Auto-Update: 2024-01-04T05:00:24.560796+00:00

This commit is contained in:
cad-safe-bot 2024-01-04 05:00:28 +00:00
parent fdbe8a0cf7
commit a8b019f1d9
13 changed files with 747 additions and 97 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27043",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-19T00:15:07.973",
"lastModified": "2023-12-28T02:15:54.543",
"lastModified": "2024-01-04T03:15:09.500",
"vulnStatus": "Modified",
"descriptions": [
{
@ -124,6 +124,10 @@
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SINP4OVYNB2AGDYI2GS37EMW3H3F7XPZ/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SOX7BCN6YL7B3RFPEEXPIU5CMTEHJOKR/",
"source": "cve@mitre.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZXC32CJ7TWDPJO6GY2XIQRO7JZX5FLP/",
"source": "cve@mitre.org"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48003",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-26T22:15:13.907",
"lastModified": "2023-12-27T18:24:09.770",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-04T03:17:21.990",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,76 @@
"value": "Una redirecci\u00f3n abierta mediante inyecci\u00f3n de HTML en mensajes de usuario en Asp.Net Zero anterior a 12.3.0 permite a atacantes remotos redirigir a v\u00edctimas objetivo a cualquier URL a trav\u00e9s de '"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:aspnetzero:asp.net_zero:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.3.0",
"matchCriteriaId": "1D924356-57FE-4848-881C-263FD301E5CF"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.unsafe-inline.com/0day/asp.net-zero-v12.3.0-html-injection-leads-to-open-redirect-via-websockets-cve-2023-48003",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/passtheticket/vulnerability-research/blob/main/aspnetzero_html_injection_via_websockets_messages.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49438",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-26T22:15:13.973",
"lastModified": "2023-12-27T18:24:09.770",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-04T03:27:28.373",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,15 +14,76 @@
"value": "Una vulnerabilidad de redireccionamiento abierto en el paquete Python Flask-Security-Too <=5.3.2 permite a los atacantes redirigir a usuarios desprevenidos a sitios maliciosos a trav\u00e9s de una URL manipulada abusando del par\u00e1metro ?next en las rutas /login y /register."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flask-security-too_project:flask-security-too:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.3.2",
"matchCriteriaId": "11C4D8B0-F35A-46FD-A848-799D45F5F7F0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Flask-Middleware/flask-security",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/brandon-t-elliott/CVE-2023-49438",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50968",
"sourceIdentifier": "security@apache.org",
"published": "2023-12-26T12:15:07.287",
"lastModified": "2023-12-26T20:34:16.103",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-04T03:01:53.323",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,11 +14,44 @@
"value": "Vulnerabilidad de lectura de propiedades de archivos arbitrarias en Apache Software Foundation Apache OFBiz cuando el usuario realiza una llamada uri sin autorizaci\u00f3n. El mismo uri puede utilizarse para realizar un ataque SSRF tambi\u00e9n sin autorizaci\u00f3n. Se recomienda a los usuarios actualizar a la versi\u00f3n 18.12.11, que soluciona este problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
},
{
"source": "security@apache.org",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -31,30 +64,70 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.12.11",
"matchCriteriaId": "B6050132-AADE-4AC9-9C96-C8333441D0EB"
}
]
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/12/26/2",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://issues.apache.org/jira/browse/OFBIZ-12875",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.apache.org/thread/x5now4bk3llwf3k58kl96qvtjyxwp43q",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "https://ofbiz.apache.org/download.html",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Product"
]
},
{
"url": "https://ofbiz.apache.org/release-notes-18.12.11.html",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://ofbiz.apache.org/security.html",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,43 +2,126 @@
"id": "CVE-2023-51467",
"sourceIdentifier": "security@apache.org",
"published": "2023-12-26T15:15:08.853",
"lastModified": "2023-12-26T20:34:16.103",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-04T03:04:43.447",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The vulnerability allows attackers to bypass authentication to achieve a simple Server-Side Request Forgery (SSRF)\n"
},
{
"lang": "es",
"value": "La vulnerabilidad permite a los atacantes omitir la autenticaci\u00f3n para lograr Server-Side Request Forgery (SSRF) simple."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:ofbiz:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.12.11",
"matchCriteriaId": "B6050132-AADE-4AC9-9C96-C8333441D0EB"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/12/26/3",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://issues.apache.org/jira/browse/OFBIZ-12873",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.apache.org/thread/9tmf9qyyhgh6m052rhz7lg9vxn390bdv",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "https://lists.apache.org/thread/oj2s6objhdq72t6g29omqpcbd1wlp48o",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
},
{
"url": "https://ofbiz.apache.org/download.html",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Product"
]
},
{
"url": "https://ofbiz.apache.org/release-notes-18.12.11.html",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://ofbiz.apache.org/security.html",
"source": "security@apache.org"
"source": "security@apache.org",
"tags": [
"Not Applicable"
]
}
]
}

View File

@ -2,35 +2,106 @@
"id": "CVE-2023-52086",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-26T18:15:09.030",
"lastModified": "2023-12-26T20:34:16.103",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-04T03:09:10.993",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "resumable.php (aka PHP backend for resumable.js) 0.1.4 before 3c6dbf5 allows arbitrary file upload anywhere in the filesystem via ../ in multipart/form-data content to upload.php. (File overwrite hasn't been possible with the code available in GitHub in recent years, however.)"
