Auto-Update: 2023-11-13T05:00:20.276988+00:00

This commit is contained in:
cad-safe-bot 2023-11-13 05:00:24 +00:00
parent 7df4397f50
commit 5eb8eb13da
146 changed files with 1385 additions and 287 deletions

View File

@ -2,12 +2,16 @@
"id": "CVE-2018-8863",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-11-09T23:15:08.740",
"lastModified": "2023-11-09T23:15:08.740",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The HTTP header in Philips EncoreAnywhere contains data an attacker may be able to use to gain sensitive information.\n\n"
},
{
"lang": "es",
"value": "El encabezado HTTP de Philips EncoreAnywhere contiene datos que un atacante puede utilizar para obtener informaci\u00f3n confidencial."
}
],
"metrics": {

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-45835",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T03:15:07.783",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in PhonePe PhonePe Payment Solutions.This issue affects PhonePe Payment Solutions: from n/a through 1.0.15.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/phonepe-payment-solutions/wordpress-phonepe-payment-solutions-plugin-1-0-15-server-side-request-forgery-ssrf?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23367",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2023-11-10T15:15:08.190",
"lastModified": "2023-11-10T15:15:08.190",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-23684",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T03:15:07.993",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in WPGraphQL.This issue affects WPGraphQL: from n/a through 1.14.5.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-graphql/wordpress-wp-graphql-plugin-1-14-5-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-23800",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T03:15:08.190",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in Vova Anokhin WP Shortcodes Plugin \u2014 Shortcodes Ultimate.This issue affects WP Shortcodes Plugin \u2014 Shortcodes Ultimate: from n/a through 5.12.6.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/shortcodes-ultimate/wordpress-shortcodes-ultimate-plugin-5-12-6-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26514",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T00:15:07.570",
"lastModified": "2023-11-13T00:15:07.570",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26516",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T00:15:07.773",
"lastModified": "2023-11-13T00:15:07.773",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26518",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T00:15:07.963",
"lastModified": "2023-11-13T00:15:07.963",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26524",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T00:15:08.153",
"lastModified": "2023-11-13T00:15:08.153",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-26531",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T01:15:07.410",
"lastModified": "2023-11-13T01:15:07.410",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in \u95ea\u7535\u535a \u591a\u5408\u4e00\u641c\u7d22\u81ea\u52a8\u63a8\u9001\u7ba1\u7406\u63d2\u4ef6-\u652f\u6301Baidu/Google/Bing/IndexNow/Yandex/\u5934\u6761 plugin <=\u00a04.2.7 versions."
"value": "Cross-Site Request Forgery (CSRF) vulnerability in ??? ?????????????-??Baidu/Google/Bing/IndexNow/Yandex/?? plugin <=\u00a04.2.7 versions."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26543",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T01:15:07.610",
"lastModified": "2023-11-13T01:15:07.610",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27417",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T23:15:08.123",
"lastModified": "2023-11-12T23:15:08.123",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27418",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T23:15:08.320",
"lastModified": "2023-11-12T23:15:08.320",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27431",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T23:15:08.520",
"lastModified": "2023-11-12T23:15:08.520",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27434",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T00:15:08.350",
"lastModified": "2023-11-13T00:15:08.350",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27436",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T00:15:08.537",
"lastModified": "2023-11-13T00:15:08.537",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27438",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T00:15:08.743",
"lastModified": "2023-11-13T00:15:08.743",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27441",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T00:15:08.937",
"lastModified": "2023-11-13T00:15:08.937",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27445",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T00:15:09.127",
"lastModified": "2023-11-13T00:15:09.127",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27611",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T23:15:08.713",
"lastModified": "2023-11-12T23:15:08.713",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27623",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T23:15:08.903",
"lastModified": "2023-11-12T23:15:08.903",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27632",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T23:15:09.093",
"lastModified": "2023-11-12T23:15:09.093",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28134",
"sourceIdentifier": "cve@checkpoint.com",
