Auto-Update: 2023-06-09T14:00:25.922819+00:00

This commit is contained in:
cad-safe-bot 2023-06-09 14:00:29 +00:00
parent b60a304b3d
commit 11e8d15cc2
122 changed files with 1146 additions and 305 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-10110",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-02T00:15:09.303",
"lastModified": "2023-06-02T00:38:44.903",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-09T13:54:30.817",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +93,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tinychat:room_spy:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.2.9",
"matchCriteriaId": "605127F5-D308-46FF-8A9B-F8663E1BBE88"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wp-plugins/tinychat-roomspy/commit/ab72627a963d61fb3bc31018e3855b08dc94a979",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://vuldb.com/?ctiid.230392",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.230392",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-33621",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-18T23:15:18.987",
"lastModified": "2023-05-16T11:02:59.923",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-09T13:15:09.360",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -135,6 +135,10 @@
}
],
"references": [
{
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DQR7LWED6VAPD5ATYOBZIGJQPCUBRJBX/",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28739",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-05-09T18:15:08.540",
"lastModified": "2022-11-08T19:39:33.537",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-09T13:15:09.503",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -164,6 +164,18 @@
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2022/Oct/28",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2022/Oct/29",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2022/Oct/30",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2022/Oct/41",
"source": "cve@mitre.org",
@ -172,6 +184,10 @@
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2022/Oct/42",
"source": "cve@mitre.org"
},
{
"url": "https://hackerone.com/reports/1248108",
"source": "cve@mitre.org",
@ -180,6 +196,10 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html",
"source": "cve@mitre.org"
},
{
"url": "https://security-tracker.debian.org/tracker/CVE-2022-28739",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0291",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:48.630",
"lastModified": "2023-06-09T06:15:48.630",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:48.703",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0292",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:49.860",
"lastModified": "2023-06-09T06:15:49.860",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0342",
"sourceIdentifier": "cna@mongodb.com",
"published": "2023-06-09T09:15:09.383",
"lastModified": "2023-06-09T09:15:09.383",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0688",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:50.387",
"lastModified": "2023-06-09T06:15:50.387",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0691",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:50.707",
"lastModified": "2023-06-09T06:15:50.707",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0692",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:51.070",
"lastModified": "2023-06-09T06:15:51.070",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0693",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:51.483",
"lastModified": "2023-06-09T06:15:51.483",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0694",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:51.780",
"lastModified": "2023-06-09T06:15:51.780",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0695",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:52.043",
"lastModified": "2023-06-09T06:15:52.043",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0708",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:52.557",
"lastModified": "2023-06-09T06:15:52.557",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0709",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:52.820",
"lastModified": "2023-06-09T06:15:52.820",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0710",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:53.053",
"lastModified": "2023-06-09T06:15:53.053",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0721",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:53.530",
"lastModified": "2023-06-09T06:15:53.530",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0729",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:53.810",
"lastModified": "2023-06-09T06:15:53.810",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0831",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:54.140",
"lastModified": "2023-06-09T06:15:54.140",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0832",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:54.510",
"lastModified": "2023-06-09T06:15:54.510",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0954",
"sourceIdentifier": "productsecurity@jci.com",
"published": "2023-06-08T21:15:16.183",
"lastModified": "2023-06-08T21:15:16.183",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:48.703",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0992",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:54.777",
"lastModified": "2023-06-09T06:15:54.777",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0993",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:55.063",
"lastModified": "2023-06-09T06:15:55.063",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1016",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:55.447",
"lastModified": "2023-06-09T06:15:55.447",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1169",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:55.873",
"lastModified": "2023-06-09T06:15:55.873",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1375",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:56.167",
"lastModified": "2023-06-09T06:15:56.167",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1403",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:56.457",
"lastModified": "2023-06-09T06:15:56.457",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1404",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:56.900",
"lastModified": "2023-06-09T06:15:56.900",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1428",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-06-09T11:15:09.200",
"lastModified": "2023-06-09T11:15:09.200",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1430",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:57.320",
"lastModified": "2023-06-09T06:15:57.320",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1615",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:57.570",
"lastModified": "2023-06-09T06:15:57.570",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1807",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:57.847",
"lastModified": "2023-06-09T06:15:57.847",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1843",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:58.037",
"lastModified": "2023-06-09T06:15:58.037",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1888",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:58.410",
"lastModified": "2023-06-09T06:15:58.410",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1889",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:58.690",
"lastModified": "2023-06-09T06:15:58.690",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1895",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:58.997",
"lastModified": "2023-06-09T06:15:58.997",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1910",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:59.433",
"lastModified": "2023-06-09T06:15:59.433",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1917",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:59.717",
"lastModified": "2023-06-09T06:15:59.717",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1978",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:00.060",
"lastModified": "2023-06-09T06:16:00.060",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2031",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:01.410",
