Auto-Update: 2023-05-15T20:00:24.845893+00:00

This commit is contained in:
René Helmke 2023-05-15 22:00:27 +02:00
parent b42bc23caf
commit 0eea2323e1
85 changed files with 5964 additions and 518 deletions

View File

@ -2,9 +2,9 @@
"id": "CVE-2015-8823",
"sourceIdentifier": "psirt@adobe.com",
"published": "2016-04-22T18:59:00.110",
"lastModified": "2016-05-26T17:32:04.250",
"vulnStatus": "Undergoing Analysis",
"evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>",
"lastModified": "2023-05-15T18:57:00.297",
"vulnStatus": "Analyzed",
"evaluatorComment": "CWE-416: Use After Free",
"descriptions": [
{
"lang": "en",
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -71,7 +71,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-416"
}
]
}
@ -131,13 +131,18 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574"
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
@ -164,78 +169,13 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574"
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionEndIncluding": "19.0.0.245",
"matchCriteriaId": "0469E9D7-B43B-44BC-B52D-A1466FE96801"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*",
"matchCriteriaId": "130D56D9-BFAD-44AB-BA04-1E6E2F18A049"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*",
"matchCriteriaId": "A0CE2650-25EB-446E-B2C9-631177740E87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*",
"matchCriteriaId": "CBAE999D-B558-4714-854D-42D45A7A48BB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:air:*:*:*:*:*:android:*:*",
"versionEndIncluding": "19.0.0.241",
"matchCriteriaId": "8A673D80-8381-4E73-BA12-AA66D91A7E1D"
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
@ -262,23 +202,23 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574"
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5ACCACAF-7BD6-4C0A-8E6A-67E13D5E341D"
"criteria": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37"
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
@ -294,8 +234,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.2.202.554",
"matchCriteriaId": "140657B1-1638-48BD-95B5-565EF5CF5BE5"
"versionEndIncluding": "11.2.202.548",
"matchCriteriaId": "A02328C4-D810-4774-8F28-2B5FB6C7CDB5"
}
]
},
@ -305,8 +245,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37"
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
}
]
}
@ -321,8 +261,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBC814B4-7DEC-4EFC-ABFF-08FFD9FD16AA"
"criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0"
}
]
},
@ -335,12 +275,6 @@
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"versionEndIncluding": "19.0.0.245",
"matchCriteriaId": "C5C96375-3919-417F-ADDC-657F3676EF91"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"versionEndIncluding": "19.0.0.245",
"matchCriteriaId": "9A6F84D7-62F0-45C0-962B-5EC8946B67AA"
}
]
}
@ -367,23 +301,23 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "340C4071-1447-477F-942A-8E09EA29F917"
"criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574"
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8255F035-04C8-4158-B301-82101711939C"
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
@ -410,23 +344,94 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "340C4071-1447-477F-942A-8E09EA29F917"
"criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574"
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8255F035-04C8-4158-B301-82101711939C"
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256"
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"versionEndIncluding": "19.0.0.245",
"matchCriteriaId": "60921187-5894-4500-A822-02986DC497C9"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FBC814B4-7DEC-4EFC-ABFF-08FFD9FD16AA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"versionEndIncluding": "19.0.0.245",
"matchCriteriaId": "9A6F84D7-62F0-45C0-962B-5EC8946B67AA"
}
]
}
@ -436,7 +441,11 @@
"references": [
{
"url": "http://www.zerodayinitiative.com/advisories/ZDI-15-665",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-16170",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-08-11T20:15:13.073",
"lastModified": "2020-09-02T19:15:17.830",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-15T18:56:11.143",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -21,20 +21,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -43,18 +43,18 @@
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "HIGH",
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
@ -99,6 +99,7 @@
"url": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},

View File

@ -2,19 +2,75 @@
"id": "CVE-2020-18280",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-09T16:15:13.690",
"lastModified": "2023-05-09T17:37:00.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:32:44.127",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability found in Phodal CMD v.1.0 allows a local attacker to execute arbitrary code via the EMBED SRC function."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:md_project:md:1.0:*:*:*:*:wechat:*:*",
"matchCriteriaId": "57E51B10-D8B1-455E-9D8C-71E59C88D892"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/phodal/md/issues/20",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2020-23363",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-09T16:15:14.090",
"lastModified": "2023-05-09T17:37:00.247",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:41:05.847",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Request Forgery (CSRF) vulnerability found in Verytops Verydows all versions that allows an attacker to execute arbitrary code via a crafted script."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:verydows:verydows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88077CEC-9C13-4061-9A3C-AB0E61FF0587"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Verytops/verydows/issues/17",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-28893",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-04-11T05:15:07.700",
"lastModified": "2022-10-08T03:21:08.610",
"lastModified": "2023-05-15T18:45:04.213",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -86,8 +86,37 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.17.2",
"matchCriteriaId": "37FB86B9-21E2-405C-851C-F8EB696C74DA"
"versionStartIncluding": "5.1",
"versionEndExcluding": "5.4.196",
"matchCriteriaId": "2A3398EE-92F2-4D11-AE56-12A63F3AF811"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.117",
"matchCriteriaId": "29E8F4A8-0245-410B-A451-FF3789D4811C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.41",
"matchCriteriaId": "DADAACF4-4A4D-4391-BC86-006141B25D65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "5.16.20",
"matchCriteriaId": "ABBBA66E-0244-4621-966B-9790AF1EEB00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.17",
"versionEndExcluding": "5.17.3",
"matchCriteriaId": "AE420AC7-1E59-4398-B84F-71F4B4337762"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33961",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T10:15:09.490",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:45:43.933",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:waspthemes:visual_css_style_editor:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "7.5.8",
