Auto-Update: 2023-05-08T14:00:23.757161+00:00

This commit is contained in:
René Helmke 2023-05-08 16:00:26 +02:00
parent 280ccbd171
commit 457b8432e5
50 changed files with 1617 additions and 219 deletions

View File

@ -0,0 +1,97 @@
{
"id": "CVE-2012-5873",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-26T00:15:08.913",
"lastModified": "2023-05-08T13:37:47.017",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ARC (aka ARC2) through 2011-12-01 allows reflected XSS via the end_point.php query parameter in an output=htmltab action."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arc2_project:arc2:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2011-12-01",
"matchCriteriaId": "13F5C4DA-E912-4B4D-B969-C94D8E827292"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ush.it/2012/11/22/arc-v2011-12-01-multiple-vulnerabilities/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-5122",
"sourceIdentifier": "psirt@adobe.com",
"published": "2015-07-14T10:59:00.213",
"lastModified": "2021-09-08T17:19:26.350",
"lastModified": "2023-05-08T13:29:02.290",
"vulnStatus": "Modified",
"evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/416.html\" rel=\"nofollow\">CWE-416: Use After Free</a>",
"cisaExploitAdd": "2022-04-13",
@ -165,8 +165,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE"
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-8652",
"sourceIdentifier": "psirt@adobe.com",
"published": "2016-03-04T23:59:00.127",
"lastModified": "2023-01-30T17:53:11.660",
"lastModified": "2023-05-08T13:29:02.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -184,8 +184,8 @@
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE"
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-8653",
"sourceIdentifier": "psirt@adobe.com",
"published": "2016-03-04T23:59:01.797",
"lastModified": "2023-01-30T18:01:53.590",
"lastModified": "2023-05-08T13:29:02.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -184,8 +184,8 @@
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE"
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-8654",
"sourceIdentifier": "psirt@adobe.com",
"published": "2016-03-04T23:59:03.280",
"lastModified": "2023-01-30T17:42:30.153",
"lastModified": "2023-05-08T13:29:02.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -184,8 +184,8 @@
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE"
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-8655",
"sourceIdentifier": "psirt@adobe.com",
"published": "2016-03-04T23:59:04.390",
"lastModified": "2023-01-30T17:42:30.153",
"lastModified": "2023-05-08T13:29:02.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -184,8 +184,8 @@
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE"
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-8656",
"sourceIdentifier": "psirt@adobe.com",
"published": "2016-03-04T23:59:05.390",
"lastModified": "2023-01-30T17:32:01.140",
"lastModified": "2023-05-08T13:29:02.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -184,8 +184,8 @@
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE"
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-8657",
"sourceIdentifier": "psirt@adobe.com",
"published": "2016-03-04T23:59:06.640",
"lastModified": "2023-01-30T17:32:07.363",
"lastModified": "2023-05-08T13:29:02.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -184,8 +184,8 @@
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE"
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-8658",
"sourceIdentifier": "psirt@adobe.com",
"published": "2016-03-04T23:59:07.843",
"lastModified": "2023-01-30T17:32:13.390",
"lastModified": "2023-05-08T13:29:02.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -184,8 +184,8 @@
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE"
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-8820",
"sourceIdentifier": "psirt@adobe.com",
"published": "2016-03-04T23:59:08.890",
"lastModified": "2023-01-30T17:32:26.020",
"lastModified": "2023-05-08T13:29:02.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -184,8 +184,8 @@
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE"
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-8821",
"sourceIdentifier": "psirt@adobe.com",
"published": "2016-03-04T23:59:09.813",
"lastModified": "2023-01-30T17:53:01.510",
"lastModified": "2023-05-08T13:29:02.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -184,8 +184,8 @@
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE"
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-8822",
"sourceIdentifier": "psirt@adobe.com",
"published": "2016-03-04T23:59:10.687",
"lastModified": "2023-01-30T17:32:30.563",
"lastModified": "2023-05-08T13:29:02.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -184,8 +184,8 @@
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE"
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
},
{
"vulnerable": false,

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-0959",
"sourceIdentifier": "psirt@adobe.com",
"published": "2017-06-27T20:29:00.807",