},
{
"lang": "es",
"value": "resumable.php (tambi\u00e9n conocido como backend PHP para resumable.js) 0.1.4 anterior a 3c6dbf5 permite la carga de archivos arbitrarios en cualquier parte del sistema de archivos a trav\u00e9s de ../ en multipart/form-data content to upload.php. (Sin embargo, la sobrescritura de archivos no ha sido posible con el c\u00f3digo disponible en GitHub en los \u00faltimos a\u00f1os)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:startutorial:php_backend_for_resumable.js:0.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "61A220BB-610D-4B95-AEC7-B4BE6197A87E"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/dilab/resumable.php/commit/3c6dbf5170b01cbb712013c7d0a83f5aac45653b",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/dilab/resumable.php/issues/34",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/dilab/resumable.php/pull/27/commits/3e3c94d0302bb399a7611b4738a5a4dd0832a926",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/dilab/resumable.php/pull/39/commits/408f54dff10e48befa44d417933787232a64304b",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/dilab/resumable.php/pull/39/commits/d3552efd403e2d87407934477eee642836cab3b4",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52096",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-26T23:15:07.947",
"lastModified": "2023-12-27T18:24:09.770",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-04T03:38:49.740",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -14,19 +14,84 @@
"value": "SteVe Community ocpp-jaxb anterior a 0.0.8 genera marcas de tiempo no v\u00e1lidas, como las del mes 00 en determinadas situaciones (como cuando una aplicaci\u00f3n recibe un Open Charge Point Protocol de StartTransaction con un par\u00e1metro de marca de tiempo de 1000000). Esto puede provocar una excepci\u00f3n de SQL en las aplicaciones y puede socavar la integridad de los registros de transacciones."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:steve-community:ocpp-jaxb:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.0.8",
"matchCriteriaId": "00CEA40C-5001-4C81-A9C8-45DA784BBEEA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/steve-community/ocpp-jaxb/compare/0.0.7...0.0.8",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/steve-community/ocpp-jaxb/issues/13",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://github.com/steve-community/steve/issues/1292",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-6190",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2023-12-27T15:15:45.900",
"lastModified": "2023-12-28T09:15:07.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-04T03:43:21.943",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Improper Input Validation vulnerability in \u0130zmir Katip \u00c7elebi University University Information Management System allows Absolute Path Traversal.This issue affects University Information Management System: before 30.11.2023.\n\n"
"value": "Improper Input Validation vulnerability in ?zmir Katip \u00c7elebi University University Information Management System allows Absolute Path Traversal.This issue affects University Information Management System: before 30.11.2023.\n\n"
},
{
"lang": "es",
@ -17,8 +17,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
@ -40,8 +60,18 @@
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -50,10 +80,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ikcu:university_information_management_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "30.11.2023",
"matchCriteriaId": "FB9D24F2-B97F-4FEA-828C-E20D8036D5E5"
}
]
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-23-0736",
"source": "iletisim@usom.gov.tr"
"source": "iletisim@usom.gov.tr",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,80 @@
"id": "CVE-2023-6268",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-12-26T19:15:08.450",
