Auto-Update: 2023-11-10T15:00:18.798400+00:00

This commit is contained in:
cad-safe-bot 2023-11-10 15:00:22 +00:00
parent 629cab192c
commit e8afe6cc90
7 changed files with 202 additions and 5 deletions

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-29426",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-10T14:15:35.327",
"lastModified": "2023-11-10T14:15:35.327",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Robert Schulz (sprd.Net AG) Spreadshop plugin <=\u00a01.6.5 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/spreadshop/wordpress-spreadshop-plugin-plugin-1-6-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-29428",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-10T14:15:35.693",
"lastModified": "2023-11-10T14:15:35.693",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in SuPlugins Superb Social Media Share Buttons and Follow Buttons for WordPress plugin <=\u00a01.1.3 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/superb-social-share-and-follow-buttons/wordpress-superb-social-media-share-buttons-and-follow-buttons-plugin-1-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-29440",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-10T14:15:35.767",
"lastModified": "2023-11-10T14:15:35.767",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in PressTigers Simple Job Board plugin <=\u00a02.10.3 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/simple-job-board/wordpress-simple-job-board-plugin-2-10-3-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-30478",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-10T14:15:35.850",
"lastModified": "2023-11-10T14:15:35.850",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Tribulant Newsletters plugin <=\u00a04.8.8 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/newsletters-lite/wordpress-newsletters-plugin-4-8-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-31077",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-10T14:15:35.923",
"lastModified": "2023-11-10T14:15:35.923",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in ReCorp Export WP Page to Static HTML/CSS plugin <=\u00a02.1.9 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/export-wp-page-to-static-html/wordpress-export-wp-page-to-static-html-css-plugin-2-1-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-31078",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-11-10T14:15:35.997",
"lastModified": "2023-11-10T14:15:35.997",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Marco Steinbrecher WP BrowserUpdate plugin <=\u00a04.4.1 versions."
}
],
"metrics": {},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-browser-update/wordpress-wp-browserupdate-plugin-4-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-10T11:00:18.826456+00:00
2023-11-10T15:00:18.798400+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-10T09:15:07.363000+00:00
2023-11-10T14:15:35.997000+00:00
```
### Last Data Feed Release
@ -29,14 +29,19 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
230314
230320
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `6`
* [CVE-2023-47164](CVE-2023/CVE-2023-471xx/CVE-2023-47164.json) (`2023-11-10T09:15:07.363`)
* [CVE-2023-29426](CVE-2023/CVE-2023-294xx/CVE-2023-29426.json) (`2023-11-10T14:15:35.327`)
* [CVE-2023-29428](CVE-2023/CVE-2023-294xx/CVE-2023-29428.json) (`2023-11-10T14:15:35.693`)
* [CVE-2023-29440](CVE-2023/CVE-2023-294xx/CVE-2023-29440.json) (`2023-11-10T14:15:35.767`)
* [CVE-2023-30478](CVE-2023/CVE-2023-304xx/CVE-2023-30478.json) (`2023-11-10T14:15:35.850`)
* [CVE-2023-31077](CVE-2023/CVE-2023-310xx/CVE-2023-31077.json) (`2023-11-10T14:15:35.923`)
* [CVE-2023-31078](CVE-2023/CVE-2023-310xx/CVE-2023-31078.json) (`2023-11-10T14:15:35.997`)
### CVEs modified in the last Commit