Auto-Update: 2023-05-23T16:00:29.409474+00:00

This commit is contained in:
cad-safe-bot 2023-05-23 16:00:33 +00:00
parent a006e81b46
commit f938f1c87b
44 changed files with 1783 additions and 144 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-9305",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-12T15:15:11.263",
"lastModified": "2019-08-15T20:07:28.203",
"lastModified": "2023-05-23T15:11:16.463",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flippercode:google_map:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:flippercode:wp_google_map:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.3.7",
"matchCriteriaId": "81F0FB94-2C0C-4602-8383-9A0E84566351"
"matchCriteriaId": "F1790EAA-CA35-4A26-98A3-AB6BECE0C257"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-9307",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-14T16:15:11.160",
"lastModified": "2023-03-01T02:27:24.920",
"lastModified": "2023-05-23T15:11:16.463",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flippercode:google_map:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:flippercode:wp_google_map:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.3.10",
"matchCriteriaId": "D8096FAC-7EF8-4DE2-A2E7-19789CDAFFE9"
"matchCriteriaId": "76AB02C9-EB97-4FE9-BC59-D676A9582FF5"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-9308",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-14T16:15:11.220",
"lastModified": "2023-03-01T02:30:31.997",
"lastModified": "2023-05-23T15:11:16.463",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flippercode:google_map:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:flippercode:wp_google_map:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.3.10",
"matchCriteriaId": "D8096FAC-7EF8-4DE2-A2E7-19789CDAFFE9"
"matchCriteriaId": "76AB02C9-EB97-4FE9-BC59-D676A9582FF5"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2015-9309",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-14T16:15:11.300",
"lastModified": "2023-03-01T02:32:10.413",
"lastModified": "2023-05-23T15:11:16.463",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flippercode:google_map:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:flippercode:wp_google_map:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.3.10",
"matchCriteriaId": "D8096FAC-7EF8-4DE2-A2E7-19789CDAFFE9"
"matchCriteriaId": "76AB02C9-EB97-4FE9-BC59-D676A9582FF5"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2016-10878",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-12T15:15:11.730",
"lastModified": "2023-02-24T19:45:59.353",
"lastModified": "2023-05-23T15:11:16.463",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flippercode:google_map:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:flippercode:wp_google_map:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.1.2",
"matchCriteriaId": "8048DC98-9A2E-4665-A315-E2C5BBE2EB72"
"matchCriteriaId": "A4548F42-EBE4-4E67-8C74-06F1465BC5F3"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-11514",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-04-07T17:15:13.573",
"lastModified": "2021-07-21T11:39:23.747",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-23T14:57:32.420",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rankmath:rankmath:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:rankmath:seo:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.40.2",
"matchCriteriaId": "2F280C36-E630-4380-8038-63CC226F9715"
"matchCriteriaId": "085DE307-EE37-47C5-BF61-874C59C8344A"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-11515",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-04-07T17:15:13.617",
"lastModified": "2020-04-07T19:47:47.837",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-23T14:57:32.420",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rankmath:rankmath:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:rankmath:seo:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.40.2",
"matchCriteriaId": "2F280C36-E630-4380-8038-63CC226F9715"
"matchCriteriaId": "085DE307-EE37-47C5-BF61-874C59C8344A"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-9334",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-02-25T17:15:13.587",
"lastModified": "2020-02-25T19:15:59.493",
"lastModified": "2023-05-23T14:22:22.827",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:enviragallery:photo_gallery:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:enviragallery:envira_gallery:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.7.6",
"matchCriteriaId": "6128754A-AF69-4E52-9C5C-69B181F5CFF1"
"matchCriteriaId": "B50EDB2D-E6E1-4EF7-9EC9-B75037621B1F"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-36376",
"sourceIdentifier": "audit@patchstack.com",
"published": "2022-09-09T15:15:10.627",
"lastModified": "2022-09-14T14:53:32.817",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-23T14:57:32.420",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -79,9 +79,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rankmath:rankmath:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:rankmath:seo:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.95",
"matchCriteriaId": "CE968D3B-4F89-4524-944A-16D9E4628FE9"
"matchCriteriaId": "5CF0B4ED-4E62-4E72-B17F-EFDD3919645B"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41610",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:16.370",
"lastModified": "2023-05-10T14:38:25.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T15:40:00.390",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,49 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00808.html",
"source": "secure@intel.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:endpoint_management_assistant_configuration_tool:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.0.4",
"matchCriteriaId": "E3EAFCB8-177D-469F-96B9-6D1D3FEDF665"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:manageability_commander:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4",
"matchCriteriaId": "16795C4A-AC04-493A-96CC-F23AC511D0EC"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00808.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41628",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:17.127",
"lastModified": "2023-05-10T14:38:37.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T15:59:19.260",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,120 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00802.html",
