-
Notifications
You must be signed in to change notification settings - Fork 16
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Auto-Update: 2024-11-27T21:01:06.385665+00:00
- Loading branch information
1 parent
a08f514
commit e46b29d
Showing
146 changed files
with
9,294 additions
and
2,041 deletions.
There are no files selected for viewing
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"id": "CVE-2015-10100", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2023-04-10T18:15:07.873", | ||
"lastModified": "2024-05-17T01:03:08.010", | ||
"lastModified": "2024-11-27T20:19:36.870", | ||
"vulnStatus": "Modified", | ||
"cveTags": [], | ||
"descriptions": [ | ||
|
@@ -14,44 +14,44 @@ | |
"metrics": { | ||
"cvssMetricV31": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"source": "[email protected]", | ||
"type": "Secondary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", | ||
"baseScore": 6.3, | ||
"baseSeverity": "MEDIUM", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "NONE", | ||
"privilegesRequired": "LOW", | ||
"userInteraction": "NONE", | ||
"scope": "UNCHANGED", | ||
"confidentialityImpact": "HIGH", | ||
"integrityImpact": "HIGH", | ||
"availabilityImpact": "HIGH", | ||
"baseScore": 9.8, | ||
"baseSeverity": "CRITICAL" | ||
"confidentialityImpact": "LOW", | ||
"integrityImpact": "LOW", | ||
"availabilityImpact": "LOW" | ||
}, | ||
"exploitabilityScore": 3.9, | ||
"impactScore": 5.9 | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 3.4 | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"type": "Secondary", | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", | ||
"baseScore": 9.8, | ||
"baseSeverity": "CRITICAL", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "LOW", | ||
"privilegesRequired": "NONE", | ||
"userInteraction": "NONE", | ||
"scope": "UNCHANGED", | ||
"confidentialityImpact": "LOW", | ||
"integrityImpact": "LOW", | ||
"availabilityImpact": "LOW", | ||
"baseScore": 6.3, | ||
"baseSeverity": "MEDIUM" | ||
"confidentialityImpact": "HIGH", | ||
"integrityImpact": "HIGH", | ||
"availabilityImpact": "HIGH" | ||
}, | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 3.4 | ||
"exploitabilityScore": 3.9, | ||
"impactScore": 5.9 | ||
} | ||
], | ||
"cvssMetricV2": [ | ||
|
@@ -61,13 +61,13 @@ | |
"cvssData": { | ||
"version": "2.0", | ||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", | ||
"baseScore": 6.5, | ||
"accessVector": "NETWORK", | ||
"accessComplexity": "LOW", | ||
"authentication": "SINGLE", | ||
"confidentialityImpact": "PARTIAL", | ||
"integrityImpact": "PARTIAL", | ||
"availabilityImpact": "PARTIAL", | ||
"baseScore": 6.5 | ||
"availabilityImpact": "PARTIAL" | ||
}, | ||
"baseSeverity": "MEDIUM", | ||
"exploitabilityScore": 8.0, | ||
|
@@ -83,7 +83,7 @@ | |
"weaknesses": [ | ||
{ | ||
"source": "[email protected]", | ||
"type": "Primary", | ||
"type": "Secondary", | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
|
@@ -101,9 +101,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:a:qurl:dynamic_widgets:*:*:*:*:*:wordpress:*:*", | ||
"criteria": "cpe:2.3:a:vivwebsolutions:dynamic_widgets:*:*:*:*:*:wordpress:*:*", | ||
"versionEndExcluding": "1.5.11", | ||
"matchCriteriaId": "7103CC42-3CEE-40CA-B419-DB7555F846D8" | ||
"matchCriteriaId": "060BE9FE-4144-4BBE-8A6E-845F013BA6AE" | ||
} | ||
] | ||
} | ||
|
@@ -140,6 +140,36 @@ | |
"Permissions Required", | ||
"Third Party Advisory" | ||
] | ||
}, | ||
{ | ||
"url": "https://github.com/wp-plugins/dynamic-widgets/commit/d0a19c6efcdc86d7093b369bc9e29a0629e57795", | ||
"source": "af854a3a-2127-422b-91ae-364da2661108", | ||
"tags": [ | ||
