mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-11-14T00:55:17.861822+00:00
This commit is contained in:
parent
80353f4539
commit
a120e75d8b
@ -2,8 +2,8 @@
|
|||||||
"id": "CVE-2021-42257",
|
"id": "CVE-2021-42257",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2021-10-11T20:15:07.373",
|
"published": "2021-10-11T20:15:07.373",
|
||||||
"lastModified": "2021-10-19T01:58:15.177",
|
"lastModified": "2023-11-14T00:15:07.430",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
@ -112,6 +112,10 @@
|
|||||||
"Third Party Advisory"
|
"Third Party Advisory"
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42257",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://www.claudiokuenzler.com/blog/1068/check_smart-6.9.1-security-fix-release-pseudo-device-path",
|
"url": "https://www.claudiokuenzler.com/blog/1068/check_smart-6.9.1-security-fix-release-pseudo-device-path",
|
||||||
"source": "cve@mitre.org",
|
"source": "cve@mitre.org",
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2021-46022",
|
"id": "CVE-2021-46022",
|
||||||
"sourceIdentifier": "cve@mitre.org",
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
"published": "2022-01-14T20:15:15.560",
|
"published": "2022-01-14T20:15:15.560",
|
||||||
"lastModified": "2023-11-07T03:39:57.683",
|
"lastModified": "2023-11-13T23:15:07.613",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -113,6 +113,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/gnu-mirror-unofficial/recutils/commit/34b75ed7ad492c8e38b669ebafe0176f1f9992d2",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDVOFC3HTBG7DF2PZTEXRMG4CV2F55UF/",
|
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDVOFC3HTBG7DF2PZTEXRMG4CV2F55UF/",
|
||||||
"source": "cve@mitre.org"
|
"source": "cve@mitre.org"
|
||||||
@ -129,6 +133,10 @@
|
|||||||
"Mailing List",
|
"Mailing List",
|
||||||
"Vendor Advisory"
|
"Vendor Advisory"
|
||||||
]
|
]
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-46022",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,7 +2,7 @@
|
|||||||
"id": "CVE-2023-0329",
|
"id": "CVE-2023-0329",
|
||||||
"sourceIdentifier": "contact@wpscan.com",
|
"sourceIdentifier": "contact@wpscan.com",
|
||||||
"published": "2023-05-30T08:15:09.397",
|
"published": "2023-05-30T08:15:09.397",
|
||||||
"lastModified": "2023-11-07T04:00:11.793",
|
"lastModified": "2023-11-13T23:15:07.743",
|
||||||
"vulnStatus": "Modified",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
@ -53,6 +53,10 @@
|
|||||||
}
|
}
|
||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "http://packetstormsecurity.com/files/175639/Elementor-Website-Builder-SQL-Injection.html",
|
||||||
|
"source": "contact@wpscan.com"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"url": "https://wpscan.com/vulnerability/a875836d-77f4-4306-b275-2b60efff1493",
|
"url": "https://wpscan.com/vulnerability/a875836d-77f4-4306-b275-2b60efff1493",
|
||||||
"source": "contact@wpscan.com",
|
"source": "contact@wpscan.com",
|
||||||
|
20
CVE-2023/CVE-2023-460xx/CVE-2023-46019.json
Normal file
20
CVE-2023/CVE-2023-460xx/CVE-2023-46019.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-46019",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-11-13T23:15:07.840",
|
||||||
|
"lastModified": "2023-11-13T23:15:07.840",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Cross Site Scripting (XSS) vulnerability in abs.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary code via the 'error' parameter."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ersinerenler/CVE-2023-46019-Code-Projects-Blood-Bank-1.0-Reflected-Cross-Site-Scripting-Vulnerability",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
CVE-2023/CVE-2023-460xx/CVE-2023-46020.json
Normal file
20
CVE-2023/CVE-2023-460xx/CVE-2023-46020.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-46020",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-11-13T23:15:07.893",
|
||||||
|
"lastModified": "2023-11-13T23:15:07.893",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Cross Site Scripting (XSS) in updateprofile.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary code via the 'rename', 'remail', 'rphone' and 'rcity' parameters."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ersinerenler/CVE-2023-46020-Code-Projects-Blood-Bank-1.0-Stored-Cross-Site-Scripting-Vulnerability",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
CVE-2023/CVE-2023-460xx/CVE-2023-46021.json
Normal file
20