"source": "secure@intel.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:nuc_p14e_laptop_element:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.44",
"matchCriteriaId": "E01DB3E8-AD45-46C8-B06D-0B99E1504312"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*",
"matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7A8E9D99-BD78-4340-88F2-5AFF27AC37C9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1DD582C-1660-4E6E-81A1-537BD1307A99"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC160B20-3EA0-49A0-A857-4E7A1C2D74E2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*",
"matchCriteriaId": "00345596-E9E0-4096-8DC6-0212F4747A13"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A363CE8F-F399-4B6E-9E7D-349792F95DDB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1B570A8-ED1A-46B6-B8AB-064445F8FC4C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4DBE5B2-AE10-4251-BCDA-DC5EDEE6EE67"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6AFD13A6-A390-4400-9029-2F4058CA17E2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1FED4C9-B680-4F44-ADC0-AC43D6B5F184"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F513002-D8C1-4D3A-9F79-4B52498F67E9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00802.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41687",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:18.417",
"lastModified": "2023-05-10T14:38:31.210",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T15:35:37.740",
"vulnStatus": "Undergoing Analysis",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,55 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00802.html",
"source": "secure@intel.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:nuc_p14e_laptop_element:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.1.44",
"matchCriteriaId": "E01DB3E8-AD45-46C8-B06D-0B99E1504312"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00802.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41690",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:18.737",
"lastModified": "2023-05-10T14:38:19.080",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T15:34:58.283",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,43 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00847.html",
"source": "secure@intel.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:retail_edge_program:*:*:*:*:*:iphone_os:*:*",
"versionEndExcluding": "3.4.7",
"matchCriteriaId": "AFED798C-0421-4A5B-92EA-5D0365D50F5B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00847.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41693",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:19.067",
"lastModified": "2023-05-10T14:38:42.927",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T15:29:10.507",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,43 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00799.html",
"source": "secure@intel.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-428"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:quartus_prime:*:*:*:*:pro:*:*:*",
"versionEndExcluding": "22.3",
"matchCriteriaId": "9BCA1386-81BD-4F1F-AD41-C42FB77B2C39"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00799.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41769",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:19.750",
"lastModified": "2023-05-10T14:38:19.080",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T15:02:51.017",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,43 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00779.html",
"source": "secure@intel.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:connect_m:*:*:*:*:*:android:*:*",
"versionEndExcluding": "1.82",
"matchCriteriaId": "750A0344-943A-4230-8843-A3AEF2C9417F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00779.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41801",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:21.153",
"lastModified": "2023-05-10T14:38:37.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T14:33:44.353",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,43 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00779.html",
"source": "secure@intel.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:connect_m:*:*:*:*:*:android:*:*",
"versionEndExcluding": "1.82",
"matchCriteriaId": "750A0344-943A-4230-8843-A3AEF2C9417F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00779.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43474",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:23.727",
"lastModified": "2023-05-10T14:38:37.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T14:29:33.257",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,55 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00816.html",
"source": "secure@intel.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-428"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:dsp_builder:*:*:*:*:*:*:*:*",
"versionEndExcluding": "22.4",
"matchCriteriaId": "1E463877-7825-41A1-979F-11F4B633B59D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:a:intel:quartus_prime:-:*:*:*:pro:*:*:*",
"matchCriteriaId": "4BC8EF35-DE1F-4F04-98BD-AAD8C3360CC0"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00816.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43507",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:24.400",
"lastModified": "2023-05-10T14:38:25.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T14:20:04.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,43 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00798.html",
"source": "secure@intel.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:quickassist_technology_engine:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.6.16",
"matchCriteriaId": "E4479CF3-0C39-439C-A3C1-9F11A656F9C4"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00798.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46279",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:25.710",
"lastModified": "2023-05-10T14:38:19.080",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T14:21:58.433",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,43 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00847.html",
