-
Notifications
You must be signed in to change notification settings - Fork 336
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
GHSA-2256-rrc4-rg7p GHSA-5f6x-wr72-j225 GHSA-67pv-pwcc-82hx GHSA-9h35-p54q-hhww GHSA-cgf8-h3fp-h956 GHSA-cqv4-m6cq-x9jx GHSA-f865-7gxm-95r4 GHSA-ghvx-5v39-7hv5 GHSA-h2q7-whv7-5m3x GHSA-qrhv-m52g-wcw8
- Loading branch information
1 parent
ff7875e
commit 787f99e
Showing
10 changed files
with
411 additions
and
0 deletions.
There are no files selected for viewing
46 changes: 46 additions & 0 deletions
46
advisories/unreviewed/2023/10/GHSA-2256-rrc4-rg7p/GHSA-2256-rrc4-rg7p.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,46 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-2256-rrc4-rg7p", | ||
"modified": "2023-10-20T06:30:19Z", | ||
"published": "2023-10-20T06:30:19Z", | ||
"aliases": [ | ||
"CVE-2023-5613" | ||
], | ||
"details": "The Super Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tpsscode' shortcode in all versions up to, and including, 2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" | ||
} | ||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5613" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/browser/super-testimonial/tags/2.8/tp-testimonials.php#L214" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/changeset/2979378/super-testimonial#file9" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52659f1c-642e-4c88-b3d0-d5c5a206b11c?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-79" | ||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": null | ||
} | ||
} |
42 changes: 42 additions & 0 deletions
42
advisories/unreviewed/2023/10/GHSA-5f6x-wr72-j225/GHSA-5f6x-wr72-j225.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,42 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-5f6x-wr72-j225", | ||
"modified": "2023-10-20T06:30:19Z", | ||
"published": "2023-10-20T06:30:19Z", | ||
"aliases": [ | ||
"CVE-2023-5668" | ||
], | ||
"details": "The WhatsApp Share Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'whatsapp' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" | ||
} | ||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5668" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/browser/whatsapp/tags/1.0.1/class-frontend.php#L46" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/77911b0f-c028-49ae-b85e-15909d806e30?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-79" | ||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": null | ||
} | ||
} |
46 changes: 46 additions & 0 deletions
46
advisories/unreviewed/2023/10/GHSA-67pv-pwcc-82hx/GHSA-67pv-pwcc-82hx.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,46 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-67pv-pwcc-82hx", | ||
"modified": "2023-10-20T06:30:19Z", | ||
"published": "2023-10-20T06:30:19Z", | ||
"aliases": [ | ||
"CVE-2023-5614" | ||
], | ||
"details": "The Theme Switcha plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'theme_switcha_list' shortcode in all versions up to, and including, 3.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", | ||
"severity": [ | ||
{ | ||
"type": "CVSS_V3", | ||
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" | ||
} | ||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5614" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/browser/theme-switcha/tags/3.3/inc/plugin-core.php#L445" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://plugins.trac.wordpress.org/changeset/2979783/theme-switcha#file1" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b0937fe-3ea6-427a-aef7-539c08687abb?source=cve" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
"CWE-79" | ||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": null | ||
} | ||
} |
55 changes: 55 additions & 0 deletions
55
advisories/unreviewed/2023/10/GHSA-9h35-p54q-hhww/GHSA-9h35-p54q-hhww.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,55 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-9h35-p54q-hhww", | ||
"modified": "2023-10-20T06:30:19Z", | ||
"published": "2023-10-20T06:30:19Z", | ||
"aliases": [ | ||
"CVE-2023-46267" | ||
], | ||
"details": "Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows XSS via a text/html e-mail message containing an SVG image with a USE element. This is related to wash_uri in rcube_washtml.php.", | ||
"severity": [ | ||
|
||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46267" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/roundcube/roundcubemail/issues/9168" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/roundcube/roundcubemail/compare/1.4.14...1.4.15" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/roundcube/roundcubemail/compare/1.5.4...1.5.5" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://roundcube.net/news/2023/10/16/security-update-1.6.4-released" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
|
||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": null | ||
} | ||
} |
47 changes: 47 additions & 0 deletions
47