"lastModified": "2023-06-09T06:16:01.410",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2066",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:01.693",
"lastModified": "2023-06-09T06:16:01.693",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2067",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:02.050",
"lastModified": "2023-06-09T06:16:02.050",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2083",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:02.497",
"lastModified": "2023-06-09T06:16:02.497",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2084",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:02.727",
"lastModified": "2023-06-09T06:16:02.727",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2085",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:03.203",
"lastModified": "2023-06-09T06:16:03.203",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2086",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:03.550",
"lastModified": "2023-06-09T06:16:03.550",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2087",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:03.890",
"lastModified": "2023-06-09T06:16:03.890",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2159",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:04.290",
"lastModified": "2023-06-09T06:16:04.290",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:33.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2184",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:04.503",
"lastModified": "2023-06-09T06:16:04.503",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2189",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:04.750",
"lastModified": "2023-06-09T06:16:04.750",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2237",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:05.110",
"lastModified": "2023-06-09T06:16:05.110",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2249",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:05.470",
"lastModified": "2023-06-09T06:16:05.470",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-2261",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T13:15:09.653",
"lastModified": "2023-06-09T13:15:09.653",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP Activity Log plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the handle_ajax_call function in versions up to, and including, 4.5.0. This makes it possible for authenticated attackers, with subscriber-level access or higher, to obtain a list of users with accounts on the site. This includes ids, usernames and emails."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-security-audit-log/trunk/vendor/wpwhitesecurity/select2-wpwhitesecurity/load.php#L70",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2911239%40wp-security-audit-log%2Ftrunk&old=2897171%40wp-security-audit-log%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f51f0919-498e-4f86-a933-1b7f2c4a10a4?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2275",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:05.777",
"lastModified": "2023-06-09T06:16:05.777",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2280",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:06.027",
"lastModified": "2023-06-09T06:16:06.027",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2284",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T13:15:09.767",
"lastModified": "2023-06-09T13:15:09.767",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP Activity Log Premium plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_switch_db function in versions up to, and including, 4.5.0. This makes it possible for authenticated attackers with subscriber-level or higher to make changes to the plugin's settings."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2911239%40wp-security-audit-log%2Ftrunk&old=2897171%40wp-security-audit-log%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e29fd6b-462a-42be-9a2a-b6717b20a937?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2285",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T13:15:09.897",
"lastModified": "2023-06-09T13:15:09.897",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP Activity Log Premium plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.0. This is due to missing or incorrect nonce validation on the ajax_switch_db function. This makes it possible for unauthenticated attackers to make changes to the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2911239%40wp-security-audit-log%2Ftrunk&old=2897171%40wp-security-audit-log%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4c659f6d-e02b-42ab-ba02-eb9b00602ad4?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-2286",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T13:15:10.003",
"lastModified": "2023-06-09T13:15:10.003",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP Activity Log for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.5.0. This is due to missing or incorrect nonce validation on the ajax_run_cleanup function. This makes it possible for unauthenticated attackers to invoke this function via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-security-audit-log/trunk/classes/Views/Settings.php#L278",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2911239%40wp-security-audit-log%2Ftrunk&old=2897171%40wp-security-audit-log%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e2008e0b-32c6-46fb-93b9-2b0004f478e8?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2289",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:06.170",
"lastModified": "2023-06-09T06:16:06.170",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2300",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-03T05:15:09.330",
"lastModified": "2023-06-05T13:03:17.903",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-09T13:59:14.243",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -46,18 +76,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vcita:contact_form_builder_by_vcita:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.9.1",
"matchCriteriaId": "FB2D75CC-D947-42C3-9A22-ADF50D93813E"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/contact-form-with-a-meeting-scheduler-by-vcita/trunk/system/parse_vcita_callback.php#L55",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/12ce97ba-8053-481f-bcd7-05d5e8292adb?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2301",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-03T05:15:09.397",
"lastModified": "2023-06-05T13:03:17.903",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-09T13:48:33.113",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -50,18 +80,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vcita:contact_form_builder_by_vcita:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.9.1",
"matchCriteriaId": "FB2D75CC-D947-42C3-9A22-ADF50D93813E"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/contact-form-with-a-meeting-scheduler-by-vcita/trunk/system/parse_vcita_callback.php#L55",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/61c39f5f-3b17-4e4d-824e-241159a73400?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2302",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-03T05:15:09.460",
"lastModified": "2023-06-05T13:03:17.903",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-09T13:47:46.267",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -46,18 +76,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vcita:contact_form_and_calls_to_action_by_vcita:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "DD4C0313-BD73-459D-850B-4936CB6D450A"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/lead-capturing-call-to-actions-by-vcita/trunk/vcita-callback.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4dfc237a-9157-4da9-ba8f-9daf2ba4f20b?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2303",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-03T05:15:09.527",
"lastModified": "2023-06-05T13:03:17.903",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-09T13:43:38.690",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -39,6 +59,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -50,18 +80,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vcita:contact_form_and_calls_to_action_by_vcita:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.6.4",