"source": "secure@intel.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:retail_edge_program:*:*:*:*:*:android:*:*",
"versionEndExcluding": "3.0.301126",
"matchCriteriaId": "11BE1F3D-9368-4E7D-8D70-1DFC8ABBAE17"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00847.html",
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-46813",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-23T15:15:09.107",
"lastModified": "2023-05-23T15:15:09.107",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Younes JFR. Advanced Database Cleaner plugin <=\u00a03.1.1 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/advanced-database-cleaner/wordpress-advanced-database-cleaner-plugin-3-1-1-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-46851",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-23T14:15:09.277",
"lastModified": "2023-05-23T14:18:11.573",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Brainstorm Force Starter Templates plugin <=\u00a03.1.20 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/astra-sites/wordpress-starter-templates-elementor-wordpress-beaver-builder-templates-plugin-3-1-20-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-46853",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-23T14:15:09.410",
"lastModified": "2023-05-23T14:18:11.573",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in RadiusTheme The Post Grid plugin <=\u00a05.0.4 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/the-post-grid/wordpress-the-post-grid-shortcode-gutenberg-blocks-and-elementor-addon-for-post-grid-plugin-5-0-4-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,15 +2,38 @@
"id": "CVE-2022-4774",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-15T13:15:09.623",
"lastModified": "2023-05-15T13:26:09.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T15:42:56.457",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Bit Form WordPress plugin before 1.9 does not validate the file types uploaded via it's file upload form field, allowing unauthenticated users to upload arbitrary files types such as PHP or HTML files to the server, leading to Remote Code Execution."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "contact@wpscan.com",
@ -23,10 +46,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://wpscan.com/vulnerability/2ae5c375-a6a0-4c0b-a9ef-e4d2a28bce5e",
"source": "contact@wpscan.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bitapps:bit_form:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.9",
"matchCriteriaId": "7D8A6178-1DC9-4F65-AA01-D8255569E912"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/2ae5c375-a6a0-4c0b-a9ef-e4d2a28bce5e",
"source": "contact@wpscan.com",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,15 +2,38 @@
"id": "CVE-2023-0233",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-15T13:15:09.700",
"lastModified": "2023-05-15T13:26:09.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T15:43:28.077",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The ActiveCampaign WordPress plugin before 8.1.12 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "contact@wpscan.com",
@ -23,10 +46,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://wpscan.com/vulnerability/e95c85fd-fa47-45bd-b8e0-a7f33edd7130",
"source": "contact@wpscan.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:activecampaign:activecampaign:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "8.1.12",
"matchCriteriaId": "F05B6E37-A00E-4D41-83D8-32F9ACA980DC"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/e95c85fd-fa47-45bd-b8e0-a7f33edd7130",
"source": "contact@wpscan.com",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,15 +2,38 @@
"id": "CVE-2023-0490",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-15T13:15:09.753",
"lastModified": "2023-05-15T13:26:09.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T15:43:58.993",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The f(x) TOC WordPress plugin through 1.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "contact@wpscan.com",
@ -23,10 +46,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://wpscan.com/vulnerability/9b497d21-f075-41a9-afec-3e24034c8c63",
"source": "contact@wpscan.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:f\\(x\\)_toc_project:f\\(x\\)_toc:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1.0",
"matchCriteriaId": "DAA247A9-7EF5-438E-A357-71145263F305"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/9b497d21-f075-41a9-afec-3e24034c8c63",
"source": "contact@wpscan.com",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,15 +2,38 @@
"id": "CVE-2023-0520",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-15T13:15:09.810",
"lastModified": "2023-05-15T13:26:09.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T15:45:27.587",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The RapidExpCart WordPress plugin through 1.0 does not sanitize and escape the url parameter in the rapidexpcart endpoint before storing it and outputting it back in the page, leading to a Stored Cross-Site Scripting vulnerability which could be used against high-privilege users such as admin, furthermore lack of csrf protection means an attacker can trick a logged in admin to perform the attack by submitting a hidden form."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "contact@wpscan.com",
@ -27,10 +50,31 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://wpscan.com/vulnerability/be4f7ff9-af79-477b-9f47-e40e25a3558e",
"source": "contact@wpscan.com"
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rapidexp:rapidexpcart:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "4EEE60E3-1875-436C-8EB1-176C5385E6ED"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/be4f7ff9-af79-477b-9f47-e40e25a3558e",
"source": "contact@wpscan.com",
"tags": [
"Exploit"
]
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-23705",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-23T14:15:09.507",
"lastModified": "2023-05-23T14:18:11.573",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in HM Plugin WordPress Books Gallery plugin <=\u00a04.4.8 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-books-gallery/wordpress-wordpress-books-gallery-plugin-4-4-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-23713",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-23T14:15:09.577",
