Auto-Update: 2023-05-18 22:00:29.016413+00:00

This commit is contained in:
cad-safe-bot 2023-05-18 22:00:32 +00:00
parent dab33dbde9
commit 00c2d17c6a
51 changed files with 11260 additions and 197 deletions

View File

@ -2,27 +2,89 @@
"id": "CVE-2021-45345",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T20:15:09.427",
"lastModified": "2023-05-11T13:36:34.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T21:21:08.063",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability found in En3rgy WebcamServer v.0.5.2 allows a remote attacker to cause a denial of service via the WebcamServer.exe file."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webcamserver_project:webcamserver:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.5.2",
"matchCriteriaId": "47A3EE56-1011-4447-843B-1E52B4B3075F"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/0xHop/0d065694d56ac3943d8e8c239d80c63f",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://gist.github.com/0xHop/337e65ec684b8866e86f4b25b8f1dbc7",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://sourceforge.net/projects/webcamserv/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-29842",
"sourceIdentifier": "psirt@wdc.com",
"published": "2023-05-10T21:15:08.867",
"lastModified": "2023-05-11T13:36:25.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T21:19:29.820",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "psirt@wdc.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "psirt@wdc.com",
"type": "Secondary",
@ -46,10 +76,89 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:westerndigital:my_cloud_os:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.02.104",
"versionEndExcluding": "5.26.119",
"matchCriteriaId": "39F165A4-1408-4575-A394-E09B02892310"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:westerndigital:my_cloud:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A9EE86B-05EE-4F2E-A912-624DDCF9C41B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:westerndigital:my_cloud_dl2100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E783EBC-7608-4527-B1AD-9B4E7A7A108C"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:westerndigital:my_cloud_dl4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3034F4A-239C-4E38-9BD6-217361A7C519"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5A581EBA-A1F2-4ABC-8183-29973A46FA43"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:westerndigital:my_cloud_ex2100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ABBBDC1E-2320-4767-B669-1BB2FFB1E1C4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B78030F0-6655-4604-9D16-2FA1F3FD52FF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:westerndigital:my_cloud_mirror_g2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6DE090BC-C847-4DF7-9C5F-52A300845558"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF58260B-2131-402C-A9DA-67B188136DE1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0C2FD9-4792-4DA2-9698-E53109A499EC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:westerndigital:wd_cloud:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FDE0337-4329-4CE3-9B0B-61BE8361E910"
}
]
}
]
}
],
"references": [
{
"url": "https://www.westerndigital.com/support/product-security/wdc-23002-my-cloud-firmware-version-5-26-119",
"source": "psirt@wdc.com"
"source": "psirt@wdc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33963",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:12.783",
"lastModified": "2023-05-10T14:38:31.210",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:31:26.633",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:unite:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "4.2.34870",
"matchCriteriaId": "401C5504-8019-4E26-BC65-06D43CA4078F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00782.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-36326",
"sourceIdentifier": "psirt@wdc.com",
"published": "2023-05-18T18:15:09.820",
"lastModified": "2023-05-18T18:15:09.820",
"vulnStatus": "Received",
"lastModified": "2023-05-18T20:16:21.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-36327",
"sourceIdentifier": "psirt@wdc.com",
"published": "2023-05-18T18:15:09.883",
"lastModified": "2023-05-18T18:15:09.883",
"vulnStatus": "Received",
"lastModified": "2023-05-18T20:16:21.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-36328",
"sourceIdentifier": "psirt@wdc.com",
"published": "2023-05-18T18:15:09.947",
"lastModified": "2023-05-18T18:15:09.947",
"vulnStatus": "Received",
"lastModified": "2023-05-18T20:16:21.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-36329",
"sourceIdentifier": "psirt@wdc.com",
"published": "2023-05-10T20:15:09.530",
"lastModified": "2023-05-11T13:36:30.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T21:20:43.717",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "psirt@wdc.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "psirt@wdc.com",
"type": "Secondary",
@ -46,10 +76,99 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:westerndigital:my_cloud_home_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.4.0-191",
"matchCriteriaId": "D471C39A-0854-4755-9DF8-5BAABAB09619"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:westerndigital:my_cloud_home:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BE2FBAB-5BA0-4F09-A76E-4A6869668810"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:westerndigital:my_cloud_home_duo_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.4.0-191",
"matchCriteriaId": "0A0368E6-53C8-4BD2-B0E8-44464B245832"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:westerndigital:my_cloud_home_duo:-:*:*:*:*:*:*:*",
"matchCriteriaId": "124BBC79-65A2-465C-B784-D21E57E96F63"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:westerndigital:sandisk_ibi_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "9.4.0-191",
"matchCriteriaId": "13A2FB91-CCCF-42B1-BCE1-F4962D353593"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:westerndigital:sandisk_ibi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "296ADA43-16BA-4444-B472-DB945FB917B2"
}
]
}
]
}
],
"references": [
{
"url": "https://www.westerndigital.com/support/product-security/wdc-23003-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-9-4-0-191",
"source": "psirt@wdc.com"
"source": "psirt@wdc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,49 @@
"id": "CVE-2022-36937",
"sourceIdentifier": "cve-assign@fb.com",
"published": "2023-05-10T19:15:08.627",
"lastModified": "2023-05-11T13:36:34.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T21:21:31.163",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "HHVM 4.172.0 and all prior versions use TLS 1.0 for secure connections when handling tls:// URLs in the stream extension. TLS1.0 has numerous published vulnerabilities and is deprecated. HHVM 4.153.4, 4.168.2, 4.169.2, 4.170.2, 4.171.1, 4.172.1, 4.173.0 replaces TLS1.0 with TLS1.3.\n\nApplications that call stream_socket_server or stream_socket_client functions with a URL starting with tls:// are affected."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "cve-assign@fb.com",
