Auto-Update: 2023-11-27T17:04:06.882426+00:00

This commit is contained in:
cad-safe-bot 2023-11-27 17:04:10 +00:00
parent d9435894a3
commit f9e66e28de
76 changed files with 2025 additions and 156 deletions

View File

@ -2,15 +2,31 @@
"id": "CVE-2023-25632",
"sourceIdentifier": "cve@navercorp.com",
"published": "2023-11-27T07:15:43.397",
"lastModified": "2023-11-27T07:15:43.397",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The Android Mobile Whale browser app before 3.0.1.2 allows the attacker to bypass its browser unlock function via 'Open in Whale' feature."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n de navegador Android Mobile Whale anterior a 3.0.1.2 permite al atacante eludir la funci\u00f3n de desbloqueo del navegador mediante la funci\u00f3n \"Abrir en Whale\"."
}
],
"metrics": {},
"weaknesses": [
{
"source": "cve@navercorp.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://cve.naver.com/detail/cve-2023-25632.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29499",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-14T20:15:09.420",
"lastModified": "2023-11-07T04:11:20.117",
"lastModified": "2023-11-27T14:15:07.590",
"vulnStatus": "Modified",
"descriptions": [
{
@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -70,7 +70,7 @@
]
},
{
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
@ -126,6 +126,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html",
"source": "secalert@redhat.com"
},
{
"url": "https://security.gentoo.org/glsa/202311-18",
"source": "secalert@redhat.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231103-0001/",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-31275",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-11-27T16:15:07.417",
"lastModified": "2023-11-27T16:35:06.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An uninitialized pointer use vulnerability exists in the functionality of WPS Office 11.2.0.11537 that handles Data elements in an Excel file. A specially crafted malformed file can lead to remote code execution. An attacker can provide a malicious file to trigger this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-457"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1748",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1748",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32611",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-14T20:15:09.550",
"lastModified": "2023-11-07T04:14:37.627",
"lastModified": "2023-11-27T14:15:07.713",
"vulnStatus": "Modified",
"descriptions": [
{
@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -70,7 +70,7 @@
]
},
{
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
@ -125,6 +125,10 @@
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html",
"source": "secalert@redhat.com"
},
{
"url": "https://security.gentoo.org/glsa/202311-18",
"source": "secalert@redhat.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20231027-0005/",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-32616",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-11-27T16:15:08.637",
"lastModified": "2023-11-27T16:35:06.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles 3D annotations. A specially crafted Javascript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1837",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1837",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-32665",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-14T20:15:09.883",
"lastModified": "2023-11-07T04:14:38.823",
"lastModified": "2023-11-27T14:15:07.820",
"vulnStatus": "Modified",
"descriptions": [
{
@ -37,7 +37,7 @@
"impactScore": 3.6
},
{
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -70,7 +70,7 @@
]
},
{
"source": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
@ -124,6 +124,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00030.html",
"source": "secalert@redhat.com"
},
{
"url": "https://security.gentoo.org/glsa/202311-18",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34059",
"sourceIdentifier": "security@vmware.com",
"published": "2023-10-27T05:15:39.013",
"lastModified": "2023-11-26T21:15:54.993",
"lastModified": "2023-11-27T12:15:07.590",
"vulnStatus": "Modified",
"descriptions": [
{
@ -136,6 +136,10 @@
"url": "http://www.openwall.com/lists/oss-security/2023/11/26/1",
"source": "security@vmware.com"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/11/27/1",
"source": "security@vmware.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00002.html",
"source": "security@vmware.com",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-35075",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2023-11-27T10:15:07.257",
"lastModified": "2023-11-27T10:15:07.257",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Mattermost fails to use\u00a0 innerText /\u00a0textContent\u00a0when setting the channel name in the webapp during autocomplete, allowing an attacker to inject HTML to a victim's page by create a channel name that is valid HTML. No XSS is possible though.\u00a0\n\n"
},
{
"lang": "es",
"value": "Mattermost no utiliza el texto interno/textContent al configurar el nombre del canal en la aplicaci\u00f3n web durante el autocompletado, lo que permite a un atacante inyectar HTML en la p\u00e1gina de una v\u00edctima creando un nombre de canal que sea HTML v\u00e1lido. Sin embargo, no es posible XSS."
}
],
"metrics": {

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-35985",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-11-27T16:15:09.460",
"lastModified": "2023-11-27T16:35:06.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to a failure to properly validate a dangerous extension. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially-crafted malicious site if the browser plugin extension is enabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-73"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1834",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1834",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-38573",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-11-27T16:15:10.343",
"lastModified": "2023-11-27T16:35:06.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free vulnerability exists in the way Foxit Reader 12.1.2.15356 handles a signature field. A specially crafted Javascript code inside a malicious PDF document can trigger reuse of a previously freed object, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1839",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1839",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-39542",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-11-27T16:15:10.653",
"lastModified": "2023-11-27T16:35:06.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A code execution vulnerability exists in the Javascript saveAs API of Foxit Reader 12.1.3.15356. A specially crafted malformed file can create arbitrary files, which can lead to remote code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-73"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1832",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1832",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-40194",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-11-27T16:15:10.963",
"lastModified": "2023-11-27T16:35:06.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file creation vulnerability exists in the Javascript exportDataObject API of Foxit Reader 12.1.3.15356 due to mistreatment of whitespace characters. A specially crafted malicious file can create files at arbitrary locations, which can lead to arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-73"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1833",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1833",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-40610",
"sourceIdentifier": "security@apache.org",
"published": "2023-11-27T11:15:07.293",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper authorization check and possible privilege escalation on Apache Superset\u00a0up to but excluding 2.1.2. Using the default examples database connection that allows access to both the examples schema and Apache Superset's metadata database, an attacker using a specially crafted CTE SQL statement could change data on the metadata database. This weakness could result on tampering with the authentication/authorization data.\n\n"
},
{
"lang": "es",
"value": "Verificaci\u00f3n de autorizaci\u00f3n incorrecta y posible escalada de privilegios en Apache Superset hasta 2.1.2, pero excluy\u00e9ndolo. Utilizando la conexi\u00f3n de base de datos de ejemplos predeterminada que permite el acceso tanto al esquema de ejemplos como a la base de datos de metadatos de Apache Superset, un atacante que utilice una declaraci\u00f3n SQL CTE especialmente manipulada podr\u00eda cambiar los datos de la base de datos de metadatos. Esta debilidad podr\u00eda resultar en la manipulaci\u00f3n de los datos de autenticaci\u00f3n/autorizaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@apache.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/11/27/2",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/jvgxpk4dbxyqtsgtl4pdgbd520rc0rot",
"source": "security@apache.org"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-40703",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2023-11-27T10:15:07.460",
"lastModified": "2023-11-27T10:15:07.460",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Mattermost fails to properly limit the characters allowed in different fields of a block in Mattermost Boards allowing\u00a0a attacker to\u00a0consume excessive resources, possibly leading to Denial of Service, by\u00a0patching the field of a block using a specially crafted string.\u00a0\n\n"
},
{
"lang": "es",
"value": "Mattermost no logra limitar adecuadamente los caracteres permitidos en diferentes campos de un bloque en Mattermost Boards, lo que permite a un atacante consumir recursos excesivos, lo que posiblemente lleve a una Denegaci\u00f3n de Servicio, al parchear el campo de un bloque usando una cadena especialmente manipulada."
