Skip to content

Commit fd76f99

Browse files
committed
Auto-Update: 2025-03-19T15:00:19.479491+00:00
1 parent 977dcd9 commit fd76f99

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

50 files changed

+1739
-206
lines changed

CVE-2018/CVE-2018-94xx/CVE-2018-9447.json

+37-2
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
"id": "CVE-2018-9447",
33
"sourceIdentifier": "[email protected]",
44
"published": "2025-01-17T23:15:12.327",
5-
"lastModified": "2025-02-18T21:15:13.370",
5+
"lastModified": "2025-03-19T14:15:34.120",
66
"vulnStatus": "Awaiting Analysis",
77
"cveTags": [],
88
"descriptions": [
@@ -15,7 +15,42 @@
1515
"value": "En onCreate de EmergencyCallbackModeExitDialog.java, existe una forma posible de bloquear el modo de devoluci\u00f3n de llamada de emergencia debido a la falta de una verificaci\u00f3n nula. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
1616
}
1717
],
18-
"metrics": {},
18+
"metrics": {
19+
"cvssMetricV31": [
20+
{
21+
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
22+
"type": "Secondary",
23+
"cvssData": {
24+
"version": "3.1",
25+
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
26+
"baseScore": 5.5,
27+
"baseSeverity": "MEDIUM",
28+
"attackVector": "LOCAL",
29+
"attackComplexity": "LOW",
30+
"privilegesRequired": "LOW",
31+
"userInteraction": "NONE",
32+
"scope": "UNCHANGED",
33+
"confidentialityImpact": "NONE",
34+
"integrityImpact": "NONE",
35+
"availabilityImpact": "HIGH"
36+
},
37+
"exploitabilityScore": 1.8,
38+
"impactScore": 3.6
39+
}
40+
]
41+
},
42+
"weaknesses": [
43+
{
44+
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
45+
"type": "Secondary",
46+
"description": [
47+
{
48+
"lang": "en",
49+
"value": "CWE-400"
50+
}
51+
]
52+
}
53+
],
1954
"references": [
2055
{
2156
"url": "https://source.android.com/security/bulletin/pixel/2018-08-01",

CVE-2023/CVE-2023-321xx/CVE-2023-32110.json

+48-4
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2023-32110",
33
"sourceIdentifier": "[email protected]",
44
"published": "2024-05-17T07:15:53.300",
5-
"lastModified": "2024-11-21T08:02:43.730",
6-
"vulnStatus": "Awaiting Analysis",
5+
"lastModified": "2025-03-19T13:37:32.060",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -36,6 +36,26 @@
3636
},
3737
"exploitabilityScore": 2.8,
3838
"impactScore": 4.7
39+
},
40+
{
41+
"source": "[email protected]",
42+
"type": "Primary",
43+
"cvssData": {
44+
"version": "3.1",
45+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
46+
"baseScore": 8.8,
47+
"baseSeverity": "HIGH",
48+
"attackVector": "NETWORK",
49+
"attackComplexity": "LOW",
50+
"privilegesRequired": "LOW",
51+
"userInteraction": "NONE",
52+
"scope": "UNCHANGED",
53+
"confidentialityImpact": "HIGH",
54+
"integrityImpact": "HIGH",
55+
"availabilityImpact": "HIGH"
56+
},
57+
"exploitabilityScore": 2.8,
58+
"impactScore": 5.9
3959
}
4060
]
4161
},
@@ -51,14 +71,38 @@
5171
]
5272
}
5373
],
74+
"configurations": [
75+
{
76+
"nodes": [
77+
{
78+
"operator": "OR",
79+
"negate": false,
80+
"cpeMatch": [
81+
{
82+
"vulnerable": true,
83+
"criteria": "cpe:2.3:a:artbees:jupiterx:*:*:*:*:*:wordpress:*:*",
84+
"versionEndExcluding": "3.1.0",
85+
"matchCriteriaId": "98564483-27C8-4969-A3F1-CF751AF09A4C"
86+
}
87+
]
88+
}
89+
]
90+
}
91+
],
5492
"references": [
5593
{
5694
"url": "https://patchstack.com/database/vulnerability/jupiterx/wordpress-jupiterx-theme-3-0-0-subscriber-local-file-inclusion-vulnerability?_s_id=cve",
57-
"source": "[email protected]"
95+
"source": "[email protected]",
96+
"tags": [
97+
"Third Party Advisory"
98+
]
5899
},
59100
{
60101
"url": "https://patchstack.com/database/vulnerability/jupiterx/wordpress-jupiterx-theme-3-0-0-subscriber-local-file-inclusion-vulnerability?_s_id=cve",
61-
"source": "af854a3a-2127-422b-91ae-364da2661108"
102+
"source": "af854a3a-2127-422b-91ae-364da2661108",
103+
"tags": [
104+
"Third Party Advisory"
105+
]
62106
}
63107
]
64108
}