"lastModified": "2023-05-23T14:18:11.573",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Manoj Thulasidas Theme Tweaker plugin <=\u00a05.20 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/theme-tweaker-lite/wordpress-theme-tweaker-plugin-5-20-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23878",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-04-04T12:15:07.280",
"lastModified": "2023-04-11T16:34:41.010",
"lastModified": "2023-05-23T15:11:16.463",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -75,9 +75,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flippercode:google_map:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:flippercode:wp_google_map:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.4.0",
"matchCriteriaId": "CC04B2B6-5DF3-46B6-94D6-7BBDAC805FCA"
"matchCriteriaId": "0D747DA7-0673-417C-9295-195295A35D60"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-25056",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-23T14:15:09.657",
"lastModified": "2023-05-23T14:18:11.573",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in SlickRemix Feed Them Social plugin <=\u00a03.0.2 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/feed-them-social/wordpress-feed-them-social-for-twitter-feed-youtube-and-more-plugin-3-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-26011",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-23T15:15:09.190",
"lastModified": "2023-05-23T15:15:09.190",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Tim Eckel Read More Excerpt Link plugin <=\u00a01.6 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/read-more-excerpt-link/wordpress-read-more-excerpt-link-plugin-1-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-26014",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-23T15:15:09.263",
"lastModified": "2023-05-23T15:15:09.263",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Tim Eckel Minify HTML plugin <=\u00a02.1.7 vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/minify-html-markup/wordpress-minify-html-plugin-2-02-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,9 @@
"id": "CVE-2023-28473",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-28T14:15:10.447",
"lastModified": "2023-05-05T15:13:54.867",
"lastModified": "2023-05-23T15:38:06.487",
"vulnStatus": "Analyzed",
"evaluatorComment": "u",
"descriptions": [
{
"lang": "en",
@ -17,20 +18,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"exploitabilityScore": 0.7,
"impactScore": 2.5
}
]
},

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-30440",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-05-23T14:15:09.733",
"lastModified": "2023-05-23T14:18:11.573",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "IBM PowerVM Hypervisor FW860.00 through FW860.B3, FW950.00 through FW950.70, FW1010.00 through FW1010.50, FW1020.00 through FW1020.30, and FW1030.00 through FW1030.10 could allow a local attacker with control a partition that has been assigned SRIOV virtual function (VF) to cause a denial of service to a peer partition or arbitrary data corruption. IBM X-Force ID: 253175."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.4,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/253175",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/6997133",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,19 +2,74 @@
"id": "CVE-2023-31842",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-15T13:15:11.003",
"lastModified": "2023-05-15T13:26:09.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T14:51:14.240",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Sourcecodester Faculty Evaluation System v1.0 is vulnerable to SQL Injection via /eval/index.php?page=edit_faculty&id=."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://github.com/acmglz/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-2.md",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:faculty_evaluation_system_project:faculty_evaluation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2433CE4C-87DF-4B90-A449-C844403740C8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/acmglz/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-2.md",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,19 +2,74 @@
"id": "CVE-2023-31843",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-15T13:15:11.043",
"lastModified": "2023-05-15T13:26:09.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T14:51:02.440",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Sourcecodester Faculty Evaluation System v1.0 is vulnerable to SQL Injection via /eval/admin/view_faculty.php?id=."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://github.com/acmglz/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-1.md",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:faculty_evaluation_system_project:faculty_evaluation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2433CE4C-87DF-4B90-A449-C844403740C8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/acmglz/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-1.md",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,19 +2,74 @@
"id": "CVE-2023-31844",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-15T13:15:11.087",
"lastModified": "2023-05-15T13:26:09.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T14:50:41.410",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Sourcecodester Faculty Evaluation System v1.0 is vulnerable to SQL Injection via /eval/admin/manage_subject.php?id=."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://github.com/acmglz/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-3.md",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:faculty_evaluation_system_project:faculty_evaluation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2433CE4C-87DF-4B90-A449-C844403740C8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/acmglz/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-3.md",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,19 +2,74 @@
"id": "CVE-2023-31845",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-15T13:15:11.127",
"lastModified": "2023-05-15T13:26:09.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-23T14:50:03.040",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Sourcecodester Faculty Evaluation System v1.0 is vulnerable to SQL Injection via /eval/admin/manage_class.php?id=."
