Auto-Update: 2023-08-08T14:00:33.520996+00:00

This commit is contained in:
cad-safe-bot 2023-08-08 14:00:37 +00:00
parent e64822b620
commit 46a4818f6e
145 changed files with 1901 additions and 289 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41544", "id": "CVE-2021-41544",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:12.500", "published": "2023-08-08T10:15:12.500",
"lastModified": "2023-08-08T10:15:12.500", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-39062", "id": "CVE-2022-39062",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:12.657", "published": "2023-08-08T10:15:12.657",
"lastModified": "2023-08-08T10:15:12.657", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-40510", "id": "CVE-2022-40510",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:12.757", "published": "2023-08-08T10:15:12.757",
"lastModified": "2023-08-08T10:15:12.757", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-45821",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T12:15:10.010",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in NooTheme Noo Timetable plugin <=\u00a02.1.3 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/noo-timetable/wordpress-noo-timetable-responsive-calendar-auto-sync-wordpress-plugin-plugin-2-1-3-cross-site-scripting-xss?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46900", "id": "CVE-2022-46900",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-07-25T20:15:13.087", "published": "2023-07-25T20:15:13.087",
"lastModified": "2023-08-01T01:30:08.263", "lastModified": "2023-08-08T13:15:09.817",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -79,6 +79,10 @@
"tags": [ "tags": [
"Not Applicable" "Not Applicable"
] ]
},
{
"url": "https://www.stryker.com/us/en/about/governance/cyber-security/product-security/vocera-report-server-vulnerabilities--cve-2022-46898--cve-2022-4.html",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,19 +2,52 @@
"id": "CVE-2023-1437", "id": "CVE-2023-1437",
"sourceIdentifier": "ics-cert@hq.dhs.gov", "sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-08-02T23:15:10.153", "published": "2023-08-02T23:15:10.153",
"lastModified": "2023-08-03T12:40:03.493", "lastModified": "2023-08-08T13:50:58.210",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent client could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files." "value": "All versions prior to 9.1.4 of Advantech WebAccess/SCADA are vulnerable to use of untrusted pointers. The RPC arguments the client sent client could contain raw memory pointers for the server to use as-is. This could allow an attacker to gain access to the remote file system and the ability to execute commands and overwrite files."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [ "weaknesses": [
{ {
"source": "ics-cert@hq.dhs.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -23,10 +56,32 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-02", "nodes": [
"source": "ics-cert@hq.dhs.gov" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:advantech:webaccess\\/scada:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.1.4",
"matchCriteriaId": "291FD4D3-18DC-4A9F-BF4C-CAF594A4669C"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-166-02",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21625", "id": "CVE-2023-21625",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:13.057", "published": "2023-08-08T10:15:13.057",
"lastModified": "2023-08-08T10:15:13.057", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21626", "id": "CVE-2023-21626",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:13.137", "published": "2023-08-08T10:15:13.137",
"lastModified": "2023-08-08T10:15:13.137", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21627", "id": "CVE-2023-21627",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:13.220", "published": "2023-08-08T10:15:13.220",
"lastModified": "2023-08-08T10:15:13.220", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21643", "id": "CVE-2023-21643",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:13.303", "published": "2023-08-08T10:15:13.303",
"lastModified": "2023-08-08T10:15:13.303", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21647", "id": "CVE-2023-21647",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:13.393", "published": "2023-08-08T10:15:13.393",
"lastModified": "2023-08-08T10:15:13.393", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21648", "id": "CVE-2023-21648",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:13.480", "published": "2023-08-08T10:15:13.480",
"lastModified": "2023-08-08T10:15:13.480", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21649", "id": "CVE-2023-21649",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:13.563", "published": "2023-08-08T10:15:13.563",
"lastModified": "2023-08-08T10:15:13.563", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21650", "id": "CVE-2023-21650",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:13.643", "published": "2023-08-08T10:15:13.643",
"lastModified": "2023-08-08T10:15:13.643", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21651", "id": "CVE-2023-21651",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:13.727", "published": "2023-08-08T10:15:13.727",