CVE-2023/CVE-2023-460xx/CVE-2023-46021.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-46021",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-11-13T23:15:07.950",
|
||||||
|
"lastModified": "2023-11-13T23:15:07.950",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "SQL Injection vulnerability in cancel.php in Code-Projects Blood Bank 1.0 allows attackers to run arbitrary commands via the 'reqid' parameter."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ersinerenler/CVE-2023-46021-Code-Projects-Blood-Bank-1.0-SQL-Injection-Vulnerability",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
51
CVE-2023/CVE-2023-46xx/CVE-2023-4603.json
Normal file
51
CVE-2023/CVE-2023-46xx/CVE-2023-4603.json
Normal file
@ -0,0 +1,51 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-4603",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-11-13T23:15:08.800",
|
||||||
|
"lastModified": "2023-11-13T23:15:08.800",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Star CloudPRNT for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'printersettings' parameter in versions up to, and including, 2.0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.1,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://drive.google.com/file/d/1cRVH7Oz6M2U2XTbNAmm43PDKBw6FzShA/view?usp=sharing",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/2991002/star-cloudprnt-for-woocommerce/trunk?contextall=1&old=2510015&old_path=%2Fstar-cloudprnt-for-woocommerce%2Ftrunk",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/110c6d41-e814-41c9-a3e7-d94ec3d953e6?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47657.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47657.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-47657",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2023-11-14T00:15:07.547",
|
||||||
|
"lastModified": "2023-11-14T00:15:07.547",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Auth. (ShopManager+) Stored Cross-Site Scripting (XSS) vulnerability in GrandPlugins Direct Checkout \u2013 Quick View \u2013 Buy Now For WooCommerce plugin <=\u00a01.5.8 versions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/quick-view-and-buy-now-for-woocommerce/wordpress-direct-checkout-quick-view-buy-now-for-woocommerce-plugin-1-5-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47662.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47662.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-47662",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2023-11-14T00:15:07.743",
|
||||||
|
"lastModified": "2023-11-14T00:15:07.743",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in GoldBroker.Com Live Gold Price & Silver Price Charts Widgets plugin <=\u00a02.4 versions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 5.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.7,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/gold-price-chart-widget/wordpress-live-gold-price-silver-price-charts-widgets-plugin-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47665.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47665.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-47665",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2023-11-14T00:15:07.940",
|
||||||
|
"lastModified": "2023-11-14T00:15:07.940",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in edward_plainview Plainview Protect Passwords plugin <=\u00a01.4 versions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/plainview-protect-passwords/wordpress-plainview-protect-passwords-plugin-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47673.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47673.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-47673",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2023-11-14T00:15:08.140",
|
||||||
|
"lastModified": "2023-11-14T00:15:08.140",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Stefano Ottolenghi Post Pay Counter plugin <=\u00a02.789 versions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/post-pay-counter/wordpress-post-pay-counter-plugin-2-789-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47680.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47680.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-47680",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2023-11-14T00:15:08.337",
|
||||||
|
