From 5c8241a0ff48c98cec40264a3951ca62f5d9342f Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 19 Jun 2023 12:00:30 +0000 Subject: [PATCH] Auto-Update: 2023-06-19T12:00:26.464934+00:00 --- CVE-2019/CVE-2019-251xx/CVE-2019-25136.json | 24 +++++++++++ CVE-2023/CVE-2023-03xx/CVE-2023-0368.json | 32 ++++++++++++++ CVE-2023/CVE-2023-04xx/CVE-2023-0489.json | 32 ++++++++++++++ CVE-2023/CVE-2023-22xx/CVE-2023-2221.json | 32 ++++++++++++++ CVE-2023/CVE-2023-23xx/CVE-2023-2359.json | 32 ++++++++++++++ CVE-2023/CVE-2023-23xx/CVE-2023-2399.json | 32 ++++++++++++++ CVE-2023/CVE-2023-24xx/CVE-2023-2401.json | 32 ++++++++++++++ CVE-2023/CVE-2023-24xx/CVE-2023-2492.json | 32 ++++++++++++++ CVE-2023/CVE-2023-257xx/CVE-2023-25733.json | 24 +++++++++++ CVE-2023/CVE-2023-257xx/CVE-2023-25736.json | 24 +++++++++++ CVE-2023/CVE-2023-257xx/CVE-2023-25747.json | 24 +++++++++++ CVE-2023/CVE-2023-25xx/CVE-2023-2527.json | 32 ++++++++++++++ CVE-2023/CVE-2023-26xx/CVE-2023-2600.json | 32 ++++++++++++++ CVE-2023/CVE-2023-26xx/CVE-2023-2654.json | 32 ++++++++++++++ CVE-2023/CVE-2023-26xx/CVE-2023-2684.json | 32 ++++++++++++++ CVE-2023/CVE-2023-27xx/CVE-2023-2719.json | 32 ++++++++++++++ CVE-2023/CVE-2023-27xx/CVE-2023-2742.json | 32 ++++++++++++++ CVE-2023/CVE-2023-27xx/CVE-2023-2751.json | 32 ++++++++++++++ CVE-2023/CVE-2023-27xx/CVE-2023-2779.json | 32 ++++++++++++++ CVE-2023/CVE-2023-28xx/CVE-2023-2805.json | 32 ++++++++++++++ CVE-2023/CVE-2023-28xx/CVE-2023-2811.json | 32 ++++++++++++++ CVE-2023/CVE-2023-28xx/CVE-2023-2812.json | 32 ++++++++++++++ CVE-2023/CVE-2023-28xx/CVE-2023-2899.json | 32 ++++++++++++++ CVE-2023/CVE-2023-295xx/CVE-2023-29531.json | 32 ++++++++++++++ CVE-2023/CVE-2023-295xx/CVE-2023-29532.json | 32 ++++++++++++++ CVE-2023/CVE-2023-295xx/CVE-2023-29534.json | 48 +++++++++++++++++++++ CVE-2023/CVE-2023-295xx/CVE-2023-29542.json | 36 ++++++++++++++++ CVE-2023/CVE-2023-295xx/CVE-2023-29545.json | 32 ++++++++++++++ CVE-2023/CVE-2023-295xx/CVE-2023-29546.json | 24 +++++++++++ CVE-2023/CVE-2023-322xx/CVE-2023-32208.json | 24 +++++++++++ CVE-2023/CVE-2023-322xx/CVE-2023-32209.json | 24 +++++++++++ CVE-2023/CVE-2023-322xx/CVE-2023-32210.json | 24 +++++++++++ CVE-2023/CVE-2023-322xx/CVE-2023-32214.json | 32 ++++++++++++++ CVE-2023/CVE-2023-322xx/CVE-2023-32216.json | 24 +++++++++++ CVE-2023/CVE-2023-344xx/CVE-2023-34414.json | 32 ++++++++++++++ CVE-2023/CVE-2023-344xx/CVE-2023-34415.json | 24 +++++++++++ CVE-2023/CVE-2023-344xx/CVE-2023-34416.json | 32 ++++++++++++++ CVE-2023/CVE-2023-344xx/CVE-2023-34417.json | 24 +++++++++++ README.md | 38 ++++++++++++---- 39 files changed, 1178 insertions(+), 8 deletions(-) create mode 100644 CVE-2019/CVE-2019-251xx/CVE-2019-25136.json create mode 100644 CVE-2023/CVE-2023-03xx/CVE-2023-0368.json create mode 100644 CVE-2023/CVE-2023-04xx/CVE-2023-0489.json create mode 100644 CVE-2023/CVE-2023-22xx/CVE-2023-2221.json create mode 100644 CVE-2023/CVE-2023-23xx/CVE-2023-2359.json create mode 100644 CVE-2023/CVE-2023-23xx/CVE-2023-2399.json create mode 100644 CVE-2023/CVE-2023-24xx/CVE-2023-2401.json create mode 100644 CVE-2023/CVE-2023-24xx/CVE-2023-2492.json create mode 100644 CVE-2023/CVE-2023-257xx/CVE-2023-25733.json create mode 100644 CVE-2023/CVE-2023-257xx/CVE-2023-25736.json create mode 100644 CVE-2023/CVE-2023-257xx/CVE-2023-25747.json create mode 100644 CVE-2023/CVE-2023-25xx/CVE-2023-2527.json create mode 100644 CVE-2023/CVE-2023-26xx/CVE-2023-2600.json create mode 100644 CVE-2023/CVE-2023-26xx/CVE-2023-2654.json create mode 100644 CVE-2023/CVE-2023-26xx/CVE-2023-2684.json create mode 100644 CVE-2023/CVE-2023-27xx/CVE-2023-2719.json create mode 100644 CVE-2023/CVE-2023-27xx/CVE-2023-2742.json create mode 100644 CVE-2023/CVE-2023-27xx/CVE-2023-2751.json create mode 100644 CVE-2023/CVE-2023-27xx/CVE-2023-2779.json create mode 100644 CVE-2023/CVE-2023-28xx/CVE-2023-2805.json create mode 100644 CVE-2023/CVE-2023-28xx/CVE-2023-2811.json create mode 100644 CVE-2023/CVE-2023-28xx/CVE-2023-2812.json create mode 100644 CVE-2023/CVE-2023-28xx/CVE-2023-2899.json create mode 100644 CVE-2023/CVE-2023-295xx/CVE-2023-29531.json create mode 100644 CVE-2023/CVE-2023-295xx/CVE-2023-29532.json create mode 100644 CVE-2023/CVE-2023-295xx/CVE-2023-29534.json create mode 100644 CVE-2023/CVE-2023-295xx/CVE-2023-29542.json create mode 100644 CVE-2023/CVE-2023-295xx/CVE-2023-29545.json create mode 100644 CVE-2023/CVE-2023-295xx/CVE-2023-29546.json create mode 100644 CVE-2023/CVE-2023-322xx/CVE-2023-32208.json create mode 100644 CVE-2023/CVE-2023-322xx/CVE-2023-32209.json create mode 100644 CVE-2023/CVE-2023-322xx/CVE-2023-32210.json create mode 100644 CVE-2023/CVE-2023-322xx/CVE-2023-32214.json create mode 100644 CVE-2023/CVE-2023-322xx/CVE-2023-32216.json create mode 100644 CVE-2023/CVE-2023-344xx/CVE-2023-34414.json create mode 100644 CVE-2023/CVE-2023-344xx/CVE-2023-34415.json create mode 100644 CVE-2023/CVE-2023-344xx/CVE-2023-34416.json create mode 100644 CVE-2023/CVE-2023-344xx/CVE-2023-34417.json diff --git a/CVE-2019/CVE-2019-251xx/CVE-2019-25136.json b/CVE-2019/CVE-2019-251xx/CVE-2019-25136.json new file mode 100644 index 00000000000..358ce7ec258 --- /dev/null +++ b/CVE-2019/CVE-2019-251xx/CVE-2019-25136.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2019-25136", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T11:15:09.430", + "lastModified": "2023-06-19T11:15:09.430", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A compromised child process could have injected XBL Bindings into privileged CSS rules, resulting in arbitrary code execution and a sandbox escape. This vulnerability affects Firefox < 70." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1530709", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2019-34/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-03xx/CVE-2023-0368.json b/CVE-2023/CVE-2023-03xx/CVE-2023-0368.json new file mode 100644 index 00000000000..2e935cfae4f --- /dev/null +++ b/CVE-2023/CVE-2023-03xx/CVE-2023-0368.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-0368", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:09.537", + "lastModified": "2023-06-19T11:15:09.537", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Responsive Tabs For WPBakery Page Builder (formerly Visual Composer) WordPress plugin through 1.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/b41e5c09-1034-48a7-ac0f-d4db6e7a3b3e", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-04xx/CVE-2023-0489.json b/CVE-2023/CVE-2023-04xx/CVE-2023-0489.json new file mode 100644 index 00000000000..40bb0cfec6e --- /dev/null +++ b/CVE-2023/CVE-2023-04xx/CVE-2023-0489.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-0489", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:09.607", + "lastModified": "2023-06-19T11:15:09.607", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The SlideOnline WordPress plugin through 1.2.1 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/238842ee-6392-4eb2-96cb-08e4ece6fca1", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2221.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2221.json new file mode 100644 index 00000000000..80799012b7e --- /dev/null +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2221.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2221", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:09.987", + "lastModified": "2023-06-19T11:15:09.987", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The WP Custom Cursors WordPress plugin before 3.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Admin." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/6666688e-7239-4d40-a348-307cf8f3b657", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2359.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2359.json new file mode 100644 index 00000000000..f673f94ff74 --- /dev/null +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2359.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2359", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.043", + "lastModified": "2023-06-19T11:15:10.043", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Slider Revolution WordPress plugin through 6.6.12 does not check for valid image files upon import, leading to an arbitrary file upload which may be escalated to Remote Code Execution in some server configurations." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/a8350890-e6d4-4b04-a158-2b0ee3748e65", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2399.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2399.json new file mode 100644 index 00000000000..e3ef0a70158 --- /dev/null +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2399.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2399", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.100", + "lastModified": "2023-06-19T11:15:10.100", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The QuBot WordPress plugin before 1.1.6 doesn't filter user input on chat, leading to bad code inserted on it be reflected on the user dashboard." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/deca3cd3-f7cf-469f-9f7e-3612f7ae514d", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2401.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2401.json new file mode 100644 index 00000000000..0b867acd5de --- /dev/null +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2401.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2401", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.153", + "lastModified": "2023-06-19T11:15:10.153", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The QuBot WordPress plugin before 1.1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/0746ea56-dd88-4fc3-86a3-54408eef1f94", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2492.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2492.json new file mode 100644 index 00000000000..d9bcd012683 --- /dev/null +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2492.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2492", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.213", + "lastModified": "2023-06-19T11:15:10.213", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The QueryWall: Plug'n Play Firewall WordPress plugin through 1.1.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/fa7c54c2-5653-4d3d-8163-f3d63272c050", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25733.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25733.json new file mode 100644 index 00000000000..93d850d7032 --- /dev/null +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25733.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-25733", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T11:15:09.670", + "lastModified": "2023-06-19T11:15:09.670", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The return value from `gfx::SourceSurfaceSkia::Map()` wasn't being verified which could have potentially lead to a null pointer dereference. This vulnerability affects Firefox < 110." