Skip to content

Commit 369ca1c

Browse files
committed
Auto-Update: 2026-02-27T23:00:13.253475+00:00
1 parent 47917d4 commit 369ca1c

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

50 files changed

+2296
-250
lines changed

CVE-2015/CVE-2015-101xx/CVE-2015-10105.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2015-10105",
33
"sourceIdentifier": "cna@vuldb.com",
44
"published": "2023-05-01T02:15:39.197",
5-
"lastModified": "2024-11-21T02:24:23.713",
6-
"vulnStatus": "Modified",
5+
"lastModified": "2026-02-27T21:49:47.287",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -111,9 +111,9 @@
111111
"cpeMatch": [
112112
{
113113
"vulnerable": true,
114-
"criteria": "cpe:2.3:a:ip-finder:ip_blacklist_cloud:*:*:*:*:*:wordpress:*:*",
114+
"criteria": "cpe:2.3:a:ad33lx:ip_blacklist_cloud:*:*:*:*:*:wordpress:*:*",
115115
"versionEndIncluding": "3.42",
116-
"matchCriteriaId": "C911D631-8FCD-40EF-A49A-44934DA7E599"
116+
"matchCriteriaId": "49F747D2-7537-4581-9C3B-789DF5E31BDB"
117117
}
118118
]
119119
}
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
{
2+
"id": "CVE-2018-25160",
3+
"sourceIdentifier": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
4+
"published": "2026-02-27T21:16:03.590",
5+
"lastModified": "2026-02-27T21:16:03.590",
6+
"vulnStatus": "Received",
7+
"cveTags": [],
8+
"descriptions": [
9+
{
10+
"lang": "en",
11+
"value": "HTTP::Session2 versions through 1.09 for Perl does not validate the format of user provided session ids, enabling code injection or other impact depending on session backend.\n\nFor example, if an application uses memcached for session storage, then it may be possible for a remote attacker to inject memcached commands in the session id value."
12+
}
13+
],
14+
"metrics": {},
15+
"weaknesses": [
16+
{
17+
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e",
18+
"type": "Secondary",
19+
"description": [
20+
{
21+
"lang": "en",
22+
"value": "CWE-20"
23+
}
24+
]
25+
}
26+
],
27+
"references": [
28+
{
29+
"url": "https://github.com/tokuhirom/HTTP-Session2/commit/813838f6d08034b6a265a70e53b59b941b5d3e6d.patch",
30+
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
31+
},
32+
{
33+
"url": "https://metacpan.org/pod/Cache::Memcached::Fast::Safe",
34+
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
35+
},
36+
{
37+
"url": "https://metacpan.org/release/TOKUHIROM/HTTP-Session2-1.10/source/Changes",
38+
"source": "9b29abf9-4ab0-4765-b253-1875cd9b441e"
39+
}
40+
]
41+
}

CVE-2020/CVE-2020-371xx/CVE-2020-37167.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,13 +2,13 @@
22
"id": "CVE-2020-37167",
33
"sourceIdentifier": "disclosure@vulncheck.com",
44
"published": "2026-02-12T23:16:08.887",
5-
"lastModified": "2026-02-27T20:21:25.050",
5+
"lastModified": "2026-02-27T22:16:20.217",
66
"vulnStatus": "Awaiting Analysis",
77
"cveTags": [],
88
"descriptions": [
99
{
1010
"lang": "en",
11-
"value": "ClamAV versions prior to 0.102.0, fixed in 0.103.0-rc, ClamBC bytecode interpreter contains a vulnerability in function name processing that allows attackers to manipulate bytecode function names. Attackers can exploit the weak input validation in function name encoding to potentially execute malicious bytecode or cause unexpected behavior in the ClamAV engine."
11+
"value": "ClamAV versions prior to 0.103.0-rc contain a vulnerability in function name processing through the\u00a0ClamBC bytecode interpreter that allows attackers to manipulate bytecode function names. Attackers can exploit the weak input validation in function name encoding to potentially execute malicious bytecode or cause unexpected behavior in the ClamAV engine."
1212
},
1313
{
1414
"lang": "es",
@@ -63,7 +63,7 @@
6363
"cvssMetricV31": [
6464
{
6565
"source": "disclosure@vulncheck.com",
66-
"type": "Primary",
66+
"type": "Secondary",
6767
"cvssData": {
6868
"version": "3.1",
6969
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",

