mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 11:07:05 +00:00
Auto-Update: 2024-02-06T03:00:25.770920+00:00
This commit is contained in:
parent
42ff08669b
commit
709e9010c9
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2014-1745",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2014-05-21T11:14:09.677",
|
||||
"lastModified": "2023-11-07T02:19:21.587",
|
||||
"lastModified": "2024-02-06T02:15:07.623",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -491,6 +491,10 @@
|
||||
"url": "http://www.debian.org/security/2014/dsa-2939",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/02/05/8",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1030270",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22817",
|
||||
"sourceIdentifier": "psirt@wdc.com",
|
||||
"published": "2024-02-05T22:15:54.820",
|
||||
"lastModified": "2024-02-05T22:15:54.820",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22819",
|
||||
"sourceIdentifier": "psirt@wdc.com",
|
||||
"published": "2024-02-05T22:15:55.023",
|
||||
"lastModified": "2024-02-05T22:15:55.023",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27318",
|
||||
"sourceIdentifier": "security-alert@netapp.com",
|
||||
"published": "2024-02-05T21:15:10.737",
|
||||
"lastModified": "2024-02-05T21:15:10.737",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-34042",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2024-02-05T22:15:55.210",
|
||||
"lastModified": "2024-02-05T22:15:55.210",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-40414",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-01-10T22:15:48.687",
|
||||
"lastModified": "2024-01-18T14:30:39.767",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-06T02:15:07.907",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -99,6 +99,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/02/05/8",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213936",
|
||||
"source": "product-security@apple.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42833",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2024-01-10T22:15:50.000",
|
||||
"lastModified": "2024-01-17T20:50:04.980",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2024-02-06T02:15:07.997",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -87,6 +87,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2024/02/05/8",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/HT213938",
|
||||
"source": "product-security@apple.com",
|
||||
|
24
CVE-2023/CVE-2023-463xx/CVE-2023-46359.json
Normal file
24
CVE-2023/CVE-2023-463xx/CVE-2023-46359.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-46359",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-06T01:15:07.877",
|
||||
"lastModified": "2024-02-06T01:15:07.877",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability in Hardy Barth cPH2 eCharge Ladestation v1.87.0 and earlier, may allow an unauthenticated remote attacker to execute arbitrary commands on the system via a specifically crafted arguments passed to the connectivity check feature."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://hardy.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.offensity.com/en/blog/os-command-injection-in-cph2-charging-station-200-cve-2023-46359-and-cve-2023-46360/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-463xx/CVE-2023-46360.json
Normal file
24
CVE-2023/CVE-2023-463xx/CVE-2023-46360.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-46360",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-06T01:15:07.930",
|
||||
"lastModified": "2024-02-06T01:15:07.930",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hardy Barth cPH2 eCharge Ladestation v1.87.0 and earlier is vulnerable to Execution with Unnecessary Privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://hardy.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.offensity.com/en/blog/os-command-injection-in-cph2-charging-station-200-cve-2023-46359-and-cve-2023-46360/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-4637",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:55.410",
|
||||
"lastModified": "2024-02-05T22:15:55.410",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
24
CVE-2023/CVE-2023-470xx/CVE-2023-47022.json
Normal file
24
CVE-2023/CVE-2023-470xx/CVE-2023-47022.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-47022",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-06T01:15:07.987",
|
||||
"lastModified": "2024-02-06T01:15:07.987",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to execute arbitrary code via a crafted script to the payload parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://docs.google.com/document/d/15s7NftTX2dxfcFnMqkFIyeN48xq3LceesWOhP-9xL4Y/edit?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Patrick0x41/Security-Advisories/tree/main/CVE-2023-47022",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-473xx/CVE-2023-47353.json
Normal file
24
CVE-2023/CVE-2023-473xx/CVE-2023-47353.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-47353",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-06T01:15:08.037",
|
||||
"lastModified": "2024-02-06T01:15:08.037",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the com.oneed.dvr.service.DownloadFirmwareService component of IMOU GO v1.0.11 allows attackers to force the download of arbitrary files."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/actuator/imou/blob/main/com.dahua.imou.go-V1.0.11.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://play.google.com/store/apps/details?id=com.dahua.imou.go",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47354",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-06T00:15:08.110",
|
||||
"lastModified": "2024-02-06T00:15:08.110",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2023/CVE-2023-478xx/CVE-2023-47889.json
Normal file
20
CVE-2023/CVE-2023-478xx/CVE-2023-47889.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-47889",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-06T01:15:08.087",
|
||||
