mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-11-10T15:00:18.798400+00:00
This commit is contained in:
parent
629cab192c
commit
e8afe6cc90
32
CVE-2023/CVE-2023-294xx/CVE-2023-29426.json
Normal file
32
CVE-2023/CVE-2023-294xx/CVE-2023-29426.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-29426",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-10T14:15:35.327",
|
||||
"lastModified": "2023-11-10T14:15:35.327",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Robert Schulz (sprd.Net AG) Spreadshop plugin <=\u00a01.6.5 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/spreadshop/wordpress-spreadshop-plugin-plugin-1-6-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-294xx/CVE-2023-29428.json
Normal file
32
CVE-2023/CVE-2023-294xx/CVE-2023-29428.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-29428",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-10T14:15:35.693",
|
||||
"lastModified": "2023-11-10T14:15:35.693",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in SuPlugins Superb Social Media Share Buttons and Follow Buttons for WordPress plugin <=\u00a01.1.3 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/superb-social-share-and-follow-buttons/wordpress-superb-social-media-share-buttons-and-follow-buttons-plugin-1-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-294xx/CVE-2023-29440.json
Normal file
32
CVE-2023/CVE-2023-294xx/CVE-2023-29440.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-29440",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-10T14:15:35.767",
|
||||
"lastModified": "2023-11-10T14:15:35.767",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in PressTigers Simple Job Board plugin <=\u00a02.10.3 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/simple-job-board/wordpress-simple-job-board-plugin-2-10-3-cross-site-request-forgery-csrf?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-304xx/CVE-2023-30478.json
Normal file
32
CVE-2023/CVE-2023-304xx/CVE-2023-30478.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-30478",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-10T14:15:35.850",
|
||||
"lastModified": "2023-11-10T14:15:35.850",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Tribulant Newsletters plugin <=\u00a04.8.8 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/newsletters-lite/wordpress-newsletters-plugin-4-8-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-310xx/CVE-2023-31077.json
Normal file
32
CVE-2023/CVE-2023-310xx/CVE-2023-31077.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-31077",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-10T14:15:35.923",
|
||||
"lastModified": "2023-11-10T14:15:35.923",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in ReCorp Export WP Page to Static HTML/CSS plugin <=\u00a02.1.9 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/export-wp-page-to-static-html/wordpress-export-wp-page-to-static-html-css-plugin-2-1-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-310xx/CVE-2023-31078.json
Normal file
32
CVE-2023/CVE-2023-310xx/CVE-2023-31078.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-31078",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-11-10T14:15:35.997",
|
||||
"lastModified": "2023-11-10T14:15:35.997",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Marco Steinbrecher WP BrowserUpdate plugin <=\u00a04.4.1 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-browser-update/wordpress-wp-browserupdate-plugin-4-4-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
15
README.md
15
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-11-10T11:00:18.826456+00:00
|
||||
2023-11-10T15:00:18.798400+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-11-10T09:15:07.363000+00:00
|
||||
2023-11-10T14:15:35.997000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,14 +29,19 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
230314
|
||||
230320
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `6`
|
||||
|
||||
* [CVE-2023-47164](CVE-2023/CVE-2023-471xx/CVE-2023-47164.json) (`2023-11-10T09:15:07.363`)
|
||||
* [CVE-2023-29426](CVE-2023/CVE-2023-294xx/CVE-2023-29426.json) (`2023-11-10T14:15:35.327`)
|
||||
* [CVE-2023-29428](CVE-2023/CVE-2023-294xx/CVE-2023-29428.json) (`2023-11-10T14:15:35.693`)
|
||||
* [CVE-2023-29440](CVE-2023/CVE-2023-294xx/CVE-2023-29440.json) (`2023-11-10T14:15:35.767`)
|
||||
* [CVE-2023-30478](CVE-2023/CVE-2023-304xx/CVE-2023-30478.json) (`2023-11-10T14:15:35.850`)
|
||||
* [CVE-2023-31077](CVE-2023/CVE-2023-310xx/CVE-2023-31077.json) (`2023-11-10T14:15:35.923`)
|
||||
* [CVE-2023-31078](CVE-2023/CVE-2023-310xx/CVE-2023-31078.json) (`2023-11-10T14:15:35.997`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
Loading…
x
Reference in New Issue
Block a user