"published": "2023-11-12T23:15:09.313",
"lastModified": "2023-11-12T23:15:09.313",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28167",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T23:15:09.407",
"lastModified": "2023-11-12T23:15:09.407",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28172",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T23:15:09.617",
"lastModified": "2023-11-12T23:15:09.617",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28173",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T23:15:09.813",
"lastModified": "2023-11-12T23:15:09.813",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28419",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T23:15:10.007",
"lastModified": "2023-11-12T23:15:10.007",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28420",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T23:15:10.203",
"lastModified": "2023-11-12T23:15:10.203",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28495",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T22:15:28.580",
"lastModified": "2023-11-12T22:15:28.580",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28497",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T22:15:28.820",
"lastModified": "2023-11-12T22:15:28.820",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28498",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T22:15:29.007",
"lastModified": "2023-11-12T22:15:29.007",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28618",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T22:15:29.190",
"lastModified": "2023-11-12T22:15:29.190",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28694",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T22:15:29.370",
"lastModified": "2023-11-12T22:15:29.370",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28696",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T22:15:29.560",
"lastModified": "2023-11-12T22:15:29.560",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28930",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T22:15:29.777",
"lastModified": "2023-11-12T22:15:29.777",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28987",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T22:15:29.960",
"lastModified": "2023-11-12T22:15:29.960",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29238",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T22:15:30.147",
"lastModified": "2023-11-12T22:15:30.147",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29425",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-12T22:15:30.327",
"lastModified": "2023-11-12T22:15:30.327",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29426",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-10T14:15:35.327",
"lastModified": "2023-11-10T14:15:35.327",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29428",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-10T14:15:35.693",
"lastModified": "2023-11-10T14:15:35.693",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29440",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-10T14:15:35.767",
"lastModified": "2023-11-10T14:15:35.767",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-29975",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-09T22:15:10.583",
"lastModified": "2023-11-09T22:15:10.583",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue discovered in Pfsense CE version 2.6.0 allows attackers to change the password of any user without verification."
},
{
"lang": "es",
"value": "Un problema descubierto en Pfsense CE versi\u00f3n 2.6.0 permite a los atacantes cambiar la contrase\u00f1a de cualquier usuario sin verificaci\u00f3n."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30478",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-10T14:15:35.850",
"lastModified": "2023-11-10T14:15:35.850",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31077",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-10T14:15:35.923",
"lastModified": "2023-11-10T14:15:35.923",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31078",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-10T14:15:35.997",
"lastModified": "2023-11-10T14:15:35.997",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-31086",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.000",
"lastModified": "2023-11-09T23:15:09.000",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Igor Benic Simple Giveaways \u2013 Grow your business, email lists and traffic with contests plugin <=\u00a02.46.0 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Igor Benic Simple Giveaways complemento: haga crecer su negocio, sus listas de correo electr\u00f3nico y su tr\u00e1fico con el complemento de concursos en versiones &lt;= 2.46.0."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-31088",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.067",
"lastModified": "2023-11-09T23:15:09.067",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Faraz Quazi Floating Action Button plugin <=\u00a01.2.1 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Faraz Quazi Floating Action Button en versiones &lt;= 1.2.1."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-31093",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.167",
"lastModified": "2023-11-09T23:15:09.167",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Chronosly Chronosly Events Calendar plugin <=\u00a02.6.2 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Chronosly Chronosly Events Calendar en versiones &lt;= 2.6.2."