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1808632", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-05/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25736.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25736.json new file mode 100644 index 00000000000..1c2e11248f5 --- /dev/null +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25736.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-25736", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T11:15:09.713", + "lastModified": "2023-06-19T11:15:09.713", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An invalid downcast from `nsHTMLDocument` to `nsIContent` could have lead to undefined behavior. This vulnerability affects Firefox < 110." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811331", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-05/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25747.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25747.json new file mode 100644 index 00000000000..5363bff3a7e --- /dev/null +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25747.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-25747", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T11:15:09.753", + "lastModified": "2023-06-19T11:15:09.753", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A potential use-after-free in libaudio was fixed by disabling the AAudio backend when running on Android API below version 30.\n*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox for Android < 110.1.0." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1815801", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-08/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2527.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2527.json new file mode 100644 index 00000000000..bb3176a637d --- /dev/null +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2527.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2527", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.270", + "lastModified": "2023-06-19T11:15:10.270", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Integration for Contact Form 7 and Zoho CRM, Bigin WordPress plugin before 1.2.4 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/8051142a-4e55-4dc2-9cb1-1b724c67574f", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2600.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2600.json new file mode 100644 index 00000000000..3d94e1f0dd8 --- /dev/null +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2600.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2600", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.327", + "lastModified": "2023-06-19T11:15:10.327", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Custom Base Terms WordPress plugin before 1.0.3 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/8e1d65c3-14e4-482f-ae9e-323e847a8613", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2654.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2654.json new file mode 100644 index 00000000000..5802f24c34a --- /dev/null +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2654.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2654", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.380", + "lastModified": "2023-06-19T11:15:10.380", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Conditional Menus WordPress plugin before 1.2.1 does not escape a parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/506ecee9-8e42-46de-9c5c-fc252ab2646e", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2684.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2684.json new file mode 100644 index 00000000000..9b7d4d0a46d --- /dev/null +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2684.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2684", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.433", + "lastModified": "2023-06-19T11:15:10.433", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The File Renaming on Upload WordPress plugin before 2.5.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/42b1f017-c497-4825-b12a-8dce3e108a55", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2719.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2719.json new file mode 100644 index 00000000000..22d947ade55 --- /dev/null +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2719.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2719", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.487", + "lastModified": "2023-06-19T11:15:10.487", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the `id` parameter for an Agent in the REST API before using it in an SQL statement, leading to an SQL Injection exploitable by users with a role as low as Subscriber." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/d9f6f4e7-a237-49c0-aba0-2934ab019e35", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2742.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2742.json new file mode 100644 index 00000000000..fdd1ee7cacf --- /dev/null +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2742.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2742", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.543", + "lastModified": "2023-06-19T11:15:10.543", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The AI ChatBot WordPress plugin before 4.5.5 does not sanitize and escape its settings, allowing high-privilege users such as admin to perform Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/f689442a-a851-4140-a10c-ac579f9da142", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2751.