"lastModified": "2023-08-08T10:15:13.727", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21652", "id": "CVE-2023-21652",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:13.803", "published": "2023-08-08T10:15:13.803",
"lastModified": "2023-08-08T10:15:13.803", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22666", "id": "CVE-2023-22666",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:13.880", "published": "2023-08-08T10:15:13.880",
"lastModified": "2023-08-08T10:15:13.880", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-23829",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T12:15:10.283",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Pierre JEHAN Owl Carousel plugin <=\u00a00.5.3 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/owl-carousel/wordpress-owl-carousel-plugin-0-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-23877",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T12:15:10.450",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in bkmacdaddy designs Pinterest RSS Widget plugin <=\u00a02.3.1 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/pinterest-rss-widget/wordpress-pinterest-rss-widget-plugin-2-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-23880",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T12:15:10.573",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in ExactMetrics plugin <=\u00a07.14.1 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/google-analytics-dashboard-for-wp/wordpress-exactmetrics-plugin-7-14-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-24409",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T12:15:10.683",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution WP Responsive Tabs horizontal vertical and accordion Tabs plugin <=\u00a01.1.15 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/responsive-horizontal-vertical-and-accordion-tabs/wordpress-wp-responsive-tabs-horizontal-vertical-and-accordion-tabs-plugin-1-1-15-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-24413",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T12:15:10.817",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution WordPress vertical image slider plugin <=\u00a01.2.16 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-vertical-image-slider/wordpress-wordpress-vertical-image-slider-plugin-plugin-1-2-16-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24845", "id": "CVE-2023-24845",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:13.963", "published": "2023-08-08T10:15:13.963",
"lastModified": "2023-08-08T10:15:13.963", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25063",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T12:15:10.950",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Anadnet Quick Page/Post Redirect Plugin plugin <=\u00a05.2.3 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/quick-pagepost-redirect-plugin/wordpress-quick-page-post-redirect-plugin-plugin-5-2-3-cross-site-scripting-xss?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25459",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T12:15:11.077",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Postsnippets Post Snippets plugin <=\u00a04.0.2 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/post-snippets/wordpress-post-snippets-custom-wordpress-code-snippets-customizer-plugin-4-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25984",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T13:15:10.107",
"lastModified": "2023-08-08T13:57:34.073",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Rigorous & Factory Pattern Dovetail plugin <=\u00a01.2.13 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/dovetail/wordpress-dovetail-plugin-1-2-13-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26430", "id": "CVE-2023-26430",
"sourceIdentifier": "security@open-xchange.com", "sourceIdentifier": "security@open-xchange.com",
"published": "2023-08-02T13:15:10.217", "published": "2023-08-02T13:15:10.217",
"lastModified": "2023-08-03T16:15:10.303", "lastModified": "2023-08-08T13:58:19.070",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -12,6 +12,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{ {
"source": "security@open-xchange.com", "source": "security@open-xchange.com",
"type": "Secondary", "type": "Secondary",
@ -35,6 +55,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{ {
"source": "security@open-xchange.com", "source": "security@open-xchange.com",
"type": "Secondary", "type": "Secondary",
@ -46,22 +76,58 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html", "nodes": [
"source": "security@open-xchange.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_backend:7.10.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D41FD049-C028-4C6D-A9D7-9DD1820B2C5F"
}, },
{ {
"url": "http://seclists.org/fulldisclosure/2023/Aug/8", "vulnerable": true,
"source": "security@open-xchange.com" "criteria": "cpe:2.3:a:open-xchange:open-xchange_appsuite_backend:8.10.0:*:*:*:*:*:*:*",
}, "matchCriteriaId": "332D5572-4F7D-498F-9E01-F8555674B4B0"
{ }
"url": "https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0003.json", ]
"source": "security@open-xchange.com" }
}, ]
{ }
"url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf", ],
"source": "security@open-xchange.com" "references": [