"lastModified": "2023-12-26T20:34:16.103",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-04T03:14:37.020",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The JSON Content Importer WordPress plugin before 1.5.4 does not sanitise and escape the tab parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
},
{
"lang": "es",
"value": "JSON Content Importer WordPress plugin anterior a 1.5.4 no sanitiza ni escapa el par\u00e1metro de pesta\u00f1a antes de devolverlo a la p\u00e1gina, lo que genera Cross-Site Scripting Reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como el administrador."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:json-content-importer:json_content_importer:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.4",
"matchCriteriaId": "8513D3CA-0BB5-475B-991B-EDDFBEC806D9"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/15b9ab48-c038-4f2e-b823-1e374baae985",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2023-6498",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-04T04:15:09.337",
"lastModified": "2024-01-04T04:15:09.337",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Complianz \u2013 GDPR/CCPA Cookie Consent plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to and including 6.5.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3009228%40complianz-gdpr&new=3009228%40complianz-gdpr&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/01c1458d-3e38-4dbf-bb65-80465ea6d0ad?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,47 @@
{
"id": "CVE-2023-6733",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-04T04:15:09.550",
"lastModified": "2024-01-04T04:15:09.550",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The WP-Members Membership Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.4.8 via the wpmem_field shortcode. This makes it possible for authenticated attackers, with contributor access and above, to extract sensitive data including user emails, password hashes, usernames, and more."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3015224%40wp-members%2Ftrunk&old=2920897%40wp-members%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/46c61f38-553e-43b2-a666-b160db40e66d?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,51 @@
{
"id": "CVE-2023-6738",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-01-04T04:15:09.730",
"lastModified": "2024-01-04T04:15:09.730",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The Page Builder: Pagelayer \u2013 Drag and Drop website builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'pagelayer_header_code', 'pagelayer_body_open_code', and 'pagelayer_footer_code' meta fields in all versions up to, and including, 1.7.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This appears to be a reintroduction of a vulnerability patched in version 1.7.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/pagelayer/trunk/main/post_metas.php#L527",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/pagelayer/tags/1.7.8&old=3016486&new_path=/pagelayer/tags/1.7.9&new=3016486&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d14c8890-482c-4d43-a68f-0d04c4feca8f?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-01-04T03:00:26.081104+00:00
2024-01-04T05:00:24.560796+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-01-04T02:51:03.117000+00:00
2024-01-04T04:15:09.730000+00:00
```
### Last Data Feed Release
@ -29,56 +29,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
234839
234842
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `3`
* [CVE-2024-20802](CVE-2024/CVE-2024-208xx/CVE-2024-20802.json) (`2024-01-04T01:15:09.013`)
* [CVE-2024-20803](CVE-2024/CVE-2024-208xx/CVE-2024-20803.json) (`2024-01-04T01:15:09.223`)
* [CVE-2024-20804](CVE-2024/CVE-2024-208xx/CVE-2024-20804.json) (`2024-01-04T01:15:09.390`)
* [CVE-2024-20805](CVE-2024/CVE-2024-208xx/CVE-2024-20805.json) (`2024-01-04T01:15:09.550`)
* [CVE-2024-20806](CVE-2024/CVE-2024-208xx/CVE-2024-20806.json) (`2024-01-04T01:15:09.720`)
* [CVE-2024-20807](CVE-2024/CVE-2024-208xx/CVE-2024-20807.json) (`2024-01-04T01:15:09.873`)
