Auto-Update: 2023-07-18T14:00:47.612665+00:00

This commit is contained in:
cad-safe-bot 2023-07-18 14:00:51 +00:00
parent 4bf5186d9f
commit edd5b3c7ab
95 changed files with 2315 additions and 210 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-10122",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-18T05:15:09.603",
"lastModified": "2023-07-18T05:15:09.603",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2018-25088",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-18T13:15:11.187",
"lastModified": "2023-07-18T13:15:11.187",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in Blue Yonder postgraas_server up to 2.0.0b2. Affected is the function _create_pg_connection/create_postgres_db of the file postgraas_server/backends/postgres_cluster/postgres_cluster_driver.py of the component PostgreSQL Backend Handler. The manipulation leads to sql injection. Upgrading to version 2.0.0 is able to address this issue. The patch is identified as 7cd8d016edc74a78af0d81c948bfafbcc93c937c. It is recommended to upgrade the affected component. VDB-234246 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.2
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 5.1,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/blue-yonder/postgraas_server/commit/7cd8d016edc74a78af0d81c948bfafbcc93c937c",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/blue-yonder/postgraas_server/releases/tag/v2.0.0",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.234246",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.234246",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-36695",
"sourceIdentifier": "hirt@hitachi.co.jp",
"published": "2023-07-18T03:15:52.963",
"lastModified": "2023-07-18T03:15:52.963",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-34619",
"sourceIdentifier": "security@wordfence.com",
"published": "2021-07-21T15:16:20.503",
"lastModified": "2021-07-29T17:36:01.040",
"lastModified": "2023-07-18T12:34:01.287",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -118,9 +118,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:storeapps:woocommerce_stock_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:storeapps:stock_manager_for_woocommerce:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.5.7",
"matchCriteriaId": "9B74A371-3309-40DB-A701-2BB4AF27421F"
"matchCriteriaId": "0EB659B6-D7D5-4C6E-AFB4-5D87DEB73CD3"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2021-36908",
"sourceIdentifier": "audit@patchstack.com",
"published": "2021-11-18T15:15:09.627",
"lastModified": "2021-11-19T21:56:21.913",
"vulnStatus": "Analyzed",
"lastModified": "2023-07-18T13:15:11.430",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability leading to Database Reset in WordPress WP Reset PRO Premium plugin (versions <= 5.98) allows attackers to trick authenticated into making unintentional database reset."
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WebFactory Ltd. WP Reset PRO plugin <=\u00a05.98 versions."
},
{
"lang": "es",
@ -85,7 +85,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
@ -95,7 +95,7 @@
]
},
{
"source": "audit@patchstack.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
@ -125,11 +125,8 @@
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-reset/wordpress-wp-reset-pro-premium-plugin-5-98-cross-site-request-forgery-csrf-vulnerability-leading-to-database-reset",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
"url": "https://patchstack.com/database/vulnerability/wp-reset/wordpress-wp-reset-pro-premium-plugin-5-98-cross-site-request-forgery-csrf-vulnerability-leading-to-database-reset?_s_id=cve",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/wp-reset-pro-critical-vulnerability-fixed/",
@ -138,14 +135,6 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpreset.com/changelog/",
"source": "audit@patchstack.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-37384",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-17T21:15:09.307",
"lastModified": "2023-07-17T21:15:09.307",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-41564",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2021-10-08T16:15:07.827",
"lastModified": "2021-10-15T15:13:35.703",
"lastModified": "2023-07-18T13:55:04.143",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41571",
"sourceIdentifier": "security@apache.org",
"published": "2022-02-01T13:15:09.663",
"lastModified": "2023-07-17T15:18:22.543",
"vulnStatus": "Analyzed",
"lastModified": "2023-07-18T12:15:11.687",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -65,7 +65,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security@apache.org",
"type": "Primary",
"description": [
{
@ -75,12 +75,12 @@
]
},
{
"source": "security@apache.org",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-863"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-42522",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2022-08-25T18:15:09.203",
"lastModified": "2022-12-21T15:01:19.963",
"lastModified": "2023-07-18T13:51:59.303",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-401"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-4204",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-08-24T16:15:09.873",
"lastModified": "2023-03-01T16:27:44.453",
"lastModified": "2023-07-18T13:52:35.333",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,22 +40,22 @@
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-119"
}
]
},
{
"source": "nvd@nist.gov",
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-20"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-4240",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-11-15T23:15:10.233",
"lastModified": "2022-11-18T19:51:51.210",
"lastModified": "2023-07-18T13:52:21.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -56,8 +56,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-330"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-4241",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-11-15T23:15:14.737",
"lastModified": "2022-11-18T19:57:48.090",
"lastModified": "2023-07-18T13:52:11.470",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -56,8 +56,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-330"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-4287",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-27T11:15:10.640",
"lastModified": "2023-01-18T14:11:31.037",
"lastModified": "2023-07-18T13:52:56.443",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -58,8 +58,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-43072",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2023-07-18T03:15:54.947",