"type": "Secondary",
@ -23,14 +56,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.153.4",
"matchCriteriaId": "91487128-B88B-4E14-B1EB-D034775108B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.154.0",
"versionEndExcluding": "4.168.2",
"matchCriteriaId": "AFEBC2B2-0FDF-46EB-80B0-F1E8ED6CE459"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.169.0",
"versionEndExcluding": "4.169.2",
"matchCriteriaId": "DB8AEBFD-04EE-419A-A080-0B123FDFEF78"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.170.0",
"versionEndExcluding": "4.170.2",
"matchCriteriaId": "47EC3B3C-6874-4F23-A906-52B13EE7DD9F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:facebook:hhvm:4.171.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BDC50CD5-5AF7-4331-810C-D489A4FF3FF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:facebook:hhvm:4.172.0:*:*:*:*:*:*:*",
"matchCriteriaId": "89209682-1753-4B6B-8AF4-E7701F493C59"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/facebook/hhvm/commit/083f5ffdee661f61512909d16f9a5b98cff3cf0b",
"source": "cve-assign@fb.com"
"source": "cve-assign@fb.com",
"tags": [
"Patch"
]
},
{
"url": "https://hhvm.com/blog/2023/01/20/security-update.html",
"source": "cve-assign@fb.com"
"source": "cve-assign@fb.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41985",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-05-10T16:15:09.400",
"lastModified": "2023-05-10T17:06:24.873",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T21:23:44.783",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,14 +76,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:weston-embedded:uc-ftps:1.98.00:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF1C85E-372F-44A2-B440-AC014D4801A3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/weston-embedded/uC-FTPs/pull/1",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1680",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-42878",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:23.103",
"lastModified": "2023-05-10T14:38:37.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:01:17.327",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,49 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:oneapi_hpc_toolkit:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023.0.0",
"matchCriteriaId": "6728C973-7E1D-46EB-BE07-E572A09B5D96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:trace_analyzer_and_collector:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2021.8.0",
"matchCriteriaId": "BA7E18CB-DCAF-4EA3-95BE-4FF68783E2C8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00805.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43465",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:23.423",
"lastModified": "2023-05-10T14:38:25.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:10:22.203",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,42 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:setup_and_configuration_software:*:*:*:*:*:*:*:*",
"matchCriteriaId": "391F6B1F-7F1A-4484-8862-7478EC88D959"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00796.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43475",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:24.070",
"lastModified": "2023-05-10T14:38:31.210",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:12:09.530",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.1",
"matchCriteriaId": "8555F365-2BFD-4A0A-A7D0-1459241758B3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00806.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-44610",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:24.720",
"lastModified": "2023-05-10T14:38:19.080",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:14:16.460",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.1",
"matchCriteriaId": "8555F365-2BFD-4A0A-A7D0-1459241758B3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00806.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46377",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-05-10T16:15:10.153",
"lastModified": "2023-05-10T17:06:24.873",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T21:23:25.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,14 +76,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:weston-embedded:uc-ftps:1.98.00:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF1C85E-372F-44A2-B440-AC014D4801A3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/weston-embedded/uC-FTPs/pull/2",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46378",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2023-05-10T16:15:10.413",
"lastModified": "2023-05-10T17:06:24.873",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T21:23:16.240",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "talos-cna@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,14 +76,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:weston-embedded:uc-ftps:1.98.00:*:*:*:*:*:*:*",
"matchCriteriaId": "EBF1C85E-372F-44A2-B440-AC014D4801A3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/weston-embedded/uC-FTPs/pull/2",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Patch"
]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2022-1681",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0965",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-05-18T19:15:09.437",
"lastModified": "2023-05-18T19:15:09.437",
"vulnStatus": "Received",
"lastModified": "2023-05-18T20:16:21.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1132",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-05-18T19:15:09.517",
"lastModified": "2023-05-18T19:15:09.517",
"vulnStatus": "Received",
"lastModified": "2023-05-18T20:16:21.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2024",
"sourceIdentifier": "productsecurity@jci.com",
"published": "2023-05-18T21:15:09.683",
"lastModified": "2023-05-18T21:15:09.683",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Improper authentication in OpenBlue Enterprise Manager Data Collector versions prior to 3.2.5.75 allow access to an unauthorized user under certain circumstances."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "productsecurity@jci.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "productsecurity@jci.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-138-04",
"source": "productsecurity@jci.com"
},
{
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories",
"source": "productsecurity@jci.com"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2025",
"sourceIdentifier": "productsecurity@jci.com",
"published": "2023-05-18T21:15:09.757",