CVE-2023/CVE-2023-383xx/CVE-2023-38385.json

+45-3
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2023-38385",
33
"sourceIdentifier": "[email protected]",
44
"published": "2024-12-13T15:15:19.183",
5-
"lastModified": "2024-12-13T15:15:19.183",
6-
"vulnStatus": "Awaiting Analysis",
5+
"lastModified": "2025-03-19T13:57:05.610",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -36,6 +36,26 @@
3636
},
3737
"exploitabilityScore": 2.8,
3838
"impactScore": 5.5
39+
},
40+
{
41+
"source": "[email protected]",
42+
"type": "Primary",
43+
"cvssData": {
44+
"version": "3.1",
45+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
46+
"baseScore": 8.8,
47+
"baseSeverity": "HIGH",
48+
"attackVector": "NETWORK",
49+
"attackComplexity": "LOW",
50+
"privilegesRequired": "LOW",
51+
"userInteraction": "NONE",
52+
"scope": "UNCHANGED",
53+
"confidentialityImpact": "HIGH",
54+
"integrityImpact": "HIGH",
55+
"availabilityImpact": "HIGH"
56+
},
57+
"exploitabilityScore": 2.8,
58+
"impactScore": 5.9
3959
}
4060
]
4161
},
@@ -51,10 +71,32 @@
5171
]
5272
}
5373
],
74+
"configurations": [
75+
{
76+
"nodes": [
77+
{
78+
"operator": "OR",
79+
"negate": false,
80+
"cpeMatch": [
81+
{
82+
"vulnerable": true,
83+
"criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*",
84+
"versionStartIncluding": "3.0.0",
85+
"versionEndExcluding": "3.3.5",
86+
"matchCriteriaId": "1D82A557-9559-442C-9A1B-9E67ABDFD987"
87+
}
88+
]
89+
}
90+
]
91+
}
92+
],
5493
"references": [
5594
{
5695
"url": "https://patchstack.com/database/wordpress/plugin/jupiterx-core/vulnerability/wordpress-jupiter-x-core-plugin-3-0-0-3-3-0-multiple-contributor-broken-access-control-vulnerability?_s_id=cve",
57-
"source": "[email protected]"
96+
"source": "[email protected]",
97+
"tags": [
98+
"Third Party Advisory"
99+
]
58100
}
59101
]
60102
}