"Patch" | ||
] | ||
}, | ||
{ | ||
"url": "https://github.com/wp-plugins/dynamic-widgets/releases/tag/1.5.11", | ||
"source": "af854a3a-2127-422b-91ae-364da2661108", | ||
"tags": [ | ||
"Release Notes" | ||
] | ||
}, | ||
{ | ||
"url": "https://vuldb.com/?ctiid.225353", | ||
"source": "af854a3a-2127-422b-91ae-364da2661108", | ||
"tags": [ | ||
"Permissions Required", | ||
"Third Party Advisory" | ||
] | ||
}, | ||
{ | ||
"url": "https://vuldb.com/?id.225353", | ||
"source": "af854a3a-2127-422b-91ae-364da2661108", | ||
"tags": [ | ||
"Permissions Required", | ||
"Third Party Advisory" | ||
] | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,8 +2,8 @@ | |
"id": "CVE-2015-9436", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2019-09-26T02:15:10.537", | ||
"lastModified": "2019-09-26T15:51:20.680", | ||
"vulnStatus": "Analyzed", | ||
"lastModified": "2024-11-27T20:19:36.870", | ||
"vulnStatus": "Modified", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
|
@@ -23,16 +23,16 @@ | |
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", | ||
"baseScore": 5.4, | ||
"baseSeverity": "MEDIUM", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "LOW", | ||
"userInteraction": "REQUIRED", | ||
"scope": "CHANGED", | ||
"confidentialityImpact": "LOW", | ||
"integrityImpact": "LOW", | ||
"availabilityImpact": "NONE", | ||
"baseScore": 5.4, | ||
"baseSeverity": "MEDIUM" | ||
"availabilityImpact": "NONE" | ||
}, | ||
"exploitabilityScore": 2.3, | ||
"impactScore": 2.7 | ||
|
@@ -45,13 +45,13 @@ | |
"cvssData": { | ||
"version": "2.0", | ||
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", | ||
"baseScore": 3.5, | ||
"accessVector": "NETWORK", | ||
"accessComplexity": "MEDIUM", | ||
"authentication": "SINGLE", | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "PARTIAL", | ||
"availabilityImpact": "NONE", | ||
"baseScore": 3.5 | ||
"availabilityImpact": "NONE" | ||
}, | ||
"baseSeverity": "LOW", | ||
"exploitabilityScore": 6.8, | ||
|
@@ -85,9 +85,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:a:qurl:dynamic_widgets:*:*:*:*:*:wordpress:*:*", | ||
"criteria": "cpe:2.3:a:vivwebsolutions:dynamic_widgets:*:*:*:*:*:wordpress:*:*", | ||
"versionEndExcluding": "1.5.11", | ||
"matchCriteriaId": "7103CC42-3CEE-40CA-B419-DB7555F846D8" | ||
"matchCriteriaId": "060BE9FE-4144-4BBE-8A6E-845F013BA6AE" | ||
} | ||
] | ||
} | ||
|
@@ -118,6 +118,30 @@ | |
"Exploit", | ||
"Third Party Advisory" | ||
] | ||
}, | ||
{ | ||
"url": "http://cinu.pl/research/wp-plugins/mail_489304900a50751da1495e2ea660bc51.html", | ||
"source": "af854a3a-2127-422b-91ae-364da2661108", | ||
"tags": [ | ||
"Exploit", | ||
"Third Party Advisory" | ||
] | ||
}, | ||
{ | ||
"url": "https://wordpress.org/plugins/dynamic-widgets/#developers", | ||
"source": "af854a3a-2127-422b-91ae-364da2661108", | ||
"tags": [ | ||
"Product", | ||
"Third Party Advisory" | ||
] | ||
}, | ||
{ | ||
"url": "https://wpvulndb.com/vulnerabilities/8258", | ||
"source": "af854a3a-2127-422b-91ae-364da2661108", | ||
"tags": [ | ||
"Exploit", | ||
"Third Party Advisory" | ||
] | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,8 +2,8 @@ | |
"id": "CVE-2015-9437", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2019-09-26T02:15:10.600", | ||
"lastModified": "2019-09-26T15:16:13.963", | ||
"vulnStatus": "Analyzed", | ||
"lastModified": "2024-11-27T20:19:36.870", | ||
"vulnStatus": "Modified", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
|
@@ -23,16 +23,16 @@ | |
"cvssData": { | ||
"version": "3.1", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", | ||
"baseScore": 6.5, | ||
"baseSeverity": "MEDIUM", | ||