"lastModified": "2024-02-06T01:15:08.087",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Android application BINHDRM26 com.bdrm.superreboot 1.0.3, exposes several critical actions through its exported broadcast receivers. These exposed actions can allow any app on the device to send unauthorized broadcasts, leading to unintended consequences. The vulnerability is particularly concerning because these actions include powering off, system reboot & entering recovery mode."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/actuator/com.bdrm.superreboot/blob/main/CWE-925.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50781",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-02-05T21:15:10.970",
|
||||
"lastModified": "2024-02-05T21:15:10.970",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-50782",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-02-05T21:15:11.183",
|
||||
"lastModified": "2024-02-05T21:15:11.183",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-51506",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-01T12:15:53.533",
|
||||
"lastModified": "2024-02-01T13:41:44.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-06T01:02:24.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in realmag777 WPCS \u2013 WordPress Currency Switcher Professional allows Stored XSS.This issue affects WPCS \u2013 WordPress Currency Switcher Professional: from n/a through 1.2.0.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en realmag777 WPCS \u2013 WordPress Currency Switcher Professional permite XSS almacenado. Este problema afecta a WPCS \u2013 WordPress Currency Switcher Professional: desde n/a hasta 1.2.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +59,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +80,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pluginus:wordpress_currency_switcher:*:*:*:*:professional:wordpress:*:*",
|
||||
"versionEndIncluding": "1.2.0",
|
||||
"matchCriteriaId": "AFCA1CB3-B05C-4321-8DDF-A6423543FDFC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/currency-switcher/wordpress-wpcs-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-51509",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-01T12:15:53.733",
|
||||
"lastModified": "2024-02-01T13:41:44.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-06T01:02:16.330",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Metagauss RegistrationMagic \u2013 Custom Registration Forms, User Registration, Payment, and User Login allows Reflected XSS.This issue affects RegistrationMagic \u2013 Custom Registration Forms, User Registration, Payment, and User Login: from n/a through 5.2.4.1.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Metagauss RegistrationMagic \u2013 Custom Registration Forms, User Registration, Payment, and User Login permite XSS reflejado. Este problema afecta a RegistrationMagic \u2013 Custom Registration Forms, User Registration, Payment, and User Login : desde n/a hasta 5.2.4.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "5.2.4.1",
|
||||
"matchCriteriaId": "1544CCD4-9E9D-4204-BF69-4E82AED429EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-2-4-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-51514",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-01T12:15:53.917",
|
||||
"lastModified": "2024-02-01T13:41:44.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-06T01:02:10.990",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Codeboxr Team CBX Bookmark & Favorite allows Stored XSS.This issue affects CBX Bookmark & Favorite: from n/a through 1.7.13.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Codeboxr Team CBX Bookmark & Favorite permite almacenar XSS. Este problema afecta a CBX Bookmark & Favorite: desde n/a hasta 1.7.13."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:codeboxr:cbx_bookmark_\\&_favorite:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.7.13",
|
||||
"matchCriteriaId": "F872E4B9-A613-4017-BCE5-A6CE7209ACB7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/cbxwpbookmark/wordpress-cbx-bookmark-favorite-plugin-1-7-13-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-51684",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-01T11:15:11.260",
|
||||
"lastModified": "2024-02-01T13:41:44.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-06T01:03:20.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Easy Digital Downloads Easy Digital Downloads \u2013 Sell Digital Files (eCommerce Store & Payments Made Easy) allows Stored XSS.This issue affects Easy Digital Downloads \u2013 Sell Digital Files (eCommerce Store & Payments Made Easy): from n/a through 3.2.5.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Easy Digital Downloads Easy Digital Downloads \u2013 Sell Digital Files (eCommerce Store & Payments Made Easy) permite XSS almacenado. Este problema afecta a Easy Digital Downloads \u2013 Sell Digital Files (eCommerce Store & Payments Made Easy): desde n/a hasta 3.2.5."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:sandhillsdev:easy_digital_downloads:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.2.5",
|
||||
"matchCriteriaId": "DE476B02-71FE-48F3-8A64-FE62EF8645BF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/easy-digital-downloads/wordpress-easy-digital-downloads-plugin-3-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-51685",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-01T11:15:11.463",
|
||||
"lastModified": "2024-02-01T13:41:44.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-06T01:03:15.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LJ Apps WP Review Slider allows Stored XSS.This issue affects WP Review Slider: from n/a through 12.7.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en LJ Apps WP Review Slider permite XSS almacenado. Este problema afecta a WP Review Slider: desde n/a hasta 12.7."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ljapps:wp_review_slider:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "12.7",
|
||||