"lastModified": "2023-07-18T03:15:54.947",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-43306",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2022-06-02T14:15:30.923",
"lastModified": "2022-06-09T17:56:56.883",
"lastModified": "2023-07-18T13:53:25.057",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-1333"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-43307",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2022-06-02T14:15:30.987",
"lastModified": "2022-06-09T18:39:59.997",
"lastModified": "2023-07-18T13:53:19.207",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-1333"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-43308",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2022-06-02T14:15:31.047",
"lastModified": "2022-06-09T18:41:26.940",
"lastModified": "2023-07-18T13:53:11.403",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-1333"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-43309",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2022-08-24T16:15:09.137",
"lastModified": "2022-08-29T01:05:15.307",
"lastModified": "2023-07-18T13:53:03.970",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-697"
"value": "CWE-1333"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27218",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-15T17:15:12.877",
"lastModified": "2022-03-25T13:57:41.423",
"lastModified": "2023-07-18T13:53:44.023",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-522"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27221",
"sourceIdentifier": "productcert@siemens.com",
"published": "2022-06-14T10:15:20.057",
"lastModified": "2022-06-22T16:53:11.837",
"lastModified": "2023-07-18T13:53:31.627",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-331"
"value": "CWE-203"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27480",
"sourceIdentifier": "productcert@siemens.com",
"published": "2022-04-12T09:15:15.103",
"lastModified": "2022-04-19T18:26:08.570",
"lastModified": "2023-07-18T13:54:54.477",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-862"
"value": "CWE-425"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27511",
"sourceIdentifier": "secure@citrix.com",
"published": "2022-06-16T19:15:07.773",
"lastModified": "2022-06-16T21:57:33.887",
"lastModified": "2023-07-18T13:54:38.100",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27549",
"sourceIdentifier": "psirt@hcl.com",
"published": "2022-07-06T21:15:11.947",
"lastModified": "2022-07-14T17:28:42.017",
"lastModified": "2023-07-18T13:54:18.830",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-532"
"value": "CWE-312"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27575",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2022-04-11T20:15:21.917",
"lastModified": "2022-04-18T14:50:22.647",
"lastModified": "2023-07-18T13:53:51.680",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "CWE-863"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27779",
"sourceIdentifier": "support@hackerone.com",
"published": "2022-06-02T14:15:44.093",
"lastModified": "2023-01-05T17:58:47.157",
"lastModified": "2023-07-18T13:55:45.337",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-27891",
"sourceIdentifier": "cve-coordination@palantir.com",
"published": "2023-02-16T16:15:12.020",
"lastModified": "2023-02-25T03:27:51.003",
"lastModified": "2023-07-18T13:55:35.387",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -61,7 +61,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-306"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2732",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-08-09T12:15:08.357",
"lastModified": "2022-08-12T14:15:50.220",
"lastModified": "2023-07-18T13:55:10.200",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -62,8 +62,18 @@
},
"weaknesses": [
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-28135",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2022-03-29T13:15:08.137",
"lastModified": "2022-04-04T19:16:40.173",
"lastModified": "2023-07-18T13:55:54.120",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-522"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-30858",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-17T19:15:09.137",
"lastModified": "2023-07-17T19:15:09.137",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:10.100",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4146",
"sourceIdentifier": "hirt@hitachi.co.jp",
"published": "2023-07-18T03:15:55.067",
"lastModified": "2023-07-18T03:15:55.067",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-45828",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-07-18T12:15:11.870",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in NooTheme Noo Timetable plugin <=\u00a02.1.3 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/noo-timetable/wordpress-noo-timetable-responsive-calendar-auto-sync-wordpress-plugin-plugin-2-1-3-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-46857",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-07-18T12:15:12.057",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in SiteAlert plugin <=\u00a01.9.7 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/my-wp-health-check/wordpress-sitealert-uptime-speed-and-security-monitoring-for-wordpress-plugin-1-9-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-47169",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-07-18T13:15:11.613",
"lastModified": "2023-07-18T13:15:11.613",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in StaxWP Visibility Logic for Elementor plugin <=\u00a02.3.4 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/visibility-logic-elementor/wordpress-visibility-logic-for-elementor-plugin-2-3-4-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-23660",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-07-18T13:15:11.713",
"lastModified": "2023-07-18T13:15:11.713",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Auth. (subscriber+) SQL Injection (SQLi) vulnerability in MainWP MainWP Maintenance Extension plugin <=\u00a04.1.1 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 8.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/articles/multiple-vulnerabilities-affecting-mainwp-extensions?_s_id=cve",
"source": "audit@patchstack.com"
},
{
"url": "https://patchstack.com/database/vulnerability/mainwp-maintenance-extension/wordpress-mainwp-maintenance-extension-plugin-4-1-1-subscriber-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2433",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-07-18T09:15:11.067",