"lastModified": "2023-11-14T00:15:08.337",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Qode Interactive Qi Addons For Elementor plugin <=\u00a01.6.3 versions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.3,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/qi-addons-for-elementor/wordpress-qi-addons-for-elementor-plugin-1-6-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47684.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47684.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-47684",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2023-11-14T00:15:08.530",
|
||||||
|
"lastModified": "2023-11-14T00:15:08.530",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ThemePunch OHG Essential Grid plugin <=\u00a03.1.0 versions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/essential-grid/wordpress-essential-grid-plugin-3-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47690.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47690.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-47690",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2023-11-13T23:15:08.003",
|
||||||
|
"lastModified": "2023-11-13T23:15:08.003",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Anton Bond Additional Order Filters for WooCommerce plugin <=\u00a01.10 versions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/additional-order-filters-for-woocommerce/wordpress-additional-order-filters-for-woocommerce-plugin-1-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47695.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47695.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-47695",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2023-11-13T23:15:08.210",
|
||||||
|
"lastModified": "2023-11-13T23:15:08.210",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Scribit Shortcodes Finder plugin <=\u00a01.5.3 versions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/shortcodes-finder/wordpress-shortcodes-finder-plugin-1-5-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47696.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47696.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-47696",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2023-11-13T23:15:08.400",
|
||||||
|
"lastModified": "2023-11-13T23:15:08.400",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Unauth. Stored Cross-Site Scripting (XSS) vulnerability\u00a0in Gravity Master Product Enquiry for WooCommerce plugin <=\u00a03.0 versions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/gm-woocommerce-quote-popup/wordpress-product-enquiry-for-woocommerce-plugin-3-0-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
55
CVE-2023/CVE-2023-476xx/CVE-2023-47697.json
Normal file
55
CVE-2023/CVE-2023-476xx/CVE-2023-47697.json
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-47697",
|
||||||
|
"sourceIdentifier": "audit@patchstack.com",
|
||||||
|
"published": "2023-11-13T23:15:08.603",
|
||||||
|
"lastModified": "2023-11-13T23:15:08.603",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WP Event Manager WP Event Manager \u2013 Events Calendar, Registrations, Sell Tickets with WooCommerce plugin <=\u00a03.1.39 versions."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 7.1,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "audit@patchstack.com",
|
||||||
|
"type": "Secondary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://patchstack.com/database/vulnerability/wp-event-manager/wordpress-wp-event-manager-plugin-3-1-39-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||||
|
"source": "audit@patchstack.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
15
CVE-2023/CVE-2023-59xx/CVE-2023-5977.json
Normal file
15
CVE-2023/CVE-2023-59xx/CVE-2023-5977.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-5977",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-11-14T00:15:08.720",
|
||||||
|
"lastModified": "2023-11-14T00:15:08.720",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: Accidental Request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6010.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6010.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-6010",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-11-14T00:15:08.763",
|
||||||
|
"lastModified": "2023-11-14T00:15:08.763",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: Accidental Request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6034.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6034.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-6034",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-11-14T00:15:08.803",