{
"url": "http://packetstormsecurity.com/files/173943/OX-App-Suite-SSRF-SQL-Injection-Cross-Site-Scripting.html",
"source": "security@open-xchange.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Aug/8",
"source": "security@open-xchange.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://documentation.open-xchange.com/security/advisories/csaf/oxas-adv-2023-0003.json",
"source": "security@open-xchange.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://software.open-xchange.com/products/appsuite/doc/Release_Notes_for_Patch_Release_6230_7.10.6_2023-05-02.pdf",
"source": "security@open-xchange.com",
"tags": [
"Release Notes"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27411", "id": "CVE-2023-27411",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:14.183", "published": "2023-08-08T10:15:14.183",
"lastModified": "2023-08-08T10:15:14.183", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27412", "id": "CVE-2023-27412",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T11:15:09.953", "published": "2023-08-08T11:15:09.953",
"lastModified": "2023-08-08T11:15:09.953", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-27415",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T12:15:11.203",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Themeqx LetterPress plugin <=\u00a01.1.2 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/letterpress/wordpress-letterpress-plugin-1-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27416", "id": "CVE-2023-27416",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T11:15:10.287", "published": "2023-08-08T11:15:10.287",
"lastModified": "2023-08-08T11:15:10.287", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27421", "id": "CVE-2023-27421",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T11:15:10.520", "published": "2023-08-08T11:15:10.520",
"lastModified": "2023-08-08T11:15:10.520", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27422", "id": "CVE-2023-27422",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T11:15:10.737", "published": "2023-08-08T11:15:10.737",
"lastModified": "2023-08-08T11:15:10.737", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-27627",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T12:15:11.337",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in eggemplo Woocommerce Email Report plugin <=\u00a02.4 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wooemailreport/wordpress-woocommerce-email-report-plugin-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28537", "id": "CVE-2023-28537",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:14.287", "published": "2023-08-08T10:15:14.287",
"lastModified": "2023-08-08T10:15:14.287", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28555", "id": "CVE-2023-28555",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:14.373", "published": "2023-08-08T10:15:14.373",
"lastModified": "2023-08-08T10:15:14.373", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28561", "id": "CVE-2023-28561",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:14.447", "published": "2023-08-08T10:15:14.447",
"lastModified": "2023-08-08T10:15:14.447", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28575", "id": "CVE-2023-28575",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:14.537", "published": "2023-08-08T10:15:14.537",
"lastModified": "2023-08-08T10:15:14.537", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28576", "id": "CVE-2023-28576",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:14.640", "published": "2023-08-08T10:15:14.640",
"lastModified": "2023-08-08T10:15:14.640", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28577", "id": "CVE-2023-28577",
"sourceIdentifier": "product-security@qualcomm.com", "sourceIdentifier": "product-security@qualcomm.com",
"published": "2023-08-08T10:15:14.760", "published": "2023-08-08T10:15:14.760",
"lastModified": "2023-08-08T10:15:14.760", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-28773",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T13:15:10.233",
"lastModified": "2023-08-08T13:57:34.073",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Kolja Nolte Secondary Title plugin <=\u00a02.0.9.1 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/secondary-title/wordpress-secondary-title-plugin-2-0-9-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28830", "id": "CVE-2023-28830",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:14.847", "published": "2023-08-08T10:15:14.847",
"lastModified": "2023-08-08T10:15:14.847", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-28931",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T13:15:10.330",
"lastModified": "2023-08-08T13:57:34.073",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Never5 Post Connector plugin <=\u00a01.0.9 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/post-connector/wordpress-post-connector-plugin-1-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-28934",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T13:15:10.427",
