-
Notifications
You must be signed in to change notification settings - Fork 206
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- 149 new CVEs: CVE-2023-44258, CVE-2023-44988, CVE-2023-45002, CVE-2023-45045, CVE-2023-45061, CVE-2023-45101, CVE-2023-45104, CVE-2023-45110, CVE-2023-45271, CVE-2023-45275, CVE-2023-45631, CVE-2023-45636, CVE-2023-45649, CVE-2023-45760, CVE-2023-45765, CVE-2023-45766, CVE-2023-45828, CVE-2023-46073, CVE-2023-46079, CVE-2023-46080, CVE-2023-46082, CVE-2023-46083, CVE-2023-46188, CVE-2023-46195, CVE-2023-46196, CVE-2023-46203, CVE-2023-46206, CVE-2023-46309, CVE-2023-46605, CVE-2023-46606, CVE-2023-46607, CVE-2023-46608, CVE-2023-46609, CVE-2023-46610, CVE-2023-46611, CVE-2023-46612, CVE-2023-46616, CVE-2023-46628, CVE-2023-46631, CVE-2023-46632, CVE-2023-46633, CVE-2023-46635, CVE-2023-46637, CVE-2023-46639, CVE-2023-46644, CVE-2023-47179, CVE-2023-47180, CVE-2023-47183, CVE-2023-47187, CVE-2023-47188, CVE-2023-47224, CVE-2023-47225, CVE-2023-47241, CVE-2023-47515, CVE-2023-47523, CVE-2023-47557, CVE-2023-47647, CVE-2023-47648, CVE-2023-47661, CVE-2023-47689, CVE-2023-47692, CVE-2023-47693, CVE-2024-13107, CVE-2024-37093, CVE-2024-37102, CVE-2024-37103, CVE-2024-37104, CVE-2024-37235, CVE-2024-37236, CVE-2024-37238, CVE-2024-37240, CVE-2024-37242, CVE-2024-37243, CVE-2024-37272, CVE-2024-37274, CVE-2024-37412, CVE-2024-37413, CVE-2024-37417, CVE-2024-37421, CVE-2024-37426, CVE-2024-37431, CVE-2024-37435, CVE-2024-37441, CVE-2024-37448, CVE-2024-37450, CVE-2024-37451, CVE-2024-37458, CVE-2024-37467, CVE-2024-37469, CVE-2024-37473, CVE-2024-37478, CVE-2024-37490, CVE-2024-37491, CVE-2024-37493, CVE-2024-37503, CVE-2024-37508, CVE-2024-37511, CVE-2024-37518, CVE-2024-37540, CVE-2024-37543, CVE-2024-37937, CVE-2024-38691, CVE-2024-38729, CVE-2024-38751, CVE-2024-38753, CVE-2024-38754, CVE-2024-38762, CVE-2024-38763, CVE-2024-38765, CVE-2024-38766, CVE-2024-38789, CVE-2024-38790, CVE-2024-43927, CVE-2024-56018, CVE-2024-56022, CVE-2024-56023, CVE-2024-56024, CVE-2024-56025, CVE-2024-56026, CVE-2024-56236, CVE-2024-56237, CVE-2024-56238, CVE-2024-56239, CVE-2024-56240, CVE-2024-56241, CVE-2024-56242, CVE-2024-56243, CVE-2024-56244, CVE-2024-56245, CVE-2024-56246, CVE-2024-56247, CVE-2024-56248, CVE-2024-56249, CVE-2024-56250, CVE-2024-56251, CVE-2024-56252, CVE-2024-56253, CVE-2024-56254, CVE-2024-56255, CVE-2024-56258, CVE-2024-56259, CVE-2024-56260, CVE-2024-56261, CVE-2024-56262, CVE-2024-56263, CVE-2024-56264, CVE-2024-56266, CVE-2024-56267, CVE-2024-56302 - 0 updated CVEs:
- Loading branch information
cvelistV5 Github Action
committed
Jan 2, 2025
1 parent
f92bbaa
commit 3698129
Showing
151 changed files
with
22,579 additions
and
70 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,142 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2023-44258", | ||
"assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "Patchstack", | ||
"dateReserved": "2023-09-27T12:39:26.099Z", | ||
"datePublished": "2025-01-02T11:59:46.069Z", | ||
"dateUpdated": "2025-01-02T11:59:46.069Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"providerMetadata": { | ||
"orgId": "21595511-bba5-4825-b968-b78d1f9984a3", | ||
"shortName": "Patchstack", | ||
"dateUpdated": "2025-01-02T11:59:46.069Z" | ||
}, | ||
