22T14:31:39.947",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce Canada Post Shipping Method.This issue affects Canada Post Shipping Method: from n/a through 2.8.3.\n\n" "value": "Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce Canada Post Shipping Method.This issue affects Canada Post Shipping Method: from n/a through 2.8.3.\n\n"
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en WooCommerce Canada Post Shipping Method. Este problema afecta a Canada Post Shipping Method: desde n/a hasta 2.8.3."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -46,10 +70,31 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:automattic:canada_post_shipping_method:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.8.4",
"matchCriteriaId": "26FA8E82-E87B-4487-8F4A-661973CFF12C"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://patchstack.com/database/vulnerability/woocommerce-shipping-canada-post/wordpress-woocommerce-canada-post-shipping-plugin-2-8-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/woocommerce-shipping-canada-post/wordpress-woocommerce-canada-post-shipping-plugin-2-8-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com" "source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4761", "id": "CVE-2023-4761",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-05T22:15:09.583", "published": "2023-09-05T22:15:09.583",
"lastModified": "2023-11-25T11:15:20.943", "lastModified": "2023-12-22T13:15:09.790",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -156,6 +156,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5491", "url": "https://www.debian.org/security/2023/dsa-5491",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4762", "id": "CVE-2023-4762",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-05T22:15:09.677", "published": "2023-09-05T22:15:09.677",
"lastModified": "2023-11-28T01:15:07.410", "lastModified": "2023-12-22T13:15:09.940",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -161,6 +161,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5491", "url": "https://www.debian.org/security/2023/dsa-5491",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4763", "id": "CVE-2023-4763",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-05T22:15:09.777", "published": "2023-09-05T22:15:09.777",
"lastModified": "2023-11-25T11:15:21.110", "lastModified": "2023-12-22T13:15:10.020",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -120,6 +120,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5491", "url": "https://www.debian.org/security/2023/dsa-5491",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-4764", "id": "CVE-2023-4764",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-09-05T22:15:09.883", "published": "2023-09-05T22:15:09.883",
"lastModified": "2023-11-25T11:15:21.180", "lastModified": "2023-12-22T13:15:10.100",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -120,6 +120,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5491", "url": "https://www.debian.org/security/2023/dsa-5491",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48795", "id": "CVE-2023-48795",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-12-18T16:15:10.897", "published": "2023-12-18T16:15:10.897",
"lastModified": "2023-12-22T04:15:08.980", "lastModified": "2023-12-22T13:15:08.900",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
@ -268,6 +268,10 @@
"url": "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update", "url": "https://www.crushftp.com/crush10wiki/Wiki.jsp?page=Update",
"source": "cve@mitre.org" "source": "cve@mitre.org"
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5586",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc", "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-23:19.openssh.asc",
"source": "cve@mitre.org" "source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51384", "id": "CVE-2023-51384",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-12-18T19:15:08.720", "published": "2023-12-18T19:15:08.720",
"lastModified": "2023-12-22T12:15:42.810", "lastModified": "2023-12-22T13:15:10.160",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -76,6 +76,10 @@
"Patch" "Patch"
] ]
}, },
{
"url": "https://www.debian.org/security/2023/dsa-5586",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.openssh.com/txt/release-9.6", "url": "https://www.openssh.com/txt/release-9.6",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51385", "id": "CVE-2023-51385",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-12-18T19:15:08.773", "published": "2023-12-18T19:15:08.773",
"lastModified": "2023-12-22T12:15:33.360", "lastModified": "2023-12-22T14:15:06.983",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -76,6 +76,14 @@
"Patch" "Patch"
] ]
}, },
{
"url": "https://vin01.github.io/piptagole/ssh/security/openssh/libssh/remote-code-execution/2023/12/20/openssh-proxycommand-libssh-rce.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2023/dsa-5586",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.openssh.com/txt/release-9.6", "url": "https://www.openssh.com/txt/release-9.6",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5218", "id": "CVE-2023-5218",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.443", "published": "2023-10-11T23:15:10.443",
"lastModified": "2023-11-25T11:15:21.253", "lastModified": "2023-12-22T13:15:10.290",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -144,6 +144,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5526", "url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5473", "id": "CVE-2023-5473",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.503", "published": "2023-10-11T23:15:10.503",
"lastModified": "2023-11-25T11:15:21.333", "lastModified": "2023-12-22T13:15:10.370",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5526", "url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5474", "id": "CVE-2023-5474",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.557", "published": "2023-10-11T23:15:10.557",
