mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2023-11-14T00:55:17.861822+00:00
This commit is contained in:
parent
80353f4539
commit
a120e75d8b
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-42257",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2021-10-11T20:15:07.373",
|
||||
"lastModified": "2021-10-19T01:58:15.177",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-11-14T00:15:07.430",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -112,6 +112,10 @@
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42257",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.claudiokuenzler.com/blog/1068/check_smart-6.9.1-security-fix-release-pseudo-device-path",
|
||||
"source": "cve@mitre.org",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-46022",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-01-14T20:15:15.560",
|
||||
"lastModified": "2023-11-07T03:39:57.683",
|
||||
"lastModified": "2023-11-13T23:15:07.613",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -113,6 +113,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gnu-mirror-unofficial/recutils/commit/34b75ed7ad492c8e38b669ebafe0176f1f9992d2",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDVOFC3HTBG7DF2PZTEXRMG4CV2F55UF/",
|
||||
"source": "cve@mitre.org"
|
||||
@ -129,6 +133,10 @@
|
||||
"Mailing List",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46022",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0329",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-30T08:15:09.397",
|
||||
"lastModified": "2023-11-07T04:00:11.793",
|
||||
"lastModified": "2023-11-13T23:15:07.743",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -53,6 +53,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/175639/Elementor-Website-Builder-SQL-Injection.html",
|
||||
"source": "contact@wpscan.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/a875836d-77f4-4306-b275-2b60efff1493",
|
||||
"source": "contact@wpscan.com",
|
||||
|
20
CVE-2023/CVE-2023-460xx/CVE-2023-46019.json
Normal file
20
CVE-2023/CVE-2023-460xx/CVE-2023-46019.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-46019",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-13T23:15:07.840",
|
||||
"lastModified": "2023-11-13T23:15:07.840",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting (XSS) vulnerability in abs.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary code via the 'error' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ersinerenler/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-460xx/CVE-2023-46020.json
Normal file
20
CVE-2023/CVE-2023-460xx/CVE-2023-46020.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-46020",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-13T23:15:07.893",
|
||||
"lastModified": "2023-11-13T23:15:07.893",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting (XSS) in updateprofile.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary code via the 'rename', 'remail', 'rphone' and 'rcity' parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ersinerenler/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-460xx/CVE-2023-46021.json
Normal file
20
CVE-2023/CVE-2023-460xx/CVE-2023-46021.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-46021",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-11-13T23:15:07.950",
|
||||
"lastModified": "2023-11-13T23:15:07.950",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability in cancel.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary commands via the 'reqid' parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ersinerenler/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2023/CVE-2023-46xx/CVE-2023-4603.json
Normal file
51
CVE-2023/CVE-2023-46xx/CVE-2023-4603.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2023-4603",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-11-13T23:15:08.800",
|
||||
"lastModified": "2023-11-13T23:15:08.800",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Star CloudPRNT for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'printersettings' parameter in versions up to, and including, 2.0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1cRVH7Oz6M2U2XTbNAmm43PDKBw6FzShA/view?usp=sharing",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/2991002/star-cloudprnt-for-woocommerce/trunk?contextall=1&old=2510015&old_path=%2Fstar-cloudprnt-for-woocommerce%2Ftrunk",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/110c6d41-e814-41c9-a3e7-d94ec3d953e6?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47657.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47657.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-47657",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-14T00:15:07.547",
|
||||
