Skip to content

Commit

Permalink
Auto-Update: 2024-12-12T23:00:20.858301+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Dec 12, 2024
1 parent 38c19c7 commit 5bd8de9
Show file tree
Hide file tree
Showing 47 changed files with 1,900 additions and 888 deletions.
485 changes: 483 additions & 2 deletions CVE-2022/CVE-2022-238xx/CVE-2022-23815.json

Large diffs are not rendered by default.

32 changes: 31 additions & 1 deletion CVE-2022/CVE-2022-484xx/CVE-2022-48498.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2022-48498",
"sourceIdentifier": "[email protected]",
"published": "2023-06-19T17:15:11.833",
"lastModified": "2024-11-21T07:33:26.660",
"lastModified": "2024-12-12T21:15:05.437",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
Expand All @@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [
Expand Down
26 changes: 25 additions & 1 deletion CVE-2023/CVE-2023-22xx/CVE-2023-2221.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-2221",
"sourceIdentifier": "[email protected]",
"published": "2023-06-19T11:15:09.987",
"lastModified": "2024-11-21T07:58:11.143",
"lastModified": "2024-12-12T21:15:06.973",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
Expand Down Expand Up @@ -69,6 +89,10 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/6666688e-7239-4d40-a348-307cf8f3b657/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}
12 changes: 11 additions & 1 deletion CVE-2023/CVE-2023-251xx/CVE-2023-25185.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-25185",
"sourceIdentifier": "[email protected]",
"published": "2023-06-16T19:15:14.360",
"lastModified": "2024-11-21T07:49:16.420",
"lastModified": "2024-12-12T22:15:06.247",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -65,6 +65,16 @@
"value": "CWE-269"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
Expand Down
12 changes: 11 additions & 1 deletion CVE-2023/CVE-2023-251xx/CVE-2023-25187.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-25187",
"sourceIdentifier": "[email protected]",
"published": "2023-06-16T20:15:09.297",
"lastModified": "2024-11-21T07:49:16.720",
"lastModified": "2024-12-12T21:15:06.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -65,6 +65,16 @@
"value": "CWE-798"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
Expand Down
26 changes: 25 additions & 1 deletion CVE-2023/CVE-2023-27xx/CVE-2023-2719.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-2719",
"sourceIdentifier": "[email protected]",
"published": "2023-06-19T11:15:10.487",
"lastModified": "2024-11-21T07:59:09.763",
"lastModified": "2024-12-12T21:15:07.120",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
Expand Down Expand Up @@ -69,6 +89,10 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/d9f6f4e7-a237-49c0-aba0-2934ab019e35/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}
26 changes: 25 additions & 1 deletion CVE-2023/CVE-2023-27xx/CVE-2023-2779.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-2779",
"sourceIdentifier": "[email protected]",
"published": "2023-06-19T11:15:10.653",
"lastModified": "2024-11-21T07:59:16.507",
"lastModified": "2024-12-12T22:15:06.780",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
Expand Down Expand Up @@ -85,6 +105,10 @@
"tags": [
"Exploit"
]
},
{
"url": "https://wpscan.com/vulnerability/fe9b7696-3b0e-42e2-9dbc-55167605f5c5/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}
6 changes: 5 additions & 1 deletion CVE-2023/CVE-2023-284xx/CVE-2023-28424.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-28424",
"sourceIdentifier": "[email protected]",
"published": "2023-03-20T13:15:11.973",
"lastModified": "2024-11-21T07:55:02.287",
"lastModified": "2024-12-12T21:15:06.840",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -100,6 +100,10 @@
"Patch"
]
},
{
"url": "https://www.sonarsource.com/blog/why-orms-and-prepared-statements-cant-always-win",
"source": "[email protected]"
},
{
"url": "https://github.com/gentoo/soko/security/advisories/GHSA-gc2x-86p3-mxg2",
"source": "af854a3a-2127-422b-91ae-364da2661108",
Expand Down
32 changes: 31 additions & 1 deletion CVE-2023/CVE-2023-307xx/CVE-2023-30759.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-30759",
"sourceIdentifier": "[email protected]",
"published": "2023-06-19T05:15:09.290",
"lastModified": "2024-11-21T08:00:50.870",
"lastModified": "2024-12-12T21:15:07.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
Expand All @@ -45,6 +65,16 @@
"value": "CWE-345"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
Expand Down
32 changes: 31 additions & 1 deletion CVE-2023/CVE-2023-316xx/CVE-2023-31672.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2023-31672",
"sourceIdentifier": "[email protected]",
"published": "2023-06-15T20:15:09.387",
"lastModified": "2024-11-21T08:02:08.783",
"lastModified": "2024-12-12T22:15:06.950",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand Down Expand Up @@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
Expand All @@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
Expand Down
Loading

0 comments on commit 5bd8de9

Please sign in to comment.