|
||||||
|
"lastModified": "2023-11-14T00:15:08.803",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: Accidental request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6083.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6083.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-6083",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-11-14T00:15:08.847",
|
||||||
|
"lastModified": "2023-11-14T00:15:08.847",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: Accidental Request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6085.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6085.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-6085",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-11-14T00:15:08.887",
|
||||||
|
"lastModified": "2023-11-14T00:15:08.887",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: Accidental request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6086.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6086.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-6086",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-11-14T00:15:08.933",
|
||||||
|
"lastModified": "2023-11-14T00:15:08.933",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: Accidental request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6087.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6087.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-6087",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-11-14T00:15:08.983",
|
||||||
|
"lastModified": "2023-11-14T00:15:08.983",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: Accidental Request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6088.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6088.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-6088",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-11-14T00:15:09.027",
|
||||||
|
"lastModified": "2023-11-14T00:15:09.027",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: Accidental Request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6089.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6089.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-6089",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-11-14T00:15:09.073",
|
||||||
|
"lastModified": "2023-11-14T00:15:09.073",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: Accidental Request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2023/CVE-2023-60xx/CVE-2023-6092.json
Normal file
15
CVE-2023/CVE-2023-60xx/CVE-2023-6092.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-6092",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-11-14T00:15:09.117",
|
||||||
|
"lastModified": "2023-11-14T00:15:09.117",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: DUPLICATE, accidental request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2023/CVE-2023-61xx/CVE-2023-6106.json
Normal file
15
CVE-2023/CVE-2023-61xx/CVE-2023-6106.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-6106",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-11-14T00:15:09.157",
|
||||||
|
"lastModified": "2023-11-14T00:15:09.157",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: Accidental request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2023/CVE-2023-61xx/CVE-2023-6107.json
Normal file
15
CVE-2023/CVE-2023-61xx/CVE-2023-6107.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-6107",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-11-14T00:15:09.193",
|
||||||
|
"lastModified": "2023-11-14T00:15:09.193",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: Accidental Request."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
15
CVE-2023/CVE-2023-61xx/CVE-2023-6115.json
Normal file
15
CVE-2023/CVE-2023-61xx/CVE-2023-6115.json
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-6115",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-11-14T00:15:09.233",
|
||||||
|
"lastModified": "2023-11-14T00:15:09.233",
|
||||||
|
"vulnStatus": "Rejected",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Rejected reason: DUPLICATE CVE"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": []
|
||||||
|
}
|
52
README.md
52
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2023-11-13T23:00:17.983434+00:00
|
2023-11-14T00:55:17.861822+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2023-11-13T22:15:07.740000+00:00
|
2023-11-14T00:15:09.233000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -29,33 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