"lastModified": "2018-01-05T02:30:31.040",
"lastModified": "2023-05-08T13:29:02.290",
"vulnStatus": "Modified",
"descriptions": [
{
@ -240,8 +240,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.0:*:*:*:*:*:*:*:*",
"matchCriteriaId": "461CBD40-CB18-4868-BAB4-CCBD724B9E07"
"criteria": "cpe:2.3:o:microsoft:windows_8:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B960E10-B1BD-494E-9A52-3FCA90AD2D85"
},
{
"vulnerable": false,

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-7808",
"sourceIdentifier": "vuln@krcert.or.kr",
"published": "2020-05-21T19:15:10.883",
"lastModified": "2020-05-22T13:10:47.297",
"lastModified": "2023-05-08T13:29:02.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -141,8 +141,8 @@
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE"
"criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-45812",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-08T13:15:09.443",
"lastModified": "2023-05-08T13:26:36.163",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (subscriber+) Stored Cross-Site Scripting (XSS) vulnerability in Martin Lees Exxp plugin <=\u00a02.6.8 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/exxp-wp/wordpress-exxp-plugin-2-6-8-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-45818",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-04T13:15:13.580",
"lastModified": "2023-05-04T18:45:32.047",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:39:29.693",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:essentialplugin:hero_banner_ultimate:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.4",
"matchCriteriaId": "6E6990C7-1942-4FCE-9A66-7E4DEBA528A2"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/hero-banner-ultimate/wordpress-hero-banner-ultimate-plugin-1-3-4-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-46799",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-08T12:15:09.313",
"lastModified": "2023-05-08T12:50:24.320",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Easy Testimonial Slider and Form plugin <=\u00a01.0.15 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/easy-testimonial-rotator/wordpress-easy-testimonial-slider-and-form-plugin-1-0-15-cross-site-scripting-xss?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,116 +2,14 @@
"id": "CVE-2023-2248",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-05-01T13:15:44.907",
"lastModified": "2023-05-06T03:13:18.127",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-08T12:15:10.367",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "A heap out-of-bounds read/write vulnerability in the Linux Kernel traffic control (QoS) subsystem can be exploited to achieve local privilege escalation.\n\nThe\u00a0qfq_change_class function does not properly limit the lmax variable which can lead to out-of-bounds read/write.\u00a0If the TCA_QFQ_LMAX value is not offered through nlattr, lmax is determined by the MTU value of the network device. The MTU of the loopback device can be set up to 2^31-1 and as a result, it is possible to have an lmax value that exceeds QFQ_MIN_LMAX.\n\nWe recommend upgrading past commit 3037933448f60f9acb705997eae62013ecb81e0d.\n\n"
"value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it was the duplicate of CVE-2023-31436."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "cve-coordination@google.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cve-coordination@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.7",
"versionEndExcluding": "6.3",
"matchCriteriaId": "232D1582-B5F3-4554-A12C-92E5604A13B3"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3037933448f60f9acb705997eae62013ecb81e0d",
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Mailing List",
"Patch"
]
},
{
"url": "https://kernel.dance/3037933448f60f9acb705997eae62013ecb81e0d",
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Patch"
]
}
]
"metrics": {},
"references": []
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-23668",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-08T12:15:09.440",
"lastModified": "2023-05-08T12:50:24.320",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in GiveWP plugin\u00a0<= 2.25.1 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/give/wordpress-givewp-plugin-2-25-1-contributor-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23723",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-02T12:15:22.430",
"lastModified": "2023-05-02T12:56:12.940",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:40:17.417",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:winwar:wp_email_capture:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.10",
"matchCriteriaId": "C2F6EEB5-CA1D-49D2-A7CE-B90F766B63DA"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-email-capture/wordpress-wordpress-email-marketing-plugin-wp-email-capture-plugin-3-9-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23808",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-03T15:15:11.770",
