Auto-Update: 2023-09-19T08:00:25.430890+00:00

This commit is contained in:
cad-safe-bot 2023-09-19 08:00:28 +00:00
parent 505e34ddc8
commit 5e73e00b61
3 changed files with 69 additions and 32 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-0125", "id": "CVE-2023-0125",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2023-01-09T21:15:11.070", "published": "2023-01-09T21:15:11.070",
"lastModified": "2023-01-13T06:49:17.683", "lastModified": "2023-09-19T06:15:45.807",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability was found in Control iD Panel. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Web Interface. The manipulation of the argument Nome leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-217717 was assigned to this vulnerability." "value": "A vulnerability was found in Control iD Gerencia Web 1.30. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Web Interface. The manipulation of the argument Nome leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-217717 was assigned to this vulnerability."
} }
], ],
"metrics": { "metrics": {

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-5054",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-09-19T07:15:51.917",
"lastModified": "2023-09-19T07:15:51.917",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Super Store Finder plugin for WordPress is vulnerable to unauthenticated arbitrary email creation and relay in versions up to, and including, 6.9.2. This is due to insufficient restrictions on the sendMail.php file that allows direct access. This makes it possible for unauthenticated attackers to send emails utilizing the vulnerable site's server, with arbitrary content. Please note that this vulnerability has already been publicly disclosed with an exploit which is why we are publishing the details without a patch available, we are attempting to initiate contact with the developer."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://superstorefinder.net/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d31d0553-9378-4c7e-a258-12562aa6b388?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-09-19T06:00:25.740267+00:00 2023-09-19T08:00:25.430890+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-09-19T05:17:20.063000+00:00 2023-09-19T07:15:51.917000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -29,43 +29,21 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
225795 225796
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `2` Recently added CVEs: `1`
* [CVE-2023-42399](CVE-2023/CVE-2023-423xx/CVE-2023-42399.json) (`2023-09-19T04:15:55.347`) * [CVE-2023-5054](CVE-2023/CVE-2023-50xx/CVE-2023-5054.json) (`2023-09-19T07:15:51.917`)
* [CVE-2023-26143](CVE-2023/CVE-2023-261xx/CVE-2023-26143.json) (`2023-09-19T05:17:10.443`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `22` Recently modified CVEs: `1`
* [CVE-2020-22219](CVE-2020/CVE-2020-222xx/CVE-2020-22219.json) (`2023-09-19T05:15:50.187`) * [CVE-2023-0125](CVE-2023/CVE-2023-01xx/CVE-2023-0125.json) (`2023-09-19T06:15:45.807`)
* [CVE-2022-23468](CVE-2022/CVE-2022-234xx/CVE-2022-23468.json) (`2023-09-19T05:16:07.477`)
* [CVE-2022-23477](CVE-2022/CVE-2022-234xx/CVE-2022-23477.json) (`2023-09-19T05:16:53.837`)
* [CVE-2022-23478](CVE-2022/CVE-2022-234xx/CVE-2022-23478.json) (`2023-09-19T05:16:55.783`)
* [CVE-2022-23479](CVE-2022/CVE-2022-234xx/CVE-2022-23479.json) (`2023-09-19T05:16:57.237`)
* [CVE-2022-23480](CVE-2022/CVE-2022-234xx/CVE-2022-23480.json) (`2023-09-19T05:17:02.960`)
* [CVE-2022-23481](CVE-2022/CVE-2022-234xx/CVE-2022-23481.json) (`2023-09-19T05:17:04.317`)
* [CVE-2022-23482](CVE-2022/CVE-2022-234xx/CVE-2022-23482.json) (`2023-09-19T05:17:05.350`)
* [CVE-2022-23483](CVE-2022/CVE-2022-234xx/CVE-2022-23483.json) (`2023-09-19T05:17:06.230`)
* [CVE-2022-23484](CVE-2022/CVE-2022-234xx/CVE-2022-23484.json) (`2023-09-19T05:17:07.450`)
* [CVE-2022-23493](CVE-2022/CVE-2022-234xx/CVE-2022-23493.json) (`2023-09-19T05:17:08.953`)
* [CVE-2023-39916](CVE-2023/CVE-2023-399xx/CVE-2023-39916.json) (`2023-09-19T04:05:17.463`)
* [CVE-2023-4900](CVE-2023/CVE-2023-49xx/CVE-2023-4900.json) (`2023-09-19T05:17:11.290`)
* [CVE-2023-4901](CVE-2023/CVE-2023-49xx/CVE-2023-4901.json) (`2023-09-19T05:17:12.017`)
* [CVE-2023-4902](CVE-2023/CVE-2023-49xx/CVE-2023-4902.json) (`2023-09-19T05:17:12.520`)
* [CVE-2023-4903](CVE-2023/CVE-2023-49xx/CVE-2023-4903.json) (`2023-09-19T05:17:14.367`)
* [CVE-2023-4904](CVE-2023/CVE-2023-49xx/CVE-2023-4904.json) (`2023-09-19T05:17:14.813`)
* [CVE-2023-4905](CVE-2023/CVE-2023-49xx/CVE-2023-4905.json) (`2023-09-19T05:17:15.350`)
* [CVE-2023-4906](CVE-2023/CVE-2023-49xx/CVE-2023-4906.json) (`2023-09-19T05:17:16.070`)
* [CVE-2023-4907](CVE-2023/CVE-2023-49xx/CVE-2023-4907.json) (`2023-09-19T05:17:18.317`)
* [CVE-2023-4908](CVE-2023/CVE-2023-49xx/CVE-2023-4908.json) (`2023-09-19T05:17:19.453`)
* [CVE-2023-4909](CVE-2023/CVE-2023-49xx/CVE-2023-4909.json) (`2023-09-19T05:17:20.063`)
## Download and Usage ## Download and Usage