"lastModified": "2023-07-18T09:15:11.067",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25036",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-07-18T13:15:11.810",
"lastModified": "2023-07-18T13:15:11.810",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in akhlesh-nagar, a.Ankit Social Media Icons Widget plugin <=\u00a01.6 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/spoontalk-social-media-icons-widget/wordpress-social-media-icons-widget-plugin-1-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25473",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-07-18T12:15:12.160",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Miro Mannino Flickr Justified Gallery plugin <=\u00a03.5 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/flickr-justified-gallery/wordpress-flickr-justified-gallery-plugin-3-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25475",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-07-18T12:15:12.247",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Vladimir Prelovac Smart YouTube PRO plugin <=\u00a04.3 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/smart-youtube/wordpress-smart-youtube-pro-plugin-4-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25482",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-07-18T12:15:12.337",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Mike Martel WP Tiles plugin <=\u00a01.1.2 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-tiles/wordpress-wp-tiles-plugin-1-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28864",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-17T20:15:13.343",
"lastModified": "2023-07-17T20:15:13.343",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:10.100",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31998",
"sourceIdentifier": "support@hackerone.com",
"published": "2023-07-18T03:15:55.163",
"lastModified": "2023-07-18T03:15:55.163",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34142",
"sourceIdentifier": "hirt@hitachi.co.jp",
"published": "2023-07-18T03:15:55.427",
"lastModified": "2023-07-18T03:15:55.427",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34143",
"sourceIdentifier": "hirt@hitachi.co.jp",
"published": "2023-07-18T03:15:55.510",
"lastModified": "2023-07-18T03:15:55.510",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34432",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-10T21:15:10.763",
"lastModified": "2023-07-11T12:43:16.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-18T13:53:51.417",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -34,14 +54,82 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sound_exchange_project:sound_exchange:*:*:*:*:*:*:*:*",
"versionEndIncluding": "14.4.3",
"matchCriteriaId": "F2B81E4A-C528-4569-B683-A9CA898C680A"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BB176AC3-3CDA-4DDA-9089-C67B2F73AA62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-34432",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2212291",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3403",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-07-18T03:15:55.673",
"lastModified": "2023-07-18T03:15:55.673",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3459",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-07-18T03:15:55.793",
"lastModified": "2023-07-18T03:15:55.793",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35352",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:19.307",
"lastModified": "2023-07-12T12:46:41.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-18T13:50:11.260",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,63 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35352",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35353",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:19.360",
"lastModified": "2023-07-12T12:46:41.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-18T13:53:13.173",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,89 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.6085",
"matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4645",
"matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.3208",
"matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.3208",
"matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2176",
"matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.1992",
"matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35353",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35356",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:19.413",
"lastModified": "2023-07-12T12:46:41.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-18T13:34:07.400",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,89 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.6085",
"matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4645",
"matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.3208",
"matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.3208",
"matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2176",
"matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.1992",
"matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35356",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35357",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:19.467",
"lastModified": "2023-07-12T12:46:41.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-18T13:37:13.943",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,89 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.6085",
"matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4645",
"matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.3208",
"matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.3208",
"matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2176",
"matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.1992",
"matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35357",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35358",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:19.520",
"lastModified": "2023-07-12T12:46:41.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-18T13:37:29.030",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,89 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.6085",
"matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4645",
"matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.3208",
"matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.3208",
"matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2176",
"matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.1992",
"matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35358",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35360",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:19.577",
"lastModified": "2023-07-12T12:46:41.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-18T13:44:05.863",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,105 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20048",
"matchCriteriaId": "CA7DB0E9-3DCD-4FAE-8F9A-20D15E061ED7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.6085",
"matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4645",
"matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.3208",
"matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.3208",
"matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2176",
"matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.1992",
"matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35360",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35361",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:19.633",
"lastModified": "2023-07-12T12:46:41.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-18T13:44:17.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,105 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20048",
"matchCriteriaId": "CA7DB0E9-3DCD-4FAE-8F9A-20D15E061ED7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.6085",
"matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4645",
"matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.3208",
"matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.3208",
"matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2176",
"matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.1992",
"matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35361",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35362",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:19.687",
"lastModified": "2023-07-12T12:46:41.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-18T13:53:23.963",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,105 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20048",
"matchCriteriaId": "CA7DB0E9-3DCD-4FAE-8F9A-20D15E061ED7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.6085",
"matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4645",
"matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.3208",
"matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.3208",
"matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2176",
"matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.1992",
"matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35362",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35363",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:19.740",
"lastModified": "2023-07-12T12:46:41.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-18T13:30:37.973",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,78 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4645",
"matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.3208",
"matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.3208",
"matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2176",
"matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.1992",
"matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35363",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35364",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:19.797",
"lastModified": "2023-07-12T12:46:41.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-18T13:31:29.590",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,78 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4645",
"matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.3208",
"matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.3208",
"matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2176",
"matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.1992",
"matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35364",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35365",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-07-11T18:15:19.850",
"lastModified": "2023-07-12T12:46:41.413",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-18T13:55:40.097",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,115 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.20048",
"matchCriteriaId": "CA7DB0E9-3DCD-4FAE-8F9A-20D15E061ED7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.6085",
"matchCriteriaId": "8557A170-443F-49D3-9041-0D883E6CB556"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4645",
"matchCriteriaId": "E7CD9EA5-EB3A-4C42-B208-75590288F6F6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19041.3208",
"matchCriteriaId": "22A20A25-6FDE-4715-873E-E7FBF2DFABCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.3208",
"matchCriteriaId": "7408C04A-729A-4CFF-8AF0-97A18BB2BD9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2176",
"matchCriteriaId": "F10BCA0D-417F-42E3-93BF-2C227357702B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.1992",
"matchCriteriaId": "B1C277B2-DE09-453D-B33E-42917E11D0E5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35365",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2023-36825",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-11T18:15:20.417",
"lastModified": "2023-07-12T12:46:41.413",
"lastModified": "2023-07-18T13:15:11.907",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Decidim is a participatory democracy framework, written in Ruby on Rails, originally developed for the Barcelona City government online and offline participation website. This vulnerability is related to the deserialization of untrusted data from the `_state` query parameter, which can result in remote code execution. The issue has been addressed in version `14.5.0`. Users are advised to upgrade their software to this version or any subsequent versions that include the patch.\n"
"value": "Orchid is a Laravel package that allows application development of back-office applications, admin/user panels, and dashboards. A vulnerability present starting in version 14.0.0-alpha4 and prior to version 14.5.0 is related to the deserialization of untrusted data from the `_state` query parameter, which can result in remote code execution. The issue has been addressed in version 14.5.0. Users are advised to upgrade their software to this version or any subsequent versions that include the patch. There are no known workarounds."