"title": "WordPress Schema App Structured Data plugin <= 1.23.1 - Broken Access Control + CSRF vulnerability", | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"cweId": "CWE-862", | ||
"description": "CWE-862 Missing Authorization", | ||
"lang": "en", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"impacts": [ | ||
{ | ||
"capecId": "CAPEC-180", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels" | ||
} | ||
] | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"vendor": "Schema App", | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"defaultStatus": "unaffected", | ||
"packageName": "schema-app-structured-data-for-schemaorg", | ||
"product": "Schema App Structured Data", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "1.23.1", | ||
"status": "affected", | ||
"version": "n/a", | ||
"versionType": "custom", | ||
"changes": [ | ||
{ | ||
"at": "1.23.2", | ||
"status": "unaffected" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "Missing Authorization vulnerability in Schema App Schema App Structured Data allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Schema App Structured Data: from n/a through 1.23.1.", | ||
"supportingMedia": [ | ||
{ | ||
"type": "text/html", | ||
"base64": false, | ||
"value": "<p>Missing Authorization vulnerability in Schema App Schema App Structured Data allows Exploiting Incorrectly Configured Access Control Security Levels.</p><p>This issue affects Schema App Structured Data: from n/a through 1.23.1.</p>" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"tags": [ | ||
"vdb-entry" | ||
], | ||
"url": "https://patchstack.com/database/wordpress/plugin/schema-app-structured-data-for-schemaorg/vulnerability/wordpress-schema-app-structured-data-plugin-1-22-3-csrf-broken-access-control-vulnerability?_s_id=cve" | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"format": "CVSS", | ||
"scenarios": [ | ||
{ | ||
"lang": "en", | ||
"value": "GENERAL" | ||
} | ||
], | ||
"cvssV3_1": { | ||
"baseScore": 5.3, | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", | ||
"baseSeverity": "MEDIUM", | ||
"attackComplexity": "LOW", | ||
"attackVector": "NETWORK", | ||
"availabilityImpact": "NONE", | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "LOW", | ||
"privilegesRequired": "NONE", | ||
"scope": "UNCHANGED", | ||
"userInteraction": "NONE", | ||
"version": "3.1" | ||
} | ||
} | ||
], | ||
"solutions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "No patched version is available. No reply from the vendor." | ||
} | ||
], | ||
"value": "No patched version is available. No reply from the vendor." | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"type": "finder", | ||
"user": "00000000-0000-4000-9000-000000000000", | ||
"value": "Rio Darmawan (Patchstack Alliance)" | ||
} | ||
], | ||
"source": { | ||
"discovery": "EXTERNAL" | ||
}, | ||
"x_generator": { | ||
"engine": "Vulnogram 0.2.0" | ||
} | ||
} | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,142 @@ | ||
{ | ||
"dataType": "CVE_RECORD", | ||
"dataVersion": "5.1", | ||
"cveMetadata": { | ||
"cveId": "CVE-2023-44988", | ||
"assignerOrgId": "21595511-bba5-4825-b968-b78d1f9984a3", | ||
"state": "PUBLISHED", | ||
"assignerShortName": "Patchstack", | ||
"dateReserved": "2023-10-02T09:38:08.907Z", | ||
"datePublished": "2025-01-02T11:59:46.731Z", | ||
"dateUpdated": "2025-01-02T11:59:46.731Z" | ||
}, | ||