"lastModified": "2023-11-25T11:15:21.403", "lastModified": "2023-12-22T13:15:10.457",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5526", "url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5475", "id": "CVE-2023-5475",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.603", "published": "2023-10-11T23:15:10.603",
"lastModified": "2023-11-25T11:15:21.530", "lastModified": "2023-12-22T13:15:10.600",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -144,6 +144,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5526", "url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5476", "id": "CVE-2023-5476",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.650", "published": "2023-10-11T23:15:10.650",
"lastModified": "2023-11-25T11:15:21.620", "lastModified": "2023-12-22T13:15:10.680",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5526", "url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5477", "id": "CVE-2023-5477",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.700", "published": "2023-10-11T23:15:10.700",
"lastModified": "2023-11-25T11:15:21.697", "lastModified": "2023-12-22T13:15:10.747",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5526", "url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5478", "id": "CVE-2023-5478",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.747", "published": "2023-10-11T23:15:10.747",
"lastModified": "2023-11-25T11:15:21.760", "lastModified": "2023-12-22T13:15:10.830",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5526", "url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5479", "id": "CVE-2023-5479",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.797", "published": "2023-10-11T23:15:10.797",
"lastModified": "2023-11-25T11:15:21.953", "lastModified": "2023-12-22T13:15:10.903",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5526", "url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5480", "id": "CVE-2023-5480",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:09.930", "published": "2023-11-01T18:15:09.930",
"lastModified": "2023-12-13T21:46:02.867", "lastModified": "2023-12-22T13:15:10.973",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5546", "url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5481", "id": "CVE-2023-5481",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.850", "published": "2023-10-11T23:15:10.850",
"lastModified": "2023-11-25T11:15:22.240", "lastModified": "2023-12-22T13:15:11.070",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5526", "url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5482", "id": "CVE-2023-5482",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:09.973", "published": "2023-11-01T18:15:09.973",
"lastModified": "2023-12-13T21:45:45.527", "lastModified": "2023-12-22T13:15:11.130",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5546", "url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5483", "id": "CVE-2023-5483",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.897", "published": "2023-10-11T23:15:10.897",
"lastModified": "2023-11-25T11:15:22.620", "lastModified": "2023-12-22T13:15:11.210",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -109,6 +109,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5526", "url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5484", "id": "CVE-2023-5484",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:10.950", "published": "2023-10-11T23:15:10.950",
"lastModified": "2023-11-25T11:15:22.710", "lastModified": "2023-12-22T13:15:11.330",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -144,6 +144,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5526", "url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5485", "id": "CVE-2023-5485",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:11.007", "published": "2023-10-11T23:15:11.007",
"lastModified": "2023-11-25T11:15:22.853", "lastModified": "2023-12-22T13:15:11.477",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5526", "url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5486", "id": "CVE-2023-5486",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:11.060", "published": "2023-10-11T23:15:11.060",
"lastModified": "2023-11-25T11:15:22.950", "lastModified": "2023-12-22T13:15:11.593",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -108,6 +108,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5526", "url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5487", "id": "CVE-2023-5487",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-10-11T23:15:11.110", "published": "2023-10-11T23:15:11.110",
"lastModified": "2023-11-25T11:15:23.053", "lastModified": "2023-12-22T13:15:11.650",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -139,6 +139,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5526", "url": "https://www.debian.org/security/2023/dsa-5526",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5849", "id": "CVE-2023-5849",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.107", "published": "2023-11-01T18:15:10.107",
"lastModified": "2023-12-13T21:45:35.673", "lastModified": "2023-12-22T13:15:11.717",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5546", "url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5850", "id": "CVE-2023-5850",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.160", "published": "2023-11-01T18:15:10.160",
"lastModified": "2023-12-13T21:39:27.273", "lastModified": "2023-12-22T13:15:11.783",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -158,6 +158,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5546", "url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5851", "id": "CVE-2023-5851",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.207", "published": "2023-11-01T18:15:10.207",
