From e0da53529c57bb246e737d6f0d076517d47946c9 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 13 Nov 2023 00:55:23 +0000 Subject: [PATCH] Auto-Update: 2023-11-13T00:55:19.523528+00:00 --- CVE-2019/CVE-2019-131xx/CVE-2019-13147.json | 8 ++- CVE-2022/CVE-2022-245xx/CVE-2022-24599.json | 8 ++- CVE-2023/CVE-2023-265xx/CVE-2023-26514.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-265xx/CVE-2023-26516.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-265xx/CVE-2023-26518.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-265xx/CVE-2023-26524.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-274xx/CVE-2023-27417.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-274xx/CVE-2023-27418.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-274xx/CVE-2023-27431.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-274xx/CVE-2023-27434.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-274xx/CVE-2023-27436.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-274xx/CVE-2023-27438.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-274xx/CVE-2023-27441.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-274xx/CVE-2023-27445.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-276xx/CVE-2023-27611.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-276xx/CVE-2023-27623.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-276xx/CVE-2023-27632.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-281xx/CVE-2023-28134.json | 32 ++++++++++++ CVE-2023/CVE-2023-281xx/CVE-2023-28167.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-281xx/CVE-2023-28172.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-281xx/CVE-2023-28173.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-284xx/CVE-2023-28419.json | 55 +++++++++++++++++++++ CVE-2023/CVE-2023-284xx/CVE-2023-28420.json | 55 +++++++++++++++++++++ README.md | 43 ++++++++++------ 24 files changed, 1172 insertions(+), 19 deletions(-) create mode 100644 CVE-2023/CVE-2023-265xx/CVE-2023-26514.json create mode 100644 CVE-2023/CVE-2023-265xx/CVE-2023-26516.json create mode 100644 CVE-2023/CVE-2023-265xx/CVE-2023-26518.json create mode 100644 CVE-2023/CVE-2023-265xx/CVE-2023-26524.json create mode 100644 CVE-2023/CVE-2023-274xx/CVE-2023-27417.json create mode 100644 CVE-2023/CVE-2023-274xx/CVE-2023-27418.json create mode 100644 CVE-2023/CVE-2023-274xx/CVE-2023-27431.json create mode 100644 CVE-2023/CVE-2023-274xx/CVE-2023-27434.json create mode 100644 CVE-2023/CVE-2023-274xx/CVE-2023-27436.json create mode 100644 CVE-2023/CVE-2023-274xx/CVE-2023-27438.json create mode 100644 CVE-2023/CVE-2023-274xx/CVE-2023-27441.json create mode 100644 CVE-2023/CVE-2023-274xx/CVE-2023-27445.json create mode 100644 CVE-2023/CVE-2023-276xx/CVE-2023-27611.json create mode 100644 CVE-2023/CVE-2023-276xx/CVE-2023-27623.json create mode 100644 CVE-2023/CVE-2023-276xx/CVE-2023-27632.json create mode 100644 CVE-2023/CVE-2023-281xx/CVE-2023-28134.json create mode 100644 CVE-2023/CVE-2023-281xx/CVE-2023-28167.json create mode 100644 CVE-2023/CVE-2023-281xx/CVE-2023-28172.json create mode 100644 CVE-2023/CVE-2023-281xx/CVE-2023-28173.json create mode 100644 CVE-2023/CVE-2023-284xx/CVE-2023-28419.json create mode 100644 CVE-2023/CVE-2023-284xx/CVE-2023-28420.json diff --git a/CVE-2019/CVE-2019-131xx/CVE-2019-13147.json b/CVE-2019/CVE-2019-131xx/CVE-2019-13147.json index 018e1bd7fba..2ecf0b1b785 100644 --- a/CVE-2019/CVE-2019-131xx/CVE-2019-13147.json +++ b/CVE-2019/CVE-2019-131xx/CVE-2019-13147.json @@ -2,8 +2,8 @@ "id": "CVE-2019-13147", "sourceIdentifier": "cve@mitre.org", "published": "2019-07-02T00:15:10.397", - "lastModified": "2019-07-03T17:26:00.237", - "vulnStatus": "Analyzed", + "lastModified": "2023-11-12T23:15:07.857", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -100,6 +100,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00006.html", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-245xx/CVE-2022-24599.json b/CVE-2022/CVE-2022-245xx/CVE-2022-24599.json index 1266efbc878..e8b2a4855ed 100644 --- a/CVE-2022/CVE-2022-245xx/CVE-2022-24599.json +++ b/CVE-2022/CVE-2022-245xx/CVE-2022-24599.json @@ -2,8 +2,8 @@ "id": "CVE-2022-24599", "sourceIdentifier": "cve@mitre.org", "published": "2022-02-24T15:15:29.633", - "lastModified": "2022-03-03T16:29:16.173", - "vulnStatus": "Analyzed", + "lastModified": "2023-11-12T23:15:08.007", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00006.html", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26514.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26514.json new file mode 100644 index 00000000000..e3319b488dd --- /dev/null +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26514.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-26514", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-13T00:15:07.570", + "lastModified": "2023-11-13T00:15:07.570", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in WPGrim Dynamic XML Sitemaps Generator for Google plugin <=\u00a01.3.3 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/xml-sitemap-generator-for-google/wordpress-xml-sitemap-generator-for-google-plugin-1-2-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26516.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26516.json new file mode 100644 index 00000000000..565a964500f --- /dev/null +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26516.