"matchCriteriaId": "B1728266-9E22-4F86-8A0A-788F9DF1B5DE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-facebook-reviews/wordpress-wp-review-slider-plugin-12-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-51689",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-01T11:15:11.760",
|
||||
"lastModified": "2024-02-01T13:41:44.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-06T01:03:10.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in naa986 Easy Video Player allows Stored XSS.This issue affects Easy Video Player: from n/a through 1.2.2.10.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en naa986 Easy Video Player permite XSS almacenado. Este problema afecta a Easy Video Player: desde n/a hasta 1.2.2.10."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:noorsplugin:easy_video_player:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.2.2.10",
|
||||
"matchCriteriaId": "A3CC8437-86DA-46AE-9993-E81F8658C13C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/easy-video-player/wordpress-easy-video-player-plugin-1-2-2-10-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-51690",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-01T11:15:11.973",
|
||||
"lastModified": "2024-02-01T13:41:44.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-06T01:03:05.650",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Advanced iFrame allows Stored XSS.This issue affects Advanced iFrame: from n/a through 2023.8.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Advanced iFrame permite XSS almacenado. Este problema afecta a Advanced iFrame: desde n/a hasta 2023.8."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tinywebgallery:advanced_iframe:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2023.8",
|
||||
"matchCriteriaId": "3FB2A371-1205-4C24-9197-7FB2C426D252"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/advanced-iframe/wordpress-advanced-iframe-plugin-2023-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-51691",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-01T11:15:12.200",
|
||||
"lastModified": "2024-02-01T13:41:44.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-06T01:02:56.130",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gVectors Team Comments \u2013 wpDiscuz allows Stored XSS.This issue affects Comments \u2013 wpDiscuz: from n/a through 7.6.12.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en gVectors Team Comments \u2013 wpDiscuz permite XSS almacenado. Este problema afecta a Comments \u2013 wpDiscuz: desde n/a hasta 7.6.12."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "7.6.12",
|
||||
"matchCriteriaId": "34F76E76-5AB9-48F9-B91F-82465F427743"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wpdiscuz/wordpress-wpdiscuz-plugin-7-6-12-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-51693",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-01T11:15:12.390",
|
||||
"lastModified": "2024-02-01T13:41:44.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-06T01:02:50.530",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themify Icons allows Stored XSS.This issue affects Themify Icons: from n/a through 2.0.1.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Themify Icons permite XSS almacenado. Este problema afecta a Themify Icons: desde n/a hasta 2.0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:themify:icons:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.0.1",
|
||||
"matchCriteriaId": "A58495FC-9A5D-4675-9E52-45D889756DE1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/themify-icons/wordpress-themify-icons-plugin-2-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-51694",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-01T11:15:12.610",
|
||||
"lastModified": "2024-02-01T13:41:44.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-06T01:02:45.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Epiphyt Embed Privacy allows Stored XSS.This issue affects Embed Privacy: from n/a through 1.8.0.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Epiphyt Embed Privacy permite XSS almacenado. Este problema afecta a Embed Privacy: desde n/a hasta 1.8.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:epiph:embed_privacy:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.8.0",
|
||||
"matchCriteriaId": "C0F2CF23-80AC-4026-9B22-43D500FEEA64"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/embed-privacy/wordpress-embed-privacy-plugin-1-8-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-51695",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-01T11:15:12.790",
|
||||
"lastModified": "2024-02-01T13:41:44.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-06T01:02:41.030",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPEverest Everest Forms \u2013 Build Contact Forms, Surveys, Polls, Application Forms, and more with Ease! allows Stored XSS.This issue affects Everest Forms \u2013 Build Contact Forms, Surveys, Polls, Application Forms, and more with Ease!: from n/a through 2.0.4.1.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WPEverest Everest Forms \u2013 Build Contact Forms, Surveys, Polls, Application Forms, and more with Ease! permite XSS almacenado. Este problema afecta a Everest Forms \u2013 Build Contact Forms, Surveys, Polls, Application Forms, and more with Ease! : desde n/a hasta 2.0.4.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpeverest:everest_forms:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.0.4.1",
|
||||
"matchCriteriaId": "CFED2A13-F884-487A-86A3-5D31BEDB7DEA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/everest-forms/wordpress-everest-forms-plugin-2-0-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-51951",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-02-05T21:15:11.397",
|
||||
"lastModified": "2024-02-05T21:15:11.397",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,16 +2,40 @@
|
||||
"id": "CVE-2023-52118",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-02-01T11:15:12.970",
|
||||