}
],
"metrics": {

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-41257",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-11-27T16:15:11.250",
"lastModified": "2023-11-27T16:35:06.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A type confusion vulnerability exists in the way Foxit Reader 12.1.2.15356 handles field value properties. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1838",
"source": "talos-cna@cisco.com"
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1838",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-42501",
"sourceIdentifier": "security@apache.org",
"published": "2023-11-27T11:15:07.743",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unnecessary read permissions within the Gamma role would allow authenticated users to read configured CSS templates and annotations.\nThis issue affects Apache Superset: before 2.1.2.\nUsers should upgrade to version or above 2.1.2 and run `superset init` to reconstruct the Gamma role or remove `can_read` permission from the mentioned resources.\n\n"
},
{
"lang": "es",
"value": "Los permisos de lectura innecesarios dentro de la funci\u00f3n Gamma permitir\u00edan a los usuarios autenticados leer plantillas y anotaciones CSS configuradas. Este problema afecta a Apache Superset: antes de 2.1.2. Los usuarios deben actualizar a la versi\u00f3n 2.1.2 o superior y ejecutar `superset init` para reconstruir la funci\u00f3n Gamma o eliminar el permiso `can_read` de los recursos mencionados."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@apache.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2023/11/27/3",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/vk1rmrh9kz0chjmc9tk7o3md6zpz4ygh",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-43701",
"sourceIdentifier": "security@apache.org",
"published": "2023-11-27T11:15:07.950",
"lastModified": "2023-11-27T15:15:07.273",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Improper payload validation and an improper REST API response type, made it possible for an authenticated malicious actor to store malicious code into Chart's metadata, this code could get executed if a user specifically accesses a specific deprecated API endpoint.\u00a0This issue affects Apache Superset versions prior to 2.1.2.\u00a0\nUsers are recommended to upgrade to version 2.1.2, which fixes this issue."
},
{
"lang": "es",
"value": "Una validaci\u00f3n de payload inadecuado y un tipo de respuesta de API REST inadecuado hicieron posible que un actor malicioso autenticado almacenara c\u00f3digo malicioso en los metadatos de Chart; este c\u00f3digo podr\u00eda ejecutarse si un usuario accede espec\u00edficamente a un endpoint de API obsoleto espec\u00edfico. Este problema afecta a las versiones de Apache Superset anteriores a la 2.1.2. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.1.2, que soluciona este problema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@apache.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/4dnr1knk50fw60jxkjgqj228f0xcc892",
"source": "security@apache.org"
},
{
"url": "https://www.openwall.com/lists/oss-security/2023/11/27/4",
"source": "security@apache.org"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-43754",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2023-11-27T10:15:07.657",
"lastModified": "2023-11-27T10:15:07.657",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Mattermost fails to check whether the\u00a0 \u201cAllow users to view archived channels\u201d\u00a0 setting is enabled during permalink previews display, allowing members to view permalink previews of archived channels even if the\u00a0\u201cAllow users to view archived channels\u201d setting is disabled.\u00a0\n\n"
},
{
"lang": "es",
"value": "Mattermost no verifica si la configuraci\u00f3n \"Permitir a los usuarios ver canales archivados\" est\u00e1 habilitada durante la visualizaci\u00f3n de vistas previas de enlaces permanentes, lo que permite a los miembros ver vistas previas de enlaces permanentes de canales archivados incluso si la configuraci\u00f3n \"Permitir a los usuarios ver canales archivados\" est\u00e1 deshabilitada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-45223",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2023-11-27T10:15:07.840",
"lastModified": "2023-11-27T10:15:07.840",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Mattermost fails to properly validate the \"Show Full Name\" option in a few endpoints in Mattermost Boards, allowing a member to get the full name of another user even if the Show Full Name option was disabled.\u00a0\n\n"
},
{
"lang": "es",
"value": "Mattermost no valida correctamente la opci\u00f3n \"Mostrar nombre completo\" en algunos endpoint de los tableros de Mattermost, lo que permite a un miembro obtener el nombre completo de otro usuario incluso si la opci\u00f3n Show Full Name estaba deshabilitada."
}
],
"metrics": {

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-4590",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2023-11-27T13:15:07.130",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Buffer overflow vulnerability in Frhed hex editor, affecting version 1.6.0. This vulnerability could allow an attacker to execute arbitrary code via a long filename argument through the Structured Exception Handler (SEH) registers."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/buffer-overflow-vulnerability-frhed",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-47168",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2023-11-27T10:15:08.023",
"lastModified": "2023-11-27T10:15:08.023",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Mattermost fails to properly check a redirect URL parameter allowing for an\u00a0open redirect was possible when the user clicked \"Back to Mattermost\" after providing a invalid custom url scheme in /oauth/{service}/mobile_login?redirect_to=\n\n"
},
{
"lang": "es",
"value": "Mattermost no verifica correctamente un par\u00e1metro de URL de redireccionamiento que permit\u00eda una redirecci\u00f3n abierta cuando el usuario hizo clic en \"Volver a Mattermost\" despu\u00e9s de proporcionar un esquema de URL personalizado no v\u00e1lido en /oauth/{service}/mobile_login?redirect_to="
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-47865",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2023-11-27T09:15:32.587",
"lastModified": "2023-11-27T09:15:32.587",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Mattermost fails to check if hardened mode is enabled when overriding the username and/or the icon when posting a post. If settings allowed integrations to override the username and profile picture when posting, a member could also override the username and icon when making a post even if the Hardened Mode setting was enabled\n\n"
},
{
"lang": "es",
"value": "Mattermost no verifica si el modo reforzado est\u00e1 habilitado al anular el nombre de usuario y/o el \u00edcono al publicar una publicaci\u00f3n. Si la configuraci\u00f3n permit\u00eda que las integraciones anularan el nombre de usuario y la imagen de perfil al publicar, un miembro tambi\u00e9n podr\u00eda anular el nombre de usuario y el \u00edcono al realizar una publicaci\u00f3n, incluso si la configuraci\u00f3n del Hardened Mode estaba habilitada."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-48268",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2023-11-27T10:15:08.217",
"lastModified": "2023-11-27T10:15:08.217",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Mattermost fails to\u00a0limit the amount of data extracted from compressed archives during board import in Mattermost Boards\u00a0allowing an attacker to consume excessive resources, possibly leading to Denial of Service, by\u00a0importing a board using a specially crafted zip (zip bomb).\n\n"
},
{
"lang": "es",
"value": "Mattermost no limita la cantidad de datos extra\u00eddos de archivos comprimidos durante la importaci\u00f3n de tableros en Mattermost Boards, lo que permite a un atacante consumir recursos excesivos, lo que posiblemente lleve a una denegaci\u00f3n de servicio, al importar un tablero usando un zip (bomba zip) especialmente manipulado."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-48312",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-24T18:15:07.127",
"lastModified": "2023-11-24T18:15:07.127",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:21.813",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "capsule-proxy is a reverse proxy for the capsule operator project. Affected versions are subject to a privilege escalation vulnerability which is based on a missing check if the user is authenticated based on the `TokenReview` result. All the clusters running with the `anonymous-auth` Kubernetes API Server setting disable (set to `false`) are affected since it would be possible to bypass the token review mechanism, interacting with the upper Kubernetes API Server. This privilege escalation cannot be exploited if you're relying only on client certificates (SSL/TLS). This vulnerability has been addressed in version 0.4.6. Users are advised to upgrade."