}
],
"metrics": {},
"references": [
"metrics": {
"cvssMetricV31": [
{
"url": "https://github.com/acmglz/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-4.md",
"source": "cve@mitre.org"
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:faculty_evaluation_system_project:faculty_evaluation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2433CE4C-87DF-4B90-A449-C844403740C8"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/acmglz/bug_report/blob/main/vendors/oretnom23/faculty-evaluation-system/SQLi-4.md",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33359",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T14:15:09.813",
"lastModified": "2023-05-23T14:18:11.573",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Piwigo 13.6.0 is vulnerable to Cross Site Request Forgery (CSRF) in the \"add tags\" function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Piwigo/Piwigo/issues/1908",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33361",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T14:15:09.863",
"lastModified": "2023-05-23T14:18:11.573",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Piwigo 13.6.0 is vulnerable to SQL Injection via /admin/permalinks.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Piwigo/Piwigo/issues/1910",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33362",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T14:15:09.917",
"lastModified": "2023-05-23T14:18:11.573",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Piwigo 13.6.0 is vulnerable to SQL Injection via in the \"profile\" function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Piwigo/Piwigo/issues/1911",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33599",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T15:15:09.343",
"lastModified": "2023-05-23T15:15:09.343",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "EasyImages2.0 ? 2.8.1 is vulnerable to Cross Site Scripting (XSS) via viewlog.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/icret/EasyImages2.0/issues/115",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33617",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T15:15:09.403",
"lastModified": "2023-05-23T15:15:09.403",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An OS Command Injection vulnerability in Parks Fiberlink 210 firmware version V2.1.14_X000 was found via the /boaform/admin/formPing target_addr parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/gbrls/58a5032bc58510abb908386124d1b4d2",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-23T14:00:32.463747+00:00
2023-05-23T16:00:29.409474+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-23T13:55:46.380000+00:00
2023-05-23T15:59:19.260000+00:00
```
### Last Data Feed Release
@ -29,52 +29,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
215843
215857
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `14`
* [CVE-2023-31669](CVE-2023/CVE-2023-316xx/CVE-2023-31669.json) (`2023-05-23T12:15:09.173`)
* [CVE-2023-2483](CVE-2023/CVE-2023-24xx/CVE-2023-2483.json) (`2023-05-23T13:15:09.783`)
* [CVE-2023-23706](CVE-2023/CVE-2023-237xx/CVE-2023-23706.json) (`2023-05-23T13:15:09.410`)
