mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-09-19T08:00:25.430890+00:00
This commit is contained in:
parent
505e34ddc8
commit
5e73e00b61
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2023-0125",
|
"id": "CVE-2023-0125",
|
||||||
"sourceIdentifier": "cna@vuldb.com",
|
"sourceIdentifier": "cna@vuldb.com",
|
||||||
"published": "2023-01-09T21:15:11.070",
|
"published": "2023-01-09T21:15:11.070",
|
||||||
"lastModified": "2023-01-13T06:49:17.683",
|
"lastModified": "2023-09-19T06:15:45.807",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "A vulnerability was found in Control iD Panel. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Web Interface. The manipulation of the argument Nome leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-217717 was assigned to this vulnerability."
|
"value": "A vulnerability was found in Control iD Gerencia Web 1.30. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Web Interface. The manipulation of the argument Nome leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-217717 was assigned to this vulnerability."
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
|
59
CVE-2023/CVE-2023-50xx/CVE-2023-5054.json
Normal file
59
CVE-2023/CVE-2023-50xx/CVE-2023-5054.json
Normal file
@ -0,0 +1,59 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-5054",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-09-19T07:15:51.917",
|
||||||
|
"lastModified": "2023-09-19T07:15:51.917",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Super Store Finder plugin for WordPress is vulnerable to unauthenticated arbitrary email creation and relay in versions up to, and including, 6.9.2. This is due to insufficient restrictions on the sendMail.php file that allows direct access. This makes it possible for unauthenticated attackers to send emails utilizing the vulnerable site's server, with arbitrary content. Please note that this vulnerability has already been publicly disclosed with an exploit which is why we are publishing the details without a patch available, we are attempting to initiate contact with the developer."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.8,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-862"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://superstorefinder.net/",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d31d0553-9378-4c7e-a258-12562aa6b388?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
36
README.md
36
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2023-09-19T06:00:25.740267+00:00
|
2023-09-19T08:00:25.430890+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2023-09-19T05:17:20.063000+00:00
|
2023-09-19T07:15:51.917000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -29,43 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
225795
|
225796
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `2`
|
Recently added CVEs: `1`
|
||||||
|
|
||||||
* [CVE-2023-42399](CVE-2023/CVE-2023-423xx/CVE-2023-42399.json) (`2023-09-19T04:15:55.347`)
|
* [CVE-2023-5054](CVE-2023/CVE-2023-50xx/CVE-2023-5054.json) (`2023-09-19T07:15:51.917`)
|
||||||
* [CVE-2023-26143](CVE-2023/CVE-2023-261xx/CVE-2023-26143.json) (`2023-09-19T05:17:10.443`)
|
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `22`
|
Recently modified CVEs: `1`
|
||||||
|
|
||||||
* [CVE-2020-22219](CVE-2020/CVE-2020-222xx/CVE-2020-22219.json) (`2023-09-19T05:15:50.187`)
|
* [CVE-2023-0125](CVE-2023/CVE-2023-01xx/CVE-2023-0125.json) (`2023-09-19T06:15:45.807`)
|
||||||
* [CVE-2022-23468](CVE-2022/CVE-2022-234xx/CVE-2022-23468.json) (`2023-09-19T05:16:07.477`)
|
|
||||||
* [CVE-2022-23477](CVE-2022/CVE-2022-234xx/CVE-2022-23477.json) (`2023-09-19T05:16:53.837`)
|
|
||||||
* [CVE-2022-23478](CVE-2022/CVE-2022-234xx/CVE-2022-23478.json) (`2023-09-19T05:16:55.783`)
|
|
||||||
* [CVE-2022-23479](CVE-2022/CVE-2022-234xx/CVE-2022-23479.json) (`2023-09-19T05:16:57.237`)
|
|
||||||
* [CVE-2022-23480](CVE-2022/CVE-2022-234xx/CVE-2022-23480.json) (`2023-09-19T05:17:02.960`)
|
|
||||||
* [CVE-2022-23481](CVE-2022/CVE-2022-234xx/CVE-2022-23481.json) (`2023-09-19T05:17:04.317`)
|
|
||||||
* [CVE-2022-23482](CVE-2022/CVE-2022-234xx/CVE-2022-23482.json) (`2023-09-19T05:17:05.350`)
|
|
||||||
* [CVE-2022-23483](CVE-2022/CVE-2022-234xx/CVE-2022-23483.json) (`2023-09-19T05:17:06.230`)
|
|
||||||
* [CVE-2022-23484](CVE-2022/CVE-2022-234xx/CVE-2022-23484.json) (`2023-09-19T05:17:07.450`)
|
|
||||||
* [CVE-2022-23493](CVE-2022/CVE-2022-234xx/CVE-2022-23493.json) (`2023-09-19T05:17:08.953`)
|
|
||||||
* [CVE-2023-39916](CVE-2023/CVE-2023-399xx/CVE-2023-39916.json) (`2023-09-19T04:05:17.463`)
|
|
||||||
* [CVE-2023-4900](CVE-2023/CVE-2023-49xx/CVE-2023-4900.json) (`2023-09-19T05:17:11.290`)
|
|
||||||
* [CVE-2023-4901](CVE-2023/CVE-2023-49xx/CVE-2023-4901.json) (`2023-09-19T05:17:12.017`)
|
|
||||||
* [CVE-2023-4902](CVE-2023/CVE-2023-49xx/CVE-2023-4902.json) (`2023-09-19T05:17:12.520`)
|
|
||||||
* [CVE-2023-4903](CVE-2023/CVE-2023-49xx/CVE-2023-4903.json) (`2023-09-19T05:17:14.367`)
|
|
||||||
* [CVE-2023-4904](CVE-2023/CVE-2023-49xx/CVE-2023-4904.json) (`2023-09-19T05:17:14.813`)
|
|
||||||
* [CVE-2023-4905](CVE-2023/CVE-2023-49xx/CVE-2023-4905.json) (`2023-09-19T05:17:15.350`)
|
|
||||||
* [CVE-2023-4906](CVE-2023/CVE-2023-49xx/CVE-2023-4906.json) (`2023-09-19T05:17:16.070`)
|
|
||||||
* [CVE-2023-4907](CVE-2023/CVE-2023-49xx/CVE-2023-4907.json) (`2023-09-19T05:17:18.317`)
|
|
||||||
* [CVE-2023-4908](CVE-2023/CVE-2023-49xx/CVE-2023-4908.json) (`2023-09-19T05:17:19.453`)
|
|
||||||
* [CVE-2023-4909](CVE-2023/CVE-2023-49xx/CVE-2023-4909.json) (`2023-09-19T05:17:20.063`)
|
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
Loading…
x
Reference in New Issue
Block a user