"lastModified": "2023-05-18T21:15:09.757",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "OpenBlue Enterprise Manager Data Collector versions prior to 3.2.5.75 may expose sensitive information to an unauthorized user under certain circumstances."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "productsecurity@jci.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "productsecurity@jci.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-138-04",
"source": "productsecurity@jci.com"
},
{
"url": "https://www.johnsoncontrols.com/cyber-solutions/security-advisories",
"source": "productsecurity@jci.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23532",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.403",
"lastModified": "2023-05-11T06:56:01.137",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-18T21:15:09.290",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -92,6 +92,10 @@
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT213765",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23535",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:16.567",
"lastModified": "2023-05-11T06:56:16.213",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-18T21:15:09.360",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT213759",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2481",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-05-18T19:15:09.577",
"lastModified": "2023-05-18T19:15:09.577",
"vulnStatus": "Received",
"lastModified": "2023-05-18T20:16:21.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25460",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-12T16:15:09.550",
"lastModified": "2023-05-15T12:54:45.023",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:21:37.427",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codesolz:easy_ad_manager:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.0",
"matchCriteriaId": "A5EC752D-B538-423B-9698-A6AADF2DEA79"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/easy-ad-manager/wordpress-easy-ad-manager-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,18 +2,82 @@
"id": "CVE-2023-27945",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:17.930",
"lastModified": "2023-05-09T12:47:05.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T21:15:09.427",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved entitlements. This issue is fixed in Xcode 14.3. A sandboxed app may be able to collect system logs"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.3",
"matchCriteriaId": "37EC667B-49B0-4210-9B73-9795D603EF78"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213679",
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT213759",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT213760",
"source": "product-security@apple.com"
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28181",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-05-08T20:15:19.273",
"lastModified": "2023-05-13T01:52:38.700",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-18T21:15:09.510",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -116,6 +116,14 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT213760",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/kb/HT213765",
"source": "product-security@apple.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28414",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-12T16:15:09.743",
"lastModified": "2023-05-15T12:54:45.023",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:21:53.677",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apexchat:apexchat:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.1",
"matchCriteriaId": "29209D48-2E7D-4488-9404-B04365E6A7BC"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/apexchat/wordpress-apexchat-plugin-1-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28625",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-04-03T14:15:07.507",
"lastModified": "2023-04-30T23:15:45.720",
"lastModified": "2023-05-18T21:15:09.577",
"vulnStatus": "Modified",
"descriptions": [
{
@ -117,6 +117,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00034.html",
"source": "security-advisories@github.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5405",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-29720",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-18T20:15:09.357",
"lastModified": "2023-05-18T20:16:21.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SofaWiki <=3.8.9 is vulnerable to Cross Site Scripting (XSS) via index.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/bellenuit/sofawiki/issues/26",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/xul18/Showcase/issues/1",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-30246",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-12T11:15:13.133",
"lastModified": "2023-05-12T14:21:53.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:31:16.180",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability found in Judging Management System v.1.0 allows a remote attacker to execute arbitrary code via the contestant_id parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:judging_management_system_project:judging_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FAE693B0-3497-406C-AD53-36AC05735004"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/qingning988/cve_report/blob/main/judging-management-system/SQLi-2.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.github.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30333",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-18T19:15:09.633",
"lastModified": "2023-05-18T19:15:09.633",
"vulnStatus": "Received",
"lastModified": "2023-05-18T20:16:21.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,23 +2,962 @@
"id": "CVE-2023-31471",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T15:15:10.017",