"lastModified": "2023-11-14T00:15:07.547",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Auth. (ShopManager+) Stored Cross-Site Scripting (XSS) vulnerability in GrandPlugins Direct Checkout \u2013 Quick View \u2013 Buy Now For WooCommerce plugin <=\u00a01.5.8 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/quick-view-and-buy-now-for-woocommerce/wordpress-direct-checkout-quick-view-buy-now-for-woocommerce-plugin-1-5-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47662.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47662.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-47662",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-14T00:15:07.743",
|
||||
"lastModified": "2023-11-14T00:15:07.743",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in GoldBroker.Com Live Gold Price & Silver Price Charts Widgets plugin <=\u00a02.4 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/gold-price-chart-widget/wordpress-live-gold-price-silver-price-charts-widgets-plugin-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47665.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47665.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-47665",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-14T00:15:07.940",
|
||||
"lastModified": "2023-11-14T00:15:07.940",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in edward_plainview Plainview Protect Passwords plugin <=\u00a01.4 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/plainview-protect-passwords/wordpress-plainview-protect-passwords-plugin-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47673.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47673.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-47673",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-14T00:15:08.140",
|
||||
"lastModified": "2023-11-14T00:15:08.140",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Stefano Ottolenghi Post Pay Counter plugin <=\u00a02.789 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/post-pay-counter/wordpress-post-pay-counter-plugin-2-789-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47680.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47680.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-47680",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-14T00:15:08.337",
|
||||
"lastModified": "2023-11-14T00:15:08.337",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Qode Interactive Qi Addons For Elementor plugin <=\u00a01.6.3 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/qi-addons-for-elementor/wordpress-qi-addons-for-elementor-plugin-1-6-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47684.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47684.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-47684",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-14T00:15:08.530",
|
||||
"lastModified": "2023-11-14T00:15:08.530",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ThemePunch OHG Essential Grid plugin <=\u00a03.1.0 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/essential-grid/wordpress-essential-grid-plugin-3-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47690.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47690.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-47690",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-13T23:15:08.003",
|
||||
"lastModified": "2023-11-13T23:15:08.003",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Anton Bond Additional Order Filters for WooCommerce plugin <=\u00a01.10 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/additional-order-filters-for-woocommerce/wordpress-additional-order-filters-for-woocommerce-plugin-1-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47695.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47695.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-47695",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-13T23:15:08.210",
|
||||
"lastModified": "2023-11-13T23:15:08.210",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Scribit Shortcodes Finder plugin <=\u00a01.5.3 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/shortcodes-finder/wordpress-shortcodes-finder-plugin-1-5-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47696.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47696.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-47696",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-13T23:15:08.400",
|
||||
"lastModified": "2023-11-13T23:15:08.400",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauth. Stored Cross-Site Scripting (XSS) vulnerability\u00a0in Gravity Master Product Enquiry for WooCommerce plugin <=\u00a03.0 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/gm-woocommerce-quote-popup/wordpress-product-enquiry-for-woocommerce-plugin-3-0-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47697.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47697.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-47697",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-13T23:15:08.603",
|
||||