"lastModified": "2023-05-03T15:23:46.587",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:45:40.917",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sponsors_carousel_project:sponsors_carousel:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.02",
"matchCriteriaId": "E4ADB11D-CBD0-47CB-8726-35FD25A58427"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sponsors-carousel/wordpress-sponsors-carousel-plugin-4-02-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23809",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-03T15:15:12.117",
"lastModified": "2023-05-03T15:23:46.587",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:45:31.337",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:finviz:stock_market_charts_from_finviz:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.1",
"matchCriteriaId": "07326BB8-DC17-4A0E-B4ED-1B16754364F4"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/stock-market-charts-from-finviz/wordpress-stock-market-charts-from-finviz-plugin-1-0-cross-site-scripting-xss-vulnerability",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23830",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-03T16:15:09.717",
"lastModified": "2023-05-03T19:07:24.620",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:41:15.720",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:profilepress:profilepress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.5.5",
"matchCriteriaId": "B2F5B21D-51F6-49A3-B52A-0B55EC4F87DB"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-user-avatar/wordpress-profilepress-plugin-4-5-4-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23875",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-03T16:15:10.130",
"lastModified": "2023-05-03T19:07:24.620",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:30:47.220",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bing_site_verification_plugin_using_meta_tag_project:bing_site_verification_plugin_using_meta_tag:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "004683FA-99C5-49B8-AB6E-B8C16D1CB016"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/bing-site-verification-using-meta-tag/wordpress-bing-site-verification-plugin-using-meta-tag-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23881",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-03T16:15:10.237",
"lastModified": "2023-05-03T19:07:24.620",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:37:37.803",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -36,7 +56,7 @@
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,12 +64,43 @@
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:greentreelabs:circles_gallery:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.10",
"matchCriteriaId": "DDAC9074-445A-4DB2-B941-B65500769001"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/circles-gallery/wordpress-circles-gallery-plugin-1-0-10-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25021",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-08T12:15:09.527",
"lastModified": "2023-05-08T12:50:24.320",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in FareHarbor FareHarbor for WordPress plugin <=\u00a03.6.6 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/fareharbor/wordpress-fareharbor-for-wordpress-plugin-3-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25052",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-08T13:15:09.537",
"lastModified": "2023-05-08T13:26:36.163",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Teplitsa Yandex.News Feed by Teplitsa plugin <=\u00a01.12.5 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/yandexnews-feed-by-teplitsa/wordpress-yandex-news-feed-by-teplitsa-plugin-1-12-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25452",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-08T13:15:09.593",
"lastModified": "2023-05-08T13:26:36.163",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Michael Pretty (prettyboymp) CMS Press plugin <=\u00a00.2.3 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cms-press/wordpress-cms-press-plugin-0-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25458",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-04T20:15:09.797",
"lastModified": "2023-05-05T13:33:53.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:38:48.890",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gmo:typesquare_webfonts_for_conoha:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.4",
"matchCriteriaId": "85386782-8FF3-4FDE-B1B6-4BFBB098DAA9"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ts-webfonts-for-conoha/wordpress-typesquare-webfonts-for-conoha-plugin-2-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2023-25754",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-08T12:15:09.613",
"lastModified": "2023-05-08T12:50:24.320",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Privilege Context Switching Error vulnerability in Apache Software Foundation Apache Airflow.This issue affects Apache Airflow: before 2.6.0.\n\n"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-270"
