diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25465.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25465.json index 4b8ba66343c..3605b74b96b 100644 --- a/CVE-2023/CVE-2023-254xx/CVE-2023-25465.json +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25465.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25465", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T10:15:07.940", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:24:13.500", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gopiplus:wp-tell-a-friend-popup-form:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "7.1", + "matchCriteriaId": "A9C0F7D7-950A-4F23-8AC4-C612B19B3050" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-tell-a-friend-popup-form/wordpress-wp-tell-a-friend-popup-form-plugin-7-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30485.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30485.json index fd8127eb38f..131691d5875 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30485.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30485.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30485", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T12:15:09.140", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:32:53.097", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:solwininfotech:avartan-slider-lite:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.5.3", + "matchCriteriaId": "0FB3F383-EFC8-4314-8436-A0604BB2B4B1" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/avartan-slider-lite/wordpress-avartan-slider-lite-plugin-1-5-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30494.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30494.json index 25c544a1363..d618f5008dc 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30494.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30494.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30494", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:39.627", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:24:54.537", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.11", + "matchCriteriaId": "482CBB3F-C701-444D-A79E-C2A79C6E34D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/imagerecycle-pdf-image-compression/wordpress-imagerecycle-pdf-image-compression-plugin-3-1-10-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31220.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31220.json index f3eb3d25c8c..eb60aa038d6 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31220.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31220.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31220", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:40.123", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:25:04.397", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wp-experts:wp-categories-widget:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.2", + "matchCriteriaId": "69479C27-EB03-4C7B-A715-F0886E8E1292" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-categories-widget/wordpress-wp-categories-widget-plugin-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32102.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32102.json index 83c5eff6dc9..6895dd304ed 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32102.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32102.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32102", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T12:15:09.220", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:33:02.990", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pexlechris:library_viewer:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.6.1", + "matchCriteriaId": "95AD58F4-1380-4B2D-89A0-FB648EF76491" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/library-viewer/wordpress-library-viewer-plugin-2-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32296.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32296.json index ff599e49e57..dafd59191da 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32296.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32296.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32296", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T12:15:09.313", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:33:10.717", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kangu:kangu:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.2.9", + "matchCriteriaId": "21E9192F-5ABA-4185-96CD-602A576F9025" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/kangu/wordpress-kangu-para-woocommerce-plugin-2-2-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32578.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32578.json index bfe130a922a..895c8aa4644 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32578.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32578.