Skip to content

Commit

Permalink
Auto-Update: 2024-11-27T21:01:06.385665+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
cad-safe-bot committed Nov 27, 2024
1 parent a08f514 commit e46b29d
Show file tree
Hide file tree
Showing 146 changed files with 9,294 additions and 2,041 deletions.
3,077 changes: 2,873 additions & 204 deletions CVE-2014/CVE-2014-35xx/CVE-2014-3566.json

Large diffs are not rendered by default.

86 changes: 58 additions & 28 deletions CVE-2015/CVE-2015-101xx/CVE-2015-10100.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
"id": "CVE-2015-10100",
"sourceIdentifier": "[email protected]",
"published": "2023-04-10T18:15:07.873",
"lastModified": "2024-05-17T01:03:08.010",
"lastModified": "2024-11-27T20:19:36.870",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
Expand All @@ -14,44 +14,44 @@
"metrics": {
"cvssMetricV31": [
{
"source": "[email protected]",
"type": "Primary",
"source": "[email protected]",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "[email protected]",
"type": "Secondary",
"source": "[email protected]",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
Expand All @@ -61,13 +61,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
Expand All @@ -83,7 +83,7 @@
"weaknesses": [
{
"source": "[email protected]",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
Expand All @@ -101,9 +101,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qurl:dynamic_widgets:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:vivwebsolutions:dynamic_widgets:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.11",
"matchCriteriaId": "7103CC42-3CEE-40CA-B419-DB7555F846D8"
"matchCriteriaId": "060BE9FE-4144-4BBE-8A6E-845F013BA6AE"
}
]
}
Expand Down Expand Up @@ -140,6 +140,36 @@
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://github.com/wp-plugins/dynamic-widgets/commit/d0a19c6efcdc86d7093b369bc9e29a0629e57795",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/wp-plugins/dynamic-widgets/releases/tag/1.5.11",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.225353",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.225353",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
}
]
}
42 changes: 33 additions & 9 deletions CVE-2015/CVE-2015-94xx/CVE-2015-9436.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2015-9436",
"sourceIdentifier": "[email protected]",
"published": "2019-09-26T02:15:10.537",
"lastModified": "2019-09-26T15:51:20.680",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:19:36.870",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
Expand All @@ -23,16 +23,16 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
Expand All @@ -45,13 +45,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"baseScore": 3.5,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
Expand Down Expand Up @@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qurl:dynamic_widgets:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:vivwebsolutions:dynamic_widgets:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.11",
"matchCriteriaId": "7103CC42-3CEE-40CA-B419-DB7555F846D8"
"matchCriteriaId": "060BE9FE-4144-4BBE-8A6E-845F013BA6AE"
}
]
}
Expand Down Expand Up @@ -118,6 +118,30 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "http://cinu.pl/research/wp-plugins/mail_489304900a50751da1495e2ea660bc51.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/dynamic-widgets/#developers",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
]
},
{
"url": "https://wpvulndb.com/vulnerabilities/8258",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}
42 changes: 33 additions & 9 deletions CVE-2015/CVE-2015-94xx/CVE-2015-9437.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,8 +2,8 @@
"id": "CVE-2015-9437",
"sourceIdentifier": "[email protected]",
"published": "2019-09-26T02:15:10.600",
"lastModified": "2019-09-26T15:16:13.963",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T20:19:36.870",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
Expand All @@ -23,16 +23,16 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
Expand All @@ -45,13 +45,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.3
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
Expand Down Expand Up @@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qurl:dynamic_widgets:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:vivwebsolutions:dynamic_widgets:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.11",
"matchCriteriaId": "7103CC42-3CEE-40CA-B419-DB7555F846D8"
"matchCriteriaId": "060BE9FE-4144-4BBE-8A6E-845F013BA6AE"
}
]
}
Expand Down Expand Up @@ -118,6 +118,30 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "http://cinu.pl/research/wp-plugins/mail_489304900a50751da1495e2ea660bc51.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/dynamic-widgets/#developers",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
]
},
{
"url": "https://wpvulndb.com/vulnerabilities/8258",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}
21 changes: 21 additions & 0 deletions CVE-2017/CVE-2017-133xx/CVE-2017-13316.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
{
"id": "CVE-2017-13316",
"sourceIdentifier": "[email protected]",
"published": "2024-11-27T20:15:22.363",
"lastModified": "2024-11-27T20:15:22.363",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In checkPermissions of RecognitionService.java, there is a possible\u00a0permissions bypass due to a missing permission check. This could lead to\u00a0local escalation of privilege with no additional execution privileges\u00a0needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2018-05-01",
"source": "[email protected]"
}
]
}
21 changes: 21 additions & 0 deletions CVE-2017/CVE-2017-133xx/CVE-2017-13319.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
{
"id": "CVE-2017-13319",
"sourceIdentifier": "[email protected]",
"published": "2024-11-27T20:15:22.493",
"lastModified": "2024-11-27T20:15:22.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In pvmp3_get_main_data_size of pvmp3_get_main_data_size.cpp, there is a\u00a0possible buffer overread due to a missing bounds check. This could lead to\u00a0remote information disclosure of global static variables with no additional\u00a0execution privileges needed. User interaction is not needed for\u00a0exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-05-01",
"source": "[email protected]"
}
]
}
Loading

0 comments on commit e46b29d

Please sign in to comment.