}
]
}
],
"references": [
{
"url": "https://github.com/apache/airflow/pull/29506",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/3y83gr0qb8t49ppfk4fb2yk7md8ltq4v",
"source": "security@apache.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25961",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-04T20:15:09.897",
"lastModified": "2023-05-05T13:33:53.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:30:06.533",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -36,7 +56,7 @@
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,12 +64,43 @@
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:catchthemes:darcie:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.6",
"matchCriteriaId": "304F0D5F-0015-497C-B223-BCE964EE97F6"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/darcie/wordpress-darcie-theme-1-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25967",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-03T16:15:10.480",
"lastModified": "2023-05-03T19:07:24.620",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:44:41.297",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:peepso:peepso:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "6.0.3.0",
"matchCriteriaId": "E2FCF17F-2813-4C83-A05B-827BAF5F2838"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/peepso-core/wordpress-community-by-peepso-social-network-membership-registration-user-profiles-plugin-6-0-2-0-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25977",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-04T20:15:09.977",
"lastModified": "2023-05-05T13:33:53.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:29:20.623",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:9seeds:cpt_-_speakers:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1",
"matchCriteriaId": "A7A26631-1BA4-45FC-B313-EC5D9AE41F4A"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cpt-speakers/wordpress-cpt-speakers-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25982",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-04T20:15:10.060",
"lastModified": "2023-05-05T13:33:53.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:32:45.317",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simple_youtube_responsive_project:simple_youtube_responsive:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.0",
"matchCriteriaId": "EC8E7C10-7DD8-4CE3-9303-220F178766E4"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/simple-youtube-responsive/wordpress-simple-youtube-responsive-plugin-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2534",
"sourceIdentifier": "security@otrs.com",
"published": "2023-05-08T08:15:43.673",
"lastModified": "2023-05-08T08:15:43.673",
"vulnStatus": "Received",
"lastModified": "2023-05-08T12:50:24.320",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2566",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-08T05:15:09.860",
"lastModified": "2023-05-08T05:15:09.860",
"vulnStatus": "Received",
"lastModified": "2023-05-08T12:50:24.320",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-2573",
"sourceIdentifier": "office@cyberdanube.com",
"published": "2023-05-08T13:15:09.710",
"lastModified": "2023-05-08T13:26:36.163",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the NTP server input field, which can be triggered by authenticated users via a crafted POST request.\n\n\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "office@cyberdanube.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "office@cyberdanube.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BEBL",
"source": "office@cyberdanube.com"
},
{
"url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BECT",
"source": "office@cyberdanube.com"
},
{
"url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BED3",
"source": "office@cyberdanube.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-2574",
"sourceIdentifier": "office@cyberdanube.com",
"published": "2023-05-08T13:15:09.790",
"lastModified": "2023-05-08T13:26:36.163",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the device name input field, which can be triggered by authenticated users via a crafted POST request.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "office@cyberdanube.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "office@cyberdanube.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BEBL",
"source": "office@cyberdanube.com"
},
{
"url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BECT",
"source": "office@cyberdanube.com"
},
{
"url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BED3",
"source": "office@cyberdanube.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-2575",
"sourceIdentifier": "office@cyberdanube.com",
"published": "2023-05-08T13:15:09.847",