"matchCriteriaId": "DD4C0313-BD73-459D-850B-4936CB6D450A"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.jonh.eu/blog/security-vulnerabilities-in-wordpress-plugins-by-vcita",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/lead-capturing-call-to-actions-by-vcita/trunk/vcita-callback.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2345c972-9fd4-4709-8bde-315ab54f60e2?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2305",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:06.493",
"lastModified": "2023-06-09T06:16:06.493",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24535",
"sourceIdentifier": "security@golang.org",
"published": "2023-06-08T21:15:16.420",
"lastModified": "2023-06-08T21:15:16.420",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:48.703",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2402",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:06.847",
"lastModified": "2023-06-09T06:16:06.847",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2414",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:07.127",
"lastModified": "2023-06-09T06:16:07.127",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2450",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:07.427",
"lastModified": "2023-06-09T06:16:07.427",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2452",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:07.850",
"lastModified": "2023-06-09T06:16:07.850",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2484",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:08.247",
"lastModified": "2023-06-09T06:16:08.247",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2526",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:08.387",
"lastModified": "2023-06-09T06:16:08.387",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2555",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:08.673",
"lastModified": "2023-06-09T06:16:08.673",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2556",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:08.960",
"lastModified": "2023-06-09T06:16:08.960",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2557",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:09.247",
"lastModified": "2023-06-09T06:16:09.247",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2558",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:09.583",
"lastModified": "2023-06-09T06:16:09.583",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2584",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:09.897",
"lastModified": "2023-06-09T06:16:09.897",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2599",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:10.247",
"lastModified": "2023-06-09T06:16:10.247",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2604",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:10.567",
"lastModified": "2023-06-09T06:16:10.567",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2607",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:10.967",
"lastModified": "2023-06-09T06:16:10.967",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2688",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:11.217",
"lastModified": "2023-06-09T06:16:11.217",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2764",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:11.573",
"lastModified": "2023-06-09T06:16:11.573",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2767",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:11.867",
"lastModified": "2023-06-09T06:16:11.867",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28043",
"sourceIdentifier": "security_alert@emc.com",
"published": "2023-06-01T16:15:09.497",
"lastModified": "2023-06-01T17:29:59.710",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-09T13:34:22.607",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -46,10 +66,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dell:secure_connect_gateway:5.14.00.16:*:*:*:*:*:*:*",
"matchCriteriaId": "71DEC2F3-383C-43A4-8696-1F7356D00D54"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000214205/dsa-2023-164-dell-secure-connect-gateway-security-update-for-multiple-vulnerabilities",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2891",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:12.163",
"lastModified": "2023-06-09T06:16:12.163",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2892",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T07:15:09.987",
"lastModified": "2023-06-09T07:15:09.987",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2893",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T07:15:10.110",
"lastModified": "2023-06-09T07:15:10.110",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2894",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T07:15:10.193",
"lastModified": "2023-06-09T07:15:10.193",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2895",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T07:15:10.273",
"lastModified": "2023-06-09T07:15:10.273",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2896",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T07:15:10.347",
"lastModified": "2023-06-09T07:15:10.347",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2897",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T07:15:10.423",
"lastModified": "2023-06-09T07:15:10.423",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29401",
"sourceIdentifier": "security@golang.org",
"published": "2023-06-08T21:15:16.620",
"lastModified": "2023-06-08T21:15:16.620",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:48.703",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29402",
"sourceIdentifier": "security@golang.org",
"published": "2023-06-08T21:15:16.770",
"lastModified": "2023-06-08T21:15:16.770",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:48.703",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29403",
"sourceIdentifier": "security@golang.org",
"published": "2023-06-08T21:15:16.927",
"lastModified": "2023-06-08T21:15:16.927",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:48.703",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29404",
"sourceIdentifier": "security@golang.org",
"published": "2023-06-08T21:15:17.077",
"lastModified": "2023-06-08T21:15:17.077",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:48.703",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29405",
"sourceIdentifier": "security@golang.org",
"published": "2023-06-08T21:15:17.197",
"lastModified": "2023-06-08T21:15:17.197",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:48.703",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3086",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-06-03T12:15:09.317",
"lastModified": "2023-06-05T13:03:03.327",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-09T13:59:50.113",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -46,14 +68,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:teampass:teampass:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.9",
"matchCriteriaId": "1FBD6586-DC7F-4FD6-BB8D-9874CCFACB2E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/nilsteampassnet/teampass/commit/1c0825b67eb8f8b5ecc418ff7614423a275e6a79",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.dev/bounties/17be9e8a-abe8-41db-987f-1d5b0686ae20",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3165",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-08T17:15:09.987",
"lastModified": "2023-06-08T17:15:09.987",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:52.847",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3172",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-06-09T01:15:30.237",
"lastModified": "2023-06-09T01:15:30.237",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:48.703",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3173",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-06-09T02:15:09.233",
"lastModified": "2023-06-09T02:15:09.233",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:48.703",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3176",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-09T06:16:12.497",
"lastModified": "2023-06-09T06:16:12.497",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3177",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-09T06:16:12.870",
"lastModified": "2023-06-09T06:16:12.870",
"vulnStatus": "Received",
"lastModified": "2023-06-09T13:03:24.613",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

Some files were not shown because too many files have changed in this diff Show More