"lastModified": "2023-05-10T15:26:03.940",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T21:24:07.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on GL.iNet devices before 3.216. Through the software installation feature, it is possible to install arbitrary software, such as a reverse shell, because the restrictions on the available package list are limited to client-side verification. It is possible to install software from the filesystem, the package list, or a URL."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-s20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "9B0A4356-5F36-40FB-918F-F46EBC31445C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-s20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3C5203D-A4A1-42DA-81BA-6701024E86C1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-x3000_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "F6F88699-FE89-4E7C-85D3-B55568116CC1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-x3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4521F491-9472-4511-9EA6-A6E2E429E306"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mt3000_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "AADA4620-98B7-4B68-9C0C-4C73685B0B3B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mt3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D832083-488B-40F2-8D7A-66E917DF67F9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mt2500_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "4BFC3E12-5AC4-4C3F-86E1-1F6522090F91"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mt2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88C600EF-AF68-45F0-B9C0-7ECA0D33179C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mt2500a_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "3301C89D-C179-4DBE-91BA-9834D8AB1574"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mt2500a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E7A9451-E593-4429-BF4C-0B03851C09B7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-axt1800_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "5B79F7E4-7A5A-48EA-8B4F-1FF42681C9B0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-axt1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49448661-9D95-4218-B2FA-73610AA5523C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-a1300_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "C60CE3B3-2DEB-4707-A4E8-40262BE9CC22"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-a1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2365517B-F8AF-490D-9282-36679EB484D2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-ax1800_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "FF71926B-3442-465A-8009-4CC49AF84065"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "459CA3AD-7D9A-4E72-8847-9F989232CDCD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-sft1200_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "25F4A1AA-E898-4220-9C29-892AA199EB3C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-sft1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD353D31-AA76-4A03-AA33-B618A3E28E3A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mt1300_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "69DB6A57-60F5-4811-9371-E4FE40F6E6A0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mt1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65A8D1C9-9EAE-4EDF-A1D4-D45E9EE65585"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-e750_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "1435C66B-38C7-4ECC-993D-F4EDD2853898"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-e750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5C88C24-42C5-4512-83B5-F7DED1D70E86"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mv1000_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "9F3A14CF-4A49-4D82-B665-C56D8D98E6AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mv1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64F0FB60-564D-492A-BF60-AEE3FDD33CEA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mv1000w_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "CA8C1CAE-1ABA-438E-AB60-0ECAD46DBFEA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mv1000w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E736B698-B40F-490C-A994-E3F89EBD764F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-s10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "3DF83156-A2BB-4081-A701-4AF613DBC2BB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-s10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B182C20-3D15-4753-9A96-BF9F7F778CE7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-s200_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "13CCF94F-675C-42C9-9849-C214A66EDDDB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-s200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54BAA0C6-0A44-4C67-9C9D-DC5D04434D04"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-s1300_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "8B689F84-726F-433B-8288-FC03B2018672"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-s1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D5F40B-93A6-486F-8575-3DAAAC324B93"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-sf1200_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "01E0F8DB-0B4C-4EE9-AD20-1353D44C5163"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-sf1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E7DDA65-A3AE-4769-A6FF-3878ECA45DC1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-b1300_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "59A98C79-93E2-4E90-B5C0-C64E11F13952"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-b1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10D84ECB-35CB-42B0-B925-8B631C235CC2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-b2200_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "2BE77DD2-EC55-432F-AEB5-7080CAEB2E8D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-b2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83560162-69E2-4E4C-8220-72455FAB45C3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-ap1300_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "8F690433-A66B-4EF4-82A6-53DB7DAC28B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-ap1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "555437D1-E216-4A0B-812A-29683D662D4C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-ap1300lte_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "84F959D3-DE3B-498B-920E-B3937E9722E9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-ap1300lte:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5FBDA79-D693-47C6-9A3A-12923B415722"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-x1200_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "9350E6E0-D5B0-4771-B3E9-2D32595B34E1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-x1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E50D1D1D-F363-4B77-BD4B-64B111D40603"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-x750_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "13E0A95F-C2ED-4013-A799-897882F2DF97"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-x750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17F0F848-0A3A-43CB-A766-71FD37CADF1B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-x300b_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "B361B182-C97B-4F68-A7DE-8DA7F2E809EC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-x300b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6C489C-C1DF-4D8B-9554-0F03E329AABB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-xe300_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "99E0D394-EF3E-4D41-A2AB-9288C4D9351F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-xe300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B11C2B97-A528-4BA9-9E46-293715A2BC21"