"matchCriteriaId": "AF34AB03-8DEF-463D-9919-F636441D241C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/yellow-pencil-visual-theme-customizer/wordpress-visual-css-style-editor-plugin-7-5-8-auth-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-37306",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-16T02:15:08.077",
"lastModified": "2023-04-21T04:15:55.170",
"lastModified": "2023-05-15T19:27:12.643",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -56,8 +56,158 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.10.6-rev30",
"matchCriteriaId": "1D5FBAE3-4578-4C2C-853E-FDB3DC49F738"
"versionEndExcluding": "7.10.6",
"matchCriteriaId": "5BBF1862-B6FF-4F32-A3C1-59D28BA25F81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:-:*:*:*:*:*:*",
"matchCriteriaId": "3A4EAD2E-C3C3-4C79-8C42-375FFE638486"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev01:*:*:*:*:*:*",
"matchCriteriaId": "39198733-D227-4935-9A60-1026040D262F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev02:*:*:*:*:*:*",
"matchCriteriaId": "3C86EE81-8CD4-4131-969A-BDA24B9B48E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev03:*:*:*:*:*:*",
"matchCriteriaId": "F9E9C869-7DA9-4EFA-B613-82BA127F6CE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev04:*:*:*:*:*:*",
"matchCriteriaId": "F8FAA329-5893-412B-8349-4DA3023CC76E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev05:*:*:*:*:*:*",
"matchCriteriaId": "BB6A57A4-B18D-498D-9A8C-406797A6255C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev06:*:*:*:*:*:*",
"matchCriteriaId": "7F0977F0-90B4-48B4-BED6-C218B5CA5E03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev07:*:*:*:*:*:*",
"matchCriteriaId": "4D55DE67-8F93-48F3-BE54-D3A065479281"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev08:*:*:*:*:*:*",
"matchCriteriaId": "D27980B4-B71B-4DA8-B130-F0B5929F8E65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev09:*:*:*:*:*:*",
"matchCriteriaId": "DD1709BC-7DEB-4508-B3C3-B20F5FD001A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev10:*:*:*:*:*:*",
"matchCriteriaId": "08A6BDD5-259E-4DC3-A548-00CD0D459749"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev11:*:*:*:*:*:*",
"matchCriteriaId": "B8166FF4-77D8-4A12-92E5-615B3DA2E602"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev12:*:*:*:*:*:*",
"matchCriteriaId": "999F057B-7918-461A-B60C-3BE72E92CDC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev13:*:*:*:*:*:*",
"matchCriteriaId": "88FD1550-3715-493E-B674-9ECF3DD7A813"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev14:*:*:*:*:*:*",
"matchCriteriaId": "F31A4949-397F-4D1B-8AEA-AC7B335722F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev15:*:*:*:*:*:*",
"matchCriteriaId": "D33A91D4-CE21-486D-9469-B09060B8C637"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev16:*:*:*:*:*:*",
"matchCriteriaId": "5E3E5CD2-7631-4DBE-AB4D-669E82BCCAD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev17:*:*:*:*:*:*",
"matchCriteriaId": "2BEE0AF0-3D22-4DE7-9E71-A4469D9CA2EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev18:*:*:*:*:*:*",
"matchCriteriaId": "AAFB199C-1D66-442D-AD7E-414DD339E1D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev19:*:*:*:*:*:*",
"matchCriteriaId": "26322561-2491-4DC7-B974-0B92B61A5BDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev20:*:*:*:*:*:*",
"matchCriteriaId": "A6BA6C2B-F2D5-4FF7-B316-C8E99C2B464B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev21:*:*:*:*:*:*",
"matchCriteriaId": "733E4A65-821B-4187-AA3A-1ACD3E882C07"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev22:*:*:*:*:*:*",
"matchCriteriaId": "6B0A0043-33E8-4440-92AC-DDD70EA39535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev23:*:*:*:*:*:*",
"matchCriteriaId": "303205CC-8BDE-47EE-A675-9BA19983139A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev24:*:*:*:*:*:*",
"matchCriteriaId": "8C088014-47D6-4632-9FB5-2C7B1085B762"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev25:*:*:*:*:*:*",
"matchCriteriaId": "42CF6057-EB40-4208-9F1E-83213E97987C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev26:*:*:*:*:*:*",
"matchCriteriaId": "966BC23E-B8CE-4F98-B3A6-4B620E8808BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev27:*:*:*:*:*:*",
"matchCriteriaId": "7409CE19-ACC1-4AF4-8C8A-AE2CDBB63D3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev28:*:*:*:*:*:*",
"matchCriteriaId": "17D71CDE-3111-459B-8520-F62E0D5D2972"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev29:*:*:*:*:*:*",
"matchCriteriaId": "6D808ED6-F819-4014-BD24-4537D52DDFB0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-43696",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-15T02:15:07.097",
"lastModified": "2023-04-21T04:16:22.603",
"lastModified": "2023-05-15T19:26:57.757",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -56,8 +56,158 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.10.6-rev30",
"matchCriteriaId": "1D5FBAE3-4578-4C2C-853E-FDB3DC49F738"
"versionEndExcluding": "7.10.6",
"matchCriteriaId": "5BBF1862-B6FF-4F32-A3C1-59D28BA25F81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:-:*:*:*:*:*:*",
"matchCriteriaId": "3A4EAD2E-C3C3-4C79-8C42-375FFE638486"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev01:*:*:*:*:*:*",
"matchCriteriaId": "39198733-D227-4935-9A60-1026040D262F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev02:*:*:*:*:*:*",
"matchCriteriaId": "3C86EE81-8CD4-4131-969A-BDA24B9B48E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev03:*:*:*:*:*:*",
"matchCriteriaId": "F9E9C869-7DA9-4EFA-B613-82BA127F6CE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev04:*:*:*:*:*:*",
"matchCriteriaId": "F8FAA329-5893-412B-8349-4DA3023CC76E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev05:*:*:*:*:*:*",
"matchCriteriaId": "BB6A57A4-B18D-498D-9A8C-406797A6255C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev06:*:*:*:*:*:*",
"matchCriteriaId": "7F0977F0-90B4-48B4-BED6-C218B5CA5E03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev07:*:*:*:*:*:*",
"matchCriteriaId": "4D55DE67-8F93-48F3-BE54-D3A065479281"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev08:*:*:*:*:*:*",
"matchCriteriaId": "D27980B4-B71B-4DA8-B130-F0B5929F8E65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev09:*:*:*:*:*:*",
"matchCriteriaId": "DD1709BC-7DEB-4508-B3C3-B20F5FD001A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev10:*:*:*:*:*:*",
"matchCriteriaId": "08A6BDD5-259E-4DC3-A548-00CD0D459749"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev11:*:*:*:*:*:*",
"matchCriteriaId": "B8166FF4-77D8-4A12-92E5-615B3DA2E602"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev12:*:*:*:*:*:*",
"matchCriteriaId": "999F057B-7918-461A-B60C-3BE72E92CDC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev13:*:*:*:*:*:*",
"matchCriteriaId": "88FD1550-3715-493E-B674-9ECF3DD7A813"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev14:*:*:*:*:*:*",