}
],
"metrics": {

View File

@ -2,15 +2,41 @@
"id": "CVE-2023-3607",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T21:15:10.887",
"lastModified": "2023-07-11T12:43:16.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-18T13:47:32.097",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in kodbox 1.26. It has been declared as critical. This vulnerability affects the function Execute of the file webconsole.php.txt of the component WebConsole Plug-In. The manipulation leads to os command injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-233476. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en kodbox v1.26. Ha sido declarada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n \"Execute\" del fichero \"webconsole.php.txt\" del componente \"WebConsole Plug-In\". La manipulaci\u00f3n conduce a la inyecci\u00f3n de comandos de tipo \"os\". El exploit ha sido revelado al p\u00fablico y puede ser utilizado. El identificador de esta vulnerabilidad es VDB-233476. NOTA: Se contact\u00f3 con el proveedor a tiempo sobre esta divulgaci\u00f3n pero no respondi\u00f3 de ninguna manera. "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +97,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kodcloud:kodbox:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "FE5E096E-4A79-4CDA-83AC-92939920F100"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mohdkey/cve/blob/main/kodbox.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.233476",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.233476",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3608",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-07-10T22:15:09.530",
"lastModified": "2023-07-11T12:43:16.387",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-18T13:31:54.110",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +93,58 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ruijienetworks:bcr810w_firmware:2.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "34F0457A-FE7A-40D4-8251-F67A9C2A7767"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:ruijienetworks:bcr810w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB2602D4-1664-4D90-85FB-61483FAD69AB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/cq535454518/cve/blob/main/RG-BCR810W.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.233477",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.233477",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-37153",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-10T16:15:53.610",
"lastModified": "2023-07-10T16:27:17.833",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-07-18T13:09:10.123",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "KodExplorer 4.51 contains a Cross-Site Scripting (XSS) vulnerability in the Description box of the Light App creation feature. An attacker can exploit this vulnerability by injecting XSS syntax into the Description field."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kodcloud:kodexplorer:4.51:*:*:*:*:*:*:*",
"matchCriteriaId": "C60D895F-51BD-4FAF-B449-B04037016307"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Trinity-SYT-SECURITY/XSS_vuln_issue/blob/main/KodExplorer4.51.03.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/kalcaddle/KodExplorer",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37265",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-17T21:15:09.653",
"lastModified": "2023-07-17T21:15:09.653",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37266",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-17T21:15:09.733",
"lastModified": "2023-07-17T21:15:09.733",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-37386",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-07-18T13:15:12.013",
"lastModified": "2023-07-18T13:15:12.013",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Media Library Helper plugin <=\u00a01.2.0 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/media-library-helper/wordpress-media-library-helper-by-codexin-plugin-1-2-0-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-37387",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-07-18T13:15:12.103",
"lastModified": "2023-07-18T13:15:12.103",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in RadiusTheme Classified Listing plugin <=\u00a02.4.5 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/classified-listing/wordpress-classified-listing-plugin-2-4-5-cross-site-request-forgery-csrf-leading-to-thumbnail-removal-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37461",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-17T20:15:13.470",
"lastModified": "2023-07-17T20:15:13.470",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:10.100",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37476",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-17T22:15:09.450",
"lastModified": "2023-07-17T22:15:09.450",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37479",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-07-17T23:15:08.973",
"lastModified": "2023-07-17T23:15:08.973",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37769",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-17T20:15:13.547",
