Auto-Update: 2023-11-10T05:00:22.568479+00:00

This commit is contained in:
cad-safe-bot 2023-11-10 05:00:26 +00:00
parent 460afb734c
commit 2d15a94566
31 changed files with 1550 additions and 130 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27605",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-06T09:15:07.717",
"lastModified": "2023-11-06T13:00:43.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:20:00.893",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,7 +14,30 @@
"value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en Sajjad Hossain WP Reroute Email permite la inyecci\u00f3n SQL. Este problema afecta a WP Reroute Email: desde n/a hasta 1.4.6."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
@ -27,10 +50,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp_reroute_email_project:wp_reroute_email:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.4.8",
"matchCriteriaId": "461845BD-C5D2-4205-91ED-AF862285EAF3"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-reroute-email/wordpress-wp-reroute-email-plugin-1-4-6-admin-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28748",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-06T09:15:07.790",
"lastModified": "2023-11-06T13:00:43.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:19:54.407",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,7 +14,30 @@
"value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL (\"Inyecci\u00f3n SQL\") en Biztechc Copy or Move Comments permite la inyecci\u00f3n SQL. Este problema afecta Copy or Move Comments: desde n/a hasta 5.0.4."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
@ -27,10 +50,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:appjetty:copy_or_move_comments:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "5.0.4",
"matchCriteriaId": "53AB2802-992C-4878-AF5B-C9844AE78B63"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/copy-or-move-comments/wordpress-copy-or-move-comments-plugin-5-0-4-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33924",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-06T09:15:07.870",
"lastModified": "2023-11-06T13:00:43.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:20:06.593",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,7 +14,30 @@
"value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en Felix Welberg SIS Handball permite la inyecci\u00f3n SQL. Este problema afecta a SIS Handball: desde n/a hasta 1.0.45."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
@ -27,10 +50,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:felixwelberg:sis_handball:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.45",
"matchCriteriaId": "2D417523-6EB1-40EC-B723-08AFB8865FB8"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sis-handball/wordpress-sis-handball-plugin-1-0-45-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35911",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-06T09:15:07.947",
"lastModified": "2023-11-06T13:00:43.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:19:43.273",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,10 +14,33 @@
"value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en Creative Solutions Contact Form Generator: el creador de formularios creativos para WordPress permite la inyecci\u00f3n SQL. Este problema afecta al Contact Form Generator: creador de formularios creativos para WordPress: de n/a hasta 2.6.0."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -25,12 +48,43 @@
"value": "CWE-89"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:creative-solutions:contact_form_generator:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.6.0",
"matchCriteriaId": "66BB3BFA-F3D2-460C-8EAF-CE15000C26AA"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/contact-form-generator/wordpress-contact-form-generator-plugin-2-6-0-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38382",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-06T09:15:08.123",
"lastModified": "2023-11-06T13:00:43.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:19:37.937",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,7 +14,30 @@
"value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('Inyecci\u00f3n SQL') en Daniel S\u00f6derstr\u00f6m / Sidney van de Stouwe Subscribe to Category permite la inyecci\u00f3n SQL. Este problema afecta Subscribe to Category: desde n/a hasta 2.7.4."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
@ -27,10 +50,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:subscribe_to_category_project:subscribe_to_category:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.7.4",
"matchCriteriaId": "978A9B3B-5E48-48EF-B43C-E07BCA1B0CBF"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/subscribe-to-category/wordpress-subscribe-to-category-plugin-2-7-4-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39042",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T22:15:08.700",
"lastModified": "2023-11-03T13:22:41.650",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:10:50.210",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,74 @@
"value": "Una filtraci\u00f3n de informaci\u00f3n en Gyouza-newhushimi v13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes manipulados."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lycorp:line_mini_app:13.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA67466B-E056-4500-8E38-5A0FFBD4DAAD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39042.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://liff.line.me/1660693321-VmNyyXqO",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39047",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T22:15:08.750",
