Auto-Update: 2023-11-10T00:55:14.638776+00:00

This commit is contained in:
cad-safe-bot 2023-11-10 00:55:18 +00:00
parent 2adcc67bad
commit e1875c727c
15 changed files with 487 additions and 50 deletions

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2018-8863",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-11-09T23:15:08.740",
"lastModified": "2023-11-09T23:15:08.740",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "The HTTP header in Philips EncoreAnywhere contains data an attacker may be able to use to gain sensitive information.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsma-18-137-02",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-31086",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.000",
"lastModified": "2023-11-09T23:15:09.000",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Igor Benic Simple Giveaways \u2013 Grow your business, email lists and traffic with contests plugin <=\u00a02.46.0 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/giveasap/wordpress-simple-giveaways-plugin-2-45-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-31088",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.067",
"lastModified": "2023-11-09T23:15:09.067",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Faraz Quazi Floating Action Button plugin <=\u00a01.2.1 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/floating-action-button/wordpress-floating-action-button-plugin-1-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-31093",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.167",
"lastModified": "2023-11-09T23:15:09.167",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Chronosly Chronosly Events Calendar plugin <=\u00a02.6.2 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/chronosly-events-calendar/wordpress-chronosly-events-calendar-plugin-2-6-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-31235",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.267",
"lastModified": "2023-11-09T23:15:09.267",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Roland Barker, xnau webdesign Participants Database plugin <=\u00a02.4.9 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/participants-database/wordpress-participants-database-plugin-2-4-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32092",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.357",
"lastModified": "2023-11-09T23:15:09.357",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in PeepSo Community by PeepSo \u2013 Social Network, Membership, Registration, User Profiles plugin <=\u00a06.0.9.0 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/peepso-core/wordpress-community-by-peepso-social-network-membership-registration-user-profiles-plugin-6-0-9-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32093",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.447",
"lastModified": "2023-11-09T23:15:09.447",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Criss Swaim TPG Redirect plugin <=\u00a01.0.7 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/tpg-redirect/wordpress-tpg-redirect-plugin-1-0-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32125",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.540",
"lastModified": "2023-11-09T23:15:09.540",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Daniel Powney Multi Rating plugin <=\u00a05.0.6 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/multi-rating/wordpress-multi-rating-plugin-5-0-6-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32500",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.633",