"lastModified": "2023-12-13T21:39:13.400", "lastModified": "2023-12-22T13:15:11.847",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5546", "url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5852", "id": "CVE-2023-5852",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.253", "published": "2023-11-01T18:15:10.253",
"lastModified": "2023-12-13T21:38:37.770", "lastModified": "2023-12-22T13:15:11.923",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5546", "url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5853", "id": "CVE-2023-5853",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.300", "published": "2023-11-01T18:15:10.300",
"lastModified": "2023-12-13T21:38:26.543", "lastModified": "2023-12-22T13:15:12.047",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5546", "url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5854", "id": "CVE-2023-5854",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.343", "published": "2023-11-01T18:15:10.343",
"lastModified": "2023-12-13T21:37:20.133", "lastModified": "2023-12-22T13:15:12.133",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5546", "url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5855", "id": "CVE-2023-5855",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.387", "published": "2023-11-01T18:15:10.387",
"lastModified": "2023-12-13T21:37:03.353", "lastModified": "2023-12-22T13:15:12.210",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5546", "url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5856", "id": "CVE-2023-5856",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.433", "published": "2023-11-01T18:15:10.433",
"lastModified": "2023-12-13T21:36:32.260", "lastModified": "2023-12-22T13:15:12.273",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5546", "url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5857", "id": "CVE-2023-5857",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.477", "published": "2023-11-01T18:15:10.477",
"lastModified": "2023-12-13T21:36:13.590", "lastModified": "2023-12-22T13:15:12.350",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5546", "url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5858", "id": "CVE-2023-5858",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.517", "published": "2023-11-01T18:15:10.517",
"lastModified": "2023-12-13T21:35:54.510", "lastModified": "2023-12-22T13:15:12.413",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5546", "url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-5859", "id": "CVE-2023-5859",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-01T18:15:10.563", "published": "2023-11-01T18:15:10.563",
"lastModified": "2023-12-13T21:35:27.487", "lastModified": "2023-12-22T13:15:12.480",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -157,6 +157,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5546", "url": "https://www.debian.org/security/2023/dsa-5546",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5996", "id": "CVE-2023-5996",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-08T20:15:07.637", "published": "2023-11-08T20:15:07.637",
"lastModified": "2023-11-25T11:15:24.920", "lastModified": "2023-12-22T13:15:12.557",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -141,6 +141,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5551", "url": "https://www.debian.org/security/2023/dsa-5551",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5997", "id": "CVE-2023-5997",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-15T18:15:06.873", "published": "2023-11-15T18:15:06.873",
"lastModified": "2023-11-28T03:15:07.510", "lastModified": "2023-12-22T13:15:12.693",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -100,6 +100,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5556", "url": "https://www.debian.org/security/2023/dsa-5556",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-6112", "id": "CVE-2023-6112",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-11-15T18:15:06.933", "published": "2023-11-15T18:15:06.933",
"lastModified": "2023-11-28T03:15:07.577", "lastModified": "2023-12-22T13:15:12.793",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -120,6 +120,10 @@
"url": "https://security.gentoo.org/glsa/202311-11", "url": "https://security.gentoo.org/glsa/202311-11",
"source": "chrome-cve-admin@google.com" "source": "chrome-cve-admin@google.com"
}, },
{
"url": "https://security.gentoo.org/glsa/202312-07",
"source": "chrome-cve-admin@google.com"
},
{ {
"url": "https://www.debian.org/security/2023/dsa-5556", "url": "https://www.debian.org/security/2023/dsa-5556",
"source": "chrome-cve-admin@google.com", "source": "chrome-cve-admin@google.com",

View File

@ -2,16 +2,40 @@
"id": "CVE-2023-6778", "id": "CVE-2023-6778",
"sourceIdentifier": "security@huntr.dev", "sourceIdentifier": "security@huntr.dev",
"published": "2023-12-18T15:15:10.030", "published": "2023-12-18T15:15:10.030",
"lastModified": "2023-12-18T17:24:19.373", "lastModified": "2023-12-22T14:54:34.047",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository allegroai/clearml-server prior to 1.13.0. This vulnerability affects the ClearML Open Source Server which is not designed to be used as a publicly available service. Security recommendations stress it should be placed behind a company firewall or VPN. This vulnerability only affects users within the same organisation (I.e when a malicious party already has access to the internal network and to a user's ClearML login credentials)." "value": "Cross-site Scripting (XSS) - Stored in GitHub repository allegroai/clearml-server prior to 1.13.0. This vulnerability affects the ClearML Open Source Server which is not designed to be used as a publicly available service. Security recommendations stress it should be placed behind a company firewall or VPN. This vulnerability only affects users within the same organisation (I.e when a malicious party already has access to the internal network and to a user's ClearML login credentials)."