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-ar750s_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "4F49F121-78E5-4256-AE49-1CABE9E09402"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-ar750s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C939D70-5353-43B7-AEF9-8F1D784DD4EF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-ar750_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "C14588E5-B00D-4FAF-84DA-CE190E1A88AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-ar750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE176E8-8CB1-429B-9B3B-E1F58EC0C8F5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mifi_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "ED6628FC-28A1-42C9-9B17-9FA5F8F0E670"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mifi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B9DB815-57A6-45F4-A68D-3507C3EE383E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "7BDF9205-45B2-4AC3-9997-2666FD0231E7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mt300n-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA4A042E-2C80-4EF9-93CA-D2756216BB0C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-ar300m_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "8D22AEE4-C757-42E8-AFA2-DB0F07883E55"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-ar300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10C965DA-2D49-4ED6-B028-3A23164EDC14"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-usb150_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "32540966-8B83-4D32-9B64-FA4F6C8C461F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-usb150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "322804A7-CE99-41E8-90DA-B60BE85F9449"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:microuter-n300_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "8FF61490-908B-41CD-9DB4-EDD7B937828C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:microuter-n300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13BEA3DD-0633-4F0B-97E0-C544C8232E3D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/3.215/Abuse_of_Functionality_leads_to_RCE.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://www.gl-inet.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,23 +2,963 @@
"id": "CVE-2023-31477",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-11T02:15:09.103",
"lastModified": "2023-05-11T13:36:25.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:29:45.897",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A path traversal issue was discovered on GL.iNet devices before 3.216. Through the file sharing feature, it is possible to share an arbitrary directory, such as /tmp or /etc, because there is no server-side restriction to limit sharing to the USB path."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-s20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "9B0A4356-5F36-40FB-918F-F46EBC31445C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-s20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3C5203D-A4A1-42DA-81BA-6701024E86C1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-x3000_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "F6F88699-FE89-4E7C-85D3-B55568116CC1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-x3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4521F491-9472-4511-9EA6-A6E2E429E306"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mt3000_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "AADA4620-98B7-4B68-9C0C-4C73685B0B3B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mt3000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D832083-488B-40F2-8D7A-66E917DF67F9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mt2500_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "4BFC3E12-5AC4-4C3F-86E1-1F6522090F91"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mt2500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88C600EF-AF68-45F0-B9C0-7ECA0D33179C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mt2500a_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "3301C89D-C179-4DBE-91BA-9834D8AB1574"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mt2500a:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E7A9451-E593-4429-BF4C-0B03851C09B7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-axt1800_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "5B79F7E4-7A5A-48EA-8B4F-1FF42681C9B0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-axt1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49448661-9D95-4218-B2FA-73610AA5523C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-a1300_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "C60CE3B3-2DEB-4707-A4E8-40262BE9CC22"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-a1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2365517B-F8AF-490D-9282-36679EB484D2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-ax1800_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "FF71926B-3442-465A-8009-4CC49AF84065"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-ax1800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "459CA3AD-7D9A-4E72-8847-9F989232CDCD"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-sft1200_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "25F4A1AA-E898-4220-9C29-892AA199EB3C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-sft1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD353D31-AA76-4A03-AA33-B618A3E28E3A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mt1300_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "69DB6A57-60F5-4811-9371-E4FE40F6E6A0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mt1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65A8D1C9-9EAE-4EDF-A1D4-D45E9EE65585"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-e750_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "1435C66B-38C7-4ECC-993D-F4EDD2853898"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-e750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5C88C24-42C5-4512-83B5-F7DED1D70E86"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mv1000_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "9F3A14CF-4A49-4D82-B665-C56D8D98E6AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mv1000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "64F0FB60-564D-492A-BF60-AEE3FDD33CEA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mv1000w_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "CA8C1CAE-1ABA-438E-AB60-0ECAD46DBFEA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mv1000w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E736B698-B40F-490C-A994-E3F89EBD764F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-s10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "3DF83156-A2BB-4081-A701-4AF613DBC2BB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-s10