From b16977739d26b7385802067059f8dba0af3c76aa Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 20 May 2023 23:55:30 +0000 Subject: [PATCH] Auto-Update: 2023-05-20 23:55:26.820352+00:00 --- CVE-2022/CVE-2022-471xx/CVE-2022-47134.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-226xx/CVE-2023-22689.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-238xx/CVE-2023-23890.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-244xx/CVE-2023-24414.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-325xx/CVE-2023-32589.json | 55 +++++++++++++++++++++ README.md | 18 ++++--- 6 files changed, 285 insertions(+), 8 deletions(-) create mode 100644 CVE-2022/CVE-2022-471xx/CVE-2022-47134.json create mode 100644 CVE-2023/CVE-2023-226xx/CVE-2023-22689.json create mode 100644 CVE-2023/CVE-2023-238xx/CVE-2023-23890.json create mode 100644 CVE-2023/CVE-2023-244xx/CVE-2023-24414.json create mode 100644 CVE-2023/CVE-2023-325xx/CVE-2023-32589.json diff --git a/CVE-2022/CVE-2022-471xx/CVE-2022-47134.json b/CVE-2022/CVE-2022-471xx/CVE-2022-47134.json new file mode 100644 index 00000000000..0d5c2a6df92 --- /dev/null +++ b/CVE-2022/CVE-2022-471xx/CVE-2022-47134.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-47134", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-20T23:15:09.017", + "lastModified": "2023-05-20T23:15:09.017", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Bill Erickson Gallery Metabox plugin <=\u00a01.5 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/gallery-metabox/wordpress-gallery-metabox-plugin-1-5-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22689.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22689.json new file mode 100644 index 00000000000..ad66693fb7f --- /dev/null +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22689.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-22689", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-20T23:15:09.097", + "lastModified": "2023-05-20T23:15:09.097", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Lucian Apostol Auto Affiliate Links plugin <=\u00a06.3 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-auto-affiliate-links/wordpress-auto-affiliate-links-plugin-6-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23890.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23890.json new file mode 100644 index 00000000000..fe103f44776 --- /dev/null +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23890.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23890", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-20T23:15:09.160", + "lastModified": "2023-05-20T23:15:09.160", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in LJ Apps WP Airbnb Review Slider plugin <=\u00a03.2 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-airbnb-review-slider/wordpress-wp-airbnb-review-slider-plugin-3-2-cross-site-request-forgery-csrf-leading-to-reviews-removal-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24414.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24414.json new file mode 100644 index 00000000000..3528090d072 --- /dev/null +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24414.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-24414", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-20T23:15:09.227", + "lastModified": "2023-05-20T23:15:09.227", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in RoboSoft Photo Gallery, Images, Slider in Rbs Image Gallery plugin <=\u00a03.2.11 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/robo-gallery/wordpress-photo-gallery-images-slider-in-rbs-image-gallery-plugin-3-2-11-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32589.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32589.json new file mode 100644 index 00000000000..fae63e6a02b --- /dev/null +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32589.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-32589", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-20T23:15:09.287", + "lastModified": "2023-05-20T23:15:09.287", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in PingOnline Dyslexiefont Free plugin <=\u00a01.0.0 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/dyslexiefont/wordpress-dyslexiefont-free-plugin-1-0-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b059b424ca7..95bf565910c 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-20T20:00:28.387609+00:00 +2023-05-20T23:55:26.820352+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-20T19:15:08.817000+00:00 +2023-05-20T23:15:09.287000+00:00 ``` ### Last Data Feed Release @@ -29,22 +29,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -215692 +215697 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `5` -* [CVE-2023-32700](CVE-2023/CVE-2023-327xx/CVE-2023-32700.json) (`2023-05-20T18:15:09.370`) -* [CVE-2023-33244](CVE-2023/CVE-2023-332xx/CVE-2023-33244.json) (`2023-05-20T19:15:08.817`) +* [CVE-2022-47134](CVE-2022/CVE-2022-471xx/CVE-2022-47134.json) (`2023-05-20T23:15:09.017`) +* [CVE-2023-22689](CVE-2023/CVE-2023-226xx/CVE-2023-22689.json) (`2023-05-20T23:15:09.097`) +* [CVE-2023-23890](CVE-2023/CVE-2023-238xx/CVE-2023-23890.json) (`2023-05-20T23:15:09.160`) +* [CVE-2023-24414](CVE-2023/CVE-2023-244xx/CVE-2023-24414.json) (`2023-05-20T23:15:09.227`) +* [CVE-2023-32589](CVE-2023/CVE-2023-325xx/CVE-2023-32589.json) (`2023-05-20T23:15:09.287`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `0` -* [CVE-2023-32668](CVE-2023/CVE-2023-326xx/CVE-2023-32668.json) (`2023-05-20T18:15:09.253`) ## Download and Usage