* [CVE-2024-20808](CVE-2024/CVE-2024-208xx/CVE-2024-20808.json) (`2024-01-04T01:15:10.040`)
* [CVE-2024-20809](CVE-2024/CVE-2024-208xx/CVE-2024-20809.json) (`2024-01-04T01:15:10.210`)
* [CVE-2024-0222](CVE-2024/CVE-2024-02xx/CVE-2024-0222.json) (`2024-01-04T02:15:28.933`)
* [CVE-2024-0223](CVE-2024/CVE-2024-02xx/CVE-2024-0223.json) (`2024-01-04T02:15:28.987`)
* [CVE-2024-0224](CVE-2024/CVE-2024-02xx/CVE-2024-0224.json) (`2024-01-04T02:15:29.033`)
* [CVE-2024-0225](CVE-2024/CVE-2024-02xx/CVE-2024-0225.json) (`2024-01-04T02:15:29.080`)
* [CVE-2023-6498](CVE-2023/CVE-2023-64xx/CVE-2023-6498.json) (`2024-01-04T04:15:09.337`)
* [CVE-2023-6733](CVE-2023/CVE-2023-67xx/CVE-2023-6733.json) (`2024-01-04T04:15:09.550`)
* [CVE-2023-6738](CVE-2023/CVE-2023-67xx/CVE-2023-6738.json) (`2024-01-04T04:15:09.730`)
### CVEs modified in the last Commit
Recently modified CVEs: `139`
Recently modified CVEs: `9`
* [CVE-2020-1581](CVE-2020/CVE-2020-15xx/CVE-2020-1581.json) (`2024-01-04T02:15:27.913`)
* [CVE-2020-1582](CVE-2020/CVE-2020-15xx/CVE-2020-1582.json) (`2024-01-04T02:15:27.987`)
* [CVE-2020-1583](CVE-2020/CVE-2020-15xx/CVE-2020-1583.json) (`2024-01-04T02:15:28.197`)
* [CVE-2020-1584](CVE-2020/CVE-2020-15xx/CVE-2020-1584.json) (`2024-01-04T02:15:28.393`)
* [CVE-2020-1585](CVE-2020/CVE-2020-15xx/CVE-2020-1585.json) (`2024-01-04T02:15:28.600`)
* [CVE-2020-1587](CVE-2020/CVE-2020-15xx/CVE-2020-1587.json) (`2024-01-04T02:15:28.667`)
* [CVE-2020-1591](CVE-2020/CVE-2020-15xx/CVE-2020-1591.json) (`2024-01-04T02:15:28.740`)
* [CVE-2020-1597](CVE-2020/CVE-2020-15xx/CVE-2020-1597.json) (`2024-01-04T02:15:28.820`)
* [CVE-2022-34267](CVE-2022/CVE-2022-342xx/CVE-2022-34267.json) (`2024-01-04T01:19:05.293`)
* [CVE-2023-47247](CVE-2023/CVE-2023-472xx/CVE-2023-47247.json) (`2024-01-04T01:07:38.967`)
* [CVE-2023-47091](CVE-2023/CVE-2023-470xx/CVE-2023-47091.json) (`2024-01-04T01:15:58.840`)
* [CVE-2023-50090](CVE-2023/CVE-2023-500xx/CVE-2023-50090.json) (`2024-01-04T01:30:19.213`)
* [CVE-2023-5879](CVE-2023/CVE-2023-58xx/CVE-2023-5879.json) (`2024-01-04T01:30:19.213`)
* [CVE-2023-5880](CVE-2023/CVE-2023-58xx/CVE-2023-5880.json) (`2024-01-04T01:30:19.213`)
* [CVE-2023-5881](CVE-2023/CVE-2023-58xx/CVE-2023-5881.json) (`2024-01-04T01:30:19.213`)
* [CVE-2023-49442](CVE-2023/CVE-2023-494xx/CVE-2023-49442.json) (`2024-01-04T01:30:19.213`)
* [CVE-2023-6338](CVE-2023/CVE-2023-63xx/CVE-2023-6338.json) (`2024-01-04T01:30:19.213`)
* [CVE-2023-6540](CVE-2023/CVE-2023-65xx/CVE-2023-6540.json) (`2024-01-04T01:30:19.213`)
* [CVE-2023-50256](CVE-2023/CVE-2023-502xx/CVE-2023-50256.json) (`2024-01-04T01:30:19.213`)
* [CVE-2023-5138](CVE-2023/CVE-2023-51xx/CVE-2023-5138.json) (`2024-01-04T01:30:19.213`)
* [CVE-2023-45741](CVE-2023/CVE-2023-457xx/CVE-2023-45741.json) (`2024-01-04T02:34:14.733`)
* [CVE-2023-49117](CVE-2023/CVE-2023-491xx/CVE-2023-49117.json) (`2024-01-04T02:42:06.503`)
* [CVE-2023-46711](CVE-2023/CVE-2023-467xx/CVE-2023-46711.json) (`2024-01-04T02:45:03.603`)
* [CVE-2023-46681](CVE-2023/CVE-2023-466xx/CVE-2023-46681.json) (`2024-01-04T02:47:32.570`)
* [CVE-2024-21634](CVE-2024/CVE-2024-216xx/CVE-2024-21634.json) (`2024-01-04T01:30:19.213`)
* [CVE-2023-50968](CVE-2023/CVE-2023-509xx/CVE-2023-50968.json) (`2024-01-04T03:01:53.323`)
* [CVE-2023-51467](CVE-2023/CVE-2023-514xx/CVE-2023-51467.json) (`2024-01-04T03:04:43.447`)
* [CVE-2023-52086](CVE-2023/CVE-2023-520xx/CVE-2023-52086.json) (`2024-01-04T03:09:10.993`)
* [CVE-2023-6268](CVE-2023/CVE-2023-62xx/CVE-2023-6268.json) (`2024-01-04T03:14:37.020`)
* [CVE-2023-27043](CVE-2023/CVE-2023-270xx/CVE-2023-27043.json) (`2024-01-04T03:15:09.500`)
* [CVE-2023-48003](CVE-2023/CVE-2023-480xx/CVE-2023-48003.json) (`2024-01-04T03:17:21.990`)
* [CVE-2023-49438](CVE-2023/CVE-2023-494xx/CVE-2023-49438.json) (`2024-01-04T03:27:28.373`)
* [CVE-2023-52096](CVE-2023/CVE-2023-520xx/CVE-2023-52096.json) (`2024-01-04T03:38:49.740`)
* [CVE-2023-6190](CVE-2023/CVE-2023-61xx/CVE-2023-6190.json) (`2024-01-04T03:43:21.943`)
## Download and Usage