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2751.json new file mode 100644 index 00000000000..cf8563cf63d --- /dev/null +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2751.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2751", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.600", + "lastModified": "2023-06-19T11:15:10.600", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Upload Resume WordPress plugin through 1.2.0 does not validate the captcha parameter when uploading a resume via the resume_upload_form shortcode, allowing unauthenticated visitors to upload arbitrary media files to the site." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/1b0fe0ac-d0d1-473d-af5b-dad6217933d4", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2779.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2779.json new file mode 100644 index 00000000000..e6d8a6b02d4 --- /dev/null +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2779.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2779", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.653", + "lastModified": "2023-06-19T11:15:10.653", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Social Share, Social Login and Social Comments WordPress plugin before 7.13.52 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/fe9b7696-3b0e-42e2-9dbc-55167605f5c5", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2805.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2805.json new file mode 100644 index 00000000000..b094f0f0ab6 --- /dev/null +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2805.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2805", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.710", + "lastModified": "2023-06-19T11:15:10.710", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The SupportCandy WordPress plugin before 3.1.7 does not properly sanitise and escape the agents[] parameter in the set_add_agent_leaves AJAX function before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/bdb75c8c-87e2-4358-ad3b-f4236e9a43c0", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2811.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2811.json new file mode 100644 index 00000000000..327d2798f2c --- /dev/null +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2811.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2811", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.763", + "lastModified": "2023-06-19T11:15:10.763", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The AI ChatBot WordPress plugin before 4.5.6 does not sanitise and escape numerous of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks to all admin when setting chatbot and all client when using chatbot" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/82a81721-0435-45a6-bd5b-dc90186cf803", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2812.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2812.json new file mode 100644 index 00000000000..4768602cdbd --- /dev/null +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2812.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2812", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.813", + "lastModified": "2023-06-19T11:15:10.813", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Ultimate Dashboard WordPress plugin before 3.7.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/7de4c313-359e-4450-85f5-d29f3c2f046a", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2899.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2899.json new file mode 100644 index 00000000000..c0a4a091d57 --- /dev/null +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2899.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-2899", + "sourceIdentifier": "contact@wpscan.com", + "published": "2023-06-19T11:15:10.867", + "lastModified": "2023-06-19T11:15:10.867", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The Google Map Shortcode WordPress plugin through 3.1.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "contact@wpscan.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://wpscan.com/vulnerability/92dcbeb3-17db-4d10-8ae7-c99acdb48c78", + "source": "contact@wpscan.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29531.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29531.json new file mode 100644 index 00000000000..6ea8e642915 --- /dev/null +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29531.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-29531", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T10:15:09.373", + "lastModified": "2023-06-19T10:15:09.373", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An attacker could have caused an out of bounds memory access using WebGL APIs, leading to memory corruption and a potentially exploitable crash.\n\n*This bug only affects Firefox and\u00a0Thunderbird for macOS. Other operating systems are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1794292", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-13/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-14/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-15/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29532.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29532.json new file mode 100644 index 00000000000..01a04a15a5f --- /dev/null +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29532.