CVE-2022/CVE-2022-424xx/CVE-2022-42462.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2022-42462",
33
"sourceIdentifier": "audit@patchstack.com",
44
"published": "2023-01-17T05:15:14.413",
5-
"lastModified": "2024-11-21T07:25:00.637",
6-
"vulnStatus": "Modified",
5+
"lastModified": "2026-02-27T21:49:34.307",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -80,9 +80,9 @@
8080
"cpeMatch": [
8181
{
8282
"vulnerable": true,
83-
"criteria": "cpe:2.3:a:ip_blacklist_cloud_project:ip_blacklist_cloud:*:*:*:*:*:wordpress:*:*",
83+
"criteria": "cpe:2.3:a:ad33lx:ip_blacklist_cloud:*:*:*:*:*:wordpress:*:*",
8484
"versionEndIncluding": "5.00",
85-
"matchCriteriaId": "49D6501F-EF8F-49A5-8CCC-86B3B8FFDF97"
85+
"matchCriteriaId": "9ECD0B24-071D-4AD5-98A5-5FEBA4B48531"
8686
}
8787
]
8888
}

CVE-2022/CVE-2022-434xx/CVE-2022-43462.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2022-43462",
33
"sourceIdentifier": "audit@patchstack.com",
44
"published": "2023-01-17T05:15:14.553",
5-
"lastModified": "2024-11-21T07:26:32.200",
6-
"vulnStatus": "Modified",
5+
"lastModified": "2026-02-27T21:49:06.473",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -80,9 +80,9 @@
8080
"cpeMatch": [
8181
{
8282
"vulnerable": true,
83-
"criteria": "cpe:2.3:a:ip_blacklist_cloud_project:ip_blacklist_cloud:*:*:*:*:*:wordpress:*:*",
83+
"criteria": "cpe:2.3:a:ad33lx:ip_blacklist_cloud:*:*:*:*:*:wordpress:*:*",
8484
"versionEndIncluding": "5.00",
85-
"matchCriteriaId": "49D6501F-EF8F-49A5-8CCC-86B3B8FFDF97"
85+
"matchCriteriaId": "9ECD0B24-071D-4AD5-98A5-5FEBA4B48531"
8686
}
8787
]
8888
}

CVE-2022/CVE-2022-46xx/CVE-2022-4669.json

Lines changed: 14 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2022-4669",
33
"sourceIdentifier": "contact@wpscan.com",
44
"published": "2023-02-21T09:15:10.953",
5-
"lastModified": "2025-03-12T17:15:37.700",
6-
"vulnStatus": "Modified",
5+
"lastModified": "2026-02-27T21:38:56.373",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -36,6 +36,16 @@
3636
]
3737
},
3838
"weaknesses": [
39+
{
40+
"source": "nvd@nist.gov",
41+
"type": "Primary",
42+
"description": [
43+
{
44+
"lang": "en",
45+
"value": "CWE-79"
46+
}
47+
]
48+
},
3949
{
4050
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
4151
"type": "Secondary",
@@ -56,9 +66,9 @@
5666
"cpeMatch": [
5767
{
5868
"vulnerable": true,
59-
"criteria": "cpe:2.3:a:livecomposerplugin:page_builder\\:_live_composer:*:*:*:*:*:wordpress:*:*",
69+
"criteria": "cpe:2.3:a:blueastral:page_builder\\:_live_composer:*:*:*:*:*:wordpress:*:*",
6070
"versionEndExcluding": "1.5.23",
61-
"matchCriteriaId": "7F32CF38-C6D4-4993-BCAD-3DCDD276BF7B"
71+
"matchCriteriaId": "744DA737-54D9-49A6-8A69-B1D3CB36477F"
6272
}
6373
]
6474
}