* [CVE-2023-23724](CVE-2023/CVE-2023-237xx/CVE-2023-23724.json) (`2023-05-23T13:15:09.487`)
* [CVE-2023-25472](CVE-2023/CVE-2023-254xx/CVE-2023-25472.json) (`2023-05-23T13:15:09.563`)
* [CVE-2023-25481](CVE-2023/CVE-2023-254xx/CVE-2023-25481.json) (`2023-05-23T13:15:09.637`)
* [CVE-2023-25707](CVE-2023/CVE-2023-257xx/CVE-2023-25707.json) (`2023-05-23T13:15:09.707`)
* [CVE-2023-33338](CVE-2023/CVE-2023-333xx/CVE-2023-33338.json) (`2023-05-23T13:15:09.887`)
* [CVE-2022-46851](CVE-2022/CVE-2022-468xx/CVE-2022-46851.json) (`2023-05-23T14:15:09.277`)
* [CVE-2022-46853](CVE-2022/CVE-2022-468xx/CVE-2022-46853.json) (`2023-05-23T14:15:09.410`)
* [CVE-2022-46813](CVE-2022/CVE-2022-468xx/CVE-2022-46813.json) (`2023-05-23T15:15:09.107`)
* [CVE-2023-23705](CVE-2023/CVE-2023-237xx/CVE-2023-23705.json) (`2023-05-23T14:15:09.507`)
* [CVE-2023-23713](CVE-2023/CVE-2023-237xx/CVE-2023-23713.json) (`2023-05-23T14:15:09.577`)
* [CVE-2023-25056](CVE-2023/CVE-2023-250xx/CVE-2023-25056.json) (`2023-05-23T14:15:09.657`)
* [CVE-2023-30440](CVE-2023/CVE-2023-304xx/CVE-2023-30440.json) (`2023-05-23T14:15:09.733`)
* [CVE-2023-33359](CVE-2023/CVE-2023-333xx/CVE-2023-33359.json) (`2023-05-23T14:15:09.813`)
* [CVE-2023-33361](CVE-2023/CVE-2023-333xx/CVE-2023-33361.json) (`2023-05-23T14:15:09.863`)
* [CVE-2023-33362](CVE-2023/CVE-2023-333xx/CVE-2023-33362.json) (`2023-05-23T14:15:09.917`)
* [CVE-2023-26011](CVE-2023/CVE-2023-260xx/CVE-2023-26011.json) (`2023-05-23T15:15:09.190`)
* [CVE-2023-26014](CVE-2023/CVE-2023-260xx/CVE-2023-26014.json) (`2023-05-23T15:15:09.263`)
* [CVE-2023-33599](CVE-2023/CVE-2023-335xx/CVE-2023-33599.json) (`2023-05-23T15:15:09.343`)
* [CVE-2023-33617](CVE-2023/CVE-2023-336xx/CVE-2023-33617.json) (`2023-05-23T15:15:09.403`)
### CVEs modified in the last Commit
Recently modified CVEs: `102`
Recently modified CVEs: `29`
* [CVE-2023-2504](CVE-2023/CVE-2023-25xx/CVE-2023-2504.json) (`2023-05-23T13:04:39.657`)
* [CVE-2023-2505](CVE-2023/CVE-2023-25xx/CVE-2023-2505.json) (`2023-05-23T13:04:39.657`)
* [CVE-2023-25440](CVE-2023/CVE-2023-254xx/CVE-2023-25440.json) (`2023-05-23T13:04:39.657`)
* [CVE-2023-27068](CVE-2023/CVE-2023-270xx/CVE-2023-27068.json) (`2023-05-23T13:04:39.657`)
* [CVE-2023-29919](CVE-2023/CVE-2023-299xx/CVE-2023-29919.json) (`2023-05-23T13:04:39.657`)
* [CVE-2023-31664](CVE-2023/CVE-2023-316xx/CVE-2023-31664.json) (`2023-05-23T13:04:39.657`)
* [CVE-2023-31670](CVE-2023/CVE-2023-316xx/CVE-2023-31670.json) (`2023-05-23T13:04:39.657`)
* [CVE-2023-31708](CVE-2023/CVE-2023-317xx/CVE-2023-31708.json) (`2023-05-23T13:04:39.657`)
* [CVE-2023-31740](CVE-2023/CVE-2023-317xx/CVE-2023-31740.json) (`2023-05-23T13:04:39.657`)
* [CVE-2023-27066](CVE-2023/CVE-2023-270xx/CVE-2023-27066.json) (`2023-05-23T13:04:43.693`)
* [CVE-2023-31742](CVE-2023/CVE-2023-317xx/CVE-2023-31742.json) (`2023-05-23T13:04:43.693`)
* [CVE-2023-2837](CVE-2023/CVE-2023-28xx/CVE-2023-2837.json) (`2023-05-23T13:04:43.693`)
* [CVE-2023-2838](CVE-2023/CVE-2023-28xx/CVE-2023-2838.json) (`2023-05-23T13:04:43.693`)
* [CVE-2023-2839](CVE-2023/CVE-2023-28xx/CVE-2023-2839.json) (`2023-05-23T13:04:43.693`)
* [CVE-2023-2840](CVE-2023/CVE-2023-28xx/CVE-2023-2840.json) (`2023-05-23T13:04:43.693`)
