Skip to content

Commit

Permalink
Publish Advisories
Browse files Browse the repository at this point in the history
  • Loading branch information
advisory-database[bot] committed Oct 20, 2023
1 parent ff7875e commit 787f99e
Show file tree
Hide file tree
Showing 10 changed files with 411 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
{
"schema_version": "1.4.0",
"id": "GHSA-2256-rrc4-rg7p",
"modified": "2023-10-20T06:30:19Z",
"published": "2023-10-20T06:30:19Z",
"aliases": [
"CVE-2023-5613"
],
"details": "The Super Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tpsscode' shortcode in all versions up to, and including, 2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5613"
},
{
"type": "WEB",
"url": "https://plugins.trac.wordpress.org/browser/super-testimonial/tags/2.8/tp-testimonials.php#L214"
},
{
"type": "WEB",
"url": "https://plugins.trac.wordpress.org/changeset/2979378/super-testimonial#file9"
},
{
"type": "WEB",
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52659f1c-642e-4c88-b3d0-d5c5a206b11c?source=cve"
}
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
{
"schema_version": "1.4.0",
"id": "GHSA-5f6x-wr72-j225",
"modified": "2023-10-20T06:30:19Z",
"published": "2023-10-20T06:30:19Z",
"aliases": [
"CVE-2023-5668"
],
"details": "The WhatsApp Share Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'whatsapp' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5668"
},
{
"type": "WEB",
"url": "https://plugins.trac.wordpress.org/browser/whatsapp/tags/1.0.1/class-frontend.php#L46"
},
{
"type": "WEB",
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/77911b0f-c028-49ae-b85e-15909d806e30?source=cve"
}
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
{
"schema_version": "1.4.0",
"id": "GHSA-67pv-pwcc-82hx",
"modified": "2023-10-20T06:30:19Z",
"published": "2023-10-20T06:30:19Z",
"aliases": [
"CVE-2023-5614"
],
"details": "The Theme Switcha plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'theme_switcha_list' shortcode in all versions up to, and including, 3.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N"
}
],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5614"
},
{
"type": "WEB",
"url": "https://plugins.trac.wordpress.org/browser/theme-switcha/tags/3.3/inc/plugin-core.php#L445"
},
{
"type": "WEB",
"url": "https://plugins.trac.wordpress.org/changeset/2979783/theme-switcha#file1"
},
{
"type": "WEB",
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b0937fe-3ea6-427a-aef7-539c08687abb?source=cve"
}
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,55 @@
{
"schema_version": "1.4.0",
"id": "GHSA-9h35-p54q-hhww",
"modified": "2023-10-20T06:30:19Z",
"published": "2023-10-20T06:30:19Z",
"aliases": [
"CVE-2023-46267"
],
"details": "Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows XSS via a text/html e-mail message containing an SVG image with a USE element. This is related to wash_uri in rcube_washtml.php.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46267"
},
{
"type": "WEB",
"url": "https://github.com/roundcube/roundcubemail/issues/9168"
},
{
"type": "WEB",
"url": "https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d"
},
{
"type": "WEB",
"url": "https://github.com/roundcube/roundcubemail/compare/1.4.14...1.4.15"
},
{
"type": "WEB",
"url": "https://github.com/roundcube/roundcubemail/compare/1.5.4...1.5.5"
},
{
"type": "WEB",
"url": "https://roundcube.net/news/2023/10/16/security-update-1.6.4-released"
},
{
"type": "WEB",
"url": "https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
{
"schema_version": "1.4.0",
"id": "GHSA-cgf8-h3fp-h956",
"modified": "2023-10-20T06:30:19Z",
"published": "2023-10-20T06:30:19Z",
"aliases": [
"CVE-2023-46277"
],
"details": "please (aka pleaser) through 0.5.4 allows privilege escalation through the TIOCSTI and/or TIOCLINUX ioctl. (If both TIOCSTI and TIOCLINUX are disabled, this cannot be exploited.)",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46277"
},
{
"type": "WEB",
"url": "https://github.com/rustsec/advisory-db/pull/1798"
},
{
"type": "WEB",
"url": "https://gitlab.com/edneville/please/-/issues/13"
},
{
"type": "WEB",
"url": "https://gitlab.com/edneville/please/-/merge_requests/69#note_1594254575"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2023-0066.html"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{
"schema_version": "1.4.0",
"id": "GHSA-cqv4-m6cq-x9jx",
"modified": "2023-10-20T06:30:19Z",
"published": "2023-10-20T06:30:19Z",
"aliases": [
"CVE-2023-45471"
],
"details": "The QAD Search Server is vulnerable to Stored Cross-Site Scripting (XSS) in versions up to, and including, 1.0.0.315 due to insufficient checks on indexes. This makes it possible for unauthenticated attackers to create a new index and inject a malicious web script into its name, that will execute whenever a user accesses the search page.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45471"
},
{
"type": "WEB",
"url": "https://github.com/itsAptx/CVE-2023-45471"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{
"schema_version": "1.4.0",
"id": "GHSA-f865-7gxm-95r4",
"modified": "2023-10-20T06:30:19Z",
"published": "2023-10-20T06:30:19Z",
"aliases": [
"CVE-2023-45394"
],
"details": "Stored Cross-Site Scripting (XSS) vulnerability in the Company field in the \"Request a Quote\" Section of Small CRM v3.0 allows an attacker to store and execute malicious javascript code in the Admin panel which leads to Admin account takeover.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45394"
},
{
"type": "WEB",
"url": "https://github.com/kartik753/CVE/blob/main/CVE-2023-45394"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{
"schema_version": "1.4.0",
"id": "GHSA-ghvx-5v39-7hv5",
"modified": "2023-10-20T06:30:19Z",
"published": "2023-10-20T06:30:19Z",
"aliases": [
"CVE-2023-34051"
],
"details": "VMware Aria Operations for Logs contains an authentication bypass vulnerability. An unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.\n",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-34051"
},
{
"type": "WEB",
"url": "https://www.vmware.com/security/advisories/VMSA-2023-0021.html"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,35 @@
{
"schema_version": "1.4.0",
"id": "GHSA-h2q7-whv7-5m3x",
"modified": "2023-10-20T06:30:19Z",
"published": "2023-10-20T06:30:19Z",
"aliases": [
"CVE-2023-40361"
],
"details": "SECUDOS Qiata (DOMOS OS) 4.13 has Insecure Permissions for the previewRm.sh daily cronjob. To exploit this, an attacker needs access as a low-privileged user to the underlying DOMOS system. Every user on the system has write permission for previewRm.sh, which is executed by the root user.",
"severity": [

],
"affected": [

],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40361"
},
{
"type": "WEB",
"url": "https://github.com/vianic/CVE-2023-40361/blob/main/advisory/advisory.md"
}
],
"database_specific": {
"cwe_ids": [

],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": null
}
}
Loading

0 comments on commit 787f99e

Please sign in to comment.