}
],
"metrics": {},

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-31219",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T03:15:08.383",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in WPChill Download Monitor.This issue affects Download Monitor: from n/a through 4.8.1.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/download-monitor/wordpress-download-monitor-plugin-4-8-1-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-31235",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.267",
"lastModified": "2023-11-09T23:15:09.267",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Roland Barker, xnau webdesign Participants Database plugin <=\u00a02.4.9 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Roland Barker, xnau webdesign Participants Database en versiones &lt;= 2.4.9."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32092",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.357",
"lastModified": "2023-11-09T23:15:09.357",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in PeepSo Community by PeepSo \u2013 Social Network, Membership, Registration, User Profiles plugin <=\u00a06.0.9.0 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento PeepSo Community by PeepSo \u2013 Social Network, Membership, Registration, User Profiles en versiones &lt;= 6.0.9.0."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32093",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.447",
"lastModified": "2023-11-09T23:15:09.447",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Criss Swaim TPG Redirect plugin <=\u00a01.0.7 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Criss Swaim TPG Redirect en versiones &lt;= 1.0.7."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32125",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.540",
"lastModified": "2023-11-09T23:15:09.540",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Daniel Powney Multi Rating plugin <=\u00a05.0.6 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Daniel Powney Multi Rating en versiones &lt;= 5.0.6."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32500",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.633",
"lastModified": "2023-11-09T23:15:09.633",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in xtemos WoodMart - Multipurpose WooCommerce Theme <=\u00a07.1.1 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en xtemos WoodMart - Multipurpose WooCommerce Theme en versiones &lt;= 7.1.1."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32501",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.733",
"lastModified": "2023-11-09T23:15:09.733",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in E4J s.R.L. VikBooking Hotel Booking Engine & PMS plugin <=\u00a01.6.1 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento E4J s.R.L. VikBooking Hotel Booking Engine &amp; PMS en versiones &lt;= 1.6.1."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32502",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.823",
"lastModified": "2023-11-09T23:15:09.823",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Sybre Waaijer Pro Mime Types \u2013 Manage file media types plugin <=\u00a01.0.7 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Sybre Waaijer Pro Mime Types \u2013 Manage file media types en versiones &lt;= 1.0.7."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32512",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T22:15:10.633",
"lastModified": "2023-11-09T22:15:10.633",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in ShortPixel ShortPixel Adaptive Images \u2013 WebP, AVIF, CDN, Image Optimization plugin <=\u00a03.7.1 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento ShortPixel ShortPixel Adaptive Images \u2013 WebP, AVIF, CDN, Image Optimization en versiones &lt;= 3.7.1."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32579",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T22:15:10.730",
"lastModified": "2023-11-09T22:15:10.730",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Designs & Code Forget About Shortcode Buttons plugin <=\u00a02.1.2 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Designs &amp; Code Forget About Shortcode Buttons en versiones &lt;= 2.1.2."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32583",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T02:15:07.650",
"lastModified": "2023-11-13T02:15:07.650",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32587",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T22:15:10.817",
"lastModified": "2023-11-09T22:15:10.817",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WP Reactions, LLC WP Reactions Lite plugin <=\u00a01.3.8 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento WP Reactions, LLC WP Reactions Lite en versiones &lt;= 1.3.8."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32588",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T02:15:07.850",
"lastModified": "2023-11-13T02:15:07.850",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32592",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T22:15:10.900",
"lastModified": "2023-11-09T22:15:10.900",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Palasthotel by Edward Bock, Katharina Rompf Sunny Search plugin <=\u00a01.0.2 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en Palasthotel por Edward Bock, complemento Katharina Rompf Sunny Search en versiones &lt;= 1.0.2."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32594",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.090",
"lastModified": "2023-11-09T21:15:24.090",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Benedict B., Maciej Gryniuk Hyphenator plugin <=\u00a05.1.5 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Benedict B., Maciej Gryniuk Hyphenator en versiones &lt;= 5.1.5."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32602",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.180",
"lastModified": "2023-11-09T21:15:24.180",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in LOKALYZE CALL ME NOW plugin <=\u00a03.0 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento LOKALYZE CALL ME NOW en versiones &lt;= 3.0."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32739",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.270",
"lastModified": "2023-11-09T21:15:24.270",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Web_Trendy WP Custom Cursors | WordPress Cursor Plugin plugin <\u00a03.2 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Web_Trendy WP Custom Cursors | WordPress Cursor Plugin en versiones &lt; 3.2."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32744",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.370",
"lastModified": "2023-11-09T21:15:24.370",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce Product Recommendations plugin <=\u00a02.3.0 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento WooCommerce Product Recommendations en versiones &lt;= 2.3.0."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32745",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.463",
"lastModified": "2023-11-09T21:15:24.463",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce AutomateWoo plugin <=\u00a05.7.1 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento WooCommerce AutomateWoo en versiones &lt;= 5.7.1."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-32794",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.553",