"lastModified": "2024-02-01T13:41:44.257",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2024-02-06T01:02:32.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Event Manager WP User Profile Avatar allows Stored XSS.This issue affects WP User Profile Avatar: from n/a through 1.0.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante de generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en WP Event Manager WP User Profile Avatar permite XSS almacenado. Este problema afecta a WP User Profile Avatar: desde n/a hasta 1.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +70,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wp-eventmanager:wp_event_manager:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.0",
|
||||
"matchCriteriaId": "66A91FE3-F891-4C5A-842E-57C6B7277B6E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-user-profile-avatar/wordpress-wp-user-profile-avatar-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2023/CVE-2023-62xx/CVE-2023-6229.json
Normal file
67
CVE-2023/CVE-2023-62xx/CVE-2023-6229.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2023-6229",
|
||||
"sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"published": "2024-02-06T01:15:08.137",
|
||||
"lastModified": "2024-02-06T01:15:08.137",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow in CPCA PDL Resource Download process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://canon.jp/support/support-info/240205vulnerability-response",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://psirt.canon/advisory-information/cp2024-001/",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://www.canon-europe.com/support/product-security-latest-news/",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2023/CVE-2023-62xx/CVE-2023-6230.json
Normal file
67
CVE-2023/CVE-2023-62xx/CVE-2023-6230.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2023-6230",
|
||||
"sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"published": "2024-02-06T01:15:08.350",
|
||||
"lastModified": "2024-02-06T01:15:08.350",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow in the Address Book password process in authentication of Mobile Device Function of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://canon.jp/support/support-info/240205vulnerability-response",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://psirt.canon/advisory-information/cp2024-001/",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://www.canon-europe.com/support/product-security-latest-news/",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2023/CVE-2023-62xx/CVE-2023-6231.json
Normal file
67
CVE-2023/CVE-2023-62xx/CVE-2023-6231.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2023-6231",
|
||||
"sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"published": "2024-02-06T01:15:08.547",
|
||||
"lastModified": "2024-02-06T01:15:08.547",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow in WSD probe request process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://canon.jp/support/support-info/240205vulnerability-response",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://psirt.canon/advisory-information/cp2024-001/",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://www.canon-europe.com/support/product-security-latest-news/",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2023/CVE-2023-62xx/CVE-2023-6232.json
Normal file
67
CVE-2023/CVE-2023-62xx/CVE-2023-6232.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2023-6232",
|
||||
"sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"published": "2024-02-06T01:15:08.740",
|
||||
"lastModified": "2024-02-06T01:15:08.740",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow in the Address Book username process in authentication of Mobile Device Function of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://canon.jp/support/support-info/240205vulnerability-response",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://psirt.canon/advisory-information/cp2024-001/",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://www.canon-europe.com/support/product-security-latest-news/",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2023/CVE-2023-62xx/CVE-2023-6233.json
Normal file
67
CVE-2023/CVE-2023-62xx/CVE-2023-6233.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2023-6233",
|
||||
"sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"published": "2024-02-06T01:15:08.930",
|
||||
"lastModified": "2024-02-06T01:15:08.930",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow in SLP attribute request process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://canon.jp/support/support-info/240205vulnerability-response",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://psirt.canon/advisory-information/cp2024-001/",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://www.canon-europe.com/support/product-security-latest-news/",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2023/CVE-2023-62xx/CVE-2023-6234.json
Normal file
67
CVE-2023/CVE-2023-62xx/CVE-2023-6234.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2023-6234",
|
||||
"sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"published": "2024-02-06T01:15:09.107",
|
||||
"lastModified": "2024-02-06T01:15:09.107",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow in CPCA Color LUT Resource Download process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://canon.jp/support/support-info/240205vulnerability-response",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://psirt.canon/advisory-information/cp2024-001/",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://www.canon-europe.com/support/product-security-latest-news/",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6526",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:55.593",
|
||||
"lastModified": "2024-02-05T22:15:55.593",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6557",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:55.767",
|
||||
"lastModified": "2024-02-05T22:15:55.767",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6635",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:56.023",
|
||||