},
{
"lang": "es",
"value": "Capsule-proxy es un proxy inverso para el proyecto del operador de c\u00e1psulas. Las versiones afectadas est\u00e1n sujetas a una vulnerabilidad de escalada de privilegios que se basa en una verificaci\u00f3n faltante si el usuario est\u00e1 autenticado seg\u00fan el resultado de \"TokenReview\". Todos los cl\u00fasteres que se ejecutan con la configuraci\u00f3n del servidor API de Kubernetes `anonymous-auth` deshabilitada (establecida en `false`) se ven afectados ya que ser\u00eda posible omitir el mecanismo de revisi\u00f3n de tokens, interactuando con el servidor API de Kubernetes superior. Esta escalada de privilegios no se puede aprovechar si conf\u00eda \u00fanicamente en certificados de cliente (SSL/TLS). Esta vulnerabilidad se ha solucionado en la versi\u00f3n 0.4.6. Se recomienda a los usuarios que actualicen."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-48369",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2023-11-27T10:15:08.400",
"lastModified": "2023-11-27T10:15:08.400",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Mattermost fails to limit the log size of server logs allowing an attacker sending specially crafted requests to different endpoints to potentially overflow the log. \n\n"
},
{
"lang": "es",
"value": "Mattermost no logra limitar el tama\u00f1o de los registros del servidor, lo que permite que un atacante env\u00ede solicitudes especialmente manipuladas a diferentes endpoint para potencialmente desbordar el registro."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-48707",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-24T18:15:07.327",
"lastModified": "2023-11-24T18:15:07.327",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:21.813",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "CodeIgniter Shield is an authentication and authorization provider for CodeIgniter 4. The `secretKey` value is an important key for HMAC SHA256 authentication and in affected versions was stored in the database in cleartext form. If a malicious person somehow had access to the data in the database, they could use the key and secretKey for HMAC SHA256 authentication to send requests impersonating that corresponding user. This issue has been addressed in version 1.0.0-beta.8. Users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "CodeIgniter Shield es un proveedor de autenticaci\u00f3n y autorizaci\u00f3n para CodeIgniter 4. El valor `secretKey` es una clave importante para la autenticaci\u00f3n HMAC SHA256 y en las versiones afectadas se almacenaba en la base de datos en forma de texto plano. Si una persona malintencionada de alguna manera tuviera acceso a los datos de la base de datos, podr\u00eda usar la clave y la clave secreta para la autenticaci\u00f3n HMAC SHA256 para enviar solicitudes haci\u00e9ndose pasar por ese usuario correspondiente. Este problema se solucion\u00f3 en la versi\u00f3n 1.0.0-beta.8. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-48708",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-24T18:15:07.520",
"lastModified": "2023-11-24T18:15:07.520",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:21.813",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "CodeIgniter Shield is an authentication and authorization provider for CodeIgniter 4. In affected versions successful login attempts are recorded with the raw tokens stored in the log table. If a malicious person somehow views the data in the log table they can obtain a raw token which can then be used to send a request with that user's authority. This issue has been addressed in version 1.0.0-beta.8. Users are advised to upgrade. Users unable to upgrade should disable logging for successful login attempts by the configuration files."
},
{
"lang": "es",
"value": "CodeIgniter Shield es un proveedor de autenticaci\u00f3n y autorizaci\u00f3n para CodeIgniter 4. En las versiones afectadas, los intentos de inicio de sesi\u00f3n exitosos se registran con los tokens sin procesar almacenados en la tabla de registro. Si una persona malintencionada de alguna manera ve los datos en la tabla de registro, puede obtener un token sin procesar que luego puede usarse para enviar una solicitud con la autoridad de ese usuario. Este problema se solucion\u00f3 en la versi\u00f3n 1.0.0-beta.8. Se recomienda a los usuarios que actualicen. Los usuarios que no puedan actualizar deben desactivar el registro para intentar iniciar sesi\u00f3n exitosamente mediante los archivos de configuraci\u00f3n."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-48711",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-24T17:15:07.563",
"lastModified": "2023-11-24T17:15:07.563",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:21.813",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "google-translate-api-browser is an npm package which interfaces with the google translate web api. A Server-Side Request Forgery (SSRF) Vulnerability is present in applications utilizing the `google-translate-api-browser` package and exposing the `translateOptions` to the end user. An attacker can set a malicious `tld`, causing the application to return unsafe URLs pointing towards local resources. The `translateOptions.tld` field is not properly sanitized before being placed in the Google translate URL. This can allow an attacker with control over the `translateOptions` to set the `tld` to a payload such as `@127.0.0.1`. This causes the full URL to become `https://translate.google.@127.0.0.1/...`, where `translate.google.` is the username used to connect to localhost. An attacker can send requests within internal networks and the local host. Should any HTTPS application be present on the internal network with a vulnerability exploitable via a GET call, then it would be possible to exploit this using this vulnerability. This issue has been addressed in release version 4.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "google-translate-api-browser es un paquete npm que interact\u00faa con la API web del traductor de Google. Una vulnerabilidad de Server-Side Request Forgery (SSRF) est\u00e1 presente en aplicaciones que utilizan el paquete `google-translate-api-browser` y exponen `translateOptions` al usuario final. Un atacante puede configurar un \"tld\" malicioso, lo que hace que la aplicaci\u00f3n devuelva URL no seguras que apunten a recursos locales. El campo `translateOptions.tld` no se sanitiza adecuadamente antes de colocarlo en la URL del traductor de Google. Esto puede permitir que un atacante con control sobre `translateOptions` establezca el `tld` en un payload como `@127.0.0.1`. Esto hace que la URL completa se convierta en `https://translate.google.@127.0.0.1/...`, donde `translate.google.` es el nombre de usuario utilizado para conectarse a localhost. Un atacante puede enviar solicitudes dentro de las redes internas y del host local. Si alguna aplicaci\u00f3n HTTPS estuviera presente en la red interna con una vulnerabilidad explotable mediante una llamada GET, entonces ser\u00eda posible explotarla utilizando esta vulnerabilidad. Este problema se solucion\u00f3 en la versi\u00f3n 4.1.3. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-48712",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-11-24T17:15:08.453",
"lastModified": "2023-11-24T17:15:08.453",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:21.813",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Warpgate is an open source SSH, HTTPS and MySQL bastion host for Linux. In affected versions there is a privilege escalation vulnerability through a non-admin user's account. Limited users can impersonate another user's account if only single-factor authentication is configured. If a user knows an admin username, opens the login screen and attempts to authenticate with an incorrect password they can subsequently enter a valid non-admin username and password they will be logged in as the admin user. All installations prior to version 0.9.0 are affected. All users are advised to upgrade. There are no known workarounds for this vulnerability."
},
{
"lang": "es",
"value": "Warpgate es un host basti\u00f3n SSH, HTTPS y MySQL de c\u00f3digo abierto para Linux. En las versiones afectadas existe una vulnerabilidad de escalada de privilegios a trav\u00e9s de una cuenta de usuario que no es administrador. Los usuarios limitados pueden hacerse pasar por la cuenta de otro usuario si solo se configura la autenticaci\u00f3n de un solo factor. Si un usuario conoce un nombre de usuario de administrador, abre la pantalla de inicio de sesi\u00f3n e intenta autenticarse con una contrase\u00f1a incorrecta, posteriormente podr\u00e1 ingresar un nombre de usuario y una contrase\u00f1a v\u00e1lidos que no sean de administrador y iniciar\u00e1 sesi\u00f3n como usuario administrador. Todas las instalaciones anteriores a la versi\u00f3n 0.9.0 se ven afectadas. Se recomienda a todos los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,19 +2,80 @@
"id": "CVE-2023-4808",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-11-20T19:15:09.497",
"lastModified": "2023-11-20T19:18:46.073",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-27T16:33:33.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The WP Post Popup WordPress plugin through 3.7.3 does not sanitise and escape some of its inputs, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)"
},
{
"lang": "es",
"value": "El complemento WP Post Popup de WordPress hasta la versi\u00f3n 3.7.3 no sanitiza ni escapa algunas de sus entradas, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenados incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en la configuraci\u00f3n multisitio)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:allurewebsolutions:wp_post_popup:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.7.3",
"matchCriteriaId": "6D7F0683-0168-423B-8786-6031FBA8C01B"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/bb8e9f06-477b-4da3-b5a6-4f06084ecd57",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-49029",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-27T16:15:11.510",
"lastModified": "2023-11-27T16:35:06.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in smpn1smg absis v.2017-10-19 and before allows a remote attacker to execute arbitrary code via the nama parameter in the lock/lock.php file."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/Chiaki2333/717b83b800180e1a4c3ee5f6e49f95c0",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Chiaki2333/vulnerability/blob/main/smpn1smg-absis-XSS-lock.php-nama.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/smpn1smg/absis",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-49043",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-27T16:15:11.557",
"lastModified": "2023-11-27T16:35:06.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability in Tenda AX1803 v.1.0.0.1 allows a remote attacker to execute arbitrary code via the wpapsk_crypto parameter in the function fromSetWirelessRepeat."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/fromSetWirelessRepeat.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-49046",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-27T16:15:11.600",
"lastModified": "2023-11-27T16:35:06.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Stack Overflow vulnerability in Tenda AX1803 v.1.0.0.1 allows a remote attacker to execute arbitrary code via the devName parameter in the function formAddMacfilterRule."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Anza2001/IOT_VULN/blob/main/Tenda/AX1803/formAddMacfilterRule.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-49068",
"sourceIdentifier": "security@apache.org",
"published": "2023-11-27T10:15:08.580",
"lastModified": "2023-11-27T10:15:08.580",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache DolphinScheduler.This issue affects Apache DolphinScheduler: before 3.2.1.\n\nUsers are recommended to upgrade to version 3.2.1, which fixes the issue. At the time of disclosure of this advisory, this version has not yet been released. In the mean time, we recommend you make sure the logs are only available to trusted operators.\n\n"
},
{
"lang": "es",
"value": "Exposici\u00f3n de informaci\u00f3n confidencial a una vulnerabilidad de actor no autorizado en Apache DolphinScheduler. Este problema afecta a Apache DolphinScheduler: versiones anteriores a 3.2.1. Se recomienda a los usuarios actualizar a la versi\u00f3n 3.2.1, que soluciona el problema. En el momento de la divulgaci\u00f3n de este aviso, esta versi\u00f3n a\u00fan no se ha publicado. Mientras tanto, le recomendamos que se asegure de que los registros solo est\u00e9n disponibles para operadores confiables."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-49298",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-24T19:15:07.587",
"lastModified": "2023-11-24T19:15:07.587",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:21.813",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "OpenZFS through 2.1.13 and 2.2.x through 2.2.1, in certain scenarios involving applications that try to rely on efficient copying of file data, can replace file contents with zero-valued bytes and thus potentially disable security mechanisms. NOTE: this issue is not always security related, but can be security related in realistic situations. A possible example is cp, from a recent GNU Core Utilities (coreutils) version, when attempting to preserve a rule set for denying unauthorized access. (One might use cp when configuring access control, such as with the /etc/hosts.deny file specified in the IBM Support reference.) NOTE: this issue occurs less often in version 2.2.1, and in versions before 2.1.4, because of the default configuration in those versions."