"matchCriteriaId": "F31A4949-397F-4D1B-8AEA-AC7B335722F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev15:*:*:*:*:*:*",
"matchCriteriaId": "D33A91D4-CE21-486D-9469-B09060B8C637"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev16:*:*:*:*:*:*",
"matchCriteriaId": "5E3E5CD2-7631-4DBE-AB4D-669E82BCCAD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev17:*:*:*:*:*:*",
"matchCriteriaId": "2BEE0AF0-3D22-4DE7-9E71-A4469D9CA2EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev18:*:*:*:*:*:*",
"matchCriteriaId": "AAFB199C-1D66-442D-AD7E-414DD339E1D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev19:*:*:*:*:*:*",
"matchCriteriaId": "26322561-2491-4DC7-B974-0B92B61A5BDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev20:*:*:*:*:*:*",
"matchCriteriaId": "A6BA6C2B-F2D5-4FF7-B316-C8E99C2B464B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev21:*:*:*:*:*:*",
"matchCriteriaId": "733E4A65-821B-4187-AA3A-1ACD3E882C07"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev22:*:*:*:*:*:*",
"matchCriteriaId": "6B0A0043-33E8-4440-92AC-DDD70EA39535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev23:*:*:*:*:*:*",
"matchCriteriaId": "303205CC-8BDE-47EE-A675-9BA19983139A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev24:*:*:*:*:*:*",
"matchCriteriaId": "8C088014-47D6-4632-9FB5-2C7B1085B762"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev25:*:*:*:*:*:*",
"matchCriteriaId": "42CF6057-EB40-4208-9F1E-83213E97987C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev26:*:*:*:*:*:*",
"matchCriteriaId": "966BC23E-B8CE-4F98-B3A6-4B620E8808BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev27:*:*:*:*:*:*",
"matchCriteriaId": "7409CE19-ACC1-4AF4-8C8A-AE2CDBB63D3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev28:*:*:*:*:*:*",
"matchCriteriaId": "17D71CDE-3111-459B-8520-F62E0D5D2972"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev29:*:*:*:*:*:*",
"matchCriteriaId": "6D808ED6-F819-4014-BD24-4537D52DDFB0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-43697",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-15T02:15:07.147",
"lastModified": "2023-04-21T04:16:20.190",
"lastModified": "2023-05-15T19:27:03.377",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -56,8 +56,158 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.10.6-rev30",
"matchCriteriaId": "1D5FBAE3-4578-4C2C-853E-FDB3DC49F738"
"versionEndExcluding": "7.10.6",
"matchCriteriaId": "5BBF1862-B6FF-4F32-A3C1-59D28BA25F81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:-:*:*:*:*:*:*",
"matchCriteriaId": "3A4EAD2E-C3C3-4C79-8C42-375FFE638486"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev01:*:*:*:*:*:*",
"matchCriteriaId": "39198733-D227-4935-9A60-1026040D262F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev02:*:*:*:*:*:*",
"matchCriteriaId": "3C86EE81-8CD4-4131-969A-BDA24B9B48E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev03:*:*:*:*:*:*",
"matchCriteriaId": "F9E9C869-7DA9-4EFA-B613-82BA127F6CE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev04:*:*:*:*:*:*",
"matchCriteriaId": "F8FAA329-5893-412B-8349-4DA3023CC76E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev05:*:*:*:*:*:*",
"matchCriteriaId": "BB6A57A4-B18D-498D-9A8C-406797A6255C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev06:*:*:*:*:*:*",
"matchCriteriaId": "7F0977F0-90B4-48B4-BED6-C218B5CA5E03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev07:*:*:*:*:*:*",
"matchCriteriaId": "4D55DE67-8F93-48F3-BE54-D3A065479281"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev08:*:*:*:*:*:*",
"matchCriteriaId": "D27980B4-B71B-4DA8-B130-F0B5929F8E65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev09:*:*:*:*:*:*",
"matchCriteriaId": "DD1709BC-7DEB-4508-B3C3-B20F5FD001A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev10:*:*:*:*:*:*",
"matchCriteriaId": "08A6BDD5-259E-4DC3-A548-00CD0D459749"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev11:*:*:*:*:*:*",
"matchCriteriaId": "B8166FF4-77D8-4A12-92E5-615B3DA2E602"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev12:*:*:*:*:*:*",
"matchCriteriaId": "999F057B-7918-461A-B60C-3BE72E92CDC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev13:*:*:*:*:*:*",
"matchCriteriaId": "88FD1550-3715-493E-B674-9ECF3DD7A813"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev14:*:*:*:*:*:*",
"matchCriteriaId": "F31A4949-397F-4D1B-8AEA-AC7B335722F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev15:*:*:*:*:*:*",
"matchCriteriaId": "D33A91D4-CE21-486D-9469-B09060B8C637"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev16:*:*:*:*:*:*",
"matchCriteriaId": "5E3E5CD2-7631-4DBE-AB4D-669E82BCCAD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev17:*:*:*:*:*:*",
"matchCriteriaId": "2BEE0AF0-3D22-4DE7-9E71-A4469D9CA2EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev18:*:*:*:*:*:*",
"matchCriteriaId": "AAFB199C-1D66-442D-AD7E-414DD339E1D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev19:*:*:*:*:*:*",
"matchCriteriaId": "26322561-2491-4DC7-B974-0B92B61A5BDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev20:*:*:*:*:*:*",
"matchCriteriaId": "A6BA6C2B-F2D5-4FF7-B316-C8E99C2B464B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev21:*:*:*:*:*:*",
"matchCriteriaId": "733E4A65-821B-4187-AA3A-1ACD3E882C07"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev22:*:*:*:*:*:*",
"matchCriteriaId": "6B0A0043-33E8-4440-92AC-DDD70EA39535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev23:*:*:*:*:*:*",
"matchCriteriaId": "303205CC-8BDE-47EE-A675-9BA19983139A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev24:*:*:*:*:*:*",
"matchCriteriaId": "8C088014-47D6-4632-9FB5-2C7B1085B762"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev25:*:*:*:*:*:*",
"matchCriteriaId": "42CF6057-EB40-4208-9F1E-83213E97987C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev26:*:*:*:*:*:*",
"matchCriteriaId": "966BC23E-B8CE-4F98-B3A6-4B620E8808BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev27:*:*:*:*:*:*",
"matchCriteriaId": "7409CE19-ACC1-4AF4-8C8A-AE2CDBB63D3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev28:*:*:*:*:*:*",
"matchCriteriaId": "17D71CDE-3111-459B-8520-F62E0D5D2972"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev29:*:*:*:*:*:*",
"matchCriteriaId": "6D808ED6-F819-4014-BD24-4537D52DDFB0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-43698",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-15T02:15:07.183",
"lastModified": "2023-04-21T04:16:17.983",
"lastModified": "2023-05-15T19:27:09.167",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -56,8 +56,158 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.10.6-rev30",
"matchCriteriaId": "1D5FBAE3-4578-4C2C-853E-FDB3DC49F738"
"versionEndExcluding": "7.10.6",
"matchCriteriaId": "5BBF1862-B6FF-4F32-A3C1-59D28BA25F81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:-:*:*:*:*:*:*",
"matchCriteriaId": "3A4EAD2E-C3C3-4C79-8C42-375FFE638486"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev01:*:*:*:*:*:*",