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B182C20-3D15-4753-9A96-BF9F7F778CE7"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-s200_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "13CCF94F-675C-42C9-9849-C214A66EDDDB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-s200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54BAA0C6-0A44-4C67-9C9D-DC5D04434D04"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-s1300_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "8B689F84-726F-433B-8288-FC03B2018672"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-s1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6D5F40B-93A6-486F-8575-3DAAAC324B93"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-sf1200_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "01E0F8DB-0B4C-4EE9-AD20-1353D44C5163"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-sf1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E7DDA65-A3AE-4769-A6FF-3878ECA45DC1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-b1300_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "59A98C79-93E2-4E90-B5C0-C64E11F13952"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-b1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10D84ECB-35CB-42B0-B925-8B631C235CC2"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-b2200_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "2BE77DD2-EC55-432F-AEB5-7080CAEB2E8D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-b2200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83560162-69E2-4E4C-8220-72455FAB45C3"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-ap1300_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "8F690433-A66B-4EF4-82A6-53DB7DAC28B1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-ap1300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "555437D1-E216-4A0B-812A-29683D662D4C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-ap1300lte_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "84F959D3-DE3B-498B-920E-B3937E9722E9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-ap1300lte:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5FBDA79-D693-47C6-9A3A-12923B415722"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-x1200_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "9350E6E0-D5B0-4771-B3E9-2D32595B34E1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-x1200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E50D1D1D-F363-4B77-BD4B-64B111D40603"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-x750_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "13E0A95F-C2ED-4013-A799-897882F2DF97"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-x750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17F0F848-0A3A-43CB-A766-71FD37CADF1B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-x300b_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "B361B182-C97B-4F68-A7DE-8DA7F2E809EC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-x300b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6C489C-C1DF-4D8B-9554-0F03E329AABB"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-xe300_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "99E0D394-EF3E-4D41-A2AB-9288C4D9351F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-xe300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B11C2B97-A528-4BA9-9E46-293715A2BC21"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-ar750s_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "4F49F121-78E5-4256-AE49-1CABE9E09402"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-ar750s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8C939D70-5353-43B7-AEF9-8F1D784DD4EF"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-ar750_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "C14588E5-B00D-4FAF-84DA-CE190E1A88AE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-ar750:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE176E8-8CB1-429B-9B3B-E1F58EC0C8F5"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mifi_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "ED6628FC-28A1-42C9-9B17-9FA5F8F0E670"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mifi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B9DB815-57A6-45F4-A68D-3507C3EE383E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-mt300n-v2_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "7BDF9205-45B2-4AC3-9997-2666FD0231E7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-mt300n-v2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA4A042E-2C80-4EF9-93CA-D2756216BB0C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-ar300m_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "8D22AEE4-C757-42E8-AFA2-DB0F07883E55"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-ar300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10C965DA-2D49-4ED6-B028-3A23164EDC14"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:gl-usb150_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "32540966-8B83-4D32-9B64-FA4F6C8C461F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:gl-usb150:-:*:*:*:*:*:*:*",
"matchCriteriaId": "322804A7-CE99-41E8-90DA-B60BE85F9449"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:gl-inet:microuter-n300_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.216",
"matchCriteriaId": "8FF61490-908B-41CD-9DB4-EDD7B937828C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:gl-inet:microuter-n300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13BEA3DD-0633-4F0B-97E0-C544C8232E3D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/gl-inet/CVE-issues/blob/main/3.215/Path_Traversal.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.gl-inet.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,27 +2,90 @@
"id": "CVE-2023-31498",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-11T11:15:09.193",
"lastModified": "2023-05-11T13:36:16.323",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:31:00.590",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A privilege escalation issue was found in PHP Gurukul Hospital Management System In v.4.0 allows a remote attacker to execute arbitrary code and access sensitive information via the session token parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-384"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hospital_management_system_project:hospital_management_system:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5782858E-EE67-4D17-98DE-BB458942F807"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/captain-noob/aff11542477ddd0a92ad8b94ec75f832",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://github.com/captain-noob",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
},
{
"url": "https://twitter.com/captain__noob",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31597",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-18T18:15:10.017",