CVE-2023/CVE-2023-383xx/CVE-2023-38388.json

+48-4
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2023-38388",
33
"sourceIdentifier": "[email protected]",
44
"published": "2024-03-26T21:15:51.113",
5-
"lastModified": "2024-11-21T08:13:27.650",
6-
"vulnStatus": "Awaiting Analysis",
5+
"lastModified": "2025-03-19T13:49:31.673",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -36,6 +36,26 @@
3636
},
3737
"exploitabilityScore": 2.2,
3838
"impactScore": 6.0
39+
},
40+
{
41+
"source": "[email protected]",
42+
"type": "Primary",
43+
"cvssData": {
44+
"version": "3.1",
45+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
46+
"baseScore": 9.8,
47+
"baseSeverity": "CRITICAL",
48+
"attackVector": "NETWORK",
49+
"attackComplexity": "LOW",
50+
"privilegesRequired": "NONE",
51+
"userInteraction": "NONE",
52+
"scope": "UNCHANGED",
53+
"confidentialityImpact": "HIGH",
54+
"integrityImpact": "HIGH",
55+
"availabilityImpact": "HIGH"
56+
},
57+
"exploitabilityScore": 3.9,
58+
"impactScore": 5.9
3959
}
4060
]
4161
},
@@ -51,14 +71,38 @@
5171
]
5272
}
5373
],
74+
"configurations": [
75+
{
76+
"nodes": [
77+
{
78+
"operator": "OR",
79+
"negate": false,
80+
"cpeMatch": [
81+
{
82+
"vulnerable": true,
83+
"criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*",
84+
"versionEndExcluding": "3.3.8",
85+
"matchCriteriaId": "0B4BF657-5A8E-43E8-834B-B0C0B65D5373"
86+
}
87+
]
88+
}
89+
]
90+
}
91+
],
5492
"references": [
5593
{
5694
"url": "https://patchstack.com/database/vulnerability/jupiterx-core/wordpress-jupiter-x-core-plugin-3-3-0-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve",
57-
"source": "[email protected]"
95+
"source": "[email protected]",
96+
"tags": [
97+
"Third Party Advisory"
98+
]
5899
},
59100
{
60101
"url": "https://patchstack.com/database/vulnerability/jupiterx-core/wordpress-jupiter-x-core-plugin-3-3-0-unauthenticated-arbitrary-file-upload-vulnerability?_s_id=cve",
61-
"source": "af854a3a-2127-422b-91ae-364da2661108"
102+
"source": "af854a3a-2127-422b-91ae-364da2661108",
103+
"tags": [
104+
"Third Party Advisory"
105+
]
62106
}
63107
]
64108
}

CVE-2023/CVE-2023-60xx/CVE-2023-6047.json

+48-4
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2023-6047",
33
"sourceIdentifier": "[email protected]",
44
"published": "2024-03-29T12:15:07.570",
5-
"lastModified": "2024-11-21T08:43:02.383",
6-
"vulnStatus": "Awaiting Analysis",
5+
"lastModified": "2025-03-19T14:28:26.253",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -36,6 +36,26 @@
3636
},
3737
"exploitabilityScore": 2.8,
3838
"impactScore": 2.7
39+
},
40+
{
41+
"source": "[email protected]",
42+
"type": "Primary",
43+
"cvssData": {
44+
"version": "3.1",
45+
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
46+
"baseScore": 6.1,
47+
"baseSeverity": "MEDIUM",
48+
"attackVector": "NETWORK",
49+
"attackComplexity": "LOW",
50+
"privilegesRequired": "NONE",
51+
"userInteraction": "REQUIRED",
52+
"scope": "CHANGED",
53+
"confidentialityImpact": "LOW",
54+
"integrityImpact": "LOW",
55+
"availabilityImpact": "NONE"
56+
},
57+
"exploitabilityScore": 2.8,
58+
"impactScore": 2.7
3959
}
4060
]
4161
},
@@ -51,14 +71,38 @@
5171
]
5272
}
5373
],
74+
"configurations": [
75+
{
76+
"nodes": [
77+
{
78+
"operator": "OR",
79+
"negate": false,
80+
"cpeMatch": [
81+
{
82+
"vulnerable": true,
83+
"criteria": "cpe:2.3:a:algoritimbilisim:e-commerce_software:*:*:*:*:*:*:*:*",
84+
"versionEndExcluding": "3.9.2",
85+
"matchCriteriaId": "B2D85945-1413-41C8-BEB9-907FCC4646A9"
86+
}
87+
]
88+
}
89+
]
90+
}
91+
],
5492
"references": [
5593
{
5694
"url": "https://www.usom.gov.tr/bildirim/tr-24-0252",
57-
"source": "[email protected]"
95+
"source": "[email protected]",
96+
"tags": [
97+
"Third Party Advisory"
98+
]
5899
},
59100
{
60101
"url": "https://www.usom.gov.tr/bildirim/tr-24-0252",
61-
"source": "af854a3a-2127-422b-91ae-364da2661108"
102+
"source": "af854a3a-2127-422b-91ae-364da2661108",
103+
"tags": [
104+
"Third Party Advisory"
105+
]
62106
}
63107
]
64108
}

0 commit comments

Comments
 (0)