"lastModified": "2024-02-05T22:15:56.023",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6679",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-12-11T19:15:09.440",
|
||||
"lastModified": "2024-01-25T20:15:39.967",
|
||||
"lastModified": "2024-02-06T02:15:08.087",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -155,6 +155,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7LSPIOMIJYTLZB6QKPQVVAYSUETUWKPF/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lore.kernel.org/netdev/20231211083758.1082853-1-jiri@resnulli.us/",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6700",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:56.187",
|
||||
"lastModified": "2024-02-05T22:15:56.187",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6701",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:56.357",
|
||||
"lastModified": "2024-02-05T22:15:56.357",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6807",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:56.543",
|
||||
"lastModified": "2024-02-05T22:15:56.543",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6808",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:56.710",
|
||||
"lastModified": "2024-02-05T22:15:56.710",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6846",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:56.887",
|
||||
"lastModified": "2024-02-05T22:15:56.887",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6884",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:57.057",
|
||||
"lastModified": "2024-02-05T22:15:57.057",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6925",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:57.233",
|
||||
"lastModified": "2024-02-05T22:15:57.233",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6933",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:57.407",
|
||||
"lastModified": "2024-02-05T22:15:57.407",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6953",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:57.587",
|
||||
"lastModified": "2024-02-05T22:15:57.587",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6959",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:57.767",
|
||||
"lastModified": "2024-02-05T22:15:57.767",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6963",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:57.930",
|
||||
"lastModified": "2024-02-05T22:15:57.930",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6982",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:58.093",
|
||||
"lastModified": "2024-02-05T22:15:58.093",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6983",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:58.257",
|
||||
"lastModified": "2024-02-05T22:15:58.257",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6985",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:58.433",
|
||||
"lastModified": "2024-02-05T22:15:58.433",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6989",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:58.603",
|
||||
"lastModified": "2024-02-05T22:15:58.603",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6996",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:58.773",
|
||||
"lastModified": "2024-02-05T22:15:58.773",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7014",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:58.943",
|
||||
"lastModified": "2024-02-05T22:15:58.943",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-7029",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:59.103",
|
||||
"lastModified": "2024-02-05T22:15:59.103",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0202",
|
||||
"sourceIdentifier": "patrick@puiterwijk.org",
|
||||
"published": "2024-02-05T21:15:11.450",
|
||||
"lastModified": "2024-02-05T21:15:11.450",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0221",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:59.297",
|
||||
"lastModified": "2024-02-05T22:15:59.297",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
67
CVE-2024/CVE-2024-02xx/CVE-2024-0244.json
Normal file
67
CVE-2024/CVE-2024-02xx/CVE-2024-0244.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2024-0244",
|
||||
"sourceIdentifier": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"published": "2024-02-06T01:15:09.300",
|
||||
"lastModified": "2024-02-06T01:15:09.300",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow in CPCA PCFAX number process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*:Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS MF750C Series/Color imageCLASS X MF1333C firmware v03.07 and earlier sold in US. i-SENSYS MF754Cdw/C1333iF firmware v03.07 and earlier sold in Europe.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://canon.jp/support/support-info/240205vulnerability-response",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://psirt.canon/advisory-information/cp2024-001/",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://www.canon-europe.com/support/product-security-latest-news/",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
},
|
||||
{
|
||||
"url": "https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers",
|
||||
"source": "f98c90f0-e9bd-4fa7-911b-51993f3571fd"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0254",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:59.630",
|
||||
"lastModified": "2024-02-05T22:15:59.630",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0255",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:59.810",
|
||||
"lastModified": "2024-02-05T22:15:59.810",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0324",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:15:59.980",
|
||||
"lastModified": "2024-02-05T22:15:59.980",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0366",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:00.150",
|
||||
"lastModified": "2024-02-05T22:16:00.150",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0370",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:00.320",
|
||||