"lastModified": "2023-05-08T13:26:36.163",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a\u00a0Stack-based Buffer Overflow vulnerability, which can be triggered by authenticated\u00a0users via a crafted POST request."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "office@cyberdanube.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "office@cyberdanube.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BEBL",
"source": "office@cyberdanube.com"
},
{
"url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BECT",
"source": "office@cyberdanube.com"
},
{
"url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BED3",
"source": "office@cyberdanube.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26017",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-03T16:15:10.747",
"lastModified": "2023-05-03T19:07:24.620",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:44:04.073",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:blueglass:jobs_for_wordpress:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.5.11",
"matchCriteriaId": "C64C971B-4E35-4B16-88FB-1FD0A4E32548"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/job-postings/wordpress-jobs-for-wordpress-plugin-2-5-10-2-cross-site-scripting-xss?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27999",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-05-03T22:15:19.200",
"lastModified": "2023-05-04T13:03:05.007",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:50:59.043",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@fortinet.com",
"type": "Secondary",
@ -34,10 +54,49 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.1.0",
"versionEndExcluding": "7.1.2",
"matchCriteriaId": "30963483-E0D5-4B71-B649-79194ACC77BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "74B0A112-AA30-4D11-8F36-3DC8A2EBCA16"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-22-297",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-28169",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-08T13:15:09.650",
"lastModified": "2023-05-08T13:26:36.163",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in CoreFortress Easy Event calendar plugin <=\u00a01.0 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/easy-event-calendar/wordpress-easy-event-calendar-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28261",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-27T19:15:20.350",
"lastModified": "2023-04-28T12:58:13.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:58:25.660",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N",
@ -34,10 +54,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:extended_stable:*:*:*",
"versionEndExcluding": "110.0.1587.78",
"matchCriteriaId": "BA4E37D9-C3B9-4C5B-8DDD-106A86F53C98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
"versionEndExcluding": "111.0.1661.54",
"matchCriteriaId": "2CE1CC18-EB72-42F8-B77D-CC53F8D66146"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28261",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28286",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-27T19:15:20.467",
"lastModified": "2023-04-28T12:58:13.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:54:28.333",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:extended_stable:*:*:*",
"versionEndExcluding": "110.0.1587.78",
"matchCriteriaId": "BA4E37D9-C3B9-4C5B-8DDD-106A86F53C98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
"versionEndExcluding": "111.0.1661.54",
"matchCriteriaId": "2CE1CC18-EB72-42F8-B77D-CC53F8D66146"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28286",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29247",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-08T10:15:09.163",
"lastModified": "2023-05-08T10:15:09.163",
"vulnStatus": "Received",
"lastModified": "2023-05-08T12:50:24.320",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29334",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-04-28T18:15:26.390",
"lastModified": "2023-04-28T18:25:52.200",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-08T13:40:30.013",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
"versionEndExcluding": "112.0.1722.48",
"matchCriteriaId": "B3088A0C-1AB8-411A-B9E7-A756BD40E4C9"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29334",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30018",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T04:15:09.247",
"lastModified": "2023-05-08T04:15:09.247",
"vulnStatus": "Received",
"lastModified": "2023-05-08T12:50:24.320",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31038",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-08T09:15:09.280",
"lastModified": "2023-05-08T09:15:09.280",
"vulnStatus": "Received",
"lastModified": "2023-05-08T12:50:24.320",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31039",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-08T09:15:09.637",
"lastModified": "2023-05-08T09:15:09.637",
"vulnStatus": "Received",
"lastModified": "2023-05-08T12:50:24.320",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-08T12:00:23.949742+00:00
2023-05-08T14:00:23.757161+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-08T10:15:09.230000+00:00