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32578", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T12:15:09.400", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:33:28.527", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -36,7 +56,7 @@ }, "weaknesses": [ { - "source": "audit@patchstack.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -44,12 +64,43 @@ "value": "CWE-79" } ] + }, + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:column-matic_project:column-matic:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.3", + "matchCriteriaId": "D6A90874-16F6-44F4-8DED-8E2512431EED" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/column-matic/wordpress-column-matic-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36382.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36382.json index 3b4da838031..ab15e63501e 100644 --- a/CVE-2023/CVE-2023-363xx/CVE-2023-36382.json +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36382.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36382", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T10:15:08.730", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:24:22.910", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jeffrey-wp:media_library_categories:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.1", + "matchCriteriaId": "969EF919-FC7D-4493-8DA4-BC89FDBA2304" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-media-library-categories/wordpress-media-library-categories-plugin-2-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-373xx/CVE-2023-37393.json b/CVE-2023/CVE-2023-373xx/CVE-2023-37393.json index ecf020a2836..4792d495de7 100644 --- a/CVE-2023/CVE-2023-373xx/CVE-2023-37393.json +++ b/CVE-2023/CVE-2023-373xx/CVE-2023-37393.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37393", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:40.383", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:25:13.517", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atarim:atarim:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.9.4", + "matchCriteriaId": "EF87BDBB-2979-47C9-B3D8-4CC14F6C4868" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/atarim-visual-collaboration/wordpress-atarim-plugin-3-9-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39162.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39162.json index c30da94ca4f..83cde68240a 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39162.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39162.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39162", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T10:15:08.913", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:24:31.437", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xlplugins:woo-confirmation-email:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.5.0", + "matchCriteriaId": "2D025551-1467-4FAB-86A4-F71DD77C281E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/woo-confirmation-email/wordpress-user-email-verification-for-woocommerce-plugin-3-5-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-391xx/CVE-2023-39164.json b/CVE-2023/CVE-2023-391xx/CVE-2023-39164.json index da08d695f4c..b0884a17a22 100644 --- a/CVE-2023/CVE-2023-391xx/CVE-2023-39164.json +++ b/CVE-2023/CVE-2023-391xx/CVE-2023-39164.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39164", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T10:15:09.097", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:24:41.070", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:molongui:molongui:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.6.20", + "matchCriteriaId": "A3B97AE0-EA7D-4CD2-960C-3052D5688862" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/molongui-authorship/wordpress-molongui-plugin-4-6-18-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39918.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39918.json index 60ad1c13f60..525a9152e9f 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39918.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39918.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39918", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:40.483", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:25:23.327", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:saasproject:booking_package:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6.02", + "matchCriteriaId": "B6C4693F-2A45-4813-9215-A4C01AC36F82" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/booking-package/wordpress-booking-package-plugin-1-6-01-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39919.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39919.json index 6e442f2dc22..7b1112b2964 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39919.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39919.