"lastModified": "2023-11-03T13:22:41.650",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:10:59.547",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,74 @@
"value": "Una filtraci\u00f3n de informaci\u00f3n en shouzu sweets oz v13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes manipulados."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lycorp:line_mini_app:13.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA67466B-E056-4500-8E38-5A0FFBD4DAAD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39047.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://liff.line.me/1657207159-oGgKdNNW",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39048",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T22:15:08.797",
"lastModified": "2023-11-03T13:22:41.650",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:11:07.203",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,74 @@
"value": "Una filtraci\u00f3n de informaci\u00f3n en Tokudaya.honten v13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes manipulados."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lycorp:line_mini_app:13.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA67466B-E056-4500-8E38-5A0FFBD4DAAD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39048.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://liff.line.me/1660822133-g5YonEZK",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39050",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T22:15:08.840",
"lastModified": "2023-11-03T13:22:41.650",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:11:23.803",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,74 @@
"value": "Una fuga de informaci\u00f3n en Daiky-value.Fukueten v13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes manipulados."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lycorp:line_mini_app:13.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA67466B-E056-4500-8E38-5A0FFBD4DAAD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39050.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://liff.line.me/1657264266-MPKmV0nq",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39051",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T22:15:08.887",
"lastModified": "2023-11-03T13:22:41.650",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:11:41.413",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,74 @@
"value": "Una filtraci\u00f3n de informaci\u00f3n en VISION MEAT WORKS Track Diner 10/10mbl v13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes manipulados."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lycorp:line_mini_app:13.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA67466B-E056-4500-8E38-5A0FFBD4DAAD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39051.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://liff.line.me/1660679085-jy2OO7WE",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39053",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T22:15:08.933",
"lastModified": "2023-11-03T13:22:41.650",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:11:48.573",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,74 @@
"value": "Una filtraci\u00f3n de informaci\u00f3n en Hattoriya v13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes manipulados."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lycorp:line_mini_app:13.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA67466B-E056-4500-8E38-5A0FFBD4DAAD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39053.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://liff.line.me/1657507029-eDjDJQ68",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39054",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T22:15:08.980",
"lastModified": "2023-11-03T13:22:41.650",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:11:57.213",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,74 @@
"value": "Una filtraci\u00f3n de informaci\u00f3n en Tokudaya.ekimae_mc v13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes manipulados."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lycorp:line_mini_app:13.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA67466B-E056-4500-8E38-5A0FFBD4DAAD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39054.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://liff.line.me/1660822001-2aM5Rl7Q",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39057",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T22:15:09.023",
"lastModified": "2023-11-03T13:22:41.650",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:12:05.497",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,74 @@
"value": "Una fuga de informaci\u00f3n en hirochanKAKIwaiting v13.6.1 permite a los atacantes obtener el token de acceso al canal y enviar mensajes manipulados."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lycorp:line_mini_app:13.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AA67466B-E056-4500-8E38-5A0FFBD4DAAD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/syz913/CVE-reports/blob/main/CVE-2023-39057.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://liff.line.me/1657563463-WZNjNErk",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39283",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T22:15:09.070",
"lastModified": "2023-11-03T13:22:46.340",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:12:27.713",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,90 @@