},
{
"lang": "es",
"value": "OpenZFS hasta 2.1.13 y 2.2.x hasta 2.2.1, en ciertos escenarios que involucran aplicaciones que intentan confiar en la copia eficiente de datos de archivos, puede reemplazar el contenido del archivo con bytes de valor cero y, por lo tanto, potencialmente deshabilitar los mecanismos de seguridad. NOTA: este problema no siempre est\u00e1 relacionado con la seguridad, pero puede estar relacionado con la seguridad en situaciones realistas. Un posible ejemplo es cp, de una versi\u00f3n reciente de GNU Core Utilities (coreutils), cuando se intenta preservar un conjunto de reglas para denegar el acceso no autorizado. (Se puede usar cp al configurar el control de acceso, como con el archivo /etc/hosts.deny especificado en la referencia de soporte de IBM). NOTA: este problema ocurre con menos frecuencia en la versi\u00f3n 2.2.1 y en versiones anteriores a la 2.1.4. debido a la configuraci\u00f3n predeterminada en esas versiones."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-49312",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-26T22:15:06.907",
"lastModified": "2023-11-26T22:15:06.907",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Precision Bridge PrecisionBridge.exe (aka the thick client) before 7.3.21 allows an integrity violation in which the same license key is used on multiple systems, via vectors involving a Process Hacker memory dump, error message inspection, and modification of a MAC address."
},
{
"lang": "es",
"value": "Precision Bridge PrecisionBridge.exe (tambi\u00e9n conocido como cliente pesado) anterior a 7.3.21 permite una violaci\u00f3n de integridad en la que se utiliza la misma clave de licencia en m\u00faltiples sistemas, a trav\u00e9s de vectores que involucran un volcado de memoria de Process Hacker, inspecci\u00f3n de mensajes de error y modificaci\u00f3n de una direcci\u00f3n MAC. ."
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-49321",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-27T00:15:07.280",
"lastModified": "2023-11-27T00:15:07.280",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Certain WithSecure products allow a Denial of Service because scanning a crafted file takes a long time, and causes the scanner to hang. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, WithSecure Linux Security 64 12.0, WithSecure Linux Protection 12.0, and WithSecure Atlant 1.0.35-1."
},
{
"lang": "es",
"value": "Ciertos productos WithSecure permiten una Denegaci\u00f3n de Servicio porque el escaneo de un archivo manipulado lleva mucho tiempo y hace que el esc\u00e1ner se cuelgue. Esto afecta a WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 y posteriores, WithSecure Client Security para Mac 15, WithSecure Elements Endpoint Protection for Mac 17 y posteriores, WithSecure Linux Security 64 12.0, WithSecure Linux Protection 12.0, y WithSecure Atlant 1.0.35-1. "
}
],
"metrics": {},

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-49322",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-27T00:15:07.330",
"lastModified": "2023-11-27T00:15:07.330",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Certain WithSecure products allow a Denial of Service because there is an unpack handler crash that can lead to a scanning engine crash. This affects WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 and later, WithSecure Client Security for Mac 15, WithSecure Elements Endpoint Protection for Mac 17 and later, WithSecure Linux Security 64 12.0, WithSecure Linux Protection 12.0, and WithSecure Atlant 1.0.35-1."
},
{
"lang": "es",
"value": "Ciertos productos WithSecure permiten una Denegaci\u00f3n de Servicio porque hay una falla en el controlador de descompresi\u00f3n que puede provocar una falla en el motor de escaneo. Esto afecta a WithSecure Client Security 15, WithSecure Server Security 15, WithSecure Email and Server Security 15, WithSecure Elements Endpoint Protection 17 y posteriores, WithSecure Client Security para Mac 15, WithSecure Elements Endpoint Protection para Mac 17 y posteriores, WithSecure Linux Security 64 12.0, WithSecure Linux Protection 12.0, y WithSecure Atlant 1.0.35-1. "
}
],
"metrics": {},

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-4931",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2023-11-27T14:15:07.930",
"lastModified": "2023-11-27T16:35:06.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled search path element vulnerability in Plesk Installer affects version 3.27.0.0. A local attacker could execute arbitrary code by injecting DLL files into the same folder where the application is installed, resulting in DLL hijacking in edputil.dll, samlib.dll, urlmon.dll, sspicli.dll, propsys.dll and profapi.dll files."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/uncontrolled-search-path-element-vulnerability-plesk",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -2,19 +2,80 @@
"id": "CVE-2023-5119",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-11-20T19:15:09.620",
"lastModified": "2023-11-20T19:18:46.073",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-27T16:33:20.673",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Forminator WordPress plugin before 1.27.0 does not properly sanitize the redirect-url field in the form submission settings, which could allow high-privilege users such as an administrator to inject arbitrary web scripts even when the unfiltered_html capability is disallowed (for example in a multisite setup)."
},
{
"lang": "es",
"value": "El complemento Forminator de WordPress anterior a 1.27.0 no sanitiza adecuadamente el campo URL de redireccionamiento en la configuraci\u00f3n de env\u00edo de formularios, lo que podr\u00eda permitir a usuarios con altos privilegios, como un administrador, inyectar scripts web arbitrarios incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo en una configuraci\u00f3n multisitio)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:incsub:forminator:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.27.0",
"matchCriteriaId": "F214A3BC-E134-4D68-88E5-FE6424243950"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/229207bb-8f8d-4579-a8e2-54516474ccb4",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,80 @@
"id": "CVE-2023-5340",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-11-20T19:15:09.723",
"lastModified": "2023-11-20T19:18:46.073",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-27T16:32:49.050",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Five Star Restaurant Menu and Food Ordering WordPress plugin before 2.4.11 unserializes user input via an AJAX action available to unauthenticated users, allowing them to perform PHP Object Injection when a suitable gadget is present on the blog."