"matchCriteriaId": "39198733-D227-4935-9A60-1026040D262F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev02:*:*:*:*:*:*",
"matchCriteriaId": "3C86EE81-8CD4-4131-969A-BDA24B9B48E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev03:*:*:*:*:*:*",
"matchCriteriaId": "F9E9C869-7DA9-4EFA-B613-82BA127F6CE5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev04:*:*:*:*:*:*",
"matchCriteriaId": "F8FAA329-5893-412B-8349-4DA3023CC76E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev05:*:*:*:*:*:*",
"matchCriteriaId": "BB6A57A4-B18D-498D-9A8C-406797A6255C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev06:*:*:*:*:*:*",
"matchCriteriaId": "7F0977F0-90B4-48B4-BED6-C218B5CA5E03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev07:*:*:*:*:*:*",
"matchCriteriaId": "4D55DE67-8F93-48F3-BE54-D3A065479281"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev08:*:*:*:*:*:*",
"matchCriteriaId": "D27980B4-B71B-4DA8-B130-F0B5929F8E65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev09:*:*:*:*:*:*",
"matchCriteriaId": "DD1709BC-7DEB-4508-B3C3-B20F5FD001A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev10:*:*:*:*:*:*",
"matchCriteriaId": "08A6BDD5-259E-4DC3-A548-00CD0D459749"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev11:*:*:*:*:*:*",
"matchCriteriaId": "B8166FF4-77D8-4A12-92E5-615B3DA2E602"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev12:*:*:*:*:*:*",
"matchCriteriaId": "999F057B-7918-461A-B60C-3BE72E92CDC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev13:*:*:*:*:*:*",
"matchCriteriaId": "88FD1550-3715-493E-B674-9ECF3DD7A813"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev14:*:*:*:*:*:*",
"matchCriteriaId": "F31A4949-397F-4D1B-8AEA-AC7B335722F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev15:*:*:*:*:*:*",
"matchCriteriaId": "D33A91D4-CE21-486D-9469-B09060B8C637"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev16:*:*:*:*:*:*",
"matchCriteriaId": "5E3E5CD2-7631-4DBE-AB4D-669E82BCCAD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev17:*:*:*:*:*:*",
"matchCriteriaId": "2BEE0AF0-3D22-4DE7-9E71-A4469D9CA2EB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev18:*:*:*:*:*:*",
"matchCriteriaId": "AAFB199C-1D66-442D-AD7E-414DD339E1D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev19:*:*:*:*:*:*",
"matchCriteriaId": "26322561-2491-4DC7-B974-0B92B61A5BDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev20:*:*:*:*:*:*",
"matchCriteriaId": "A6BA6C2B-F2D5-4FF7-B316-C8E99C2B464B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev21:*:*:*:*:*:*",
"matchCriteriaId": "733E4A65-821B-4187-AA3A-1ACD3E882C07"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev22:*:*:*:*:*:*",
"matchCriteriaId": "6B0A0043-33E8-4440-92AC-DDD70EA39535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev23:*:*:*:*:*:*",
"matchCriteriaId": "303205CC-8BDE-47EE-A675-9BA19983139A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev24:*:*:*:*:*:*",
"matchCriteriaId": "8C088014-47D6-4632-9FB5-2C7B1085B762"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev25:*:*:*:*:*:*",
"matchCriteriaId": "42CF6057-EB40-4208-9F1E-83213E97987C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev26:*:*:*:*:*:*",
"matchCriteriaId": "966BC23E-B8CE-4F98-B3A6-4B620E8808BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev27:*:*:*:*:*:*",
"matchCriteriaId": "7409CE19-ACC1-4AF4-8C8A-AE2CDBB63D3D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev28:*:*:*:*:*:*",
"matchCriteriaId": "17D71CDE-3111-459B-8520-F62E0D5D2972"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev29:*:*:*:*:*:*",
"matchCriteriaId": "6D808ED6-F819-4014-BD24-4537D52DDFB0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46817",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T10:15:10.223",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:45:11.683",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flyzoo:flyzoo_chat:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.3.3",
"matchCriteriaId": "F9F69D9D-1FAC-419F-9E0A-9EEF333EAD27"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/flyzoo/wordpress-flyzoo-chat-plugin-2-3-3-cross-site-scripting-xss?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0614",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-04-03T23:15:06.957",
"lastModified": "2023-04-16T04:15:08.097",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-15T18:44:56.913",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -67,29 +67,40 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.6.16",
"matchCriteriaId": "B3FDA4C7-6C53-401C-A133-D5B4299FE185"
"versionEndExcluding": "4.16.10",
"matchCriteriaId": "4199E7A4-284A-45D7-84C7-AF0141FD94EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.7.0",
"versionEndExcluding": "4.7.9",
"matchCriteriaId": "D2D88D65-4DCC-44B4-9671-1D2C5FE598D9"
"versionStartIncluding": "4.17.0",
"versionEndExcluding": "4.17.7",
"matchCriteriaId": "2F914D5D-6211-4CF3-87AB-71284AD225A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.8.0",
"versionEndExcluding": "4.8.4",
"matchCriteriaId": "24E405D2-03BC-4808-A8F1-1C4BF24CFCCA"
"criteria": "cpe:2.3:a:samba:samba:4.18.0:-:*:*:*:*:*:*",
"matchCriteriaId": "D9A6E955-CE26-405F-9468-4557A256CA8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.9.0",
"versionEndExcluding": "4.9.4",
"matchCriteriaId": "902B65DD-745F-4588-80D6-E529F0862B95"
"criteria": "cpe:2.3:a:samba:samba:4.18.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E9604B46-FDA2-4CA1-971F-315AFD250033"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:samba:samba:4.18.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "1C209E4C-098B-4D49-A21B-AC8154FE3D85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:samba:samba:4.18.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "2849132A-18B1-4A49-8B2E-8B6DCFCC0501"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:samba:samba:4.18.0:rc4:*:*:*:*:*:*",
"matchCriteriaId": "F657608C-18FB-49FA-A73E-F9BF5CD95B17"
}
]
}
@ -99,7 +110,10 @@
"references": [
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230406-0007/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1681",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-28T23:15:09.070",
"lastModified": "2023-04-04T19:32:04.267",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-15T19:26:01.047",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -112,8 +112,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xunruicms:xunrui_cms:4.61:*:*:*:*:*:*:*",
"matchCriteriaId": "C5E41FB0-7E67-4C28-8B96-2FD5AC3CD1F5"
"criteria": "cpe:2.3:a:xunruicms:xunruicms:4.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F87320D5-95B1-4484-AC76-9E22F5B26B94"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1682",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-29T00:15:08.903",
"lastModified": "2023-04-05T01:52:40.933",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-15T19:26:12.580",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -112,8 +112,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xunruicms:xunruicms:4.61:*:*:*:*:*:*:*",
"matchCriteriaId": "578806FE-ED42-476F-A690-CCBB6A9F2382"