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39919", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:40.627", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:25:35.907", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:maennchen1:wpshopgermany_-_protected_shops:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "FCE4F01F-B4E5-4FF3-BA2D-4D63A9829C32" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wpshopgermany-protectedshops/wordpress-wpshopgermany-protected-shops-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39987.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39987.json index 14397fe4699..df63236c459 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39987.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39987.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39987", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:40.737", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:25:44.800", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:joomlaserviceprovider:wsecure:*:*:*:*:lite:wordpress:*:*", + "versionEndIncluding": "2.5", + "matchCriteriaId": "769CE48F-8B96-4029-90E3-DF3F59C56BB6" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wsecure/wordpress-wsecure-lite-plugin-2-5-cross-site-scripting-xss?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39988.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39988.json index bf514ca785d..9ff39cbaefa 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39988.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39988.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39988", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:40.840", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:25:55.360", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tencent:wxsync:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.7.23", + "matchCriteriaId": "5FB15F10-6D2D-43C3-B01C-54F08DE690C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wxsync/wordpress-wxsync-plugin-2-7-23-cross-site-scripting-xss?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-399xx/CVE-2023-39992.json b/CVE-2023/CVE-2023-399xx/CVE-2023-39992.json index 52abc2c39e8..3e36b284666 100644 --- a/CVE-2023/CVE-2023-399xx/CVE-2023-39992.json +++ b/CVE-2023/CVE-2023-399xx/CVE-2023-39992.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39992", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:41.030", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:32:25.333", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vcita:online_booking_\\&_scheduling_calendar_for_wordpress_by_vcita:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.3.3", + "matchCriteriaId": "8BF8819C-9FBF-40E4-BC21-D552BE257E48" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/meeting-scheduler-by-vcita/wordpress-online-booking-scheduling-calendar-for-wordpress-by-vcita-plugin-4-3-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40206.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40206.json index bf7a1664cb3..80b23374082 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40206.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40206.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40206", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:41.133", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:32:35.350", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hwk:wp_404_auto_redirect_to_similar_post:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.3", + "matchCriteriaId": "9E2B717C-A6D7-4363-9DCE-9797D0291C73" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-404-auto-redirect-to-similar-post/wordpress-wp-404-auto-redirect-to-similar-post-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-402xx/CVE-2023-40208.json b/CVE-2023/CVE-2023-402xx/CVE-2023-40208.json index e1add46106f..5c9978f7752 100644 --- a/CVE-2023/CVE-2023-402xx/CVE-2023-40208.json +++ b/CVE-2023/CVE-2023-402xx/CVE-2023-40208.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40208", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-04T11:15:41.227", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:32:43.077", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:urosevic:stock_ticker:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.23.4", + "matchCriteriaId": "43BE00CD-7981-4F29-9148-43F305E1AD46" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/stock-ticker/wordpress-stock-ticker-plugin-3-23-3-unauth-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41636.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41636.json index 01268e39c08..7480da4ac05 100644 --- a/CVE-2023/CVE-2023-416xx/CVE-2023-41636.json +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41636.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41636", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-31T14:15:08.823", - "lastModified": "2023-09-05T18:13:14.267", - "vulnStatus": "Analyzed", + "lastModified": "2023-09-06T23:15:23.430", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,10 @@ } ], "references": [ + { + "url": "https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41636%20%7C%20RealGimm%20-%20SQL%20Injection(1).md", + "source": "cve@mitre.org" + }, { "url": "https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20SQL%20Injection(1).md", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41637.