"lastModified": "2023-08-08T13:57:34.073",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Mammothology WP Full Stripe Free plugin <=\u00a01.6.1 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-full-stripe-free/wordpress-wp-full-stripe-free-plugin-1-6-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29099", "id": "CVE-2023-29099",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T11:15:10.900", "published": "2023-08-08T11:15:10.900",
"lastModified": "2023-08-08T11:15:10.900", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-30482",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T13:15:10.520",
"lastModified": "2023-08-08T13:57:34.073",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in VillaTheme WPBulky plugin <=\u00a01.0.10 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wpbulky-wp-bulk-edit-post-types/wordpress-wpbulky-plugin-1-0-10-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30795", "id": "CVE-2023-30795",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:15.067", "published": "2023-08-08T10:15:15.067",
"lastModified": "2023-08-08T10:15:15.067", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30796", "id": "CVE-2023-30796",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:15.153", "published": "2023-08-08T10:15:15.153",
"lastModified": "2023-08-08T10:15:15.153", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-31221",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T13:15:10.617",
"lastModified": "2023-08-08T13:57:34.073",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Ransom Christofferson PDQ CSV plugin <=\u00a01.0.0 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/pdq-csv/wordpress-pdq-csv-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-32292",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T13:15:10.717",
"lastModified": "2023-08-08T13:57:34.073",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in GetButton Chat Button by GetButton.Io plugin <=\u00a01.8.9.4 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/whatshelp-chat-button/wordpress-chat-button-plugin-1-8-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32503", "id": "CVE-2023-32503",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T11:15:11.173", "published": "2023-08-08T11:15:11.173",
"lastModified": "2023-08-08T11:15:11.173", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3268", "id": "CVE-2023-3268",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-16T19:15:14.707", "published": "2023-06-16T19:15:14.707",
"lastModified": "2023-07-27T21:15:14.850", "lastModified": "2023-08-08T13:15:12.490",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -75,6 +75,14 @@
} }
], ],
"references": [ "references": [
{
"url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.3.2",
"source": "secalert@redhat.com"
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=43ec16f1450f4936025a9bdf1a273affdb9732c1",
"source": "secalert@redhat.com"
},
{ {
"url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html", "url": "https://lists.debian.org/debian-lts-announce/2023/07/msg00030.html",
"source": "secalert@redhat.com" "source": "secalert@redhat.com"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33993", "id": "CVE-2023-33993",
"sourceIdentifier": "cna@sap.com", "sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:15.367", "published": "2023-08-08T01:15:15.367",
"lastModified": "2023-08-08T01:15:15.367", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3526", "id": "CVE-2023-3526",
"sourceIdentifier": "info@cert.vde.com", "sourceIdentifier": "info@cert.vde.com",
"published": "2023-08-08T07:15:10.150", "published": "2023-08-08T07:15:10.150",
"lastModified": "2023-08-08T07:15:10.150", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3569", "id": "CVE-2023-3569",
"sourceIdentifier": "info@cert.vde.com", "sourceIdentifier": "info@cert.vde.com",
"published": "2023-08-08T07:15:10.480", "published": "2023-08-08T07:15:10.480",
"lastModified": "2023-08-08T07:15:10.480", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3570", "id": "CVE-2023-3570",
"sourceIdentifier": "info@cert.vde.com", "sourceIdentifier": "info@cert.vde.com",
"published": "2023-08-08T07:15:10.603", "published": "2023-08-08T07:15:10.603",
"lastModified": "2023-08-08T07:15:10.603", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3571", "id": "CVE-2023-3571",
"sourceIdentifier": "info@cert.vde.com", "sourceIdentifier": "info@cert.vde.com",
"published": "2023-08-08T07:15:10.727", "published": "2023-08-08T07:15:10.727",
"lastModified": "2023-08-08T07:15:10.727", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3572", "id": "CVE-2023-3572",
"sourceIdentifier": "info@cert.vde.com", "sourceIdentifier": "info@cert.vde.com",
"published": "2023-08-08T07:15:10.840", "published": "2023-08-08T07:15:10.840",
"lastModified": "2023-08-08T07:15:10.840", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3573", "id": "CVE-2023-3573",
"sourceIdentifier": "info@cert.vde.com", "sourceIdentifier": "info@cert.vde.com",
"published": "2023-08-08T07:15:10.957", "published": "2023-08-08T07:15:10.957",
"lastModified": "2023-08-08T07:15:10.957", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-36546",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T13:15:10.807",
"lastModified": "2023-08-08T13:57:34.073",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in PEStudio v.9.52 allows a remote attacker to execute arbitrary code via a crafted DLL file to the PESstudio exeutable."