"criteria": "cpe:2.3:a:xunruicms:xunruicms:4.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F87320D5-95B1-4484-AC76-9E22F5B26B94"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1683",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-03-29T01:15:10.443",
"lastModified": "2023-04-05T01:57:37.367",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-15T19:26:18.010",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -112,8 +112,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xunruicms:xunruicms:4.61:*:*:*:*:*:*:*",
"matchCriteriaId": "578806FE-ED42-476F-A690-CCBB6A9F2382"
"criteria": "cpe:2.3:a:xunruicms:xunruicms:4.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F87320D5-95B1-4484-AC76-9E22F5B26B94"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22711",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T08:15:09.767",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:44:29.450",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:agentevolution:impress_listings:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.6.2",
"matchCriteriaId": "C1C4D053-DD4F-48BC-AAC4-52A27FD21389"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-listings/wordpress-impress-listings-plugin-2-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23701",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T08:15:10.980",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:43:41.283",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:web_design_easy_sign_up_project:web_design_easy_sign_up:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.4.1",
"matchCriteriaId": "24AE9D79-C77A-4F50-B1FA-3FB0638980DC"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/easy-sign-up/wordpress-easy-sign-up-plugin-3-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23788",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T08:15:11.163",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:43:07.003",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:custom_more_link_complete_project:custom_more_link_complete:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.4.1",
"matchCriteriaId": "15046E03-EBD6-4390-BE5D-2FD1DA571E08"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/custom-more-link-complete/wordpress-custom-more-link-complete-plugin-1-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23789",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T08:15:11.230",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:47:30.610",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:premmerce:premmerce_redirect_manager:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.9",
"matchCriteriaId": "5CC40127-3680-47F4-B825-BAB6D9040FB7"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/premmerce-redirect-manager/wordpress-premmerce-redirect-manager-plugin-1-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23812",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T08:15:11.310",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:47:13.493",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:enhanced_wp_contact_form_project:enhanced_wp_contact_form:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.2.3",
"matchCriteriaId": "A0D03077-6C10-4D3E-B411-7AFD05DCA2CF"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/enhanced-wordpress-contactform/wordpress-enhanced-wp-contact-form-plugin-2-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24505",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2023-05-08T21:15:10.797",
"lastModified": "2023-05-09T12:47:05.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:18:10.547",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
@ -46,10 +76,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:milesight:ncr\\/camera_firmware:71.8.0.6-r5:*:*:*:*:*:*:*",
"matchCriteriaId": "932A78A4-FA43-4247-9F25-A4AE5FDDC9A6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:milesight:ncr\\/camera:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88745DC8-B8DA-4CF1-A03D-4913809A8715"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
"source": "cna@cyber.gov.il",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24506",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2023-05-08T21:15:10.867",
"lastModified": "2023-05-09T12:47:05.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:01:57.487",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
@ -46,10 +76,42 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:milesight:ncr\\/camera_firmware:71.8.0.6-r5:*:*:*:*:*:*:*",
"matchCriteriaId": "932A78A4-FA43-4247-9F25-A4AE5FDDC9A6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:milesight:ncr\\/camera:-:*:*:*:*:*:*:*",
"matchCriteriaId": "88745DC8-B8DA-4CF1-A03D-4913809A8715"
}
]
}
]
}
],
"references": [
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "cna@cyber.gov.il"
"source": "cna@cyber.gov.il",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24898",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:11.913",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:39:58.677",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.1724",
"matchCriteriaId": "D67CFE7C-A12C-407A-8658-E717F78400B4"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24898",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24899",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:11.970",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:40:29.773",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,55 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "54CA9311-FE54-44E3-9EC5-257B8167F535"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24899",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24900",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.033",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:40:49.847",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,121 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24900",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24901",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.097",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:33:54.050",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,111 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "06DC17AF-48FE-4237-8479-F36205326BBA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24901",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24902",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.157",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:35:05.153",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24902",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24903",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.217",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:39:34.700",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,115 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24903",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24904",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.280",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:31:50.367",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,48 