Skip to content

Commit

Permalink
Auto-Update: 2024-01-04T21:00:25.943994+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Jan 4, 2024
1 parent c05ddb8 commit 4ce4757
Show file tree
Hide file tree
Showing 40 changed files with 1,882 additions and 166 deletions.
47 changes: 44 additions & 3 deletions CVE-2023/CVE-2023-274xx/CVE-2023-27447.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-27447",
"sourceIdentifier": "[email protected]",
"published": "2023-12-28T11:15:07.973",
"lastModified": "2023-12-28T15:09:45.763",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-04T19:32:40.140",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
Expand All @@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "[email protected]",
"type": "Secondary",
Expand Down Expand Up @@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:veronalabs:wp_sms:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "6.0.4",
"matchCriteriaId": "35B32467-0333-4A3A-BB59-CAF7C594A06D"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-sms/wordpress-wp-sms-plugin-6-0-4-sensitive-data-exposure-vulnerability?_s_id=cve",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Third Party Advisory"
]
}
]
}
49 changes: 45 additions & 4 deletions CVE-2023/CVE-2023-325xx/CVE-2023-32513.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,20 +2,40 @@
"id": "CVE-2023-32513",
"sourceIdentifier": "[email protected]",
"published": "2023-12-28T11:15:08.590",
"lastModified": "2023-12-28T15:09:45.763",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-04T19:32:31.050",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in GiveWP GiveWP \u2013 Donation Plugin and Fundraising Platform.This issue affects GiveWP \u2013 Donation Plugin and Fundraising Platform: from n/a through 2.25.3.\n\n"
},
{
"lang": "es",
"value": "Vulnerabilidad de deserializaci\u00f3n de de datos no confiables enGiveWP GiveWP \u2013 Donation Plugin and Fundraising Platform. Este problema afecta a GiveWP \u2013 Donation Plugin and Fundraising Platform: desde n/a hasta 2.25.3."
"value": "Vulnerabilidad de deserializaci\u00f3n de de datos no confiables en GiveWP GiveWP \u2013 Donation Plugin and Fundraising Platform. Este problema afecta a GiveWP \u2013 Donation Plugin and Fundraising Platform: desde n/a hasta 2.25.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "[email protected]",
"type": "Secondary",
Expand Down Expand Up @@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.25.3",
"matchCriteriaId": "9A521DF8-BFEC-4E16-B531-C127E8E2978D"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/give/wordpress-give-donation-plugin-plugin-2-25-3-php-object-injection-vulnerability?_s_id=cve",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Third Party Advisory"
]
}
]
}
47 changes: 44 additions & 3 deletions CVE-2023/CVE-2023-327xx/CVE-2023-32795.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-32795",
"sourceIdentifier": "[email protected]",
"published": "2023-12-28T11:15:08.833",
"lastModified": "2023-12-28T15:09:45.763",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-04T19:23:26.827",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
Expand All @@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "[email protected]",
"type": "Secondary",
Expand Down Expand Up @@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:woocommerce:product_addons:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "6.1.3",
"matchCriteriaId": "C4A56CCE-859D-4EE5-8817-F3954ECFC5F2"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woocommerce-product-addons/wordpress-woocommerce-product-add-ons-plugin-6-1-3-authenticated-php-object-injection-vulnerability?_s_id=cve",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Third Party Advisory"
]
}
]
}
6 changes: 3 additions & 3 deletions CVE-2023/CVE-2023-339xx/CVE-2023-33952.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,12 +2,12 @@
"id": "CVE-2023-33952",
"sourceIdentifier": "[email protected]",
"published": "2023-07-24T16:15:11.893",
"lastModified": "2023-12-28T14:39:16.187",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-04T20:15:24.550",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "A double-free vulnerability was found in the vmwgfx driver in the Linux kernel. The flaw exists within the handling of vmw_buffer_object objects. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. This flaw allows a local privileged user to escalate privileges and execute code in the context of the kernel."
"value": "A double-free vulnerability was found in handling vmw_buffer_object objects in the vmwgfx driver in the Linux kernel. This issue occurs due to the lack of validating the existence of an object prior to performing further free operations on the object, which may allow a local privileged user to escalate privileges and execute code in the context of the kernel."
}
],
"metrics": {
Expand Down
47 changes: 44 additions & 3 deletions CVE-2023/CVE-2023-363xx/CVE-2023-36381.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-36381",
"sourceIdentifier": "[email protected]",
"published": "2023-12-28T11:15:09.067",
"lastModified": "2023-12-28T15:09:45.763",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-01-04T19:22:53.737",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
Expand All @@ -16,6 +16,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "[email protected]",
"type": "Secondary",
Expand Down Expand Up @@ -50,10 +70,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gesundheit-bewegt:zippy:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.6.5",
"matchCriteriaId": "DF44C6C7-813D-4D66-A886-9443AF5A9085"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/zippy/wordpress-zippy-plugin-1-6-3-php-object-injection-vulnerability?_s_id=cve",
"source": "[email protected]"
"source": "[email protected]",
"tags": [
"Third Party Advisory"
]
}
]
}
16 changes: 8 additions & 8 deletions CVE-2023/CVE-2023-407xx/CVE-2023-40791.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-40791",
"sourceIdentifier": "[email protected]",
"published": "2023-10-16T03:15:09.273",
"lastModified": "2023-12-28T16:13:37.483",
"lastModified": "2024-01-04T19:08:57.303",
"vulnStatus": "Analyzed",
"descriptions": [
{
Expand All @@ -21,19 +21,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 1.0,
"impactScore": 5.2
}
]
Expand Down
8 changes: 6 additions & 2 deletions CVE-2023/CVE-2023-452xx/CVE-2023-45286.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2023-45286",
"sourceIdentifier": "[email protected]",
"published": "2023-11-28T17:15:08.280",
"lastModified": "2023-12-05T21:06:03.273",
"vulnStatus": "Analyzed",
"lastModified": "2024-01-04T19:15:08.737",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
Expand Down Expand Up @@ -69,6 +69,10 @@
}
],
"references": [
{
"url": "https://github.com/go-resty/resty/commit/577fed8730d79f583eb48dfc81674164e1fc471e",
"source": "[email protected]"
},
{
"url": "https://github.com/go-resty/resty/issues/739",
"source": "[email protected]",
Expand Down
Loading

0 comments on commit 4ce4757

Please sign in to comment.