"lastModified": "2023-11-09T23:15:09.633",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in xtemos WoodMart - Multipurpose WooCommerce Theme <=\u00a07.1.1 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woodmart/wordpress-woodmart-theme-7-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32501",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.733",
"lastModified": "2023-11-09T23:15:09.733",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in E4J s.R.L. VikBooking Hotel Booking Engine & PMS plugin <=\u00a01.6.1 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/vikbooking/wordpress-vikbooking-hotel-booking-engine-pms-plugin-1-6-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-32502",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-09T23:15:09.823",
"lastModified": "2023-11-09T23:15:09.823",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Sybre Waaijer Pro Mime Types \u2013 Manage file media types plugin <=\u00a01.0.7 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/pro-mime-types/wordpress-pro-mime-types-plugin-1-0-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-36014",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-11-10T00:15:08.640",
"lastModified": "2023-11-10T00:15:08.640",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.5
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36014",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-36024",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-11-10T00:15:08.840",
"lastModified": "2023-11-10T00:15:08.840",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36024",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36034",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-11-03T01:15:08.047",
"lastModified": "2023-11-03T13:22:51.977",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-10T00:15:09.017",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -21,20 +21,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
"impactScore": 5.5
}
]
},

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-09T23:00:18.752024+00:00
2023-11-10T00:55:14.638776+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-09T22:18:24.930000+00:00
2023-11-10T00:15:09.017000+00:00
```
### Last Data Feed Release
@ -29,57 +29,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
230293
230306
```
### CVEs added in the last Commit
Recently added CVEs: `17`
Recently added CVEs: `13`
* [CVE-2023-32594](CVE-2023/CVE-2023-325xx/CVE-2023-32594.json) (`2023-11-09T21:15:24.090`)
* [CVE-2023-32602](CVE-2023/CVE-2023-326xx/CVE-2023-32602.json) (`2023-11-09T21:15:24.180`)
* [CVE-2023-32739](CVE-2023/CVE-2023-327xx/CVE-2023-32739.json) (`2023-11-09T21:15:24.270`)
* [CVE-2023-32744](CVE-2023/CVE-2023-327xx/CVE-2023-32744.json) (`2023-11-09T21:15:24.370`)
* [CVE-2023-32745](CVE-2023/CVE-2023-327xx/CVE-2023-32745.json) (`2023-11-09T21:15:24.463`)
* [CVE-2023-32794](CVE-2023/CVE-2023-327xx/CVE-2023-32794.json) (`2023-11-09T21:15:24.553`)
* [CVE-2023-34024](CVE-2023/CVE-2023-340xx/CVE-2023-34024.json) (`2023-11-09T21:15:24.647`)
* [CVE-2023-34025](CVE-2023/CVE-2023-340xx/CVE-2023-34025.json) (`2023-11-09T21:15:24.740`)
* [CVE-2023-34031](CVE-2023/CVE-2023-340xx/CVE-2023-34031.json) (`2023-11-09T21:15:24.827`)
* [CVE-2023-4379](CVE-2023/CVE-2023-43xx/CVE-2023-4379.json) (`2023-11-09T21:15:24.930`)
* [CVE-2023-5954](CVE-2023/CVE-2023-59xx/CVE-2023-5954.json) (`2023-11-09T21:15:25.143`)
* [CVE-2023-29975](CVE-2023/CVE-2023-299xx/CVE-2023-29975.json) (`2023-11-09T22:15:10.583`)
* [CVE-2023-32512](CVE-2023/CVE-2023-325xx/CVE-2023-32512.json) (`2023-11-09T22:15:10.633`)
* [CVE-2023-32579](CVE-2023/CVE-2023-325xx/CVE-2023-32579.json) (`2023-11-09T22:15:10.730`)