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24904",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24905",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.347",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:06:58.340",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,68 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24905",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24932",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.407",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:18:30.897",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,121 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24939",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.467",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:31:01.027",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,111 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24939",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24940",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.527",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:28:15.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,121 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24940",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24941",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.587",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:28:47.743",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24941",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24942",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.643",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:29:01.270",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,121 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24942",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24943",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.720",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:27:43.557",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,121 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24943",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24944",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.780",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:27:29.400",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,84 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24944",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24945",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.840",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:16:12.817",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,121 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24945",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24946",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.900",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:16:24.293",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,101 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24946",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24947",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:12.960",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:26:43.583",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,78 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24947",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24948",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:13.017",
"lastModified": "2023-05-09T18:23:34.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:54:58.640",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,100 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24948",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24949",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:13.080",
"lastModified": "2023-05-09T18:23:25.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:14:25.917",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,84 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24949",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24950",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:13.143",
"lastModified": "2023-05-09T18:23:25.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:15:22.023",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,53 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
"matchCriteriaId": "9C082CC4-6128-475D-BC19-B239E348FDB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*",
"matchCriteriaId": "AC8BB33F-44C4-41FE-8B17-68E3C4B38142"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24950",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25829",
"sourceIdentifier": "psirt@esri.com",
"published": "2023-05-09T17:15:10.387",
"lastModified": "2023-05-09T17:36:56.357",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:50:04.493",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -46,14 +46,42 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1DCD5CA4-4423-4AC2-A9B8-3FCACC4E43ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2A62FCB5-12A6-487C-BCA9-0AD3F11354CD"
}
]
}
]
}
],
"references": [
{
"url": "https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8095",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25830",
"sourceIdentifier": "psirt@esri.com",
"published": "2023-05-09T17:15:10.567",
"lastModified": "2023-05-09T17:36:56.357",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:49:22.937",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -46,14 +46,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "81C43246-F8AC-4A3D-8F43-8280E1AD3007"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE382B5-E228-4803-A3FC-B803C7838777"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1DCD5CA4-4423-4AC2-A9B8-3FCACC4E43ED"
}
]
}
]
}
],
"references": [
{
"url": "https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8095",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2594",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-09T13:15:17.910",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:48:44.910",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,14 +93,41 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:food_ordering_management_system_project:food_ordering_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "041627BE-2E8A-46EE-9B11-07AC3EB4B969"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.228396",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.228396",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2595",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-09T13:15:17.980",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:48:27.957",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +93,49 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:billing_management_system_project:billing_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3E27C8-B58D-4F75-BC4E-B076575833E2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Yastar/bug_report/blob/main/SQLi-1.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.228397",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.228397",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2596",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-09T13:15:18.043",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:48:06.217",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +93,49 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:online_reviewer_system_project:online_reviewer_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7DF1563B-E1A7-44A3-ACE0-5C00BCBA51FB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/rick13795/bug_report/blob/main/SQLi-1.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.228398",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.228398",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27010",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-13T19:15:22.617",