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-29532", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T10:15:09.430", + "lastModified": "2023-06-19T10:15:09.430", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A local attacker can trick the Mozilla Maintenance Service into applying an unsigned update file by pointing the service at an update file on a malicious SMB server. The update file can be replaced after the signature check, before the use, because the write-lock requested by the service does not work on a SMB server.\n\n*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1806394", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-13/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-14/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-15/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29534.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29534.json new file mode 100644 index 00000000000..05726fc0f1e --- /dev/null +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29534.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2023-29534", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T11:15:09.797", + "lastModified": "2023-06-19T11:15:09.797", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Different techniques existed to obscure the fullscreen notification in Firefox and Focus for Android. These could have led to potential user confusion and spoofing attacks.\n\n*This bug only affects Firefox and Focus for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox for Android < 112 and Focus for Android < 112.\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1816007", + "source": "security@mozilla.org" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1816059", + "source": "security@mozilla.org" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1821155", + "source": "security@mozilla.org" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1821576", + "source": "security@mozilla.org" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1821906", + "source": "security@mozilla.org" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1822298", + "source": "security@mozilla.org" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1822305", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-13/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29542.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29542.json new file mode 100644 index 00000000000..5a8b50bb06a --- /dev/null +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29542.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-29542", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T11:15:09.847", + "lastModified": "2023-06-19T11:15:09.847", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A newline in a filename could have been used to bypass the file extension security mechanisms that replace malicious file extensions such as .lnk with .download. This could have led to accidental execution of malicious code.\n\n*This bug only affects Firefox and Thunderbird on Windows. Other versions of Firefox\u00a0and Thunderbird are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1810793", + "source": "security@mozilla.org" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1815062", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-13/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-14/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-15/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29545.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29545.json new file mode 100644 index 00000000000..eb6dac97d74 --- /dev/null +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29545.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-29545", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T11:15:09.890", + "lastModified": "2023-06-19T11:15:09.890", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Similar to CVE-2023-28163, this time when choosing 'Save Link As', suggested filenames containing environment variable names would have resolved those in the context of the current user. \n\n*This bug only affects Firefox and\u00a0Thunderbird on Windows. Other versions of Firefox and\u00a0Thunderbird are unaffected.* This vulnerability affects Firefox < 112, Firefox ESR < 102.10, and Thunderbird < 102.10.\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1823077", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-13/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-14/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-15/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29546.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29546.json new file mode 100644 index 00000000000..7398946aeee --- /dev/null +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29546.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-29546", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T11:15:09.943", + "lastModified": "2023-06-19T11:15:09.943", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "When recording the screen while in Private Browsing on Firefox for Android the address bar and keyboard were not hidden, potentially leaking sensitive information. \n\n*This bug only affects Firefox for Android. Other operating systems are unaffected.* This vulnerability affects Firefox for Android < 112 and Focus for Android < 112.\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1780842", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-13/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32208.