"containers": { | ||
"cna": { | ||
"providerMetadata": { | ||
"orgId": "21595511-bba5-4825-b968-b78d1f9984a3", | ||
"shortName": "Patchstack", | ||
"dateUpdated": "2025-01-02T11:59:46.731Z" | ||
}, | ||
"title": "WordPress WP Custom Admin Interface plugin <= 7.32 - Broken Access Control vulnerability", | ||
"problemTypes": [ | ||
{ | ||
"descriptions": [ | ||
{ | ||
"cweId": "CWE-862", | ||
"description": "CWE-862 Missing Authorization", | ||
"lang": "en", | ||
"type": "CWE" | ||
} | ||
] | ||
} | ||
], | ||
"impacts": [ | ||
{ | ||
"capecId": "CAPEC-180", | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels" | ||
} | ||
] | ||
} | ||
], | ||
"affected": [ | ||
{ | ||
"vendor": "Martin Gibson", | ||
"collectionURL": "https://wordpress.org/plugins", | ||
"defaultStatus": "unaffected", | ||
"packageName": "wp-custom-admin-interface", | ||
"product": "WP Custom Admin Interface", | ||
"versions": [ | ||
{ | ||
"lessThanOrEqual": "7.32", | ||
"status": "affected", | ||
"version": "n/a", | ||
"versionType": "custom", | ||
"changes": [ | ||
{ | ||
"at": "7.33", | ||
"status": "unaffected" | ||
} | ||
] | ||
} | ||
] | ||
} | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "Missing Authorization vulnerability in Martin Gibson WP Custom Admin Interface allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP Custom Admin Interface: from n/a through 7.32.", | ||
"supportingMedia": [ | ||
{ | ||
"type": "text/html", | ||
"base64": false, | ||
"value": "<p>Missing Authorization vulnerability in Martin Gibson WP Custom Admin Interface allows Exploiting Incorrectly Configured Access Control Security Levels.</p><p>This issue affects WP Custom Admin Interface: from n/a through 7.32.</p>" | ||
} | ||
] | ||
} | ||
], | ||
"references": [ | ||
{ | ||
"tags": [ | ||
"vdb-entry" | ||
], | ||
"url": "https://patchstack.com/database/wordpress/plugin/wp-custom-admin-interface/vulnerability/wordpress-wp-custom-admin-interface-plugin-7-32-broken-access-control-vulnerability?_s_id=cve" | ||
} | ||
], | ||
"metrics": [ | ||
{ | ||
"format": "CVSS", | ||
"scenarios": [ | ||
{ | ||
"lang": "en", | ||
"value": "GENERAL" | ||
} | ||
], | ||
"cvssV3_1": { | ||
"baseScore": 4.3, | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", | ||
"baseSeverity": "MEDIUM", | ||
"attackComplexity": "LOW", | ||
"attackVector": "NETWORK", | ||
"availabilityImpact": "NONE", | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "LOW", | ||
"privilegesRequired": "LOW", | ||
"scope": "UNCHANGED", | ||
"userInteraction": "NONE", | ||
"version": "3.1" | ||
} | ||
} | ||
], | ||
"solutions": [ | ||
{ | ||
"lang": "en", | ||
"supportingMedia": [ | ||
{ | ||
"base64": false, | ||
"type": "text/html", | ||
"value": "Update the WordPress WP Custom Admin Interface plugin to the latest available version (at least 7.33)." | ||
} | ||
], | ||
"value": "Update the WordPress WP Custom Admin Interface plugin to the latest available version (at least 7.33)." | ||
} | ||
], | ||
"credits": [ | ||
{ | ||
"lang": "en", | ||
"type": "finder", | ||
"user": "00000000-0000-4000-9000-000000000000", | ||
"value": "Abdi Pranata (Patchstack Alliance)" | ||
} | ||
], | ||
"source": { | ||
"discovery": "EXTERNAL" | ||
}, | ||
"x_generator": { | ||
"engine": "Vulnogram 0.2.0" | ||
} | ||
} | ||
} | ||
} |
Oops, something went wrong.