"lastModified": "2023-11-13T23:15:08.603",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WP Event Manager WP Event Manager \u2013 Events Calendar, Registrations, Sell Tickets with WooCommerce plugin <=\u00a03.1.39 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-event-manager/wordpress-wp-event-manager-plugin-3-1-39-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
15
CVE-2023/CVE-2023-59xx/CVE-2023-5977.json
Normal file
15
CVE-2023/CVE-2023-59xx/CVE-2023-5977.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2023-5977",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-11-14T00:15:08.720",
|
||||
"lastModified": "2023-11-14T00:15:08.720",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Accidental Request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6010.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6010.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2023-6010",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-11-14T00:15:08.763",
|
||||
"lastModified": "2023-11-14T00:15:08.763",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Accidental Request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6034.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6034.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2023-6034",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-11-14T00:15:08.803",
|
||||
"lastModified": "2023-11-14T00:15:08.803",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Accidental request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6083.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6083.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2023-6083",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-11-14T00:15:08.847",
|
||||
"lastModified": "2023-11-14T00:15:08.847",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Accidental Request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6085.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6085.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2023-6085",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-11-14T00:15:08.887",
|
||||
"lastModified": "2023-11-14T00:15:08.887",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Accidental request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6086.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6086.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2023-6086",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-11-14T00:15:08.933",
|
||||
"lastModified": "2023-11-14T00:15:08.933",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Accidental request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6087.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6087.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2023-6087",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-11-14T00:15:08.983",
|
||||
"lastModified": "2023-11-14T00:15:08.983",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Accidental Request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6088.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6088.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2023-6088",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-11-14T00:15:09.027",
|
||||
"lastModified": "2023-11-14T00:15:09.027",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Accidental Request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6089.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6089.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2023-6089",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-11-14T00:15:09.073",
|
||||
"lastModified": "2023-11-14T00:15:09.073",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Accidental Request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6092.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6092.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2023-6092",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-11-14T00:15:09.117",
|
||||
"lastModified": "2023-11-14T00:15:09.117",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: DUPLICATE, accidental request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2023/CVE-2023-61xx/CVE-2023-6106.json
Normal file
15
CVE-2023/CVE-2023-61xx/CVE-2023-6106.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2023-6106",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-11-14T00:15:09.157",
|
||||
"lastModified": "2023-11-14T00:15:09.157",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Accidental request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2023/CVE-2023-61xx/CVE-2023-6107.json
Normal file
15
CVE-2023/CVE-2023-61xx/CVE-2023-6107.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2023-6107",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-11-14T00:15:09.193",
|
||||
"lastModified": "2023-11-14T00:15:09.193",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Accidental Request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
15
CVE-2023/CVE-2023-61xx/CVE-2023-6115.json
Normal file
15
CVE-2023/CVE-2023-61xx/CVE-2023-6115.json
Normal file
@ -0,0 +1,15 @@
|
||||