advisories/unreviewed/2023/10/GHSA-cgf8-h3fp-h956/GHSA-cgf8-h3fp-h956.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,47 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-cgf8-h3fp-h956", | ||
"modified": "2023-10-20T06:30:19Z", | ||
"published": "2023-10-20T06:30:19Z", | ||
"aliases": [ | ||
"CVE-2023-46277" | ||
], | ||
"details": "please (aka pleaser) through 0.5.4 allows privilege escalation through the TIOCSTI and/or TIOCLINUX ioctl. (If both TIOCSTI and TIOCLINUX are disabled, this cannot be exploited.)", | ||
"severity": [ | ||
|
||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46277" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/rustsec/advisory-db/pull/1798" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://gitlab.com/edneville/please/-/issues/13" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://gitlab.com/edneville/please/-/merge_requests/69#note_1594254575" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://rustsec.org/advisories/RUSTSEC-2023-0066.html" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
|
||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": null | ||
} | ||
} |
35 changes: 35 additions & 0 deletions
35
advisories/unreviewed/2023/10/GHSA-cqv4-m6cq-x9jx/GHSA-cqv4-m6cq-x9jx.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-cqv4-m6cq-x9jx", | ||
"modified": "2023-10-20T06:30:19Z", | ||
"published": "2023-10-20T06:30:19Z", | ||
"aliases": [ | ||
"CVE-2023-45471" | ||
], | ||
"details": "The QAD Search Server is vulnerable to Stored Cross-Site Scripting (XSS) in versions up to, and including, 1.0.0.315 due to insufficient checks on indexes. This makes it possible for unauthenticated attackers to create a new index and inject a malicious web script into its name, that will execute whenever a user accesses the search page.", | ||
"severity": [ | ||
|
||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45471" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/itsAptx/CVE-2023-45471" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
|
||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": null | ||
} | ||
} |
35 changes: 35 additions & 0 deletions
35
advisories/unreviewed/2023/10/GHSA-f865-7gxm-95r4/GHSA-f865-7gxm-95r4.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-f865-7gxm-95r4", | ||
"modified": "2023-10-20T06:30:19Z", | ||
"published": "2023-10-20T06:30:19Z", | ||
"aliases": [ | ||
"CVE-2023-45394" | ||
], | ||
"details": "Stored Cross-Site Scripting (XSS) vulnerability in the Company field in the \"Request a Quote\" Section of Small CRM v3.0 allows an attacker to store and execute malicious javascript code in the Admin panel which leads to Admin account takeover.", | ||
"severity": [ | ||
|
||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45394" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/kartik753/CVE/blob/main/CVE-2023-45394" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
|
||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": null | ||
} | ||
} |
35 changes: 35 additions & 0 deletions
35
advisories/unreviewed/2023/10/GHSA-ghvx-5v39-7hv5/GHSA-ghvx-5v39-7hv5.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-ghvx-5v39-7hv5", | ||
"modified": "2023-10-20T06:30:19Z", | ||
"published": "2023-10-20T06:30:19Z", | ||
"aliases": [ | ||
"CVE-2023-34051" | ||
], | ||
"details": "VMware Aria Operations for Logs contains an authentication bypass vulnerability. An unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.\n", | ||
"severity": [ | ||
|
||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34051" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://www.vmware.com/security/advisories/VMSA-2023-0021.html" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
|
||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": null | ||
} | ||
} |
35 changes: 35 additions & 0 deletions
35
advisories/unreviewed/2023/10/GHSA-h2q7-whv7-5m3x/GHSA-h2q7-whv7-5m3x.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,35 @@ | ||
{ | ||
"schema_version": "1.4.0", | ||
"id": "GHSA-h2q7-whv7-5m3x", | ||
"modified": "2023-10-20T06:30:19Z", | ||
"published": "2023-10-20T06:30:19Z", | ||
"aliases": [ | ||
"CVE-2023-40361" | ||
], | ||
"details": "SECUDOS Qiata (DOMOS OS) 4.13 has Insecure Permissions for the previewRm.sh daily cronjob. To exploit this, an attacker needs access as a low-privileged user to the underlying DOMOS system. Every user on the system has write permission for previewRm.sh, which is executed by the root user.", | ||
"severity": [ | ||
|
||
], | ||
"affected": [ | ||
|
||
], | ||
"references": [ | ||
{ | ||
"type": "ADVISORY", | ||
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40361" | ||
}, | ||
{ | ||
"type": "WEB", | ||
"url": "https://github.com/vianic/CVE-2023-40361/blob/main/advisory/advisory.md" | ||
} | ||
], | ||
"database_specific": { | ||
"cwe_ids": [ | ||
|
||
], | ||
"severity": null, | ||
"github_reviewed": false, | ||
"github_reviewed_at": null, | ||
"nvd_published_at": null | ||
} | ||
} |
Oops, something went wrong.