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32208.json new file mode 100644 index 00000000000..507cfb36493 --- /dev/null +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32208.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-32208", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T10:15:09.480", + "lastModified": "2023-06-19T10:15:09.480", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Service workers could reveal script base URL due to dynamic `import()`. This vulnerability affects Firefox < 113." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1646034", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-16/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32209.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32209.json new file mode 100644 index 00000000000..7bc823f4127 --- /dev/null +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32209.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-32209", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T10:15:09.523", + "lastModified": "2023-06-19T10:15:09.523", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted favicon could have led to an out of memory crash. This vulnerability affects Firefox < 113." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1767194", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-16/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32210.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32210.json new file mode 100644 index 00000000000..d55761d8ca1 --- /dev/null +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32210.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-32210", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T10:15:09.573", + "lastModified": "2023-06-19T10:15:09.573", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Documents were incorrectly assuming an ordering of principal objects when ensuring we were loading an appropriately privileged principal. In certain circumstances it might have been possible to cause a document to be loaded with a higher privileged principal than intended. This vulnerability affects Firefox < 113." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1776755", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-16/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32214.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32214.json new file mode 100644 index 00000000000..baeaa34b1ec --- /dev/null +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32214.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-32214", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T10:15:09.613", + "lastModified": "2023-06-19T10:15:09.613", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Protocol handlers `ms-cxh` and `ms-cxh-full` could have been leveraged to trigger a denial of service.\n*Note: This attack only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1828716", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-16/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-17/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-18/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32216.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32216.json new file mode 100644 index 00000000000..e28acc40d47 --- /dev/null +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32216.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-32216", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T10:15:09.660", + "lastModified": "2023-06-19T10:15:09.660", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory safety bugs present in Firefox 112. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 113.\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746479%2C1806852%2C1815987%2C1820359%2C1823568%2C1824803%2C1824834%2C1825170%2C1827020%2C1828130", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-16/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34414.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34414.json new file mode 100644 index 00000000000..5cb0300d5f0 --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34414.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-34414", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T11:15:10.927", + "lastModified": "2023-06-19T11:15:10.927", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The error page for sites with invalid TLS certificates was missing the\nactivation-delay Firefox uses to protect prompts and permission dialogs\nfrom attacks that exploit human response time delays. If a malicious\npage elicited user clicks in precise locations immediately before\nnavigating to a site with a certificate error and made the renderer\nextremely busy at the same time, it could create a gap between when\nthe error page was loaded and when the display actually refreshed.\nWith the right timing the elicited clicks could land in that gap and \nactivate the button that overrides the certificate error for that site. This vulnerability affects Firefox ESR < 102.12, Firefox < 114, and Thunderbird < 102.12." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1695986", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-19/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-20/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-21/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34415.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34415.json new file mode 100644 index 00000000000..9979428ad53 --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34415.