"value": "Una vulnerabilidad de corrupci\u00f3n de memoria SMM en el controlador SMM (SMRAM write) en CsmInt10HookSmm en Insyde InsydeH2O con kernel 5.0 a 5.5 permite a atacantes enviar datos arbitrarios a SMM, lo que podr\u00eda conducir a una escalada de privilegios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0",
"versionEndIncluding": "5.5",
"matchCriteriaId": "D301572D-C5C6-41F1-A5D2-41F07E0FC15D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insyde:insydeh2o:5.5.05.53.22:*:*:*:*:*:*:*",
"matchCriteriaId": "6EA483CB-E835-40C9-8DE0-6B2DB2A2D736"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insyde:insydeh2o:5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2D36B269-1168-4287-8F11-F5DFE8B23A5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:insyde:insydeh2o:5.6.05.60.22:*:*:*:*:*:*:*",
"matchCriteriaId": "0ECB2B5B-C312-479F-8BAE-9B98E5DD5CD7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.insyde.com/security-pledge",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://www.insyde.com/security-pledge/SA-2023055",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40207",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-06T09:15:08.237",
"lastModified": "2023-11-06T13:00:43.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:19:32.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,7 +14,30 @@
"value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('Inyecci\u00f3n SQL') en RedNao Donations Made Easy \u2013 Smart Donations permite la inyecci\u00f3n de SQL. Este problema afecta a Donations Made Easy \u2013 Smart Donations: desde n/a hasta 4.0.12."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
@ -27,10 +50,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rednao:donations_made_easy_-_smart_donations:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.0.12",
"matchCriteriaId": "CF2CF4D9-CEA8-405C-AF65-15499E991E4F"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/smart-donations/wordpress-donations-made-easy-smart-donations-plugin-4-0-12-sql-injection?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40609",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-06T09:15:08.307",
"lastModified": "2023-11-06T13:00:43.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:18:14.100",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,7 +14,30 @@
"value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en la validaci\u00f3n Aiyaz, maheshpatel Contact form 7 Custom personalizada permite la inyecci\u00f3n de SQL. Este problema afecta la validaci\u00f3n de Contact form 7 Custom: desde n/a hasta 1.1.3."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
@ -27,10 +50,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rocklobster:contact_form_7_custom_validation:1.1.3:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "35E5A9AC-90FF-4E24-BC48-79D92614EDCF"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cf7-field-validation/wordpress-contact-form-7-custom-validation-plugin-1-1-3-unauth-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41685",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-06T09:15:08.367",
"lastModified": "2023-11-06T13:00:43.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:18:08.210",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,7 +14,30 @@
"value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en ilGhera Woocommerce Support System permite la inyecci\u00f3n de SQL. Este problema afecta Woocommerce Support System: desde n/a hasta 1.2.1."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
@ -27,10 +50,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ilghera:woocommerce_support_system:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.2.1",
"matchCriteriaId": "F392A2A2-4008-48D2-AFAB-D21A02800F14"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wc-support-system/wordpress-woocommerce-support-system-plugin-1-2-0-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42299",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T22:15:09.113",
"lastModified": "2023-11-03T13:22:46.340",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:12:40.023",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,69 @@
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en OpenImageIO oiio v.2.4.12.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario y provocar una denegaci\u00f3n de servicio a trav\u00e9s de la funci\u00f3n read_subimage_data."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openimageio:openimageio:2.4.12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "28795C4C-8800-499D-8C41-5B27C2745310"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/OpenImageIO/oiio/issues/3840",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42627",
"sourceIdentifier": "security@liferay.com",
"published": "2023-10-17T13:15:11.677",
"lastModified": "2023-10-24T20:31:19.840",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-10T03:15:07.293",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -216,6 +216,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/",
"source": "security@liferay.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42628",
"sourceIdentifier": "security@liferay.com",
"published": "2023-10-17T12:15:10.043",
"lastModified": "2023-10-24T20:01:17.897",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-10T03:15:07.417",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -631,6 +631,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/",
"source": "security@liferay.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42629",
"sourceIdentifier": "security@liferay.com",
"published": "2023-10-17T09:15:10.167",