},
{
"lang": "es",
"value": "El complemento Five Star Restaurant Menu and Food Ordering de WordPress anterior a 2.4.11 deserializa la entrada del usuario a trav\u00e9s de una acci\u00f3n AJAX disponible para usuarios no autenticados, lo que les permite realizar inyecci\u00f3n de objetos PHP cuando hay un gadget adecuado presente en el blog."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fivestarplugins:five_star_restaurant_menu:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.4.11",
"matchCriteriaId": "8C49D783-21A2-4EAA-BDFE-0FDFC4F683C5"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/91a5847a-62e7-4b98-a554-5eecb6a06e5b",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,80 @@
"id": "CVE-2023-5343",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-11-20T19:15:09.770",
"lastModified": "2023-11-20T19:18:46.073",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-27T16:32:32.340",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Popup box WordPress plugin before 3.7.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed."
},
{
"lang": "es",
"value": "El complemento Popup box de WordPress anterior a 3.7.9 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con altos privilegios, como el administrador, realizar ataques de Cross Site Scripting incluso cuando unfiltered_html no est\u00e1 permitido."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ays-pro:popup_box:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.7.9",
"matchCriteriaId": "F3E61486-B65C-4D40-9CC8-A5C4EEB5A310"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/74613b38-48f2-43d5-bae5-25c89ba7db6e",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,81 @@
"id": "CVE-2023-5509",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-11-20T19:15:09.813",
"lastModified": "2023-11-20T19:18:46.073",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-27T16:32:16.477",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The myStickymenu WordPress plugin before 2.6.5 does not adequately authorize some ajax calls, allowing any logged-in user to perform the actions."
},
{
"lang": "es",
"value": "El complemento myStickymenu de WordPress anterior a 2.6.5 no autoriza adecuadamente algunas llamadas ajax, lo que permite que cualquier usuario que haya iniciado sesi\u00f3n realice las acciones."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:premio:mystickymenu:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.6.5",
"matchCriteriaId": "98A5DA0E-0DE2-438A-8830-6A1D792CC409"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/3b33c262-e7f0-4310-b26d-4727d7c25c9d",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Product",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-5607",
"sourceIdentifier": "trellixpsirt@trellix.com",
"published": "2023-11-27T11:15:08.133",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "\nAn improper limitation of a path name to a restricted directory (path traversal) vulnerability in the TACC ePO extension, for on-premises ePO servers, prior to version 8.4.0 could lead to an authorised administrator attacker executing arbitrary code through uploading a specially crafted GTI reputation file. The attacker would need the appropriate privileges to access the relevant section of the User Interface. The import logic has been updated to restrict file types and content. \n\n"
},
{
"lang": "es",
"value": "Una limitaci\u00f3n inadecuada de un nombre de ruta a una vulnerabilidad de directorio restringido (path traversal) en la extensi\u00f3n TACC ePO, para servidores de ePO locales, antes de la versi\u00f3n 8.4.0 podr\u00eda llevar a que un atacante administrador autorizado ejecute c\u00f3digo arbitrario mediante la carga de un archivo especialmente manipulado. Archivo de reputaci\u00f3n GTI. El atacante necesitar\u00eda los privilegios adecuados para acceder a la secci\u00f3n correspondiente de la interfaz de usuario. La l\u00f3gica de importaci\u00f3n se ha actualizado para restringir los tipos de archivos y el contenido."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "trellixpsirt@trellix.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.7,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "trellixpsirt@trellix.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://kcm.trellix.com/corporate/index?page=content&id=SB10411",
"source": "trellixpsirt@trellix.com"
}
]
}

View File

@ -2,19 +2,80 @@
"id": "CVE-2023-5609",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-11-20T19:15:09.853",
"lastModified": "2023-11-20T19:18:46.073",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-27T16:31:32.570",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Seraphinite Accelerator WordPress plugin before 2.2.29 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
},
{
"lang": "es",
"value": "El complemento Seraphinite Accelerator de WordPress anterior a 2.2.29 no sanitiza ni escapa un par\u00e1metro antes de devolverlo a la p\u00e1gina, lo que genera un ataque de Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como administradores."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:s-sols:seraphinite_accelerator:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.2.29",
"matchCriteriaId": "AC9E467B-857B-46B5-8788-B90A459C6D9B"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/aac4bcc8-b826-4165-aed3-f422dd178692",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,81 @@
"id": "CVE-2023-5610",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-11-20T19:15:09.897",
"lastModified": "2023-11-20T19:18:46.073",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-27T16:31:21.320",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Seraphinite Accelerator WordPress plugin before 2.2.29 does not validate the URL to redirect any authenticated user to, leading to an arbitrary redirect"
},
{
"lang": "es",
"value": "El complemento Seraphinite Accelerator de WordPress anterior a 2.2.29 no valida la URL para redirigir a cualquier usuario autenticado, lo que genera una redirecci\u00f3n arbitraria."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:s-sols:seraphinite_accelerator:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.2.29",
"matchCriteriaId": "AC9E467B-857B-46B5-8788-B90A459C6D9B"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/e880a9fb-b089-4f98-9781-7d946f22777e",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Product",
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,88 @@
"id": "CVE-2023-5640",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-11-20T19:15:09.940",
"lastModified": "2023-11-20T19:18:46.073",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-27T16:34:48.403",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Article Analytics WordPress plugin does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection vulnerability."
},
{
"lang": "es",
"value": "El complemento Article Analytics de WordPress no sanitiza ni escapa adecuadamente un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL a trav\u00e9s de una acci\u00f3n AJAX disponible para usuarios no autenticados, lo que genera una vulnerabilidad de inyecci\u00f3n SQL."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dguzun:article_analytics:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "F843011A-F756-43F0-B4F2-D8D4CF65941D"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://devl00p.github.io/posts/Injection-SQL-dans-le-plugin-Wordpress-Article-Analytics/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit"
]
},
{
"url": "https://wpscan.com/vulnerability/9a383ef5-0f1a-4894-8f78-845abcb5062d",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Product",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,80 @@
"id": "CVE-2023-5651",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-11-20T19:15:09.983",
"lastModified": "2023-11-20T19:18:46.073",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-27T16:30:23.423",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The WP Hotel Booking WordPress plugin before 2.0.8 does not have authorisation and CSRF checks, as well as does not ensure that the package to be deleted is a package, allowing any authenticated users, such as subscriber to delete arbitrary posts"
},
{
"lang": "es",
"value": "El complemento WP Hotel Booking de WordPress anterior a 2.0.8 no tiene autorizaci\u00f3n ni controles CSRF, adem\u00e1s no garantiza que el paquete que se eliminar\u00e1 sea un paquete, lo que permite a cualquier usuario autenticado, como un suscriptor, eliminar publicaciones arbitrarias."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thimpress:wp_hotel_booking:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.8",
"matchCriteriaId": "51BE1303-D553-4F13-A1DB-30858469F354"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/a365c050-96ae-4266-aa87-850ee259ee2c",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,80 @@
"id": "CVE-2023-5652",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-11-20T19:15:10.027",
"lastModified": "2023-11-20T19:18:46.073",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-27T16:30:00.860",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The WP Hotel Booking WordPress plugin before 2.0.8 does not have authorisation and CSRF checks, as well as does not escape user input before using it in a SQL statement of a function hooked to admin_init, allowing unauthenticated users to perform SQL injections"
},
{
"lang": "es",
"value": "El complemento WP Hotel Booking de WordPress anterior a 2.0.8 no tiene autorizaci\u00f3n ni controles CSRF, y tampoco escapa a la entrada del usuario antes de usarlo en una declaraci\u00f3n SQL de una funci\u00f3n vinculada a admin_init, lo que permite a usuarios no autenticados realizar inyecciones SQL."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thimpress:wp_hotel_booking:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.8",
"matchCriteriaId": "51BE1303-D553-4F13-A1DB-30858469F354"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/8ea46b9a-5239-476b-949d-49546371eac1",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,80 @@
"id": "CVE-2023-5799",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-11-20T19:15:10.070",
"lastModified": "2023-11-20T19:18:46.073",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-11-27T16:29:50.217",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The WP Hotel Booking WordPress plugin before 2.0.8 does not have proper authorisation when deleting a package, allowing Contributor and above roles to delete posts that do no belong to them"
},
{
"lang": "es",