"lastModified": "2023-07-17T20:15:13.547",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:10.100",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37770",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-17T20:15:13.587",
"lastModified": "2023-07-17T20:15:13.587",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37781",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-17T20:15:13.623",
"lastModified": "2023-07-17T20:15:13.623",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-37791",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-17T19:15:09.440",
"lastModified": "2023-07-17T19:15:09.440",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:10.100",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-37889",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-07-18T13:15:12.197",
"lastModified": "2023-07-18T13:15:12.197",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WPAdmin WPAdmin AWS CDN plugin <=\u00a02.0.13 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/aws-cdn-by-wpadmin/wordpress-wpadmin-aws-cdn-plugin-2-0-13-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-37892",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-07-18T13:15:12.290",
"lastModified": "2023-07-18T13:15:12.290",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Kemal YAZICI - PluginPress Shortcode IMDB plugin <=\u00a06.0.8 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/shortcode-imdb/wordpress-shortcode-imdb-plugin-6-0-8-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-37973",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-07-18T13:15:12.387",
"lastModified": "2023-07-18T13:15:12.387",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in David Pokorny Replace Word plugin <=\u00a02.1 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/replace-word/wordpress-replace-word-plugin-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3708",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-07-18T03:15:55.897",
"lastModified": "2023-07-18T03:15:55.897",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3709",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-07-18T03:15:56.010",
"lastModified": "2023-07-18T03:15:56.010",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3713",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-07-18T03:15:56.110",
"lastModified": "2023-07-18T03:15:56.110",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3714",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-07-18T03:15:56.207",
"lastModified": "2023-07-18T03:15:56.207",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3724",
"sourceIdentifier": "facts@wolfssl.com",
"published": "2023-07-17T22:15:09.587",
"lastModified": "2023-07-17T22:15:09.587",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-3743",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2023-07-18T12:15:12.427",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Ap Page Builder, in versions lower than 1.7.8.2, could allow a remote attacker to send a specially crafted SQL query to the product_one_img parameter to retrieve the information stored in the database.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/sql-injection-vulnerability-leothemes-ap-page-builder",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2023-38326",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-18T13:15:12.483",
"lastModified": "2023-07-18T13:15:12.483",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38403",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-17T21:15:09.800",
"lastModified": "2023-07-17T21:15:09.800",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38404",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-17T21:15:09.847",
"lastModified": "2023-07-17T21:15:09.847",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38405",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-17T21:15:09.907",
"lastModified": "2023-07-17T21:15:09.907",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38409",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-17T22:15:09.540",
"lastModified": "2023-07-17T22:15:09.540",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38426",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-18T00:15:09.483",
"lastModified": "2023-07-18T00:15:09.483",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38427",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-18T00:15:09.530",
"lastModified": "2023-07-18T00:15:09.530",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38428",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-18T00:15:09.577",
"lastModified": "2023-07-18T00:15:09.577",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38429",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-18T00:15:09.620",
"lastModified": "2023-07-18T00:15:09.620",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38430",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-18T00:15:09.663",
"lastModified": "2023-07-18T00:15:09.663",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38431",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-18T00:15:09.707",