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41637.json index b510d7e537c..2135fdc4c9d 100644 --- a/CVE-2023/CVE-2023-416xx/CVE-2023-41637.json +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41637.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41637", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-31T14:15:08.877", - "lastModified": "2023-09-05T18:12:41.087", - "vulnStatus": "Analyzed", + "lastModified": "2023-09-06T23:15:26.063", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,10 @@ } ], "references": [ + { + "url": "https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41637%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md", + "source": "cve@mitre.org" + }, { "url": "https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20Stored%20Cross-site%20Scripting.md", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41642.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41642.json index 4180b64a9b0..b4435f9dbd2 100644 --- a/CVE-2023/CVE-2023-416xx/CVE-2023-41642.json +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41642.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41642", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-31T14:15:09.033", - "lastModified": "2023-09-05T17:51:45.430", - "vulnStatus": "Analyzed", + "lastModified": "2023-09-06T22:15:08.133", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -64,6 +64,10 @@ } ], "references": [ + { + "url": "https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41642%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md", + "source": "cve@mitre.org" + }, { "url": "https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20%20-%20Reflected%20Cross-site%20Scripting.md", "source": "cve@mitre.org", diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4754.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4754.json index 6610335c749..7eb9a688b1e 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4754.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4754.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4754", "sourceIdentifier": "security@huntr.dev", "published": "2023-09-04T09:15:07.897", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:23:47.563", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -46,14 +68,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3", + "matchCriteriaId": "422EDAFD-56FE-49AE-ADCF-7D33CFA0C56B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gpac/gpac/commit/7e2e92feb1b30fac1d659f6620d743b5a188ffe0", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.dev/bounties/b7ed24ad-7d0b-40b7-8f4d-3c18a906620c", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-47xx/CVE-2023-4756.json b/CVE-2023/CVE-2023-47xx/CVE-2023-4756.json index a35069c3b6c..abcdc19ab57 100644 --- a/CVE-2023/CVE-2023-47xx/CVE-2023-4756.json +++ b/CVE-2023/CVE-2023-47xx/CVE-2023-4756.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4756", "sourceIdentifier": "security@huntr.dev", "published": "2023-09-04T09:15:07.990", - "lastModified": "2023-09-05T06:50:39.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-09-06T22:24:03.187", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -36,8 +58,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,14 +78,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3", + "matchCriteriaId": "422EDAFD-56FE-49AE-ADCF-7D33CFA0C56B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gpac/gpac/commit/6914d016e2b540bac2c471c4aea156ddef8e8e01", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.dev/bounties/2342da0e-f097-4ce7-bfdc-3ec0ba446e05", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index e7137fda138..b5ff6815255 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-09-06T22:00:25.087782+00:00 +2023-09-06T23:55:24.462921+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-09-06T21:15:14.517000+00:00 +2023-09-06T23:15:26.063000+00:00 ``` ### Last Data Feed Release @@ -34,52 +34,37 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `13` +Recently added CVEs: `0` -* [CVE-2023-41601](CVE-2023/CVE-2023-416xx/CVE-2023-41601.json) (`2023-09-06T20:15:07.857`) -* [CVE-2023-4809](CVE-2023/CVE-2023-48xx/CVE-2023-4809.json) (`2023-09-06T20:15:08.080`) -* [CVE-2023-23623](CVE-2023/CVE-2023-236xx/CVE-2023-23623.json) (`2023-09-06T21:15:08.977`) -* [CVE-2023-29198](CVE-2023/CVE-2023-291xx/CVE-2023-29198.json) (`2023-09-06T21:15:11.560`) -* [CVE-2023-38605](CVE-2023/CVE-2023-386xx/CVE-2023-38605.json) (`2023-09-06T21:15:12.783`) -* [CVE-2023-38616](CVE-2023/CVE-2023-386xx/CVE-2023-38616.json) (`2023-09-06T21:15:13.063`) -* [CVE-2023-39956](CVE-2023/CVE-2023-399xx/CVE-2023-39956.json) (`2023-09-06T21:15:13.217`) -* [CVE-2023-39967](CVE-2023/CVE-2023-399xx/CVE-2023-39967.json) (`2023-09-06T21:15:13.320`) -* [CVE-2023-40392](CVE-2023/CVE-2023-403xx/CVE-2023-40392.json) (`2023-09-06T21:15:13.560`) -* [CVE-2023-40397](CVE-2023/CVE-2023-403xx/CVE-2023-40397.json) (`2023-09-06T21:15:13.850`) -* [CVE-2023-41053](CVE-2023/CVE-2023-410xx/CVE-2023-41053.json) (`2023-09-06T21:15:14.137`) -* [CVE-2023-41327](CVE-2023/CVE-2023-413xx/CVE-2023-41327.json) (`2023-09-06T21:15:14.323`) -* [CVE-2023-41329](CVE-2023/CVE-2023-413xx/CVE-2023-41329.json) (`2023-09-06T21:15:14.517`) ### CVEs