{
|
||||
"id": "CVE-2023-6115",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-11-14T00:15:09.233",
|
||||
"lastModified": "2023-11-14T00:15:09.233",
|
||||
"vulnStatus": "Rejected",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: DUPLICATE CVE"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
52
README.md
52
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-11-13T23:00:17.983434+00:00
|
||||
2023-11-14T00:55:17.861822+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-11-13T22:15:07.740000+00:00
|
||||
2023-11-14T00:15:09.233000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,33 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
230454
|
||||
230481
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `27`
|
||||
|
||||
* [CVE-2023-42813](CVE-2023/CVE-2023-428xx/CVE-2023-42813.json) (`2023-11-13T21:15:07.473`)
|
||||
* [CVE-2023-42814](CVE-2023/CVE-2023-428xx/CVE-2023-42814.json) (`2023-11-13T21:15:07.730`)
|
||||
* [CVE-2023-42815](CVE-2023/CVE-2023-428xx/CVE-2023-42815.json) (`2023-11-13T21:15:07.940`)
|
||||
* [CVE-2023-42816](CVE-2023/CVE-2023-428xx/CVE-2023-42816.json) (`2023-11-13T21:15:08.127`)
|
||||
* [CVE-2023-47117](CVE-2023/CVE-2023-471xx/CVE-2023-47117.json) (`2023-11-13T21:15:08.317`)
|
||||
* [CVE-2023-47625](CVE-2023/CVE-2023-476xx/CVE-2023-47625.json) (`2023-11-13T21:15:08.513`)
|
||||
* [CVE-2023-46014](CVE-2023/CVE-2023-460xx/CVE-2023-46014.json) (`2023-11-13T22:15:07.487`)
|
||||
* [CVE-2023-46015](CVE-2023/CVE-2023-460xx/CVE-2023-46015.json) (`2023-11-13T22:15:07.537`)
|
||||
* [CVE-2023-46016](CVE-2023/CVE-2023-460xx/CVE-2023-46016.json) (`2023-11-13T22:15:07.587`)
|
||||
* [CVE-2023-46017](CVE-2023/CVE-2023-460xx/CVE-2023-46017.json) (`2023-11-13T22:15:07.640`)
|
||||
* [CVE-2023-46018](CVE-2023/CVE-2023-460xx/CVE-2023-46018.json) (`2023-11-13T22:15:07.690`)
|
||||
* [CVE-2023-47346](CVE-2023/CVE-2023-473xx/CVE-2023-47346.json) (`2023-11-13T22:15:07.740`)
|
||||
* [CVE-2023-46021](CVE-2023/CVE-2023-460xx/CVE-2023-46021.json) (`2023-11-13T23:15:07.950`)
|
||||
* [CVE-2023-47690](CVE-2023/CVE-2023-476xx/CVE-2023-47690.json) (`2023-11-13T23:15:08.003`)
|
||||
* [CVE-2023-47695](CVE-2023/CVE-2023-476xx/CVE-2023-47695.json) (`2023-11-13T23:15:08.210`)
|
||||
* [CVE-2023-47696](CVE-2023/CVE-2023-476xx/CVE-2023-47696.json) (`2023-11-13T23:15:08.400`)
|
||||
* [CVE-2023-47697](CVE-2023/CVE-2023-476xx/CVE-2023-47697.json) (`2023-11-13T23:15:08.603`)
|
||||
* [CVE-2023-4603](CVE-2023/CVE-2023-46xx/CVE-2023-4603.json) (`2023-11-13T23:15:08.800`)
|
||||
* [CVE-2023-47657](CVE-2023/CVE-2023-476xx/CVE-2023-47657.json) (`2023-11-14T00:15:07.547`)
|
||||
* [CVE-2023-47662](CVE-2023/CVE-2023-476xx/CVE-2023-47662.json) (`2023-11-14T00:15:07.743`)
|
||||
* [CVE-2023-47665](CVE-2023/CVE-2023-476xx/CVE-2023-47665.json) (`2023-11-14T00:15:07.940`)
|
||||
* [CVE-2023-47673](CVE-2023/CVE-2023-476xx/CVE-2023-47673.json) (`2023-11-14T00:15:08.140`)
|
||||
* [CVE-2023-47680](CVE-2023/CVE-2023-476xx/CVE-2023-47680.json) (`2023-11-14T00:15:08.337`)
|
||||
* [CVE-2023-47684](CVE-2023/CVE-2023-476xx/CVE-2023-47684.json) (`2023-11-14T00:15:08.530`)
|
||||
* [CVE-2023-5977](CVE-2023/CVE-2023-59xx/CVE-2023-5977.json) (`2023-11-14T00:15:08.720`)
|
||||
* [CVE-2023-6010](CVE-2023/CVE-2023-60xx/CVE-2023-6010.json) (`2023-11-14T00:15:08.763`)
|
||||
* [CVE-2023-6034](CVE-2023/CVE-2023-60xx/CVE-2023-6034.json) (`2023-11-14T00:15:08.803`)
|
||||
* [CVE-2023-6083](CVE-2023/CVE-2023-60xx/CVE-2023-6083.json) (`2023-11-14T00:15:08.847`)
|
||||
* [CVE-2023-6085](CVE-2023/CVE-2023-60xx/CVE-2023-6085.json) (`2023-11-14T00:15:08.887`)
|
||||
* [CVE-2023-6086](CVE-2023/CVE-2023-60xx/CVE-2023-6086.json) (`2023-11-14T00:15:08.933`)
|
||||
* [CVE-2023-6087](CVE-2023/CVE-2023-60xx/CVE-2023-6087.json) (`2023-11-14T00:15:08.983`)
|
||||
* [CVE-2023-6088](CVE-2023/CVE-2023-60xx/CVE-2023-6088.json) (`2023-11-14T00:15:09.027`)
|
||||
* [CVE-2023-6089](CVE-2023/CVE-2023-60xx/CVE-2023-6089.json) (`2023-11-14T00:15:09.073`)
|
||||
* [CVE-2023-6092](CVE-2023/CVE-2023-60xx/CVE-2023-6092.json) (`2023-11-14T00:15:09.117`)
|
||||
* [CVE-2023-6106](CVE-2023/CVE-2023-61xx/CVE-2023-6106.json) (`2023-11-14T00:15:09.157`)
|
||||
* [CVE-2023-6107](CVE-2023/CVE-2023-61xx/CVE-2023-6107.json) (`2023-11-14T00:15:09.193`)
|
||||
* [CVE-2023-6115](CVE-2023/CVE-2023-61xx/CVE-2023-6115.json) (`2023-11-14T00:15:09.233`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `3`
|
||||
|
||||
* [CVE-2021-42073](CVE-2021/CVE-2021-420xx/CVE-2021-42073.json) (`2023-11-13T22:15:07.353`)
|
||||
* [CVE-2023-5999](CVE-2023/CVE-2023-59xx/CVE-2023-5999.json) (`2023-11-13T21:15:08.710`)
|
||||
* [CVE-2021-46022](CVE-2021/CVE-2021-460xx/CVE-2021-46022.json) (`2023-11-13T23:15:07.613`)
|
||||
* [CVE-2021-42257](CVE-2021/CVE-2021-422xx/CVE-2021-42257.json) (`2023-11-14T00:15:07.430`)
|
||||
* [CVE-2023-0329](CVE-2023/CVE-2023-03xx/CVE-2023-0329.json) (`2023-11-13T23:15:07.743`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user