"lastModified": "2023-07-18T00:15:09.707",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38432",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-18T00:15:09.750",
"lastModified": "2023-07-18T00:15:09.750",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:59:03.770",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38434",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-18T03:15:55.610",
"lastModified": "2023-07-18T03:15:55.610",
"vulnStatus": "Received",
"lastModified": "2023-07-18T12:58:57.160",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-07-18T12:01:11.195601+00:00
2023-07-18T14:00:47.612665+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-07-18T11:54:08.147000+00:00
2023-07-18T13:55:54.120000+00:00
```
### Last Data Feed Release
@ -29,23 +29,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
220508
220524
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `16`
* [CVE-2018-25088](CVE-2018/CVE-2018-250xx/CVE-2018-25088.json) (`2023-07-18T13:15:11.187`)
* [CVE-2022-45828](CVE-2022/CVE-2022-458xx/CVE-2022-45828.json) (`2023-07-18T12:15:11.870`)
* [CVE-2022-46857](CVE-2022/CVE-2022-468xx/CVE-2022-46857.json) (`2023-07-18T12:15:12.057`)
* [CVE-2022-47169](CVE-2022/CVE-2022-471xx/CVE-2022-47169.json) (`2023-07-18T13:15:11.613`)
* [CVE-2023-25473](CVE-2023/CVE-2023-254xx/CVE-2023-25473.json) (`2023-07-18T12:15:12.160`)
* [CVE-2023-25475](CVE-2023/CVE-2023-254xx/CVE-2023-25475.json) (`2023-07-18T12:15:12.247`)
* [CVE-2023-25482](CVE-2023/CVE-2023-254xx/CVE-2023-25482.json) (`2023-07-18T12:15:12.337`)
* [CVE-2023-3743](CVE-2023/CVE-2023-37xx/CVE-2023-3743.json) (`2023-07-18T12:15:12.427`)
* [CVE-2023-23660](CVE-2023/CVE-2023-236xx/CVE-2023-23660.json) (`2023-07-18T13:15:11.713`)
* [CVE-2023-25036](CVE-2023/CVE-2023-250xx/CVE-2023-25036.json) (`2023-07-18T13:15:11.810`)
* [CVE-2023-37386](CVE-2023/CVE-2023-373xx/CVE-2023-37386.json) (`2023-07-18T13:15:12.013`)
* [CVE-2023-37387](CVE-2023/CVE-2023-373xx/CVE-2023-37387.json) (`2023-07-18T13:15:12.103`)
* [CVE-2023-37889](CVE-2023/CVE-2023-378xx/CVE-2023-37889.json) (`2023-07-18T13:15:12.197`)
* [CVE-2023-37892](CVE-2023/CVE-2023-378xx/CVE-2023-37892.json) (`2023-07-18T13:15:12.290`)
* [CVE-2023-37973](CVE-2023/CVE-2023-379xx/CVE-2023-37973.json) (`2023-07-18T13:15:12.387`)
* [CVE-2023-38326](CVE-2023/CVE-2023-383xx/CVE-2023-38326.json) (`2023-07-18T13:15:12.483`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `78`
* [CVE-2023-35698](CVE-2023/CVE-2023-356xx/CVE-2023-35698.json) (`2023-07-18T11:44:50.397`)
* [CVE-2023-35699](CVE-2023/CVE-2023-356xx/CVE-2023-35699.json) (`2023-07-18T11:46:43.907`)
* [CVE-2023-3118](CVE-2023/CVE-2023-31xx/CVE-2023-3118.json) (`2023-07-18T11:50:22.380`)
* [CVE-2023-37392](CVE-2023/CVE-2023-373xx/CVE-2023-37392.json) (`2023-07-18T11:54:08.147`)
* [CVE-2023-38428](CVE-2023/CVE-2023-384xx/CVE-2023-38428.json) (`2023-07-18T12:59:03.770`)
* [CVE-2023-38429](CVE-2023/CVE-2023-384xx/CVE-2023-38429.json) (`2023-07-18T12:59:03.770`)
* [CVE-2023-38430](CVE-2023/CVE-2023-384xx/CVE-2023-38430.json) (`2023-07-18T12:59:03.770`)
* [CVE-2023-38431](CVE-2023/CVE-2023-384xx/CVE-2023-38431.json) (`2023-07-18T12:59:03.770`)
* [CVE-2023-38432](CVE-2023/CVE-2023-384xx/CVE-2023-38432.json) (`2023-07-18T12:59:03.770`)
* [CVE-2023-37791](CVE-2023/CVE-2023-377xx/CVE-2023-37791.json) (`2023-07-18T12:59:10.100`)
* [CVE-2023-28864](CVE-2023/CVE-2023-288xx/CVE-2023-28864.json) (`2023-07-18T12:59:10.100`)
* [CVE-2023-37461](CVE-2023/CVE-2023-374xx/CVE-2023-37461.json) (`2023-07-18T12:59:10.100`)
* [CVE-2023-37769](CVE-2023/CVE-2023-377xx/CVE-2023-37769.json) (`2023-07-18T12:59:10.100`)
* [CVE-2023-37153](CVE-2023/CVE-2023-371xx/CVE-2023-37153.json) (`2023-07-18T13:09:10.123`)
* [CVE-2023-36825](CVE-2023/CVE-2023-368xx/CVE-2023-36825.json) (`2023-07-18T13:15:11.907`)
* [CVE-2023-35363](CVE-2023/CVE-2023-353xx/CVE-2023-35363.json) (`2023-07-18T13:30:37.973`)
* [CVE-2023-35364](CVE-2023/CVE-2023-353xx/CVE-2023-35364.json) (`2023-07-18T13:31:29.590`)
* [CVE-2023-3608](CVE-2023/CVE-2023-36xx/CVE-2023-3608.json) (`2023-07-18T13:31:54.110`)
* [CVE-2023-35356](CVE-2023/CVE-2023-353xx/CVE-2023-35356.json) (`2023-07-18T13:34:07.400`)
* [CVE-2023-35357](CVE-2023/CVE-2023-353xx/CVE-2023-35357.json) (`2023-07-18T13:37:13.943`)
* [CVE-2023-35358](CVE-2023/CVE-2023-353xx/CVE-2023-35358.json) (`2023-07-18T13:37:29.030`)
* [CVE-2023-35360](CVE-2023/CVE-2023-353xx/CVE-2023-35360.json) (`2023-07-18T13:44:05.863`)
* [CVE-2023-35361](CVE-2023/CVE-2023-353xx/CVE-2023-35361.json) (`2023-07-18T13:44:17.307`)
* [CVE-2023-3607](CVE-2023/CVE-2023-36xx/CVE-2023-3607.json) (`2023-07-18T13:47:32.097`)
* [CVE-2023-35352](CVE-2023/CVE-2023-353xx/CVE-2023-35352.json) (`2023-07-18T13:50:11.260`)
* [CVE-2023-35353](CVE-2023/CVE-2023-353xx/CVE-2023-35353.json) (`2023-07-18T13:53:13.173`)
* [CVE-2023-35362](CVE-2023/CVE-2023-353xx/CVE-2023-35362.json) (`2023-07-18T13:53:23.963`)
* [CVE-2023-34432](CVE-2023/CVE-2023-344xx/CVE-2023-34432.json) (`2023-07-18T13:53:51.417`)
* [CVE-2023-35365](CVE-2023/CVE-2023-353xx/CVE-2023-35365.json) (`2023-07-18T13:55:40.097`)
## Download and Usage