"value": "El complemento WP Hotel Booking de WordPress anterior a 2.0.8 no tiene la autorizaci\u00f3n adecuada al eliminar un paquete, lo que permite que los roles Colaborador y superiores eliminen publicaciones que no les pertenecen."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thimpress:wp_hotel_booking:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.8",
"matchCriteriaId": "51BE1303-D553-4F13-A1DB-30858469F354"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://wpscan.com/vulnerability/3061f85e-a70e-49e5-bccf-ae9240f51178",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2023-5871",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-27T12:15:07.940",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in libnbd, due to a malicious Network Block Device (NBD), a protocol for accessing Block Devices such as hard disks over a Network. This issue may allow a malicious NBD server to cause a Denial of Service."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en libnbd debido a un Network Block Device (NBD) malicioso, un protocolo para acceder a dispositivos de bloque, como discos duros, a trav\u00e9s de una red. Este problema puede permitir que un servidor NBD malintencionado provoque una Denegaci\u00f3n de Servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2023-5871",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247308",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.libguestfs.org/archives/list/guestfs@lists.libguestfs.org/thread/PFVUCMPFQUDC23JXSCUUPXIGDZ7XCFMD/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6202",
"sourceIdentifier": "responsibledisclosure@mattermost.com",
"published": "2023-11-27T10:15:08.677",
"lastModified": "2023-11-27T10:15:08.677",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Mattermost fails to perform proper authorization in the /plugins/focalboard/api/v2/users endpoint allowing an attacker who is a guest user and knows the ID of another user\u00a0to get their information (e.g. name, surname, nickname) via Mattermost Boards.\n\n"
},
{
"lang": "es",
"value": "Mattermost no realiza la autorizaci\u00f3n adecuada en el endpoint /plugins/focalboard/api/v2/users, lo que permite a un atacante que es un usuario invitado y conoce el ID de otro usuario obtener su informaci\u00f3n (por ejemplo, nombre, apellido, apodo) a trav\u00e9s de Mattermost Boards."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6254",
"sourceIdentifier": "security@otrs.com",
"published": "2023-11-27T10:15:08.863",
"lastModified": "2023-11-27T10:15:08.863",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A Vulnerability in OTRS AgentInterface and ExternalInterface allows the reading of plain text passwords which are send back to the client in the server response-\nThis issue affects OTRS: from 8.0.X through 8.0.37.\n\n"
},
{
"lang": "es",
"value": "Una vulnerabilidad en OTRS AgentInterface y ExternalInterface permite la lectura de contrase\u00f1as de texto plano que se env\u00edan al cliente en la respuesta del servidor. Este problema afecta a OTRS: desde 8.0.X hasta 8.0.37."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6276",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-24T16:15:06.910",
"lastModified": "2023-11-24T16:15:06.910",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:21.813",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Tongda OA 2017 up to 11.9. This affects an unknown part of the file general/wiki/cp/ct/delete.php. The manipulation of the argument PROJ_ID_STR leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 11.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-246105 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Tongda OA 2017 hasta 11.9 y clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo general/wiki/cp/ct/delete.php. La manipulaci\u00f3n del argumento PROJ_ID_STR conduce a la inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 11.10 puede solucionar este problema. Se recomienda actualizar el componente afectado. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-246105."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6277",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-24T19:15:07.643",
"lastModified": "2023-11-24T19:15:07.643",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:21.813",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An out-of-memory flaw was found in libtiff. Passing a crafted tiff file to TIFFOpen() API may allow a remote attacker to cause a denial of service via a craft input with size smaller than 379 KB."
},
{
"lang": "es",
"value": "Se encontr\u00f3 un error de falta de memoria en libtiff. Pasar un archivo tiff manipulado a la API TIFFOpen() puede permitir que un atacante remoto provoque una denegaci\u00f3n de servicio a trav\u00e9s de una entrada artesanal con un tama\u00f1o inferior a 379 KB."
}
],
"metrics": {

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-6287",
"sourceIdentifier": "security@checkmk.com",
"published": "2023-11-27T14:15:08.157",
"lastModified": "2023-11-27T16:35:06.953",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Sensitive data exposure in Webconf in Tribe29 Checkmk Appliance before 1.6.8 allows local attacker to retrieve passwords via reading log files."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@checkmk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@checkmk.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-598"
}
]
}
],
"references": [
{
"url": "https://checkmk.com/werk/9554",
"source": "security@checkmk.com"
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6293",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-11-24T20:15:07.293",
"lastModified": "2023-11-24T20:15:07.293",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Prototype Pollution in GitHub repository robinbuschmann/sequelize-typescript prior to 2.1.6."
},
{
"lang": "es",
"value": "Prototipo de contaminaci\u00f3n en el repositorio de GitHub robinbuschmann/sequelize-typescript anterior a 2.1.6."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6296",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-26T22:15:06.983",
"lastModified": "2023-11-26T22:15:06.983",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in osCommerce 4. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /catalog/compare of the component Instant Message Handler. The manipulation of the argument compare with the input 40dz4iq\"><script>alert(1)</script>zohkx leads to cross site scripting. The attack may be launched remotely. VDB-246122 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en osCommerce 4. Se ha calificado como problem\u00e1tica. Una funci\u00f3n desconocida del archivo /catalog/compare del componente Instant Message Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento comparar con la entrada 40dz4iq\"&gt;zohkx conduce a cross site scripting. El ataque puede iniciarse de forma remota. VDB-246122 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6297",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-26T23:15:07.423",
"lastModified": "2023-11-26T23:15:07.423",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file patient-search-report.php of the component Search Report Page. The manipulation of the argument Search By Patient Name with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246123."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en PHPGurukul Nipah Virus Testing Management System 1.0 y clasificada como problem\u00e1tica. Una parte desconocida del archivo Patient-search-report.php del componente Search Report Page afecta a una parte desconocida. La manipulaci\u00f3n del argumento Search By Patient Name con la entrada conduce a cross site scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-246123."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6298",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-26T23:15:07.657",
"lastModified": "2023-11-26T23:15:07.657",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in Apryse iText 8.0.2. This vulnerability affects the function main of the file PdfDocument.java. The manipulation leads to improper validation of array index. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246124. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Apryse iText 8.0.2 y clasificada como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n principal del archivo PdfDocument.java. La manipulaci\u00f3n conduce a una validaci\u00f3n incorrecta del \u00edndice de la matriz. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-246124. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6299",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-26T23:15:07.883",
"lastModified": "2023-11-26T23:15:07.883",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in Apryse iText 8.0.2. This issue affects some unknown processing of the file PdfDocument.java of the component Reference Table Handler. The manipulation leads to memory leak. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246125 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Apryse iText 8.0.2 y clasificada como problem\u00e1tica. Este problema afecta un procesamiento desconocido del archivo PdfDocument.java del componente Reference Table Handler. La manipulaci\u00f3n conduce a una p\u00e9rdida de memoria. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-246125. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6300",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T00:15:07.377",
"lastModified": "2023-11-27T00:15:07.377",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in SourceCodester Best Courier Management System 1.0. Affected is an unknown function. The manipulation of the argument page with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-246126 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en SourceCodester Best Courier Management System 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida es afectada por esta funci\u00f3n. La manipulaci\u00f3n de la p\u00e1gina de argumentos con la entrada conduce a cross site scripting. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-246126 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6301",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T00:15:07.597",
"lastModified": "2023-11-27T00:15:07.597",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in SourceCodester Best Courier Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file parcel_list.php of the component GET Parameter Handler. The manipulation of the argument id with the input </TiTlE><ScRiPt>alert(1)</ScRiPt> leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246127."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en SourceCodester Best Courier Management System 1.0 y clasificada como problem\u00e1tica. Una funci\u00f3n desconocida del archivo parcel_list.php del componente GET Parameter Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento id con la entrada conduce a cross site scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-246127."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6302",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T00:15:07.820",