"lastModified": "2023-11-09T21:15:24.553",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WooCommerce Product Add-Ons plugin <=\u00a06.1.3 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento WooCommerce Product Add-Ons en versiones &lt;= 6.1.3."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33207",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T02:15:08.037",
"lastModified": "2023-11-13T02:15:08.037",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34013",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T03:15:08.570",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in Poll Maker Team Poll Maker \u2013 Best WordPress Poll Plugin.This issue affects Poll Maker \u2013 Best WordPress Poll Plugin: from n/a through 4.6.2.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/poll-maker/wordpress-poll-maker-plugin-4-6-2-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-34024",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.647",
"lastModified": "2023-11-09T21:15:24.647",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Guillemant David WP Full Auto Tags Manager plugin <=\u00a02.2 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Guillemant David WP Full Auto Tags Manager en versiones &lt;= 2.2."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-34025",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.740",
"lastModified": "2023-11-09T21:15:24.740",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in LWS LWS Hide Login plugin <=\u00a02.1.6 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento LWS LWS Hide Login en versiones &lt;= 2.1.6."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-34031",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T21:15:24.827",
"lastModified": "2023-11-09T21:15:24.827",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Pascal Casier bbPress Toolkit plugin <=\u00a01.0.12 versions."
},
{
"lang": "es",
"value": "Vulnerabilidad de Cross-Site Request Forgery (CSRF) en el complemento Pascal Casier bbPress Toolkit en versiones &lt;= 1.0.12."
}
],
"metrics": {},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34378",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T02:15:08.230",
"lastModified": "2023-11-13T02:15:08.230",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34384",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T02:15:08.423",
"lastModified": "2023-11-13T02:15:08.423",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-35041",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T03:15:08.777",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability leading to Local File Inclusion (LF) in Webpushr Web Push Notifications Web Push Notifications \u2013 Webpushr\u00a0plugin <= 4.34.0 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/webpushr-web-push-notifications/wordpress-web-push-notifications-webpushr-plugin-4-34-0-csrf-leading-to-lfi-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-36014",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-11-10T00:15:08.640",
"lastModified": "2023-11-10T00:15:08.640",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo de Microsoft Edge (basado en Chromium)"
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36022",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-11-03T01:15:07.907",
"lastModified": "2023-11-03T13:22:51.977",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-13T03:30:02.753",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -38,10 +58,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:extended_stable:*:*:*",
"versionEndExcluding": "118.0.2088.88",
"matchCriteriaId": "4ACC4EC7-19AE-41C2-985D-B0C8FF61A7C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
"versionEndExcluding": "119.0.2151.44",
"matchCriteriaId": "7F31A7E3-00A9-4285-B775-3F76CE942BEF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36022",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-36024",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-11-10T00:15:08.840",
"lastModified": "2023-11-10T00:15:08.840",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Microsoft Edge (basado en Chromium)"
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36027",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-11-10T20:15:07.263",
"lastModified": "2023-11-10T20:15:07.263",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36029",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-11-03T01:15:07.980",
"lastModified": "2023-11-03T13:22:51.977",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-13T03:28:00.920",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -38,10 +58,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge:*:*:*:*:*:android:*:*",
"versionEndExcluding": "118.0.2088.88",
"matchCriteriaId": "4E1AD745-C639-474A-971C-270E85B7607C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36029",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36034",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-11-03T01:15:08.047",
"lastModified": "2023-11-10T00:15:09.017",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-11-13T03:21:54.270",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.5
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
@ -38,10 +58,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:extended_stable:*:*:*",
"versionEndExcluding": "118.0.2088.88",
"matchCriteriaId": "4ACC4EC7-19AE-41C2-985D-B0C8FF61A7C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
"versionEndExcluding": "119.0.2151.44",
"matchCriteriaId": "7F31A7E3-00A9-4285-B775-3F76CE942BEF"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36034",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-37978",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T03:15:08.957",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in Dimitar Ivanov HTTP Headers.This issue affects HTTP Headers: from n/a through 1.18.11.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/http-headers/wordpress-http-headers-plugin-1-18-11-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38363",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-11-13T02:15:08.663",
"lastModified": "2023-11-13T02:15:08.663",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38364",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-11-13T02:15:08.840",
"lastModified": "2023-11-13T02:15:08.840",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-38515",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T03:15:09.143",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in Andy Moyle Church Admin.This issue affects Church Admin: from n/a through 3.7.56.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/church-admin/wordpress-church-admin-plugin-3-7-56-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-39295",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2023-11-10T16:15:32.580",
"lastModified": "2023-11-10T16:15:32.580",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-39796",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-10T06:15:30.410",
"lastModified": "2023-11-10T06:15:30.410",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in the miniform module in WBCE CMS v.1.6.0 allows remote unauthenticated attacker to execute arbitrary code via the DB_RECORD_TABLE parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en el m\u00f3dulo miniform en WBCE CMS v.1.6.0 permite a un atacante remoto no autenticado ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro DB_RECORD_TABLE."