* [CVE-2023-27067](CVE-2023/CVE-2023-270xx/CVE-2023-27067.json) (`2023-05-23T13:04:43.693`)
* [CVE-2023-28467](CVE-2023/CVE-2023-284xx/CVE-2023-28467.json) (`2023-05-23T13:04:43.693`)
* [CVE-2023-31584](CVE-2023/CVE-2023-315xx/CVE-2023-31584.json) (`2023-05-23T13:04:43.693`)
* [CVE-2023-28386](CVE-2023/CVE-2023-283xx/CVE-2023-28386.json) (`2023-05-23T13:04:43.693`)
* [CVE-2023-28412](CVE-2023/CVE-2023-284xx/CVE-2023-28412.json) (`2023-05-23T13:04:43.693`)
* [CVE-2023-28649](CVE-2023/CVE-2023-286xx/CVE-2023-28649.json) (`2023-05-23T13:04:43.693`)
* [CVE-2023-29838](CVE-2023/CVE-2023-298xx/CVE-2023-29838.json) (`2023-05-23T13:04:43.693`)
* [CVE-2023-31193](CVE-2023/CVE-2023-311xx/CVE-2023-31193.json) (`2023-05-23T13:04:43.693`)
* [CVE-2023-31240](CVE-2023/CVE-2023-312xx/CVE-2023-31240.json) (`2023-05-23T13:04:43.693`)
* [CVE-2023-33203](CVE-2023/CVE-2023-332xx/CVE-2023-33203.json) (`2023-05-23T13:15:09.837`)
* [CVE-2016-10878](CVE-2016/CVE-2016-108xx/CVE-2016-10878.json) (`2023-05-23T15:11:16.463`)
* [CVE-2020-9334](CVE-2020/CVE-2020-93xx/CVE-2020-9334.json) (`2023-05-23T14:22:22.827`)
* [CVE-2020-11514](CVE-2020/CVE-2020-115xx/CVE-2020-11514.json) (`2023-05-23T14:57:32.420`)
* [CVE-2020-11515](CVE-2020/CVE-2020-115xx/CVE-2020-11515.json) (`2023-05-23T14:57:32.420`)
* [CVE-2022-43507](CVE-2022/CVE-2022-435xx/CVE-2022-43507.json) (`2023-05-23T14:20:04.157`)
* [CVE-2022-46279](CVE-2022/CVE-2022-462xx/CVE-2022-46279.json) (`2023-05-23T14:21:58.433`)
* [CVE-2022-43474](CVE-2022/CVE-2022-434xx/CVE-2022-43474.json) (`2023-05-23T14:29:33.257`)
* [CVE-2022-41801](CVE-2022/CVE-2022-418xx/CVE-2022-41801.json) (`2023-05-23T14:33:44.353`)
* [CVE-2022-36376](CVE-2022/CVE-2022-363xx/CVE-2022-36376.json) (`2023-05-23T14:57:32.420`)
* [CVE-2022-41769](CVE-2022/CVE-2022-417xx/CVE-2022-41769.json) (`2023-05-23T15:02:51.017`)
* [CVE-2022-41693](CVE-2022/CVE-2022-416xx/CVE-2022-41693.json) (`2023-05-23T15:29:10.507`)
* [CVE-2022-41690](CVE-2022/CVE-2022-416xx/CVE-2022-41690.json) (`2023-05-23T15:34:58.283`)
* [CVE-2022-41687](CVE-2022/CVE-2022-416xx/CVE-2022-41687.json) (`2023-05-23T15:35:37.740`)
* [CVE-2022-41610](CVE-2022/CVE-2022-416xx/CVE-2022-41610.json) (`2023-05-23T15:40:00.390`)
* [CVE-2022-4774](CVE-2022/CVE-2022-47xx/CVE-2022-4774.json) (`2023-05-23T15:42:56.457`)
* [CVE-2022-41628](CVE-2022/CVE-2022-416xx/CVE-2022-41628.json) (`2023-05-23T15:59:19.260`)
* [CVE-2023-31845](CVE-2023/CVE-2023-318xx/CVE-2023-31845.json) (`2023-05-23T14:50:03.040`)
* [CVE-2023-31844](CVE-2023/CVE-2023-318xx/CVE-2023-31844.json) (`2023-05-23T14:50:41.410`)
* [CVE-2023-31843](CVE-2023/CVE-2023-318xx/CVE-2023-31843.json) (`2023-05-23T14:51:02.440`)
* [CVE-2023-31842](CVE-2023/CVE-2023-318xx/CVE-2023-31842.json) (`2023-05-23T14:51:14.240`)
* [CVE-2023-23878](CVE-2023/CVE-2023-238xx/CVE-2023-23878.json) (`2023-05-23T15:11:16.463`)
* [CVE-2023-28473](CVE-2023/CVE-2023-284xx/CVE-2023-28473.json) (`2023-05-23T15:38:06.487`)
* [CVE-2023-0233](CVE-2023/CVE-2023-02xx/CVE-2023-0233.json) (`2023-05-23T15:43:28.077`)
* [CVE-2023-0490](CVE-2023/CVE-2023-04xx/CVE-2023-0490.json) (`2023-05-23T15:43:58.993`)
* [CVE-2023-0520](CVE-2023/CVE-2023-05xx/CVE-2023-0520.json) (`2023-05-23T15:45:27.587`)
## Download and Usage