},
{
"lang": "es",
"value": "Cross-Site Scripting (XSS) almacenado en el repositorio de GitHub allegroai/clearml-server anterior a 1.13.0. Esta vulnerabilidad afecta al servidor de c\u00f3digo abierto ClearML, que no est\u00e1 dise\u00f1ado para usarse como un servicio disponible p\u00fablicamente. Las recomendaciones de seguridad enfatizan que debe colocarse detr\u00e1s de un firewall o VPN de la empresa. Esta vulnerabilidad solo afecta a los usuarios dentro de la misma organizaci\u00f3n (es decir, cuando una parte malintencionada ya tiene acceso a la red interna y a las credenciales de inicio de sesi\u00f3n de ClearML de un usuario)."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{ {
"source": "security@huntr.dev", "source": "security@huntr.dev",
"type": "Secondary", "type": "Secondary",
@ -46,14 +70,40 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clear:clearml_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.13.0",
"matchCriteriaId": "885DBA48-94E2-4F63-9E10-5AD4CBABBB48"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/allegroai/clearml-server/commit/4684fd5b74af582c894b67a0a06e865c948b763a", "url": "https://github.com/allegroai/clearml-server/commit/4684fd5b74af582c894b67a0a06e865c948b763a",
"source": "security@huntr.dev" "source": "security@huntr.dev",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://huntr.com/bounties/5f3fffac-0358-48e6-a500-81bac13e0e2b", "url": "https://huntr.com/bounties/5f3fffac-0358-48e6-a500-81bac13e0e2b",
"source": "security@huntr.dev" "source": "security@huntr.dev",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2023-7076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-12-22T14:15:07.093",
"lastModified": "2023-12-22T14:15:07.093",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in slawkens MyAAC up to 0.8.13. It has been declared as problematic. This vulnerability affects unknown code of the file system/pages/bugtracker.php. The manipulation of the argument bug[2]['subject']/bug[2]['text']/report['subject'] leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 0.8.14 is able to address this issue. The name of the patch is 83a91ec540072d319dd338abff45f8d5ebf48190. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-248848."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/otsoft/myaac/commit/83a91ec540072d319dd338abff45f8d5ebf48190",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/slawkens/myaac/releases/tag/v0.8.14",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.248848",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.248848",
"source": "cna@vuldb.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-12-22T13:00:25.280449+00:00 2023-12-22T15:00:24.651577+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-12-22T12:18:32.690000+00:00 2023-12-22T15:00:05.587000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -29,47 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
234078 234079
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `3` Recently added CVEs: `1`
* [CVE-2023-49391](CVE-2023/CVE-2023-493xx/CVE-2023-49391.json) (`2023-12-22T11:15:07.517`) * [CVE-2023-7076](CVE-2023/CVE-2023-70xx/CVE-2023-7076.json) (`2023-12-22T14:15:07.093`)
* [CVE-2023-50569](CVE-2023/CVE-2023-505xx/CVE-2023-50569.json) (`2023-12-22T11:15:07.840`)
* [CVE-2023-7075](CVE-2023/CVE-2023-70xx/CVE-2023-7075.json) (`2023-12-22T12:15:27.410`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `107` Recently modified CVEs: `59`
* [CVE-2023-48308](CVE-2023/CVE-2023-483xx/CVE-2023-48308.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5483](CVE-2023/CVE-2023-54xx/CVE-2023-5483.json) (`2023-12-22T13:15:11.210`)
* [CVE-2023-49086](CVE-2023/CVE-2023-490xx/CVE-2023-49086.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5484](CVE-2023/CVE-2023-54xx/CVE-2023-5484.json) (`2023-12-22T13:15:11.330`)
* [CVE-2023-49684](CVE-2023/CVE-2023-496xx/CVE-2023-49684.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5485](CVE-2023/CVE-2023-54xx/CVE-2023-5485.json) (`2023-12-22T13:15:11.477`)