}
],
"metrics": {},
"references": [
{
"url": "https://securitycafe.ro/2023/06/19/dll-hijacking-finding-vulnerabilities-in-pestudio-9-52/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36692", "id": "CVE-2023-36692",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T11:15:11.427", "published": "2023-08-08T11:15:11.427",
"lastModified": "2023-08-08T11:15:11.427", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36923", "id": "CVE-2023-36923",
"sourceIdentifier": "cna@sap.com", "sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:16.647", "published": "2023-08-08T01:15:16.647",
"lastModified": "2023-08-08T01:15:16.647", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-36926", "id": "CVE-2023-36926",
"sourceIdentifier": "cna@sap.com", "sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:17.003", "published": "2023-08-08T01:15:17.003",
"lastModified": "2023-08-08T01:15:17.003", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Due to missing authentication check in SAP Host Agent - version 7.22, an unauthenticated attacker can set an undocumented parameter to a particular compatibility value and in turn call read functions. This allows the attacker to gather some non-sensitive information about the server.\u00a0 There is no impact on integrity or availability.\n\n" "value": "Due to missing authentication check in SAP Host Agent - version 7.22, an unauthenticated attacker can set an undocumented parameter to a particular compatibility value and in turn call read functions. This allows the attacker to gather some non-sensitive information about the server.\u00a0 There is no impact on integrity or availability.\n\n"
},
{
"lang": "es",
"value": "Debido a la falta de comprobaci\u00f3n de autenticaci\u00f3n en SAP Host Agent - versi\u00f3n 7.22, un atacante no autenticado puede establecer un par\u00e1metro no documentado a un valor de compatibilidad particular y a su vez llamar a funciones de lectura. Esto permite al atacante recopilar informaci\u00f3n no sensible sobre el servidor. No hay impacto en la integridad o disponibilidad. "
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37372", "id": "CVE-2023-37372",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:15.440", "published": "2023-08-08T10:15:15.440",
"lastModified": "2023-08-08T10:15:15.440", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37373", "id": "CVE-2023-37373",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:15.520", "published": "2023-08-08T10:15:15.520",
"lastModified": "2023-08-08T10:15:15.520", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37483", "id": "CVE-2023-37483",
"sourceIdentifier": "cna@sap.com", "sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:17.313", "published": "2023-08-08T01:15:17.313",
"lastModified": "2023-08-08T01:15:17.313", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37484", "id": "CVE-2023-37484",
"sourceIdentifier": "cna@sap.com", "sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:17.627", "published": "2023-08-08T01:15:17.627",
"lastModified": "2023-08-08T01:15:17.627", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37486", "id": "CVE-2023-37486",
"sourceIdentifier": "cna@sap.com", "sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:17.907", "published": "2023-08-08T01:15:17.907",
"lastModified": "2023-08-08T01:15:17.907", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37487", "id": "CVE-2023-37487",
"sourceIdentifier": "cna@sap.com", "sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:18.247", "published": "2023-08-08T01:15:18.247",
"lastModified": "2023-08-08T01:15:18.247", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37488", "id": "CVE-2023-37488",
"sourceIdentifier": "cna@sap.com", "sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:18.483", "published": "2023-08-08T01:15:18.483",
"lastModified": "2023-08-08T01:15:18.483", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37490", "id": "CVE-2023-37490",
"sourceIdentifier": "cna@sap.com", "sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:18.677", "published": "2023-08-08T01:15:18.677",
"lastModified": "2023-08-08T01:15:18.677", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37491", "id": "CVE-2023-37491",
"sourceIdentifier": "cna@sap.com", "sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:18.840", "published": "2023-08-08T01:15:18.840",
"lastModified": "2023-08-08T01:15:18.840", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37492", "id": "CVE-2023-37492",
"sourceIdentifier": "cna@sap.com", "sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:18.993", "published": "2023-08-08T01:15:18.993",
"lastModified": "2023-08-08T01:15:18.993", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37569", "id": "CVE-2023-37569",
"sourceIdentifier": "vdisclose@cert-in.org.in", "sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2023-08-08T09:15:10.620", "published": "2023-08-08T09:15:10.620",
"lastModified": "2023-08-08T09:15:10.620", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37570", "id": "CVE-2023-37570",
"sourceIdentifier": "vdisclose@cert-in.org.in", "sourceIdentifier": "vdisclose@cert-in.org.in",
"published": "2023-08-08T09:15:10.783", "published": "2023-08-08T09:15:10.783",
"lastModified": "2023-08-08T09:15:10.783", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-37682",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T12:15:11.477",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Judging Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /php-jms/deductScores.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/rt122001/CVES/blob/main/CVE-2023-37682.txt",
"source": "cve@mitre.org"
},
{
"url": "https://www.sourcecodester.com/php/15910/judging-management-system-using-php-and-mysql-free-source-code.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-37683",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T12:15:11.587",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Online Nurse Hiring System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the Profile Page of the Admin."