"lastModified": "2023-11-27T00:15:07.820",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in CSZCMS 1.3.0 and classified as critical. Affected by this issue is some unknown functionality of the file \\views\\templates of the component File Manager Page. The manipulation leads to permission issues. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246128. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en CSZCMS 1.3.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo \\views\\templates del componente File Manager Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a problemas de permisos. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-246128. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6303",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T00:15:08.040",
"lastModified": "2023-11-27T00:15:08.040",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in CSZCMS 1.3.0. It has been classified as problematic. This affects an unknown part of the file /admin/settings/ of the component Site Settings Page. The manipulation of the argument Additional Meta Tag with the input <svg><animate onbegin=alert(1) attributeName=x dur=1s> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246129 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en CSZCMS 1.3.0. Ha sido clasificada como problem\u00e1tica. Esto afecta a una parte desconocida del archivo /admin/settings/ del componente Site Settings Page. La manipulaci\u00f3n del argumento Additional Meta Tag con la entrada conduce a cross site scripting. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-246129. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6304",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T01:15:07.223",
"lastModified": "2023-11-27T01:15:07.223",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tecno 4G Portable WiFi TR118 TR118-M30E-RR-D-EnFrArSwHaPo-OP-V008-20220830. It has been declared as critical. This vulnerability affects unknown code of the file /goform/goform_get_cmd_process of the component Ping Tool. The manipulation of the argument url leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-246130 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Tecno 4G Portable WiFi TR118 TR118-M30E-RR-D-EnFrArSwHaPo-OP-V008-20220830. Ha sido declarada cr\u00edtica. Esta vulnerabilidad afecta a c\u00f3digo desconocido del archivo /goform/goform_get_cmd_process del componente Ping Tool. La manipulaci\u00f3n del argumento URL conduce a la inyecci\u00f3n de comandos del sistema operativo. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-246130 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6305",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T01:15:07.463",
"lastModified": "2023-11-27T01:15:07.463",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Free and Open Source Inventory Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file ample/app/ajax/suppliar_data.php. The manipulation of the argument columns leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246131."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Free and Open Source Inventory Management System 1.0. Ha sido calificada como cr\u00edtica. Este problema afecta un procesamiento desconocido del archivo ample/app/ajax/suppliar_data.php. La manipulaci\u00f3n de las columnas de argumentos conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-246131."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6306",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T02:15:42.133",
"lastModified": "2023-11-27T02:15:42.133",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Free and Open Source Inventory Management System 1.0. Affected is an unknown function of the file /ample/app/ajax/member_data.php. The manipulation of the argument columns leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246132."
},
{
"lang": "es",
"value": "Una vulnerabilidad ha sido encontrada en SourceCodester Free and Open Source Inventory Management System 1.0 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del archivo /ample/app/ajax/member_data.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n de las columnas de argumentos conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-246132."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6307",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T02:15:42.353",
"lastModified": "2023-11-27T02:15:42.353",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in jeecgboot JimuReport up to 1.6.1. Affected by this vulnerability is an unknown functionality of the file /download/image. The manipulation of the argument imageUrl leads to relative path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246133 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en jeecgboot JimuReport hasta 1.6.1 y clasificada como cr\u00edtica. Una funcionalidad desconocida del archivo /download/image es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento imageUrl conduce a un path traversal relativo. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-246133. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6308",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T02:15:42.570",
"lastModified": "2023-11-27T02:15:42.570",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in Xiamen Four-Faith Video Surveillance Management System 2016/2017. Affected by this issue is some unknown functionality of the component Apache Struts. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-246134 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en Xiamen Four-Faith Video Surveillance Management System 2016/2017 y clasificada como cr\u00edtica. Una funci\u00f3n desconocida del componente Apache Struts es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a una carga sin restricciones. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-246134 es el identificador asignado a esta vulnerabilidad. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6309",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T02:15:42.797",
"lastModified": "2023-11-27T02:15:42.797",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in moses-smt mosesdecoder up to 4.0. This affects an unknown part of the file contrib/iSenWeb/trans_result.php. The manipulation of the argument input1 leads to os command injection. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246135."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en moses-smt mosesdecoder hasta 4.0 y clasificada como cr\u00edtica. Esto afecta a una parte desconocida del archivo contrib/iSenWeb/trans_result.php. La manipulaci\u00f3n del argumento input1 conduce a la inyecci\u00f3n del comando os. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-246135."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6310",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T02:15:43.007",
"lastModified": "2023-11-27T02:15:43.007",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in SourceCodester Loan Management System 1.0 and classified as critical. This vulnerability affects the function delete_borrower of the file deleteBorrower.php. The manipulation of the argument borrower_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-246136."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en SourceCodester Loan Management System 1.0 y clasificada como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n delete_borrower del archivo deleteBorrower.php. La manipulaci\u00f3n del argumento borrower_id conduce a la inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador de esta vulnerabilidad es VDB-246136."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6311",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T02:15:43.237",
"lastModified": "2023-11-27T02:15:43.237",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:15.377",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Loan Management System 1.0 and classified as critical. This issue affects the function delete_ltype of the file delete_ltype.php of the component Loan Type Page. The manipulation of the argument ltype_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-246137 was assigned to this vulnerability."
},
{
"lang": "es",
"value": "Una vulnerabilidad fue encontrada en SourceCodester Loan Management System 1.0 y clasificada como cr\u00edtica. Este problema afecta la funci\u00f3n delete_ltype del archivo delete_ltype.php del componente Loan Type Page. La manipulaci\u00f3n del argumento ltype_id conduce a la inyecci\u00f3n de SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. A esta vulnerabilidad se le asign\u00f3 el identificador VDB-246137."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6312",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T03:15:07.420",
"lastModified": "2023-11-27T03:15:07.420",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Loan Management System 1.0. It has been classified as critical. Affected is the function delete_user of the file deleteUser.php of the component Users Page. The manipulation of the argument user_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-246138 is the identifier assigned to this vulnerability."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Loan Management System 1.0. Ha sido clasificada como cr\u00edtica. La funci\u00f3n delete_user del archivo deleteUser.php del componente Users Page es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento user_id conduce a la inyecci\u00f3n de SQL. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. VDB-246138 es el identificador asignado a esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-6313",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-11-27T03:15:07.650",
"lastModified": "2023-11-27T03:15:07.650",
"vulnStatus": "Received",
"lastModified": "2023-11-27T13:52:09.230",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester URL Shortener 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Long URL Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-246139."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester URL Shortener 1.0. Ha sido declarada problem\u00e1tica. Una funci\u00f3n desconocida del componente Long URL Handler es afectada por esta vulnerabilidad. La manipulaci\u00f3n conduce a cross site scripting. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. El identificador asociado de esta vulnerabilidad es VDB-246139."