"lastModified": "2023-05-18T18:15:10.017",
"vulnStatus": "Received",
"lastModified": "2023-05-18T20:16:21.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31655",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-18T20:15:09.407",
"lastModified": "2023-05-18T20:16:21.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "redis-7.0.10 was discovered to contain a segmentation violation."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/RedisLabs/redisraft/issues/608",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-31913",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-12T14:15:09.773",
"lastModified": "2023-05-12T14:21:53.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:16:48.160",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jerryscript 3.0 *commit 1a2c047) was discovered to contain an Assertion Failure via the component parser_parse_class at jerry-core/parser/js/js-parser-expr.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jerryscript-project/jerryscript/issues/5061",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-31914",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-12T14:15:09.807",
"lastModified": "2023-05-12T14:21:53.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:15:33.877",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jerryscript 3.0 (commit 05dbbd1) was discovered to contain out-of-memory issue in malloc."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jerryscript-project/jerryscript/issues/5071",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-31916",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-12T14:15:09.847",
"lastModified": "2023-05-12T14:21:53.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:12:57.197",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the jmem_heap_finalize at jerry-core/jmem/jmem-heap.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jerryscript-project/jerryscript/issues/5062",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-31918",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-12T14:15:09.890",
"lastModified": "2023-05-12T14:21:53.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:06:44.907",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jerryscript 3.0 (commit 1a2c047) was discovered to contain an Assertion Failure via the parser_parse_function_arguments at jerry-core/parser/js/js-parser.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jerryscript-project/jerryscript/issues/5064",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-31919",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-12T14:15:09.927",
"lastModified": "2023-05-12T14:21:53.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:01:17.457",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the jcontext_raise_exception at jerry-core/jcontext/jcontext.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jerryscript-project/jerryscript/issues/5069",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,77 @@
"id": "CVE-2023-31920",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-12T14:15:09.963",
"lastModified": "2023-05-12T14:21:53.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:16:08.610",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the vm_loop at jerry-core/vm/vm.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jerryscript-project/jerryscript/issues/5070",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,77 @@
"id": "CVE-2023-31921",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-12T14:15:10.007",
"lastModified": "2023-05-12T14:21:53.020",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T20:21:23.847",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the ecma_big_uint_div_mod at jerry-core/ecma/operations/ecma-big-uint.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jerryscript-project/jerryscript/issues/5068",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32076",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-10T18:15:10.410",
"lastModified": "2023-05-11T13:36:34.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T21:22:11.723",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-610"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,22 +76,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:in-toto_project:in-toto:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.4.0",
"matchCriteriaId": "D9CFCBAC-E44D-46C9-936E-32A421601351"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/in-toto/docs/security/advisories/GHSA-p86f-xmg6-9q4x",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/in-toto/in-toto/commit/3a21d84f40811b7d191fa7bd17265c1f99599afd",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/in-toto/in-toto/security/advisories/GHSA-wc64-c5rv-32pf",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://specifications.freedesktop.org/basedir-spec/basedir-spec-latest.html",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32080",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-10T21:15:08.997",
"lastModified": "2023-05-11T13:36:25.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T21:19:16.560",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,18 +76,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pterodactyl:wings:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.7.4",
"matchCriteriaId": "2DF86687-E677-4F45-B12F-36A248325549"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pterodactyl:wings:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.11.0",
"versionEndExcluding": "1.11.6",
"matchCriteriaId": "B8773A31-4925-4F2A-B384-D30550E6EC7E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/pterodactyl/wings/releases/tag/v1.11.6",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/pterodactyl/wings/releases/tag/v1.17.5",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/pterodactyl/wings/security/advisories/GHSA-p744-4q6p-hvc2",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32096",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-05-18T19:15:09.683",
"lastModified": "2023-05-18T19:15:09.683",
"vulnStatus": "Received",
"lastModified": "2023-05-18T20:16:21.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32097",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-05-18T19:15:09.753",
"lastModified": "2023-05-18T19:15:09.753",
"vulnStatus": "Received",
"lastModified": "2023-05-18T20:16:21.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32098",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-05-18T19:15:09.810",
"lastModified": "2023-05-18T19:15:09.810",
"vulnStatus": "Received",
"lastModified": "2023-05-18T20:16:21.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32099",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-05-18T19:15:09.867",
"lastModified": "2023-05-18T19:15:09.867",
"vulnStatus": "Received",