* [CVE-2023-32587](CVE-2023/CVE-2023-325xx/CVE-2023-32587.json) (`2023-11-09T22:15:10.817`)
* [CVE-2023-32592](CVE-2023/CVE-2023-325xx/CVE-2023-32592.json) (`2023-11-09T22:15:10.900`)
* [CVE-2023-5543](CVE-2023/CVE-2023-55xx/CVE-2023-5543.json) (`2023-11-09T22:15:11.000`)
* [CVE-2018-8863](CVE-2018/CVE-2018-88xx/CVE-2018-8863.json) (`2023-11-09T23:15:08.740`)
* [CVE-2023-31086](CVE-2023/CVE-2023-310xx/CVE-2023-31086.json) (`2023-11-09T23:15:09.000`)
* [CVE-2023-31088](CVE-2023/CVE-2023-310xx/CVE-2023-31088.json) (`2023-11-09T23:15:09.067`)
* [CVE-2023-31093](CVE-2023/CVE-2023-310xx/CVE-2023-31093.json) (`2023-11-09T23:15:09.167`)
* [CVE-2023-31235](CVE-2023/CVE-2023-312xx/CVE-2023-31235.json) (`2023-11-09T23:15:09.267`)
* [CVE-2023-32092](CVE-2023/CVE-2023-320xx/CVE-2023-32092.json) (`2023-11-09T23:15:09.357`)
* [CVE-2023-32093](CVE-2023/CVE-2023-320xx/CVE-2023-32093.json) (`2023-11-09T23:15:09.447`)
* [CVE-2023-32125](CVE-2023/CVE-2023-321xx/CVE-2023-32125.json) (`2023-11-09T23:15:09.540`)
* [CVE-2023-32500](CVE-2023/CVE-2023-325xx/CVE-2023-32500.json) (`2023-11-09T23:15:09.633`)
* [CVE-2023-32501](CVE-2023/CVE-2023-325xx/CVE-2023-32501.json) (`2023-11-09T23:15:09.733`)
* [CVE-2023-32502](CVE-2023/CVE-2023-325xx/CVE-2023-32502.json) (`2023-11-09T23:15:09.823`)
* [CVE-2023-36014](CVE-2023/CVE-2023-360xx/CVE-2023-36014.json) (`2023-11-10T00:15:08.640`)
* [CVE-2023-36024](CVE-2023/CVE-2023-360xx/CVE-2023-36024.json) (`2023-11-10T00:15:08.840`)
### CVEs modified in the last Commit
Recently modified CVEs: `21`
Recently modified CVEs: `1`
* [CVE-2020-28407](CVE-2020/CVE-2020-284xx/CVE-2020-28407.json) (`2023-11-09T21:42:24.177`)
* [CVE-2022-41076](CVE-2022/CVE-2022-410xx/CVE-2022-41076.json) (`2023-11-09T22:15:09.223`)
* [CVE-2022-41089](CVE-2022/CVE-2022-410xx/CVE-2022-41089.json) (`2023-11-09T22:15:09.370`)
* [CVE-2022-41115](CVE-2022/CVE-2022-411xx/CVE-2022-41115.json) (`2023-11-09T22:15:09.610`)
* [CVE-2022-41121](CVE-2022/CVE-2022-411xx/CVE-2022-41121.json) (`2023-11-09T22:15:09.700`)
* [CVE-2022-44689](CVE-2022/CVE-2022-446xx/CVE-2022-44689.json) (`2023-11-09T22:15:10.077`)
* [CVE-2022-44702](CVE-2022/CVE-2022-447xx/CVE-2022-44702.json) (`2023-11-09T22:15:10.273`)
* [CVE-2022-44704](CVE-2022/CVE-2022-447xx/CVE-2022-44704.json) (`2023-11-09T22:15:10.347`)
* [CVE-2022-44708](CVE-2022/CVE-2022-447xx/CVE-2022-44708.json) (`2023-11-09T22:15:10.447`)
* [CVE-2023-5924](CVE-2023/CVE-2023-59xx/CVE-2023-5924.json) (`2023-11-09T21:07:52.570`)
* [CVE-2023-1720](CVE-2023/CVE-2023-17xx/CVE-2023-1720.json) (`2023-11-09T21:12:21.233`)
* [CVE-2023-5923](CVE-2023/CVE-2023-59xx/CVE-2023-5923.json) (`2023-11-09T21:14:25.430`)
* [CVE-2023-46725](CVE-2023/CVE-2023-467xx/CVE-2023-46725.json) (`2023-11-09T21:16:04.827`)
* [CVE-2023-31579](CVE-2023/CVE-2023-315xx/CVE-2023-31579.json) (`2023-11-09T21:17:52.387`)
* [CVE-2023-46954](CVE-2023/CVE-2023-469xx/CVE-2023-46954.json) (`2023-11-09T21:38:55.393`)
* [CVE-2023-36621](CVE-2023/CVE-2023-366xx/CVE-2023-36621.json) (`2023-11-09T21:55:49.257`)
* [CVE-2023-41343](CVE-2023/CVE-2023-413xx/CVE-2023-41343.json) (`2023-11-09T21:59:36.353`)
* [CVE-2023-44271](CVE-2023/CVE-2023-442xx/CVE-2023-44271.json) (`2023-11-09T22:01:30.133`)
* [CVE-2023-43982](CVE-2023/CVE-2023-439xx/CVE-2023-43982.json) (`2023-11-09T22:07:27.420`)
* [CVE-2023-41914](CVE-2023/CVE-2023-419xx/CVE-2023-41914.json) (`2023-11-09T22:11:29.870`)
* [CVE-2023-45360](CVE-2023/CVE-2023-453xx/CVE-2023-45360.json) (`2023-11-09T22:18:24.930`)
* [CVE-2023-36034](CVE-2023/CVE-2023-360xx/CVE-2023-36034.json) (`2023-11-10T00:15:09.017`)
## Download and Usage