CVE-2023/CVE-2023-341xx/CVE-2023-34153.json

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2023-34153",
33
"sourceIdentifier": "secalert@redhat.com",
44
"published": "2023-05-30T22:15:11.143",
5-
"lastModified": "2025-01-10T21:15:12.310",
6-
"vulnStatus": "Modified",
5+
"lastModified": "2026-02-27T21:17:21.790",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -87,8 +87,9 @@
8787
{
8888
"vulnerable": true,
8989
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
90+
"versionStartIncluding": "7.1.0-1",
9091
"versionEndExcluding": "7.1.1-11",
91-
"matchCriteriaId": "D8F0FD9E-E120-4BAB-A5C9-776077B47603"
92+
"matchCriteriaId": "83674780-35E1-402A-969C-901B73D7B1BB"
9293
}
9394
]
9495
}

CVE-2023/CVE-2023-475xx/CVE-2023-47512.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2023-47512",
33
"sourceIdentifier": "audit@patchstack.com",
44
"published": "2023-11-16T19:15:09.070",
5-
"lastModified": "2024-11-21T08:30:22.130",
6-
"vulnStatus": "Modified",
5+
"lastModified": "2026-02-27T21:48:07.650",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -80,9 +80,9 @@
8080
"cpeMatch": [
8181
{
8282
"vulnerable": true,
83-
"criteria": "cpe:2.3:a:wphive:product_enquiry_for_woocommerce:*:*:*:*:*:wordpress:*:*",
83+
"criteria": "cpe:2.3:a:gravitymaster:product_enquiry_for_woocommerce:*:*:*:*:*:wordpress:*:*",
8484
"versionEndIncluding": "3.0",
85-
"matchCriteriaId": "6F01111E-3FDE-47C3-863A-826044CE76E4"
85+
"matchCriteriaId": "828EE6DF-E57B-498A-866B-DC712A4C6991"
8686
}
8787
]
8888
}

CVE-2023/CVE-2023-521xx/CVE-2023-52193.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2023-52193",
33
"sourceIdentifier": "audit@patchstack.com",
44
"published": "2024-02-01T10:15:10.423",
5-
"lastModified": "2024-11-21T08:39:22.237",
6-
"vulnStatus": "Modified",
5+
"lastModified": "2026-02-27T21:46:25.387",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -80,9 +80,9 @@
8080
"cpeMatch": [
8181
{
8282
"vulnerable": true,
83-
"criteria": "cpe:2.3:a:livecomposerplugin:live-composer-page-builder:*:*:*:*:*:wordpress:*:*",
83+
"criteria": "cpe:2.3:a:blueastral:page_builder\\:_live_composer:*:*:*:*:*:wordpress:*:*",
8484
"versionEndIncluding": "1.5.23",
85-
"matchCriteriaId": "A6FA7337-71AF-4267-B042-F9206CDC49C7"
85+
"matchCriteriaId": "BC66D2C1-9408-4949-82CB-9BC0228C9E7F"
8686
}
8787
]
8888
}

CVE-2023/CVE-2023-71xx/CVE-2023-7151.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,8 +2,8 @@
22
"id": "CVE-2023-7151",
33
"sourceIdentifier": "contact@wpscan.com",
44
"published": "2024-01-16T16:15:14.130",
5-
"lastModified": "2025-06-02T15:15:26.013",
6-
"vulnStatus": "Modified",
5+
"lastModified": "2026-02-27T21:48:17.727",
6+
"vulnStatus": "Analyzed",
77
"cveTags": [],
88
"descriptions": [
99
{
@@ -80,9 +80,9 @@
8080
"cpeMatch": [
8181
{
8282
"vulnerable": true,
83-
"criteria": "cpe:2.3:a:piwebsolution:product_enquiry_for_woocommerce:*:*:*:*:*:wordpress:*:*",
83+
"criteria": "cpe:2.3:a:gravitymaster:product_enquiry_for_woocommerce:*:*:*:*:*:wordpress:*:*",
8484
"versionEndExcluding": "3.2",
85-
"matchCriteriaId": "BA972780-4176-40A4-9FD2-709725F2BC0C"
85+
"matchCriteriaId": "E161F93D-BF98-423E-B075-DD4239D45A04"
8686
}
8787
]
8888
}

0 commit comments

Comments
 (0)