}
],
"metrics": {},
"references": [
{
"url": "http://online.com",
"source": "cve@mitre.org"
},
{
"url": "http://phpgurukul.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/rt122001/CVES/blob/main/CVE-2023-37683.txt",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-37684",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T12:15:11.677",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Online Nurse Hiring System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the Search Report Details of the Admin portal."
}
],
"metrics": {},
"references": [
{
"url": "http://online.com",
"source": "cve@mitre.org"
},
{
"url": "http://phpgurukul.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/rt122001/CVES/blob/main/CVE-2023-37684.txt",
"source": "cve@mitre.org"
},
{
"url": "https://phpgurukul.com/online-nurse-hiring-system-using-php-and-mysql/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-37685",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T12:15:11.773",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Online Nurse Hiring System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the Search Report Page of the Admin portal."
}
],
"metrics": {},
"references": [
{
"url": "http://online.com",
"source": "cve@mitre.org"
},
{
"url": "http://phpgurukul.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/rt122001/CVES/blob/main/CVE-2023-37685.txt",
"source": "cve@mitre.org"
},
{
"url": "https://phpgurukul.com/online-nurse-hiring-system-using-php-and-mysql/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-37686",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T12:15:11.877",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Online Nurse Hiring System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the Add Nurse Page in the Admin portal."
}
],
"metrics": {},
"references": [
{
"url": "http://online.com",
"source": "cve@mitre.org"
},
{
"url": "http://phpgurukul.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/rt122001/CVES/blob/main/CVE-2023-37686.txt",
"source": "cve@mitre.org"
},
{
"url": "https://phpgurukul.com/online-nurse-hiring-system-using-php-and-mysql/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-37687",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T12:15:11.967",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Online Nurse Hiring System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the View Request of Nurse Page in the Admin portal."
}
],
"metrics": {},
"references": [
{
"url": "http://online.com",
"source": "cve@mitre.org"
},
{
"url": "http://phpgurukul.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/rt122001/CVES/blob/main/CVE-2023-37687.txt",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-37688",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T12:15:12.077",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Maid Hiring Management System v1.0 was discovered to contain a SQL injection vulnerability in the Admin page."
}
],
"metrics": {},
"references": [
{
"url": "http://maid.com",
"source": "cve@mitre.org"
},
{
"url": "http://phpgurukul.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/rt122001/CVES/blob/main/CVE-2023-37688.txt",
"source": "cve@mitre.org"
},
{
"url": "https://phpgurukul.com/maid-hiring-management-system-using-php-and-mysql/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-37689",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T12:15:12.150",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Maid Hiring Management System v1.0 was discovered to contain a SQL injection vulnerability in the Booking Request page."