}
],
"metrics": {},

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-41239",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T03:15:09.347",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in Blubrry PowerPress Podcasting plugin by Blubrry.This issue affects PowerPress Podcasting plugin by Blubrry: from n/a through 11.0.6.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/powerpress/wordpress-powerpress-podcasting-plugin-by-blubrry-plugin-11-0-6-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41284",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2023-11-10T16:15:32.780",
"lastModified": "2023-11-10T16:15:32.780",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-41285",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2023-11-10T16:15:32.967",
"lastModified": "2023-11-10T16:15:32.967",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42781",
"sourceIdentifier": "security@apache.org",
"published": "2023-11-12T14:15:25.847",
"lastModified": "2023-11-12T15:15:07.883",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43057",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-11-11T16:15:31.623",
"lastModified": "2023-11-11T16:15:31.623",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-4379",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-11-09T21:15:24.930",
"lastModified": "2023-11-09T21:15:24.930",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue has been discovered in GitLab EE affecting all versions starting from 15.3 prior to 16.2.8, 16.3 prior to 16.3.5, and 16.4 prior to 16.4.1. Code owner approval was not removed from merge requests when the target branch was updated."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en GitLab EE que afecta a todas las versiones desde la 15.3 anterior a la 16.2.8, la 16.3 anterior a la 16.3.5 y la 16.4 anterior a la 16.4.1. La aprobaci\u00f3n del propietario del c\u00f3digo no se elimin\u00f3 de las solicitudes de fusi\u00f3n cuando se actualiz\u00f3 la rama de destino."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-45167",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-11-10T04:15:07.070",
"lastModified": "2023-11-10T04:15:07.070",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM AIX's 7.3 Python implementation could allow a non-privileged local user to exploit a vulnerability to cause a denial of service. IBM X-Force ID: 267965."
},
{
"lang": "es",
"value": "La implementaci\u00f3n Python 7.3 de IBM AIX podr\u00eda permitir que un usuario local sin privilegios aproveche una vulnerabilidad para provocar una denegaci\u00f3n de servicio. ID de IBM X-Force: 267965."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45806",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-10T15:15:08.440",
"lastModified": "2023-11-10T16:15:33.177",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45816",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-10T15:15:08.667",
"lastModified": "2023-11-10T16:15:33.250",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46130",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-10T15:15:08.870",
"lastModified": "2023-11-10T16:15:33.323",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-46207",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T03:15:09.537",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in StylemixThemes Motors \u2013 Car Dealer, Classifieds & Listing.This issue affects Motors \u2013 Car Dealer, Classifieds & Listing: from n/a through 1.4.6.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/motors-car-dealership-classified-listings/wordpress-motors-car-dealer-classifieds-listing-plugin-1-4-6-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46618",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-13T01:15:07.813",
"lastModified": "2023-11-13T01:15:07.813",
"vulnStatus": "Received",
"lastModified": "2023-11-13T03:16:20.870",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

Some files were not shown because too many files have changed in this diff Show More