"attackVector": "NETWORK", | ||
"attackComplexity": "LOW", | ||
"privilegesRequired": "NONE", | ||
"userInteraction": "REQUIRED", | ||
"scope": "UNCHANGED", | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "HIGH", | ||
"availabilityImpact": "NONE", | ||
"baseScore": 6.5, | ||
"baseSeverity": "MEDIUM" | ||
"availabilityImpact": "NONE" | ||
}, | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 3.6 | ||
|
@@ -45,13 +45,13 @@ | |
"cvssData": { | ||
"version": "2.0", | ||
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", | ||
"baseScore": 4.3, | ||
"accessVector": "NETWORK", | ||
"accessComplexity": "MEDIUM", | ||
"authentication": "NONE", | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "PARTIAL", | ||
"availabilityImpact": "NONE", | ||
"baseScore": 4.3 | ||
"availabilityImpact": "NONE" | ||
}, | ||
"baseSeverity": "MEDIUM", | ||
"exploitabilityScore": 8.6, | ||
|
@@ -85,9 +85,9 @@ | |
"cpeMatch": [ | ||
{ | ||
"vulnerable": true, | ||
"criteria": "cpe:2.3:a:qurl:dynamic_widgets:*:*:*:*:*:wordpress:*:*", | ||
"criteria": "cpe:2.3:a:vivwebsolutions:dynamic_widgets:*:*:*:*:*:wordpress:*:*", | ||
"versionEndExcluding": "1.5.11", | ||
"matchCriteriaId": "7103CC42-3CEE-40CA-B419-DB7555F846D8" | ||
"matchCriteriaId": "060BE9FE-4144-4BBE-8A6E-845F013BA6AE" | ||
} | ||
] | ||
} | ||
|
@@ -118,6 +118,30 @@ | |
"Exploit", | ||
"Third Party Advisory" | ||
] | ||
}, | ||
{ | ||
"url": "http://cinu.pl/research/wp-plugins/mail_489304900a50751da1495e2ea660bc51.html", | ||
"source": "af854a3a-2127-422b-91ae-364da2661108", | ||
"tags": [ | ||
"Exploit", | ||
"Third Party Advisory" | ||
] | ||
}, | ||
{ | ||
"url": "https://wordpress.org/plugins/dynamic-widgets/#developers", | ||
"source": "af854a3a-2127-422b-91ae-364da2661108", | ||
"tags": [ | ||
"Product", | ||
"Third Party Advisory" | ||
] | ||
}, | ||
{ | ||
"url": "https://wpvulndb.com/vulnerabilities/8258", | ||
"source": "af854a3a-2127-422b-91ae-364da2661108", | ||
"tags": [ | ||
"Exploit", | ||
"Third Party Advisory" | ||
] | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
{ | ||
"id": "CVE-2017-13316", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-11-27T20:15:22.363", | ||
"lastModified": "2024-11-27T20:15:22.363", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "In checkPermissions of RecognitionService.java, there is a possible\u00a0permissions bypass due to a missing permission check. This could lead to\u00a0local escalation of privilege with no additional execution privileges\u00a0needed. User interaction is not needed for exploitation." | ||
} | ||
], | ||
"metrics": {}, | ||
"references": [ | ||
{ | ||
"url": "https://source.android.com/security/bulletin/pixel/2018-05-01", | ||
"source": "[email protected]" | ||
} | ||
] | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
{ | ||
"id": "CVE-2017-13319", | ||
"sourceIdentifier": "[email protected]", | ||
"published": "2024-11-27T20:15:22.493", | ||
"lastModified": "2024-11-27T20:15:22.493", | ||
"vulnStatus": "Received", | ||
"cveTags": [], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "In pvmp3_get_main_data_size of pvmp3_get_main_data_size.cpp, there is a\u00a0possible buffer overread due to a missing bounds check. This could lead to\u00a0remote information disclosure of global static variables with no additional\u00a0execution privileges needed. User interaction is not needed for\u00a0exploitation." | ||
} | ||
], | ||
"metrics": {}, | ||
"references": [ | ||
{ | ||
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-05-01", | ||
"source": "[email protected]" | ||
} | ||
] | ||
} |
Oops, something went wrong.