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-26516", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-13T00:15:07.773", + "lastModified": "2023-11-13T00:15:07.773", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in WPIndeed Debug Assistant plugin <=\u00a01.4 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/debug-assistant/wordpress-debug-assistant-plugin-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26518.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26518.json new file mode 100644 index 00000000000..80cfac3ef3d --- /dev/null +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26518.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-26518", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-13T00:15:07.963", + "lastModified": "2023-11-13T00:15:07.963", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in AccessPress Themes WP TFeed plugin <=\u00a01.6.9 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/accesspress-twitter-feed/wordpress-wp-tfeed-plugin-1-6-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26524.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26524.json new file mode 100644 index 00000000000..d90decba620 --- /dev/null +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26524.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-26524", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-13T00:15:08.153", + "lastModified": "2023-11-13T00:15:08.153", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ExpressTech Quiz And Survey Master \u2013 Best Quiz, Exam and Survey Plugin for WordPress plugin <=\u00a08.0.10 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/quiz-master-next/wordpress-quiz-and-survey-master-plugin-8-0-10-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27417.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27417.json new file mode 100644 index 00000000000..e08bb17bcc2 --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27417.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27417", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-12T23:15:08.123", + "lastModified": "2023-11-12T23:15:08.123", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Timo Reith Affiliate Super Assistent plugin <=\u00a01.5.1 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/amazonsimpleadmin/wordpress-affiliate-super-assistent-plugin-1-5-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27418.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27418.json new file mode 100644 index 00000000000..dd024cb282a --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27418.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27418", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-12T23:15:08.320", + "lastModified": "2023-11-12T23:15:08.320", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Side Menu Lite \u2013 add sticky fixed buttons plugin <=\u00a04.0 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/side-menu-lite/wordpress-side-menu-lite-plugin-4-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27431.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27431.json new file mode 100644 index 00000000000..154c01bfed1 --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27431.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27431", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-12T23:15:08.520", + "lastModified": "2023-11-12T23:15:08.520", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ThemeHunk Big Store theme <=\u00a01.9.3 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/big-store/wordpress-big-store-theme-1-9-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27434.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27434.json new file mode 100644 index 00000000000..1c7b9b0172b --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27434.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27434", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-13T00:15:08.350", + "lastModified": "2023-11-13T00:15:08.350", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in WPGrim Classic Editor and Classic Widgets plugin <=\u00a01.2.5 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/classic-editor-and-classic-widgets/wordpress-classic-editor-and-classic-widgets-plugin-1-2-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27436.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27436.json new file mode 100644 index 00000000000..f9647264615 --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27436.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27436", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-13T00:15:08.537", + "lastModified": "2023-11-13T00:15:08.537", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Louis Reingold Elegant Custom Fonts plugin <=\u00a01.0 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/elegant-custom-fonts/wordpress-elegant-custom-fonts-plugin-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27438.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27438.json new file mode 100644 index 00000000000..824c644750f --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27438.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27438", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-13T00:15:08.743", + "lastModified": "2023-11-13T00:15:08.743", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Evgen Yurchenko WP Translitera plugin <=\u00a0p1.2.5 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-translitera/wordpress-wp-translitera-plugin-p1-2-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27441.