2023-05-08T13:58:25.660000+00:00
```
### Last Data Feed Release
@ -29,21 +29,68 @@ Download and Changelog: [Click](releases/latest)
### Total Number of included CVEs
```plain
214196
214207
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `11`
* [CVE-2023-29247](CVE-2023/CVE-2023-292xx/CVE-2023-29247.json) (`2023-05-08T10:15:09.163`)
* [CVE-2022-45812](CVE-2022/CVE-2022-458xx/CVE-2022-45812.json) (`2023-05-08T13:15:09.443`)
* [CVE-2022-46799](CVE-2022/CVE-2022-467xx/CVE-2022-46799.json) (`2023-05-08T12:15:09.313`)
* [CVE-2023-23668](CVE-2023/CVE-2023-236xx/CVE-2023-23668.json) (`2023-05-08T12:15:09.440`)
* [CVE-2023-25021](CVE-2023/CVE-2023-250xx/CVE-2023-25021.json) (`2023-05-08T12:15:09.527`)
* [CVE-2023-25052](CVE-2023/CVE-2023-250xx/CVE-2023-25052.json) (`2023-05-08T13:15:09.537`)
* [CVE-2023-25452](CVE-2023/CVE-2023-254xx/CVE-2023-25452.json) (`2023-05-08T13:15:09.593`)
* [CVE-2023-2573](CVE-2023/CVE-2023-25xx/CVE-2023-2573.json) (`2023-05-08T13:15:09.710`)
* [CVE-2023-2574](CVE-2023/CVE-2023-25xx/CVE-2023-2574.json) (`2023-05-08T13:15:09.790`)
* [CVE-2023-2575](CVE-2023/CVE-2023-25xx/CVE-2023-2575.json) (`2023-05-08T13:15:09.847`)
* [CVE-2023-25754](CVE-2023/CVE-2023-257xx/CVE-2023-25754.json) (`2023-05-08T12:15:09.613`)
* [CVE-2023-28169](CVE-2023/CVE-2023-281xx/CVE-2023-28169.json) (`2023-05-08T13:15:09.650`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `38`
* [CVE-2023-2251](CVE-2023/CVE-2023-22xx/CVE-2023-2251.json) (`2023-05-08T10:15:09.230`)
* [CVE-2012-5873](CVE-2012/CVE-2012-58xx/CVE-2012-5873.json) (`2023-05-08T13:37:47.017`)
* [CVE-2015-5122](CVE-2015/CVE-2015-51xx/CVE-2015-5122.json) (`2023-05-08T13:29:02.290`)
* [CVE-2015-8652](CVE-2015/CVE-2015-86xx/CVE-2015-8652.json) (`2023-05-08T13:29:02.290`)
* [CVE-2015-8653](CVE-2015/CVE-2015-86xx/CVE-2015-8653.json) (`2023-05-08T13:29:02.290`)
* [CVE-2015-8654](CVE-2015/CVE-2015-86xx/CVE-2015-8654.json) (`2023-05-08T13:29:02.290`)
* [CVE-2015-8655](CVE-2015/CVE-2015-86xx/CVE-2015-8655.json) (`2023-05-08T13:29:02.290`)
* [CVE-2015-8656](CVE-2015/CVE-2015-86xx/CVE-2015-8656.json) (`2023-05-08T13:29:02.290`)
* [CVE-2015-8657](CVE-2015/CVE-2015-86xx/CVE-2015-8657.json) (`2023-05-08T13:29:02.290`)
* [CVE-2015-8658](CVE-2015/CVE-2015-86xx/CVE-2015-8658.json) (`2023-05-08T13:29:02.290`)
* [CVE-2015-8820](CVE-2015/CVE-2015-88xx/CVE-2015-8820.json) (`2023-05-08T13:29:02.290`)
* [CVE-2015-8821](CVE-2015/CVE-2015-88xx/CVE-2015-8821.json) (`2023-05-08T13:29:02.290`)
* [CVE-2015-8822](CVE-2015/CVE-2015-88xx/CVE-2015-8822.json) (`2023-05-08T13:29:02.290`)
* [CVE-2016-0959](CVE-2016/CVE-2016-09xx/CVE-2016-0959.json) (`2023-05-08T13:29:02.290`)
* [CVE-2020-7808](CVE-2020/CVE-2020-78xx/CVE-2020-7808.json) (`2023-05-08T13:29:02.290`)
* [CVE-2022-45818](CVE-2022/CVE-2022-458xx/CVE-2022-45818.json) (`2023-05-08T13:39:29.693`)
* [CVE-2023-2248](CVE-2023/CVE-2023-22xx/CVE-2023-2248.json) (`2023-05-08T12:15:10.367`)
* [CVE-2023-23723](CVE-2023/CVE-2023-237xx/CVE-2023-23723.json) (`2023-05-08T13:40:17.417`)
* [CVE-2023-23808](CVE-2023/CVE-2023-238xx/CVE-2023-23808.json) (`2023-05-08T13:45:40.917`)
* [CVE-2023-23809](CVE-2023/CVE-2023-238xx/CVE-2023-23809.json) (`2023-05-08T13:45:31.337`)
* [CVE-2023-23830](CVE-2023/CVE-2023-238xx/CVE-2023-23830.json) (`2023-05-08T13:41:15.720`)
* [CVE-2023-23875](CVE-2023/CVE-2023-238xx/CVE-2023-23875.json) (`2023-05-08T13:30:47.220`)
* [CVE-2023-23881](CVE-2023/CVE-2023-238xx/CVE-2023-23881.json) (`2023-05-08T13:37:37.803`)
* [CVE-2023-2534](CVE-2023/CVE-2023-25xx/CVE-2023-2534.json) (`2023-05-08T12:50:24.320`)
* [CVE-2023-25458](CVE-2023/CVE-2023-254xx/CVE-2023-25458.json) (`2023-05-08T13:38:48.890`)
* [CVE-2023-2566](CVE-2023/CVE-2023-25xx/CVE-2023-2566.json) (`2023-05-08T12:50:24.320`)
* [CVE-2023-25961](CVE-2023/CVE-2023-259xx/CVE-2023-25961.json) (`2023-05-08T13:30:06.533`)
* [CVE-2023-25967](CVE-2023/CVE-2023-259xx/CVE-2023-25967.json) (`2023-05-08T13:44:41.297`)
* [CVE-2023-25977](CVE-2023/CVE-2023-259xx/CVE-2023-25977.json) (`2023-05-08T13:29:20.623`)
* [CVE-2023-25982](CVE-2023/CVE-2023-259xx/CVE-2023-25982.json) (`2023-05-08T13:32:45.317`)
* [CVE-2023-26017](CVE-2023/CVE-2023-260xx/CVE-2023-26017.json) (`2023-05-08T13:44:04.073`)
* [CVE-2023-27999](CVE-2023/CVE-2023-279xx/CVE-2023-27999.json) (`2023-05-08T13:50:59.043`)
* [CVE-2023-28261](CVE-2023/CVE-2023-282xx/CVE-2023-28261.json) (`2023-05-08T13:58:25.660`)
* [CVE-2023-28286](CVE-2023/CVE-2023-282xx/CVE-2023-28286.json) (`2023-05-08T13:54:28.333`)
* [CVE-2023-29247](CVE-2023/CVE-2023-292xx/CVE-2023-29247.json) (`2023-05-08T12:50:24.320`)
* [CVE-2023-29334](CVE-2023/CVE-2023-293xx/CVE-2023-29334.json) (`2023-05-08T13:40:30.013`)
* [CVE-2023-30018](CVE-2023/CVE-2023-300xx/CVE-2023-30018.json) (`2023-05-08T12:50:24.320`)
* [CVE-2023-31038](CVE-2023/CVE-2023-310xx/CVE-2023-31038.json) (`2023-05-08T12:50:24.320`)
* [CVE-2023-31039](CVE-2023/CVE-2023-310xx/CVE-2023-31039.json) (`2023-05-08T12:50:24.320`)
## Download and Usage