"lastModified": "2023-03-22T18:18:56.817",
"lastModified": "2023-05-15T19:25:41.970",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -55,8 +55,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wondershare:dr.phone:12.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8013624C-30CD-429F-A56F-0CFC2017505B"
"criteria": "cpe:2.3:a:wondershare:dr.fone:12.9.6:*:*:*:*:windows:*:*",
"matchCriteriaId": "C2C2D87E-8A0C-4686-BA5A-C8DB098ED33F"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27407",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-05-09T13:15:16.640",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:47:18.340",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -31,13 +31,43 @@
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,10 +76,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.1",
"matchCriteriaId": "E4B6DB46-5FD2-4ABD-B1A5-7AB8BB3724BB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52A77C9D-E59C-4397-B834-797D7B334A6B"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-325383.pdf",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27408",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-05-09T13:15:16.727",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:46:34.533",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -46,10 +46,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.1",
"matchCriteriaId": "E4B6DB46-5FD2-4ABD-B1A5-7AB8BB3724BB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52A77C9D-E59C-4397-B834-797D7B334A6B"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-325383.pdf",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27409",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-05-09T13:15:16.800",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:45:55.523",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
@ -46,10 +66,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.1",
"matchCriteriaId": "E4B6DB46-5FD2-4ABD-B1A5-7AB8BB3724BB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52A77C9D-E59C-4397-B834-797D7B334A6B"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-325383.pdf",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27410",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-05-09T13:15:16.873",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:44:29.897",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -46,10 +46,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.1",
"matchCriteriaId": "E4B6DB46-5FD2-4ABD-B1A5-7AB8BB3724BB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52A77C9D-E59C-4397-B834-797D7B334A6B"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-325383.pdf",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28251",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:13.433",
"lastModified": "2023-05-09T18:23:25.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:40:19.857",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,116 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28251",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28283",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:13.490",
"lastModified": "2023-05-09T18:23:25.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:39:36.323",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,116 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28283",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28290",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:13.547",
"lastModified": "2023-05-09T18:23:25.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:39:22.090",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:remote_desktop:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.2.3006.0",
"matchCriteriaId": "A967D3CD-57A5-404B-91EF-5AE2F24A6370"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28290",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28832",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-05-09T13:15:17.373",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:49:38.067",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -46,10 +46,70 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6gk1411-1ac00_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A1F685FA-A737-4D3D-AF47-837D30EBD898"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A62A87CC-250C-469E-9D2C-187271020EE6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6gk1411-5ac00_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD8CE67-41F5-4673-BC79-EF290971FF20"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7804B194-FECA-4D73-9D49-4B7E8FD49258"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29092",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-09T02:15:12.127",
"lastModified": "2023-05-09T12:46:35.530",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:57:52.217",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -34,10 +54,135 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_5123_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFB4DF2-B55C-45BD-9073-56299E19B6DE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_5123:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A5954D95-E12B-487D-9744-361566788A2D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_5300_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E2E6EE0-4271-43A3-9439-49F332D1FE1C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_5300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2F9B26D9-AA50-4652-AFC0-A6AC966B4770"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F18F62E-2012-442E-BE60-6E76325D1824"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0D8701B6-6989-44D1-873A-A1823BFD7CCC"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:samsung:exynos_1080_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43DE4D6F-D662-46F2-93BC-9AE950320BDE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EE06CD56-8BFD-4208-843A-179E3E6F5C10"
}
]
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29103",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-05-09T13:15:17.447",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:38:37.257",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -46,10 +46,72 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6gk1411-1ac00_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.1",