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27441.json new file mode 100644 index 00000000000..b0b7c24d4b0 --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27441.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27441", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-13T00:15:08.937", + "lastModified": "2023-11-13T00:15:08.937", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in gl_SPICE New Adman plugin <=\u00a01.6.8 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/new-adman/wordpress-new-adman-plugin-1-6-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27445.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27445.json new file mode 100644 index 00000000000..207b32fb1cb --- /dev/null +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27445.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27445", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-13T00:15:09.127", + "lastModified": "2023-11-13T00:15:09.127", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Meril Inc. Blog Floating Button plugin <=\u00a01.4.12 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/blog-floating-button/wordpress-blog-floating-button-plugin-1-4-12-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27611.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27611.json new file mode 100644 index 00000000000..f5ba2bc5c0c --- /dev/null +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27611.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27611", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-12T23:15:08.713", + "lastModified": "2023-11-12T23:15:08.713", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in audrasjb Reusable Blocks Extended plugin <=\u00a00.9 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/reusable-blocks-extended/wordpress-reusable-blocks-extended-plugin-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27623.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27623.json new file mode 100644 index 00000000000..5ba0dd5db65 --- /dev/null +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27623.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27623", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-12T23:15:08.903", + "lastModified": "2023-11-12T23:15:08.903", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Jens T\u00f6rnell WP Page Numbers plugin <=\u00a00.5 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-page-numbers/wordpress-wp-page-numbers-plugin-0-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-276xx/CVE-2023-27632.json b/CVE-2023/CVE-2023-276xx/CVE-2023-27632.json new file mode 100644 index 00000000000..dec8140769f --- /dev/null +++ b/CVE-2023/CVE-2023-276xx/CVE-2023-27632.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-27632", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-12T23:15:09.093", + "lastModified": "2023-11-12T23:15:09.093", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in mmrs151 Daily Prayer Time plugin <=\u00a02023.03.08 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/daily-prayer-time-for-mosques/wordpress-daily-prayer-time-plugin-2023-02-21-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28134.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28134.json new file mode 100644 index 00000000000..45e24c80b87 --- /dev/null +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28134.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-28134", + "sourceIdentifier": "cve@checkpoint.com", + "published": "2023-11-12T23:15:09.313", + "lastModified": "2023-11-12T23:15:09.313", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Local attacker can escalate privileges on affected installations of Check Point Harmony Endpoint/ZoneAlarm Extreme Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "cve@checkpoint.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://support.checkpoint.com/results/sk/sk181597", + "source": "cve@checkpoint.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28167.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28167.json new file mode 100644 index 00000000000..7b3ff1d27d2 --- /dev/null +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28167.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28167", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-12T23:15:09.407", + "lastModified": "2023-11-12T23:15:09.407", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Vsourz Digital CF7 Invisible reCAPTCHA plugin <=\u00a01.3.3 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/cf7-invisible-recaptcha/wordpress-cf7-invisible-recaptcha-plugin-1-3-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28172.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28172.json new file mode 100644 index 00000000000..5e13b6d4c77 --- /dev/null +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28172.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28172", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-12T23:15:09.617", + "lastModified": "2023-11-12T23:15:09.617", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in flippercode WordPress Plugin for Google Maps \u2013 WP MAPS (formerly WP Google Map Plugin) plugin <=\u00a04.4.2 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-google-map-plugin/wordpress-wp-maps-plugin-4-4-2-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28173.