"lastModified": "2023-05-18T20:16:21.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32100",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-05-18T19:15:09.920",
"lastModified": "2023-05-18T19:15:09.920",
"vulnStatus": "Received",
"lastModified": "2023-05-18T20:16:21.423",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-18T20:00:32.217781+00:00
2023-05-18T22:00:29.016413+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-18T19:49:32.067000+00:00
2023-05-18T21:24:07.747000+00:00
```
### Last Data Feed Release
@ -29,57 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
215631
215635
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `4`
* [CVE-2022-36326](CVE-2022/CVE-2022-363xx/CVE-2022-36326.json) (`2023-05-18T18:15:09.820`)
* [CVE-2022-36327](CVE-2022/CVE-2022-363xx/CVE-2022-36327.json) (`2023-05-18T18:15:09.883`)
* [CVE-2022-36328](CVE-2022/CVE-2022-363xx/CVE-2022-36328.json) (`2023-05-18T18:15:09.947`)
* [CVE-2023-31597](CVE-2023/CVE-2023-315xx/CVE-2023-31597.json) (`2023-05-18T18:15:10.017`)
* [CVE-2023-0965](CVE-2023/CVE-2023-09xx/CVE-2023-0965.json) (`2023-05-18T19:15:09.437`)
* [CVE-2023-1132](CVE-2023/CVE-2023-11xx/CVE-2023-1132.json) (`2023-05-18T19:15:09.517`)
* [CVE-2023-2481](CVE-2023/CVE-2023-24xx/CVE-2023-2481.json) (`2023-05-18T19:15:09.577`)
* [CVE-2023-30333](CVE-2023/CVE-2023-303xx/CVE-2023-30333.json) (`2023-05-18T19:15:09.633`)
* [CVE-2023-32096](CVE-2023/CVE-2023-320xx/CVE-2023-32096.json) (`2023-05-18T19:15:09.683`)
* [CVE-2023-32097](CVE-2023/CVE-2023-320xx/CVE-2023-32097.json) (`2023-05-18T19:15:09.753`)
* [CVE-2023-32098](CVE-2023/CVE-2023-320xx/CVE-2023-32098.json) (`2023-05-18T19:15:09.810`)
* [CVE-2023-32099](CVE-2023/CVE-2023-320xx/CVE-2023-32099.json) (`2023-05-18T19:15:09.867`)
* [CVE-2023-32100](CVE-2023/CVE-2023-321xx/CVE-2023-32100.json) (`2023-05-18T19:15:09.920`)
* [CVE-2023-29720](CVE-2023/CVE-2023-297xx/CVE-2023-29720.json) (`2023-05-18T20:15:09.357`)
* [CVE-2023-31655](CVE-2023/CVE-2023-316xx/CVE-2023-31655.json) (`2023-05-18T20:15:09.407`)
* [CVE-2023-2024](CVE-2023/CVE-2023-20xx/CVE-2023-2024.json) (`2023-05-18T21:15:09.683`)
* [CVE-2023-2025](CVE-2023/CVE-2023-20xx/CVE-2023-2025.json) (`2023-05-18T21:15:09.757`)
### CVEs modified in the last Commit
Recently modified CVEs: `34`
Recently modified CVEs: `46`
* [CVE-2022-47629](CVE-2022/CVE-2022-476xx/CVE-2022-47629.json) (`2023-05-18T18:08:04.067`)
* [CVE-2022-3515](CVE-2022/CVE-2022-35xx/CVE-2022-3515.json) (`2023-05-18T18:08:04.067`)
* [CVE-2022-29840](CVE-2022/CVE-2022-298xx/CVE-2022-29840.json) (`2023-05-18T18:15:09.717`)
* [CVE-2022-21845](CVE-2022/CVE-2022-218xx/CVE-2022-21845.json) (`2023-05-18T19:15:09.073`)
* [CVE-2022-22031](CVE-2022/CVE-2022-220xx/CVE-2022-22031.json) (`2023-05-18T19:15:09.230`)
* [CVE-2022-22711](CVE-2022/CVE-2022-227xx/CVE-2022-22711.json) (`2023-05-18T19:15:09.327`)
* [CVE-2022-40974](CVE-2022/CVE-2022-409xx/CVE-2022-40974.json) (`2023-05-18T19:15:39.943`)
* [CVE-2022-38103](CVE-2022/CVE-2022-381xx/CVE-2022-38103.json) (`2023-05-18T19:25:55.957`)
* [CVE-2022-40972](CVE-2022/CVE-2022-409xx/CVE-2022-40972.json) (`2023-05-18T19:32:05.167`)
* [CVE-2022-41621](CVE-2022/CVE-2022-416xx/CVE-2022-41621.json) (`2023-05-18T19:49:32.067`)
* [CVE-2023-23108](CVE-2023/CVE-2023-231xx/CVE-2023-23108.json) (`2023-05-18T18:03:46.660`)
* [CVE-2023-23109](CVE-2023/CVE-2023-231xx/CVE-2023-23109.json) (`2023-05-18T18:03:59.573`)
* [CVE-2023-2789](CVE-2023/CVE-2023-27xx/CVE-2023-2789.json) (`2023-05-18T18:04:44.523`)
* [CVE-2023-2790](CVE-2023/CVE-2023-27xx/CVE-2023-2790.json) (`2023-05-18T18:04:44.523`)
* [CVE-2023-2799](CVE-2023/CVE-2023-27xx/CVE-2023-2799.json) (`2023-05-18T18:04:44.523`)
* [CVE-2023-2800](CVE-2023/CVE-2023-28xx/CVE-2023-2800.json) (`2023-05-18T18:04:44.523`)
* [CVE-2023-31871](CVE-2023/CVE-2023-318xx/CVE-2023-31871.json) (`2023-05-18T18:04:44.523`)
* [CVE-2023-32322](CVE-2023/CVE-2023-323xx/CVE-2023-32322.json) (`2023-05-18T18:04:44.523`)
* [CVE-2023-30256](CVE-2023/CVE-2023-302xx/CVE-2023-30256.json) (`2023-05-18T18:16:55.270`)
* [CVE-2023-2490](CVE-2023/CVE-2023-24xx/CVE-2023-2490.json) (`2023-05-18T18:17:26.777`)
* [CVE-2023-22661](CVE-2023/CVE-2023-226xx/CVE-2023-22661.json) (`2023-05-18T18:49:44.697`)
* [CVE-2023-22443](CVE-2023/CVE-2023-224xx/CVE-2023-22443.json) (`2023-05-18T19:04:13.540`)
* [CVE-2023-22442](CVE-2023/CVE-2023-224xx/CVE-2023-22442.json) (`2023-05-18T19:06:14.987`)
* [CVE-2023-22379](CVE-2023/CVE-2023-223xx/CVE-2023-22379.json) (`2023-05-18T19:09:59.237`)
* [CVE-2023-22297](CVE-2023/CVE-2023-222xx/CVE-2023-22297.json) (`2023-05-18T19:11:29.387`)
* [CVE-2023-31597](CVE-2023/CVE-2023-315xx/CVE-2023-31597.json) (`2023-05-18T20:16:21.423`)
* [CVE-2023-0965](CVE-2023/CVE-2023-09xx/CVE-2023-0965.json) (`2023-05-18T20:16:21.423`)
* [CVE-2023-1132](CVE-2023/CVE-2023-11xx/CVE-2023-1132.json) (`2023-05-18T20:16:21.423`)
* [CVE-2023-2481](CVE-2023/CVE-2023-24xx/CVE-2023-2481.json) (`2023-05-18T20:16:21.423`)
* [CVE-2023-30333](CVE-2023/CVE-2023-303xx/CVE-2023-30333.json) (`2023-05-18T20:16:21.423`)
* [CVE-2023-32096](CVE-2023/CVE-2023-320xx/CVE-2023-32096.json) (`2023-05-18T20:16:21.423`)
* [CVE-2023-32097](CVE-2023/CVE-2023-320xx/CVE-2023-32097.json) (`2023-05-18T20:16:21.423`)
* [CVE-2023-32098](CVE-2023/CVE-2023-320xx/CVE-2023-32098.json) (`2023-05-18T20:16:21.423`)
* [CVE-2023-32099](CVE-2023/CVE-2023-320xx/CVE-2023-32099.json) (`2023-05-18T20:16:21.423`)
* [CVE-2023-32100](CVE-2023/CVE-2023-321xx/CVE-2023-32100.json) (`2023-05-18T20:16:21.423`)
* [CVE-2023-31913](CVE-2023/CVE-2023-319xx/CVE-2023-31913.json) (`2023-05-18T20:16:48.160`)
* [CVE-2023-31921](CVE-2023/CVE-2023-319xx/CVE-2023-31921.json) (`2023-05-18T20:21:23.847`)
* [CVE-2023-25460](CVE-2023/CVE-2023-254xx/CVE-2023-25460.json) (`2023-05-18T20:21:37.427`)
* [CVE-2023-28414](CVE-2023/CVE-2023-284xx/CVE-2023-28414.json) (`2023-05-18T20:21:53.677`)
* [CVE-2023-31477](CVE-2023/CVE-2023-314xx/CVE-2023-31477.json) (`2023-05-18T20:29:45.897`)
* [CVE-2023-31498](CVE-2023/CVE-2023-314xx/CVE-2023-31498.json) (`2023-05-18T20:31:00.590`)
* [CVE-2023-30246](CVE-2023/CVE-2023-302xx/CVE-2023-30246.json) (`2023-05-18T20:31:16.180`)
* [CVE-2023-23532](CVE-2023/CVE-2023-235xx/CVE-2023-23532.json) (`2023-05-18T21:15:09.290`)
* [CVE-2023-23535](CVE-2023/CVE-2023-235xx/CVE-2023-23535.json) (`2023-05-18T21:15:09.360`)
* [CVE-2023-27945](CVE-2023/CVE-2023-279xx/CVE-2023-27945.json) (`2023-05-18T21:15:09.427`)
* [CVE-2023-28181](CVE-2023/CVE-2023-281xx/CVE-2023-28181.json) (`2023-05-18T21:15:09.510`)
* [CVE-2023-28625](CVE-2023/CVE-2023-286xx/CVE-2023-28625.json) (`2023-05-18T21:15:09.577`)
* [CVE-2023-32080](CVE-2023/CVE-2023-320xx/CVE-2023-32080.json) (`2023-05-18T21:19:16.560`)
* [CVE-2023-32076](CVE-2023/CVE-2023-320xx/CVE-2023-32076.json) (`2023-05-18T21:22:11.723`)
* [CVE-2023-31471](CVE-2023/CVE-2023-314xx/CVE-2023-31471.json) (`2023-05-18T21:24:07.747`)
## Download and Usage