230454
|
230481
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `12`
|
Recently added CVEs: `27`
|
||||||
|
|
||||||
* [CVE-2023-42813](CVE-2023/CVE-2023-428xx/CVE-2023-42813.json) (`2023-11-13T21:15:07.473`)
|
* [CVE-2023-46021](CVE-2023/CVE-2023-460xx/CVE-2023-46021.json) (`2023-11-13T23:15:07.950`)
|
||||||
* [CVE-2023-42814](CVE-2023/CVE-2023-428xx/CVE-2023-42814.json) (`2023-11-13T21:15:07.730`)
|
* [CVE-2023-47690](CVE-2023/CVE-2023-476xx/CVE-2023-47690.json) (`2023-11-13T23:15:08.003`)
|
||||||
* [CVE-2023-42815](CVE-2023/CVE-2023-428xx/CVE-2023-42815.json) (`2023-11-13T21:15:07.940`)
|
* [CVE-2023-47695](CVE-2023/CVE-2023-476xx/CVE-2023-47695.json) (`2023-11-13T23:15:08.210`)
|
||||||
* [CVE-2023-42816](CVE-2023/CVE-2023-428xx/CVE-2023-42816.json) (`2023-11-13T21:15:08.127`)
|
* [CVE-2023-47696](CVE-2023/CVE-2023-476xx/CVE-2023-47696.json) (`2023-11-13T23:15:08.400`)
|
||||||
* [CVE-2023-47117](CVE-2023/CVE-2023-471xx/CVE-2023-47117.json) (`2023-11-13T21:15:08.317`)
|
* [CVE-2023-47697](CVE-2023/CVE-2023-476xx/CVE-2023-47697.json) (`2023-11-13T23:15:08.603`)
|
||||||
* [CVE-2023-47625](CVE-2023/CVE-2023-476xx/CVE-2023-47625.json) (`2023-11-13T21:15:08.513`)
|
* [CVE-2023-4603](CVE-2023/CVE-2023-46xx/CVE-2023-4603.json) (`2023-11-13T23:15:08.800`)
|
||||||
* [CVE-2023-46014](CVE-2023/CVE-2023-460xx/CVE-2023-46014.json) (`2023-11-13T22:15:07.487`)
|
* [CVE-2023-47657](CVE-2023/CVE-2023-476xx/CVE-2023-47657.json) (`2023-11-14T00:15:07.547`)
|
||||||
* [CVE-2023-46015](CVE-2023/CVE-2023-460xx/CVE-2023-46015.json) (`2023-11-13T22:15:07.537`)
|
* [CVE-2023-47662](CVE-2023/CVE-2023-476xx/CVE-2023-47662.json) (`2023-11-14T00:15:07.743`)
|
||||||
* [CVE-2023-46016](CVE-2023/CVE-2023-460xx/CVE-2023-46016.json) (`2023-11-13T22:15:07.587`)
|
* [CVE-2023-47665](CVE-2023/CVE-2023-476xx/CVE-2023-47665.json) (`2023-11-14T00:15:07.940`)
|
||||||
* [CVE-2023-46017](CVE-2023/CVE-2023-460xx/CVE-2023-46017.json) (`2023-11-13T22:15:07.640`)
|
* [CVE-2023-47673](CVE-2023/CVE-2023-476xx/CVE-2023-47673.json) (`2023-11-14T00:15:08.140`)
|
||||||
* [CVE-2023-46018](CVE-2023/CVE-2023-460xx/CVE-2023-46018.json) (`2023-11-13T22:15:07.690`)
|
* [CVE-2023-47680](CVE-2023/CVE-2023-476xx/CVE-2023-47680.json) (`2023-11-14T00:15:08.337`)
|
||||||
* [CVE-2023-47346](CVE-2023/CVE-2023-473xx/CVE-2023-47346.json) (`2023-11-13T22:15:07.740`)
|
* [CVE-2023-47684](CVE-2023/CVE-2023-476xx/CVE-2023-47684.json) (`2023-11-14T00:15:08.530`)
|
||||||
|
* [CVE-2023-5977](CVE-2023/CVE-2023-59xx/CVE-2023-5977.json) (`2023-11-14T00:15:08.720`)
|
||||||
|
* [CVE-2023-6010](CVE-2023/CVE-2023-60xx/CVE-2023-6010.json) (`2023-11-14T00:15:08.763`)
|
||||||
|
* [CVE-2023-6034](CVE-2023/CVE-2023-60xx/CVE-2023-6034.json) (`2023-11-14T00:15:08.803`)
|
||||||
|
* [CVE-2023-6083](CVE-2023/CVE-2023-60xx/CVE-2023-6083.json) (`2023-11-14T00:15:08.847`)
|
||||||
|
* [CVE-2023-6085](CVE-2023/CVE-2023-60xx/CVE-2023-6085.json) (`2023-11-14T00:15:08.887`)
|
||||||
|
* [CVE-2023-6086](CVE-2023/CVE-2023-60xx/CVE-2023-6086.json) (`2023-11-14T00:15:08.933`)
|
||||||
|
* [CVE-2023-6087](CVE-2023/CVE-2023-60xx/CVE-2023-6087.json) (`2023-11-14T00:15:08.983`)
|
||||||
|
* [CVE-2023-6088](CVE-2023/CVE-2023-60xx/CVE-2023-6088.json) (`2023-11-14T00:15:09.027`)
|
||||||
|
* [CVE-2023-6089](CVE-2023/CVE-2023-60xx/CVE-2023-6089.json) (`2023-11-14T00:15:09.073`)
|
||||||
|
* [CVE-2023-6092](CVE-2023/CVE-2023-60xx/CVE-2023-6092.json) (`2023-11-14T00:15:09.117`)
|
||||||
|
* [CVE-2023-6106](CVE-2023/CVE-2023-61xx/CVE-2023-6106.json) (`2023-11-14T00:15:09.157`)
|
||||||
|
* [CVE-2023-6107](CVE-2023/CVE-2023-61xx/CVE-2023-6107.json) (`2023-11-14T00:15:09.193`)
|
||||||
|
* [CVE-2023-6115](CVE-2023/CVE-2023-61xx/CVE-2023-6115.json) (`2023-11-14T00:15:09.233`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `2`
|
Recently modified CVEs: `3`
|
||||||
|
|
||||||
* [CVE-2021-42073](CVE-2021/CVE-2021-420xx/CVE-2021-42073.json) (`2023-11-13T22:15:07.353`)
|
* [CVE-2021-46022](CVE-2021/CVE-2021-460xx/CVE-2021-46022.json) (`2023-11-13T23:15:07.613`)
|
||||||
* [CVE-2023-5999](CVE-2023/CVE-2023-59xx/CVE-2023-5999.json) (`2023-11-13T21:15:08.710`)
|
* [CVE-2021-42257](CVE-2021/CVE-2021-422xx/CVE-2021-42257.json) (`2023-11-14T00:15:07.430`)
|
||||||
|
* [CVE-2023-0329](CVE-2023/CVE-2023-03xx/CVE-2023-0329.json) (`2023-11-13T23:15:07.743`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
Loading…
x
Reference in New Issue
Block a user