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28173.json new file mode 100644 index 00000000000..6073852ae1e --- /dev/null +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28173.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28173", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-12T23:15:09.813", + "lastModified": "2023-11-12T23:15:09.813", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Amit Agarwal Google XML Sitemap for Images plugin <=\u00a02.1.3 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/google-image-sitemap/wordpress-google-xml-sitemap-for-images-plugin-2-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28419.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28419.json new file mode 100644 index 00000000000..5e53cc06552 --- /dev/null +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28419.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28419", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-12T23:15:10.007", + "lastModified": "2023-11-12T23:15:10.007", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Stranger Studios Force First and Last Name as Display Name plugin <=\u00a01.2 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/force-first-last/wordpress-force-first-and-last-name-as-display-name-plugin-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28420.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28420.json new file mode 100644 index 00000000000..3dd7bc9fd47 --- /dev/null +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28420.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28420", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-11-12T23:15:10.203", + "lastModified": "2023-11-12T23:15:10.203", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Leo Caseiro Custom Options Plus plugin <=\u00a01.8.1 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/custom-options-plus/wordpress-custom-options-plus-plugin-1-8-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 745f0fbaad9..31c3ffd5240 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-11-12T23:00:18.416642+00:00 +2023-11-13T00:55:19.523528+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-11-12T22:15:30.327000+00:00 +2023-11-13T00:15:09.127000+00:00 ``` ### Last Data Feed Release @@ -29,29 +29,42 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -230363 +230384 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `21` -* [CVE-2023-28495](CVE-2023/CVE-2023-284xx/CVE-2023-28495.json) (`2023-11-12T22:15:28.580`) -* [CVE-2023-28497](CVE-2023/CVE-2023-284xx/CVE-2023-28497.json) (`2023-11-12T22:15:28.820`) -* [CVE-2023-28498](CVE-2023/CVE-2023-284xx/CVE-2023-28498.json) (`2023-11-12T22:15:29.007`) -* [CVE-2023-28618](CVE-2023/CVE-2023-286xx/CVE-2023-28618.json) (`2023-11-12T22:15:29.190`) -* [CVE-2023-28694](CVE-2023/CVE-2023-286xx/CVE-2023-28694.json) (`2023-11-12T22:15:29.370`) -* [CVE-2023-28696](CVE-2023/CVE-2023-286xx/CVE-2023-28696.json) (`2023-11-12T22:15:29.560`) -* [CVE-2023-28930](CVE-2023/CVE-2023-289xx/CVE-2023-28930.json) (`2023-11-12T22:15:29.777`) -* [CVE-2023-28987](CVE-2023/CVE-2023-289xx/CVE-2023-28987.json) (`2023-11-12T22:15:29.960`) -* [CVE-2023-29238](CVE-2023/CVE-2023-292xx/CVE-2023-29238.json) (`2023-11-12T22:15:30.147`) -* [CVE-2023-29425](CVE-2023/CVE-2023-294xx/CVE-2023-29425.json) (`2023-11-12T22:15:30.327`) +* [CVE-2023-27417](CVE-2023/CVE-2023-274xx/CVE-2023-27417.json) (`2023-11-12T23:15:08.123`) +* [CVE-2023-27418](CVE-2023/CVE-2023-274xx/CVE-2023-27418.json) (`2023-11-12T23:15:08.320`) +* [CVE-2023-27431](CVE-2023/CVE-2023-274xx/CVE-2023-27431.json) (`2023-11-12T23:15:08.520`) +* [CVE-2023-27611](CVE-2023/CVE-2023-276xx/CVE-2023-27611.json) (`2023-11-12T23:15:08.713`) +* [CVE-2023-27623](CVE-2023/CVE-2023-276xx/CVE-2023-27623.json) (`2023-11-12T23:15:08.903`) +* [CVE-2023-27632](CVE-2023/CVE-2023-276xx/CVE-2023-27632.json) (`2023-11-12T23:15:09.093`) +* [CVE-2023-28134](CVE-2023/CVE-2023-281xx/CVE-2023-28134.json) (`2023-11-12T23:15:09.313`) +* [CVE-2023-28167](CVE-2023/CVE-2023-281xx/CVE-2023-28167.json) (`2023-11-12T23:15:09.407`) +* [CVE-2023-28172](CVE-2023/CVE-2023-281xx/CVE-2023-28172.json) (`2023-11-12T23:15:09.617`) +* [CVE-2023-28173](CVE-2023/CVE-2023-281xx/CVE-2023-28173.json) (`2023-11-12T23:15:09.813`) +* [CVE-2023-28419](CVE-2023/CVE-2023-284xx/CVE-2023-28419.json) (`2023-11-12T23:15:10.007`) +* [CVE-2023-28420](CVE-2023/CVE-2023-284xx/CVE-2023-28420.json) (`2023-11-12T23:15:10.203`) +* [CVE-2023-26514](CVE-2023/CVE-2023-265xx/CVE-2023-26514.json) (`2023-11-13T00:15:07.570`) +* [CVE-2023-26516](CVE-2023/CVE-2023-265xx/CVE-2023-26516.json) (`2023-11-13T00:15:07.773`) +* [CVE-2023-26518](CVE-2023/CVE-2023-265xx/CVE-2023-26518.json) (`2023-11-13T00:15:07.963`) +* [CVE-2023-26524](CVE-2023/CVE-2023-265xx/CVE-2023-26524.json) (`2023-11-13T00:15:08.153`) +* [CVE-2023-27434](CVE-2023/CVE-2023-274xx/CVE-2023-27434.json) (`2023-11-13T00:15:08.350`) +* [CVE-2023-27436](CVE-2023/CVE-2023-274xx/CVE-2023-27436.json) (`2023-11-13T00:15:08.537`) +* [CVE-2023-27438](CVE-2023/CVE-2023-274xx/CVE-2023-27438.json) (`2023-11-13T00:15:08.743`) +* [CVE-2023-27441](CVE-2023/CVE-2023-274xx/CVE-2023-27441.json) (`2023-11-13T00:15:08.937`) +* [CVE-2023-27445](CVE-2023/CVE-2023-274xx/CVE-2023-27445.json) (`2023-11-13T00:15:09.127`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `2` +* [CVE-2019-13147](CVE-2019/CVE-2019-131xx/CVE-2019-13147.json) (`2023-11-12T23:15:07.857`) +* [CVE-2022-24599](CVE-2022/CVE-2022-245xx/CVE-2022-24599.json) (`2023-11-12T23:15:08.007`) ## Download and Usage