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-34415", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T11:15:10.980", + "lastModified": "2023-06-19T11:15:10.980", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "When choosing a site-isolated process for a document loaded from a data: URL that was the result of a redirect, Firefox would load that document in the same process as the site that issued the redirect. This bypassed the site-isolation protections against Spectre-like attacks on sites that host an \"open redirect\". Firefox no longer follows HTTP redirects to data: URLs. This vulnerability affects Firefox < 114." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1811999", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-20/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34416.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34416.json new file mode 100644 index 00000000000..68ce165faea --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34416.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-34416", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T11:15:11.023", + "lastModified": "2023-06-19T11:15:11.023", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory safety bugs present in Firefox 113, Firefox ESR 102.11, and Thunderbird 102.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 102.12, Firefox < 114, and Thunderbird < 102.12.\n\n" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1752703%2C1818394%2C1826875%2C1827340%2C1827655%2C1828065%2C1830190%2C1830206%2C1830795%2C1833339", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-19/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-20/", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-21/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-344xx/CVE-2023-34417.json b/CVE-2023/CVE-2023-344xx/CVE-2023-34417.json new file mode 100644 index 00000000000..d72e5a3a3f4 --- /dev/null +++ b/CVE-2023/CVE-2023-344xx/CVE-2023-34417.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-34417", + "sourceIdentifier": "security@mozilla.org", + "published": "2023-06-19T11:15:11.067", + "lastModified": "2023-06-19T11:15:11.067", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Memory safety bugs present in Firefox 113. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 114." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1746447%2C1820903%2C1832832", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2023-20/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 6d4c1a4ad58..63b75e42d86 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-19T10:00:29.586574+00:00 +2023-06-19T12:00:26.464934+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-19T09:15:09.380000+00:00 +2023-06-19T11:15:11.067000+00:00 ``` ### Last Data Feed Release @@ -29,22 +29,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -218021 +218059 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `38` -* [CVE-2023-35005](CVE-2023/CVE-2023-350xx/CVE-2023-35005.json) (`2023-06-19T09:15:09.380`) +* [CVE-2023-29534](CVE-2023/CVE-2023-295xx/CVE-2023-29534.json) (`2023-06-19T11:15:09.797`) +* [CVE-2023-29542](CVE-2023/CVE-2023-295xx/CVE-2023-29542.json) (`2023-06-19T11:15:09.847`) +* [CVE-2023-29545](CVE-2023/CVE-2023-295xx/CVE-2023-29545.json) (`2023-06-19T11:15:09.890`) +* [CVE-2023-29546](CVE-2023/CVE-2023-295xx/CVE-2023-29546.json) (`2023-06-19T11:15:09.943`) +* [CVE-2023-2221](CVE-2023/CVE-2023-22xx/CVE-2023-2221.json) (`2023-06-19T11:15:09.987`) +* [CVE-2023-2359](CVE-2023/CVE-2023-23xx/CVE-2023-2359.json) (`2023-06-19T11:15:10.043`) +* [CVE-2023-2399](CVE-2023/CVE-2023-23xx/CVE-2023-2399.json) (`2023-06-19T11:15:10.100`) +* [CVE-2023-2401](CVE-2023/CVE-2023-24xx/CVE-2023-2401.json) (`2023-06-19T11:15:10.153`) +* [CVE-2023-2492](CVE-2023/CVE-2023-24xx/CVE-2023-2492.json) (`2023-06-19T11:15:10.213`) +* [CVE-2023-2527](CVE-2023/CVE-2023-25xx/CVE-2023-2527.json) (`2023-06-19T11:15:10.270`) +* [CVE-2023-2600](CVE-2023/CVE-2023-26xx/CVE-2023-2600.json) (`2023-06-19T11:15:10.327`) +* [CVE-2023-2654](CVE-2023/CVE-2023-26xx/CVE-2023-2654.json) (`2023-06-19T11:15:10.380`) +* [CVE-2023-2684](CVE-2023/CVE-2023-26xx/CVE-2023-2684.json) (`2023-06-19T11:15:10.433`) +* [CVE-2023-2719](CVE-2023/CVE-2023-27xx/CVE-2023-2719.json) (`2023-06-19T11:15:10.487`) +* [CVE-2023-2742](CVE-2023/CVE-2023-27xx/CVE-2023-2742.json) (`2023-06-19T11:15:10.543`) +* [CVE-2023-2751](CVE-2023/CVE-2023-27xx/CVE-2023-2751.json) (`2023-06-19T11:15:10.600`) +* [CVE-2023-2779](CVE-2023/CVE-2023-27xx/CVE-2023-2779.json) (`2023-06-19T11:15:10.653`) +* [CVE-2023-2805](CVE-2023/CVE-2023-28xx/CVE-2023-2805.json) (`2023-06-19T11:15:10.710`) +* [CVE-2023-2811](CVE-2023/CVE-2023-28xx/CVE-2023-2811.json) (`2023-06-19T11:15:10.763`) +* [CVE-2023-2812](CVE-2023/CVE-2023-28xx/CVE-2023-2812.json) (`2023-06-19T11:15:10.813`) +* [CVE-2023-2899](CVE-2023/CVE-2023-28xx/CVE-2023-2899.json) (`2023-06-19T11:15:10.867`) +* [CVE-2023-34414](CVE-2023/CVE-2023-344xx/CVE-2023-34414.json) (`2023-06-19T11:15:10.927`) +* [CVE-2023-34415](CVE-2023/CVE-2023-344xx/CVE-2023-34415.json) (`2023-06-19T11:15:10.980`) +* [CVE-2023-34416](CVE-2023/CVE-2023-344xx/CVE-2023-34416.json) (`2023-06-19T11:15:11.023`) +* [CVE-2023-34417](CVE-2023/CVE-2023-344xx/CVE-2023-34417.json) (`2023-06-19T11:15:11.067`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `0` -* [CVE-2023-3309](CVE-2023/CVE-2023-33xx/CVE-2023-3309.json) (`2023-06-19T08:15:09.270`) -* [CVE-2023-3311](CVE-2023/CVE-2023-33xx/CVE-2023-3311.json) (`2023-06-19T08:15:09.447`) ## Download and Usage