}
],
"metrics": {

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-11-27T11:00:47.922049+00:00
2023-11-27T17:04:06.882426+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-11-27T10:15:08.863000+00:00
2023-11-27T16:35:06.953000+00:00
```
### Last Data Feed Release
@ -29,31 +29,62 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
231518
231536
```
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `18`
* [CVE-2023-25632](CVE-2023/CVE-2023-256xx/CVE-2023-25632.json) (`2023-11-27T07:15:43.397`)
* [CVE-2023-47865](CVE-2023/CVE-2023-478xx/CVE-2023-47865.json) (`2023-11-27T09:15:32.587`)
* [CVE-2023-35075](CVE-2023/CVE-2023-350xx/CVE-2023-35075.json) (`2023-11-27T10:15:07.257`)
* [CVE-2023-40703](CVE-2023/CVE-2023-407xx/CVE-2023-40703.json) (`2023-11-27T10:15:07.460`)
* [CVE-2023-43754](CVE-2023/CVE-2023-437xx/CVE-2023-43754.json) (`2023-11-27T10:15:07.657`)
* [CVE-2023-45223](CVE-2023/CVE-2023-452xx/CVE-2023-45223.json) (`2023-11-27T10:15:07.840`)
* [CVE-2023-47168](CVE-2023/CVE-2023-471xx/CVE-2023-47168.json) (`2023-11-27T10:15:08.023`)
* [CVE-2023-48268](CVE-2023/CVE-2023-482xx/CVE-2023-48268.json) (`2023-11-27T10:15:08.217`)
* [CVE-2023-48369](CVE-2023/CVE-2023-483xx/CVE-2023-48369.json) (`2023-11-27T10:15:08.400`)
* [CVE-2023-49068](CVE-2023/CVE-2023-490xx/CVE-2023-49068.json) (`2023-11-27T10:15:08.580`)
* [CVE-2023-6202](CVE-2023/CVE-2023-62xx/CVE-2023-6202.json) (`2023-11-27T10:15:08.677`)
* [CVE-2023-6254](CVE-2023/CVE-2023-62xx/CVE-2023-6254.json) (`2023-11-27T10:15:08.863`)
* [CVE-2023-40610](CVE-2023/CVE-2023-406xx/CVE-2023-40610.json) (`2023-11-27T11:15:07.293`)
* [CVE-2023-42501](CVE-2023/CVE-2023-425xx/CVE-2023-42501.json) (`2023-11-27T11:15:07.743`)
* [CVE-2023-5607](CVE-2023/CVE-2023-56xx/CVE-2023-5607.json) (`2023-11-27T11:15:08.133`)
* [CVE-2023-5871](CVE-2023/CVE-2023-58xx/CVE-2023-5871.json) (`2023-11-27T12:15:07.940`)
* [CVE-2023-4590](CVE-2023/CVE-2023-45xx/CVE-2023-4590.json) (`2023-11-27T13:15:07.130`)
* [CVE-2023-43701](CVE-2023/CVE-2023-437xx/CVE-2023-43701.json) (`2023-11-27T11:15:07.950`)
* [CVE-2023-4931](CVE-2023/CVE-2023-49xx/CVE-2023-4931.json) (`2023-11-27T14:15:07.930`)
* [CVE-2023-6287](CVE-2023/CVE-2023-62xx/CVE-2023-6287.json) (`2023-11-27T14:15:08.157`)
* [CVE-2023-31275](CVE-2023/CVE-2023-312xx/CVE-2023-31275.json) (`2023-11-27T16:15:07.417`)
* [CVE-2023-32616](CVE-2023/CVE-2023-326xx/CVE-2023-32616.json) (`2023-11-27T16:15:08.637`)
* [CVE-2023-35985](CVE-2023/CVE-2023-359xx/CVE-2023-35985.json) (`2023-11-27T16:15:09.460`)
* [CVE-2023-38573](CVE-2023/CVE-2023-385xx/CVE-2023-38573.json) (`2023-11-27T16:15:10.343`)
* [CVE-2023-39542](CVE-2023/CVE-2023-395xx/CVE-2023-39542.json) (`2023-11-27T16:15:10.653`)
* [CVE-2023-40194](CVE-2023/CVE-2023-401xx/CVE-2023-40194.json) (`2023-11-27T16:15:10.963`)
* [CVE-2023-41257](CVE-2023/CVE-2023-412xx/CVE-2023-41257.json) (`2023-11-27T16:15:11.250`)
* [CVE-2023-49029](CVE-2023/CVE-2023-490xx/CVE-2023-49029.json) (`2023-11-27T16:15:11.510`)
* [CVE-2023-49043](CVE-2023/CVE-2023-490xx/CVE-2023-49043.json) (`2023-11-27T16:15:11.557`)
* [CVE-2023-49046](CVE-2023/CVE-2023-490xx/CVE-2023-49046.json) (`2023-11-27T16:15:11.600`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `57`
* [CVE-2023-6309](CVE-2023/CVE-2023-63xx/CVE-2023-6309.json) (`2023-11-27T13:52:15.377`)
* [CVE-2023-6310](CVE-2023/CVE-2023-63xx/CVE-2023-6310.json) (`2023-11-27T13:52:15.377`)
* [CVE-2023-6311](CVE-2023/CVE-2023-63xx/CVE-2023-6311.json) (`2023-11-27T13:52:15.377`)
* [CVE-2023-6276](CVE-2023/CVE-2023-62xx/CVE-2023-6276.json) (`2023-11-27T13:52:21.813`)
* [CVE-2023-48711](CVE-2023/CVE-2023-487xx/CVE-2023-48711.json) (`2023-11-27T13:52:21.813`)
* [CVE-2023-48712](CVE-2023/CVE-2023-487xx/CVE-2023-48712.json) (`2023-11-27T13:52:21.813`)
* [CVE-2023-48312](CVE-2023/CVE-2023-483xx/CVE-2023-48312.json) (`2023-11-27T13:52:21.813`)
* [CVE-2023-48707](CVE-2023/CVE-2023-487xx/CVE-2023-48707.json) (`2023-11-27T13:52:21.813`)
* [CVE-2023-48708](CVE-2023/CVE-2023-487xx/CVE-2023-48708.json) (`2023-11-27T13:52:21.813`)
* [CVE-2023-49298](CVE-2023/CVE-2023-492xx/CVE-2023-49298.json) (`2023-11-27T13:52:21.813`)
* [CVE-2023-6277](CVE-2023/CVE-2023-62xx/CVE-2023-6277.json) (`2023-11-27T13:52:21.813`)
* [CVE-2023-29499](CVE-2023/CVE-2023-294xx/CVE-2023-29499.json) (`2023-11-27T14:15:07.590`)
* [CVE-2023-32611](CVE-2023/CVE-2023-326xx/CVE-2023-32611.json) (`2023-11-27T14:15:07.713`)
* [CVE-2023-32665](CVE-2023/CVE-2023-326xx/CVE-2023-32665.json) (`2023-11-27T14:15:07.820`)
* [CVE-2023-5799](CVE-2023/CVE-2023-57xx/CVE-2023-5799.json) (`2023-11-27T16:29:50.217`)
* [CVE-2023-5652](CVE-2023/CVE-2023-56xx/CVE-2023-5652.json) (`2023-11-27T16:30:00.860`)
* [CVE-2023-5651](CVE-2023/CVE-2023-56xx/CVE-2023-5651.json) (`2023-11-27T16:30:23.423`)
* [CVE-2023-5610](CVE-2023/CVE-2023-56xx/CVE-2023-5610.json) (`2023-11-27T16:31:21.320`)
* [CVE-2023-5609](CVE-2023/CVE-2023-56xx/CVE-2023-5609.json) (`2023-11-27T16:31:32.570`)
* [CVE-2023-5509](CVE-2023/CVE-2023-55xx/CVE-2023-5509.json) (`2023-11-27T16:32:16.477`)
* [CVE-2023-5343](CVE-2023/CVE-2023-53xx/CVE-2023-5343.json) (`2023-11-27T16:32:32.340`)
* [CVE-2023-5340](CVE-2023/CVE-2023-53xx/CVE-2023-5340.json) (`2023-11-27T16:32:49.050`)
* [CVE-2023-5119](CVE-2023/CVE-2023-51xx/CVE-2023-5119.json) (`2023-11-27T16:33:20.673`)
* [CVE-2023-4808](CVE-2023/CVE-2023-48xx/CVE-2023-4808.json) (`2023-11-27T16:33:33.237`)
* [CVE-2023-5640](CVE-2023/CVE-2023-56xx/CVE-2023-5640.json) (`2023-11-27T16:34:48.403`)
## Download and Usage