* [CVE-2023-49685](CVE-2023/CVE-2023-496xx/CVE-2023-49685.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5486](CVE-2023/CVE-2023-54xx/CVE-2023-5486.json) (`2023-12-22T13:15:11.593`)
* [CVE-2023-49686](CVE-2023/CVE-2023-496xx/CVE-2023-49686.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5487](CVE-2023/CVE-2023-54xx/CVE-2023-5487.json) (`2023-12-22T13:15:11.650`)
* [CVE-2023-49687](CVE-2023/CVE-2023-496xx/CVE-2023-49687.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5849](CVE-2023/CVE-2023-58xx/CVE-2023-5849.json) (`2023-12-22T13:15:11.717`)
* [CVE-2023-49688](CVE-2023/CVE-2023-496xx/CVE-2023-49688.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5850](CVE-2023/CVE-2023-58xx/CVE-2023-5850.json) (`2023-12-22T13:15:11.783`)
* [CVE-2023-49689](CVE-2023/CVE-2023-496xx/CVE-2023-49689.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5851](CVE-2023/CVE-2023-58xx/CVE-2023-5851.json) (`2023-12-22T13:15:11.847`)
* [CVE-2023-49690](CVE-2023/CVE-2023-496xx/CVE-2023-49690.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5852](CVE-2023/CVE-2023-58xx/CVE-2023-5852.json) (`2023-12-22T13:15:11.923`)
* [CVE-2023-7052](CVE-2023/CVE-2023-70xx/CVE-2023-7052.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5853](CVE-2023/CVE-2023-58xx/CVE-2023-5853.json) (`2023-12-22T13:15:12.047`)
* [CVE-2023-51704](CVE-2023/CVE-2023-517xx/CVE-2023-51704.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5854](CVE-2023/CVE-2023-58xx/CVE-2023-5854.json) (`2023-12-22T13:15:12.133`)
* [CVE-2023-51707](CVE-2023/CVE-2023-517xx/CVE-2023-51707.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5855](CVE-2023/CVE-2023-58xx/CVE-2023-5855.json) (`2023-12-22T13:15:12.210`)
* [CVE-2023-51708](CVE-2023/CVE-2023-517xx/CVE-2023-51708.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5856](CVE-2023/CVE-2023-58xx/CVE-2023-5856.json) (`2023-12-22T13:15:12.273`)
* [CVE-2023-7053](CVE-2023/CVE-2023-70xx/CVE-2023-7053.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5857](CVE-2023/CVE-2023-58xx/CVE-2023-5857.json) (`2023-12-22T13:15:12.350`)
* [CVE-2023-7054](CVE-2023/CVE-2023-70xx/CVE-2023-7054.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5858](CVE-2023/CVE-2023-58xx/CVE-2023-5858.json) (`2023-12-22T13:15:12.413`)
* [CVE-2023-51713](CVE-2023/CVE-2023-517xx/CVE-2023-51713.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5859](CVE-2023/CVE-2023-58xx/CVE-2023-5859.json) (`2023-12-22T13:15:12.480`)
* [CVE-2023-7055](CVE-2023/CVE-2023-70xx/CVE-2023-7055.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5996](CVE-2023/CVE-2023-59xx/CVE-2023-5996.json) (`2023-12-22T13:15:12.557`)
* [CVE-2023-7056](CVE-2023/CVE-2023-70xx/CVE-2023-7056.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-5997](CVE-2023/CVE-2023-59xx/CVE-2023-5997.json) (`2023-12-22T13:15:12.693`)
* [CVE-2023-24609](CVE-2023/CVE-2023-246xx/CVE-2023-24609.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-6112](CVE-2023/CVE-2023-61xx/CVE-2023-6112.json) (`2023-12-22T13:15:12.793`)
* [CVE-2023-7057](CVE-2023/CVE-2023-70xx/CVE-2023-7057.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-51385](CVE-2023/CVE-2023-513xx/CVE-2023-51385.json) (`2023-12-22T14:15:06.983`)
* [CVE-2023-7058](CVE-2023/CVE-2023-70xx/CVE-2023-7058.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-47789](CVE-2023/CVE-2023-477xx/CVE-2023-47789.json) (`2023-12-22T14:31:39.947`)
* [CVE-2023-7059](CVE-2023/CVE-2023-70xx/CVE-2023-7059.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-47787](CVE-2023/CVE-2023-477xx/CVE-2023-47787.json) (`2023-12-22T14:32:43.010`)
* [CVE-2023-43116](CVE-2023/CVE-2023-431xx/CVE-2023-43116.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-6778](CVE-2023/CVE-2023-67xx/CVE-2023-6778.json) (`2023-12-22T14:54:34.047`)
* [CVE-2023-43741](CVE-2023/CVE-2023-437xx/CVE-2023-43741.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-20169](CVE-2023/CVE-2023-201xx/CVE-2023-20169.json) (`2023-12-22T14:59:47.780`)
* [CVE-2023-49356](CVE-2023/CVE-2023-493xx/CVE-2023-49356.json) (`2023-12-22T12:18:32.690`) * [CVE-2023-20042](CVE-2023/CVE-2023-200xx/CVE-2023-20042.json) (`2023-12-22T15:00:05.587`)
## Download and Usage ## Download and Usage