"lastModified": "2024-02-05T22:16:00.320",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0371",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:00.483",
|
||||
"lastModified": "2024-02-05T22:16:00.483",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0372",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:00.667",
|
||||
"lastModified": "2024-02-05T22:16:00.667",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0373",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:00.840",
|
||||
"lastModified": "2024-02-05T22:16:00.840",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0374",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:01.020",
|
||||
"lastModified": "2024-02-05T22:16:01.020",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0380",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:01.190",
|
||||
"lastModified": "2024-02-05T22:16:01.190",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0382",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:01.360",
|
||||
"lastModified": "2024-02-05T22:16:01.360",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0384",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:01.527",
|
||||
"lastModified": "2024-02-05T22:16:01.527",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0428",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:01.710",
|
||||
"lastModified": "2024-02-05T22:16:01.710",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0448",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:01.890",
|
||||
"lastModified": "2024-02-05T22:16:01.890",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0508",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:02.067",
|
||||
"lastModified": "2024-02-05T22:16:02.067",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0509",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:02.260",
|
||||
"lastModified": "2024-02-05T22:16:02.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0585",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:02.433",
|
||||
"lastModified": "2024-02-05T22:16:02.433",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0586",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:02.607",
|
||||
"lastModified": "2024-02-05T22:16:02.607",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0597",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:02.777",
|
||||
"lastModified": "2024-02-05T22:16:02.777",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0612",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:03.003",
|
||||
"lastModified": "2024-02-05T22:16:03.003",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0630",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:03.170",
|
||||
"lastModified": "2024-02-05T22:16:03.170",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0659",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:03.343",
|
||||
"lastModified": "2024-02-05T22:16:03.343",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0660",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:03.520",
|
||||
"lastModified": "2024-02-05T22:16:03.520",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0668",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:03.700",
|
||||
"lastModified": "2024-02-05T22:16:03.700",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0678",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:03.867",
|
||||
"lastModified": "2024-02-05T22:16:03.867",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0691",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:04.037",
|
||||
"lastModified": "2024-02-05T22:16:04.037",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0699",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:04.210",
|
||||
"lastModified": "2024-02-05T22:16:04.210",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0701",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:04.380",
|
||||
"lastModified": "2024-02-05T22:16:04.380",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0709",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:04.553",
|
||||
"lastModified": "2024-02-05T22:16:04.553",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0761",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:04.733",
|
||||
"lastModified": "2024-02-05T22:16:04.733",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0790",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:04.907",
|
||||
"lastModified": "2024-02-05T22:16:04.907",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0791",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:05.077",
|
||||
"lastModified": "2024-02-05T22:16:05.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0796",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:05.243",
|
||||
"lastModified": "2024-02-05T22:16:05.243",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0797",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:05.407",
|
||||
"lastModified": "2024-02-05T22:16:05.407",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0823",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:05.577",
|
||||
"lastModified": "2024-02-05T22:16:05.577",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0834",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:05.750",
|
||||
"lastModified": "2024-02-05T22:16:05.750",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0835",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:05.917",
|
||||
"lastModified": "2024-02-05T22:16:05.917",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0859",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:06.090",
|
||||
"lastModified": "2024-02-05T22:16:06.090",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0869",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:06.267",
|
||||
"lastModified": "2024-02-05T22:16:06.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0954",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-05T22:16:06.433",
|
||||
"lastModified": "2024-02-05T22:16:06.433",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2024-02-06T01:00:55.997",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user