}
],
"metrics": {},
"references": [
{
"url": "http://maid.com",
"source": "cve@mitre.org"
},
{
"url": "http://phpgurukul.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/rt122001/CVES/blob/main/CVE-2023-37689.txt",
"source": "cve@mitre.org"
},
{
"url": "https://phpgurukul.com/maid-hiring-management-system-using-php-and-mysql/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-37690",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-08-08T12:15:12.250",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Maid Hiring Management System v1.0 was discovered to contain a SQL injection vulnerability in the Search Maid page."
}
],
"metrics": {},
"references": [
{
"url": "http://maid.com",
"source": "cve@mitre.org"
},
{
"url": "http://phpgurukul.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/rt122001/CVES/blob/main/CVE-2023-37690.txt",
"source": "cve@mitre.org"
},
{
"url": "https://phpgurukul.com/maid-hiring-management-system-using-php-and-mysql/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-3716",
"sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-08-08T12:15:12.417",
"lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Oduyo Online Collection Software allows SQL Injection.This issue affects Online Collection Software: before 1.0.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0442",
"source": "cve@usom.gov.tr"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3717", "id": "CVE-2023-3717",
"sourceIdentifier": "cve@usom.gov.tr", "sourceIdentifier": "cve@usom.gov.tr",
"published": "2023-08-08T11:15:11.763", "published": "2023-08-08T11:15:11.763",
"lastModified": "2023-08-08T11:15:11.763", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-38384",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-08-08T13:15:10.870",
"lastModified": "2023-08-08T13:57:34.073",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Syntactics, Inc. EaSYNC plugin <=\u00a01.3.7 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/easync-booking/wordpress-easync-plugin-1-3-6-reflected-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38524", "id": "CVE-2023-38524",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:15.627", "published": "2023-08-08T10:15:15.627",
"lastModified": "2023-08-08T10:15:15.627", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38525", "id": "CVE-2023-38525",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:15.723", "published": "2023-08-08T10:15:15.723",
"lastModified": "2023-08-08T10:15:15.723", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38526", "id": "CVE-2023-38526",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:15.817", "published": "2023-08-08T10:15:15.817",
"lastModified": "2023-08-08T10:15:15.817", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38527", "id": "CVE-2023-38527",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:15.923", "published": "2023-08-08T10:15:15.923",
"lastModified": "2023-08-08T10:15:15.923", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38528", "id": "CVE-2023-38528",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:16.023", "published": "2023-08-08T10:15:16.023",
"lastModified": "2023-08-08T10:15:16.023", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38529", "id": "CVE-2023-38529",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:16.127", "published": "2023-08-08T10:15:16.127",
"lastModified": "2023-08-08T10:15:16.127", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38530", "id": "CVE-2023-38530",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:16.220", "published": "2023-08-08T10:15:16.220",
"lastModified": "2023-08-08T10:15:16.220", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38531", "id": "CVE-2023-38531",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:16.317", "published": "2023-08-08T10:15:16.317",
"lastModified": "2023-08-08T10:15:16.317", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38532", "id": "CVE-2023-38532",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:16.403", "published": "2023-08-08T10:15:16.403",
"lastModified": "2023-08-08T10:15:16.403", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38641", "id": "CVE-2023-38641",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:16.493", "published": "2023-08-08T10:15:16.493",
"lastModified": "2023-08-08T10:15:16.493", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38679", "id": "CVE-2023-38679",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:16.583", "published": "2023-08-08T10:15:16.583",
"lastModified": "2023-08-08T10:15:16.583", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38680", "id": "CVE-2023-38680",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:16.677", "published": "2023-08-08T10:15:16.677",
"lastModified": "2023-08-08T10:15:16.677", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38681", "id": "CVE-2023-38681",
"sourceIdentifier": "productcert@siemens.com", "sourceIdentifier": "productcert@siemens.com",
"published": "2023-08-08T10:15:16.783", "published": "2023-08-08T10:15:16.783",
"lastModified": "2023-08-08T10:15:16.783", "lastModified": "2023-08-08T12:51:11.140",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

Some files were not shown because too many files have changed in this diff Show More