"lastModified": "2023-10-24T17:09:28.777",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-10T03:15:07.523",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -196,6 +196,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.pentagrid.ch/en/blog/stored-cross-site-scripting-vulnerabilities-in-liferay-portal/",
"source": "security@liferay.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43194",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T22:15:09.160",
"lastModified": "2023-11-03T13:22:57.130",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:12:56.120",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,75 @@
"value": "Submitty anterior a v22.06.00 es vulnerable a un control de acceso incorrecto. Un atacante puede eliminar cualquier publicaci\u00f3n en el foro modificando el par\u00e1metro de solicitud."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rcos:submitty:22.06.00:*:*:*:*:*:*:*",
"matchCriteriaId": "B7CF2346-A018-4C07-8588-5C3F6B663F6F"
}
]
}
]
}
],
"references": [
{
"url": "https://fuchai.net/cve/CVE-2023-43194",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/Submitty/Submitty/pull/8032",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43796",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-10-31T17:15:23.270",
"lastModified": "2023-11-08T17:59:11.510",
"vulnStatus": "Analyzed",
"lastModified": "2023-11-10T03:15:07.610",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -112,6 +112,14 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2IDEEZMFJBDLTFHQUTZRJJNCOZGQ2ZVS/",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VH3RNC5ZPQZ4OKPSL4E6BBJSZOQLGDEY/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45001",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-06T09:15:08.427",
"lastModified": "2023-11-06T13:00:43.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:18:01.923",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,7 +14,30 @@
"value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en Castos Seriously Simple Stats permite la inyecci\u00f3n SQL. Este problema afecta a Seriously Simple Stats: desde n/a hasta 1.5.0."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
@ -27,10 +50,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:castos:seriously_simple_stats:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.1",
"matchCriteriaId": "26F9B148-7CDE-47BA-9319-151DCC3F3A4D"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/seriously-simple-stats/wordpress-seriously-simple-stats-plugin-1-5-0-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45046",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-06T09:15:08.493",
"lastModified": "2023-11-06T13:00:43.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:17:55.987",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,7 +14,30 @@
"value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL (\"Inyecci\u00f3n SQL\") en Pressference Pressference Exporter permite la inyecci\u00f3n SQL. Este problema afecta a Pressference Exporter: desde n/a hasta 1.0.3."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
@ -27,10 +50,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pressference:pressference_exporter:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.3",
"matchCriteriaId": "D49212E0-8D09-413B-AE86-69379523426E"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/pressference-exporter/wordpress-pressference-exporter-plugin-1-0-3-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45055",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-06T09:15:08.553",
"lastModified": "2023-11-06T13:00:43.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:17:47.710",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,7 +14,30 @@
"value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en la API MStore de InspireUI permite la inyecci\u00f3n SQL. Este problema afecta a la API MStore: desde n/a hasta 4.0.6."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
@ -27,10 +50,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.0.7",
"matchCriteriaId": "3E035EF2-69A9-4736-9530-7CAAABCBC6AA"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mstore-api/wordpress-mstore-api-plugin-4-0-6-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45069",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-06T09:15:08.617",
"lastModified": "2023-11-06T13:00:43.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:17:41.553",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,10 +14,33 @@
"value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en Video Gallery de Total-Soft Video Gallery - Best WordPress YouTube Gallery Plugin permite la inyecci\u00f3n de SQL. Este problema afecta a Video Gallery \u2013 Best WordPress YouTube Gallery Plugin para WordPress desde n /a hasta 2.1.3."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -25,12 +48,43 @@
"value": "CWE-89"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:total-soft:video_gallery:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.1.4",
"matchCriteriaId": "2957D705-8A30-49B3-A1BF-25BDEE3F9DB9"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/gallery-videos/wordpress-gallery-video-plugin-2-0-2-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45074",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-06T09:15:08.673",
"lastModified": "2023-11-06T13:00:43.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:17:33.087",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,7 +14,30 @@
"value": "La neutralizaci\u00f3n incorrecta de elementos especiales utilizados en una vulnerabilidad de comando SQL ('inyecci\u00f3n SQL') en Page Visit Counter Advanced Page Visit Counter - Most Wanted Analytics Plugin para WordPress permite la inyecci\u00f3n SQL. Este problema afecta Advanced Page Visit Counter \u2013 Most Wanted Analytics Plugin para WordPress : desde n/a hasta 7.1.1."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