modified in the last Commit -Recently modified CVEs: `40` +Recently modified CVEs: `23` -* [CVE-2023-4755](CVE-2023/CVE-2023-47xx/CVE-2023-4755.json) (`2023-09-06T20:43:56.003`) -* [CVE-2023-4688](CVE-2023/CVE-2023-46xx/CVE-2023-4688.json) (`2023-09-06T20:45:12.027`) -* [CVE-2023-41751](CVE-2023/CVE-2023-417xx/CVE-2023-41751.json) (`2023-09-06T20:45:46.590`) -* [CVE-2023-41750](CVE-2023/CVE-2023-417xx/CVE-2023-41750.json) (`2023-09-06T20:46:05.583`) -* [CVE-2023-39353](CVE-2023/CVE-2023-393xx/CVE-2023-39353.json) (`2023-09-06T20:47:06.693`) -* [CVE-2023-41749](CVE-2023/CVE-2023-417xx/CVE-2023-41749.json) (`2023-09-06T20:50:56.357`) -* [CVE-2023-39685](CVE-2023/CVE-2023-396xx/CVE-2023-39685.json) (`2023-09-06T21:05:35.420`) -* [CVE-2023-23333](CVE-2023/CVE-2023-233xx/CVE-2023-23333.json) (`2023-09-06T21:15:08.640`) -* [CVE-2023-27950](CVE-2023/CVE-2023-279xx/CVE-2023-27950.json) (`2023-09-06T21:15:09.183`) -* [CVE-2023-28187](CVE-2023/CVE-2023-281xx/CVE-2023-28187.json) (`2023-09-06T21:15:09.387`) -* [CVE-2023-28188](CVE-2023/CVE-2023-281xx/CVE-2023-28188.json) (`2023-09-06T21:15:09.597`) -* [CVE-2023-28195](CVE-2023/CVE-2023-281xx/CVE-2023-28195.json) (`2023-09-06T21:15:09.690`) -* [CVE-2023-28200](CVE-2023/CVE-2023-282xx/CVE-2023-28200.json) (`2023-09-06T21:15:09.937`) -* [CVE-2023-28209](CVE-2023/CVE-2023-282xx/CVE-2023-28209.json) (`2023-09-06T21:15:10.227`) -* [CVE-2023-28210](CVE-2023/CVE-2023-282xx/CVE-2023-28210.json) (`2023-09-06T21:15:10.473`) -* [CVE-2023-28211](CVE-2023/CVE-2023-282xx/CVE-2023-28211.json) (`2023-09-06T21:15:10.647`) -* [CVE-2023-28212](CVE-2023/CVE-2023-282xx/CVE-2023-28212.json) (`2023-09-06T21:15:10.893`) -* [CVE-2023-28213](CVE-2023/CVE-2023-282xx/CVE-2023-28213.json) (`2023-09-06T21:15:11.093`) -* [CVE-2023-28214](CVE-2023/CVE-2023-282xx/CVE-2023-28214.json) (`2023-09-06T21:15:11.227`) -* [CVE-2023-28215](CVE-2023/CVE-2023-282xx/CVE-2023-28215.json) (`2023-09-06T21:15:11.387`) -* [CVE-2023-29491](CVE-2023/CVE-2023-294xx/CVE-2023-29491.json) (`2023-09-06T21:15:11.787`) -* [CVE-2023-32356](CVE-2023/CVE-2023-323xx/CVE-2023-32356.json) (`2023-09-06T21:15:11.873`) -* [CVE-2023-32362](CVE-2023/CVE-2023-323xx/CVE-2023-32362.json) (`2023-09-06T21:15:11.933`) -* [CVE-2023-32426](CVE-2023/CVE-2023-324xx/CVE-2023-32426.json) (`2023-09-06T21:15:12.130`) -* [CVE-2023-35359](CVE-2023/CVE-2023-353xx/CVE-2023-35359.json) (`2023-09-06T21:15:12.427`) +* [CVE-2023-41642](CVE-2023/CVE-2023-416xx/CVE-2023-41642.json) (`2023-09-06T22:15:08.133`) +* [CVE-2023-4754](CVE-2023/CVE-2023-47xx/CVE-2023-4754.json) (`2023-09-06T22:23:47.563`) +* [CVE-2023-4756](CVE-2023/CVE-2023-47xx/CVE-2023-4756.json) (`2023-09-06T22:24:03.187`) +* [CVE-2023-25465](CVE-2023/CVE-2023-254xx/CVE-2023-25465.json) (`2023-09-06T22:24:13.500`) +* [CVE-2023-36382](CVE-2023/CVE-2023-363xx/CVE-2023-36382.json) (`2023-09-06T22:24:22.910`) +* [CVE-2023-39162](CVE-2023/CVE-2023-391xx/CVE-2023-39162.json) (`2023-09-06T22:24:31.437`) +* [CVE-2023-39164](CVE-2023/CVE-2023-391xx/CVE-2023-39164.json) (`2023-09-06T22:24:41.070`) +* [CVE-2023-30494](CVE-2023/CVE-2023-304xx/CVE-2023-30494.json) (`2023-09-06T22:24:54.537`) +* [CVE-2023-31220](CVE-2023/CVE-2023-312xx/CVE-2023-31220.json) (`2023-09-06T22:25:04.397`) +* [CVE-2023-37393](CVE-2023/CVE-2023-373xx/CVE-2023-37393.json) (`2023-09-06T22:25:13.517`) +* [CVE-2023-39918](CVE-2023/CVE-2023-399xx/CVE-2023-39918.json) (`2023-09-06T22:25:23.327`) +* [CVE-2023-39919](CVE-2023/CVE-2023-399xx/CVE-2023-39919.json) (`2023-09-06T22:25:35.907`) +* [CVE-2023-39987](CVE-2023/CVE-2023-399xx/CVE-2023-39987.json) (`2023-09-06T22:25:44.800`) +* [CVE-2023-39988](CVE-2023/CVE-2023-399xx/CVE-2023-39988.json) (`2023-09-06T22:25:55.360`) +* [CVE-2023-39992](CVE-2023/CVE-2023-399xx/CVE-2023-39992.json) (`2023-09-06T22:32:25.333`) +* [CVE-2023-40206](CVE-2023/CVE-2023-402xx/CVE-2023-40206.json) (`2023-09-06T22:32:35.350`) +* [CVE-2023-40208](CVE-2023/CVE-2023-402xx/CVE-2023-40208.json) (`2023-09-06T22:32:43.077`) +* [CVE-2023-30485](CVE-2023/CVE-2023-304xx/CVE-2023-30485.json) (`2023-09-06T22:32:53.097`) +* [CVE-2023-32102](CVE-2023/CVE-2023-321xx/CVE-2023-32102.json) (`2023-09-06T22:33:02.990`) +* [CVE-2023-32296](CVE-2023/CVE-2023-322xx/CVE-2023-32296.json) (`2023-09-06T22:33:10.717`) +* [CVE-2023-32578](CVE-2023/CVE-2023-325xx/CVE-2023-32578.json) (`2023-09-06T22:33:28.527`) +* [CVE-2023-41636](CVE-2023/CVE-2023-416xx/CVE-2023-41636.json) (`2023-09-06T23:15:23.430`) +* [CVE-2023-41637](CVE-2023/CVE-2023-416xx/CVE-2023-41637.json) (`2023-09-06T23:15:26.063`) ## Download and Usage