@ -27,10 +50,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pagevisitcounter:advanced_page_visit_counter:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "8.0.1",
"matchCriteriaId": "9336E6D6-81D1-41EC-B754-9521BEDA0AB3"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/advanced-page-visit-counter/wordpress-advanced-page-visit-counter-plugin-7-1-1-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-45167",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-11-10T04:15:07.070",
"lastModified": "2023-11-10T04:15:07.070",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM AIX's 7.3 Python implementation could allow a non-privileged local user to exploit a vulnerability to cause a denial of service. IBM X-Force ID: 267965."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://aix.software.ibm.com/aix/efixes/security/python_advisory6.asc",
"source": "psirt@us.ibm.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/267965",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/7068084",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46352",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-02T22:15:09.203",
"lastModified": "2023-11-03T13:22:51.977",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T04:13:07.300",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,74 @@
"value": "En el m\u00f3dulo \"Pixel Plus: Events + CAPI + Pixel Catalog for Facebook Module\" (facebookconversiontrackingplus) hasta la versi\u00f3n 2.4.9 de Smart Modules para PrestaShop, un invitado puede descargar informaci\u00f3n personal sin restricciones. Debido a la falta de control de permisos, un invitado puede acceder a las exportaciones desde el m\u00f3dulo, lo que puede provocar una filtraci\u00f3n de informaci\u00f3n personal de la tabla ps_customer, como nombre, apellido o correo electr\u00f3nico."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:smartmodules:facebookconversiontrackingplus:*:*:*:*:*:prestashop:*:*",
"versionEndExcluding": "2.4.9",
"matchCriteriaId": "B222E8F2-7971-4B07-B165-01EED2509C05"
}
]
}
]
}
],
"references": [
{
"url": "https://addons.prestashop.com/en/analytics-statistics/18739-pixel-plus-events-capi-pixel-catalog-for-facebook.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://security.friendsofpresta.org/modules/2023/10/31/facebookconversiontrackingplus.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-10T03:00:20.135476+00:00
2023-11-10T05:00:22.568479+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-10T02:15:07.560000+00:00
2023-11-10T04:20:06.593000+00:00
```
### Last Data Feed Release
@ -29,23 +29,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
230308
230309
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `1`
* [CVE-2023-46729](CVE-2023/CVE-2023-467xx/CVE-2023-46729.json) (`2023-11-10T01:15:07.430`)
* [CVE-2023-6069](CVE-2023/CVE-2023-60xx/CVE-2023-6069.json) (`2023-11-10T01:15:07.623`)
* [CVE-2023-45167](CVE-2023/CVE-2023-451xx/CVE-2023-45167.json) (`2023-11-10T04:15:07.070`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `29`
* [CVE-2023-5367](CVE-2023/CVE-2023-53xx/CVE-2023-5367.json) (`2023-11-10T02:15:07.383`)
* [CVE-2023-5380](CVE-2023/CVE-2023-53xx/CVE-2023-5380.json) (`2023-11-10T02:15:07.560`)
* [CVE-2023-39042](CVE-2023/CVE-2023-390xx/CVE-2023-39042.json) (`2023-11-10T04:10:50.210`)
* [CVE-2023-39047](CVE-2023/CVE-2023-390xx/CVE-2023-39047.json) (`2023-11-10T04:10:59.547`)
* [CVE-2023-39048](CVE-2023/CVE-2023-390xx/CVE-2023-39048.json) (`2023-11-10T04:11:07.203`)
* [CVE-2023-39050](CVE-2023/CVE-2023-390xx/CVE-2023-39050.json) (`2023-11-10T04:11:23.803`)
* [CVE-2023-39051](CVE-2023/CVE-2023-390xx/CVE-2023-39051.json) (`2023-11-10T04:11:41.413`)
* [CVE-2023-39053](CVE-2023/CVE-2023-390xx/CVE-2023-39053.json) (`2023-11-10T04:11:48.573`)
* [CVE-2023-39054](CVE-2023/CVE-2023-390xx/CVE-2023-39054.json) (`2023-11-10T04:11:57.213`)
* [CVE-2023-39057](CVE-2023/CVE-2023-390xx/CVE-2023-39057.json) (`2023-11-10T04:12:05.497`)
* [CVE-2023-39283](CVE-2023/CVE-2023-392xx/CVE-2023-39283.json) (`2023-11-10T04:12:27.713`)
* [CVE-2023-42299](CVE-2023/CVE-2023-422xx/CVE-2023-42299.json) (`2023-11-10T04:12:40.023`)
* [CVE-2023-43194](CVE-2023/CVE-2023-431xx/CVE-2023-43194.json) (`2023-11-10T04:12:56.120`)
* [CVE-2023-46352](CVE-2023/CVE-2023-463xx/CVE-2023-46352.json) (`2023-11-10T04:13:07.300`)
* [CVE-2023-45074](CVE-2023/CVE-2023-450xx/CVE-2023-45074.json) (`2023-11-10T04:17:33.087`)
* [CVE-2023-45069](CVE-2023/CVE-2023-450xx/CVE-2023-45069.json) (`2023-11-10T04:17:41.553`)
* [CVE-2023-45055](CVE-2023/CVE-2023-450xx/CVE-2023-45055.json) (`2023-11-10T04:17:47.710`)
* [CVE-2023-45046](CVE-2023/CVE-2023-450xx/CVE-2023-45046.json) (`2023-11-10T04:17:55.987`)
* [CVE-2023-45001](CVE-2023/CVE-2023-450xx/CVE-2023-45001.json) (`2023-11-10T04:18:01.923`)
* [CVE-2023-41685](CVE-2023/CVE-2023-416xx/CVE-2023-41685.json) (`2023-11-10T04:18:08.210`)
* [CVE-2023-40609](CVE-2023/CVE-2023-406xx/CVE-2023-40609.json) (`2023-11-10T04:18:14.100`)
* [CVE-2023-40207](CVE-2023/CVE-2023-402xx/CVE-2023-40207.json) (`2023-11-10T04:19:32.000`)
* [CVE-2023-38382](CVE-2023/CVE-2023-383xx/CVE-2023-38382.json) (`2023-11-10T04:19:37.937`)
* [CVE-2023-35911](CVE-2023/CVE-2023-359xx/CVE-2023-35911.json) (`2023-11-10T04:19:43.273`)
* [CVE-2023-28748](CVE-2023/CVE-2023-287xx/CVE-2023-28748.json) (`2023-11-10T04:19:54.407`)
* [CVE-2023-27605](CVE-2023/CVE-2023-276xx/CVE-2023-27605.json) (`2023-11-10T04:20:00.893`)
* [CVE-2023-33924](CVE-2023/CVE-2023-339xx/CVE-2023-33924.json) (`2023-11-10T04:20:06.593`)
## Download and Usage