"matchCriteriaId": "F167D4D5-349A-4A2B-90E8-7EF29991F135"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A62A87CC-250C-469E-9D2C-187271020EE6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6gk1411-5ac00_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.1",
"matchCriteriaId": "3DFB8EBF-5050-4AA9-8BD1-51CC51E9E4CB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7804B194-FECA-4D73-9D49-4B7E8FD49258"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29104",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-05-09T13:15:17.547",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:37:59.890",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
@ -46,10 +66,70 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6gk1411-1ac00_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A1F685FA-A737-4D3D-AF47-837D30EBD898"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A62A87CC-250C-469E-9D2C-187271020EE6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6gk1411-5ac00_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD8CE67-41F5-4673-BC79-EF290971FF20"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7804B194-FECA-4D73-9D49-4B7E8FD49258"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29105",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-05-09T13:15:17.627",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:36:17.447",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
@ -46,10 +66,72 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6gk1411-1ac00_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.1",
"matchCriteriaId": "F167D4D5-349A-4A2B-90E8-7EF29991F135"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A62A87CC-250C-469E-9D2C-187271020EE6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6gk1411-5ac00_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.1",
"matchCriteriaId": "3DFB8EBF-5050-4AA9-8BD1-51CC51E9E4CB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7804B194-FECA-4D73-9D49-4B7E8FD49258"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29106",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-05-09T13:15:17.703",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:34:08.910",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
@ -46,10 +66,70 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6gk1411-1ac00_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A1F685FA-A737-4D3D-AF47-837D30EBD898"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A62A87CC-250C-469E-9D2C-187271020EE6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6gk1411-5ac00_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD8CE67-41F5-4673-BC79-EF290971FF20"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7804B194-FECA-4D73-9D49-4B7E8FD49258"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29107",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-05-09T13:15:17.777",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:33:18.470",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -36,7 +36,7 @@
},
"weaknesses": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,12 +44,82 @@
"value": "CWE-552"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-552"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6gk1411-1ac00_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A1F685FA-A737-4D3D-AF47-837D30EBD898"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A62A87CC-250C-469E-9D2C-187271020EE6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6gk1411-5ac00_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD8CE67-41F5-4673-BC79-EF290971FF20"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7804B194-FECA-4D73-9D49-4B7E8FD49258"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29128",
"sourceIdentifier": "productcert@siemens.com",
"published": "2023-05-09T13:15:17.843",
"lastModified": "2023-05-09T14:30:54.950",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:21:42.613",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L",
@ -46,10 +66,70 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6gk1411-1ac00_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A1F685FA-A737-4D3D-AF47-837D30EBD898"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A62A87CC-250C-469E-9D2C-187271020EE6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:6gk1411-5ac00_firmware:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD8CE67-41F5-4673-BC79-EF290971FF20"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7804B194-FECA-4D73-9D49-4B7E8FD49258"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29324",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:13.607",
"lastModified": "2023-05-09T18:23:25.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:37:30.953",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,7 +13,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -31,13 +31,139 @@
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29324",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29325",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:13.667",
"lastModified": "2023-05-09T18:23:25.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:35:37.617",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -13,8 +13,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
@ -34,10 +54,116 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29325",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29333",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:13.727",
"lastModified": "2023-05-09T18:23:25.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:33:19.563",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,53 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:*:*",
"matchCriteriaId": "25D63F31-2978-4C24-B7CA-6A0398012700"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29333",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29335",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-09T18:15:13.783",
"lastModified": "2023-05-09T18:23:25.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:32:59.537",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,156 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.10240.19926",
"matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.5921",
"matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.4377",
"matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19042.2965",
"matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.2965",
"matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.2965",
"matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1936",
"matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.1702",
"matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*",
"matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:*:*",
"matchCriteriaId": "25D63F31-2978-4C24-B7CA-6A0398012700"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:word:2013:*:*:*:rt:*:*:*",
"matchCriteriaId": "3C81544A-00F9-4B20-B679-CFE60D5B23CB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*",
"matchCriteriaId": "45E21528-4B0F-4A6F-82AD-DF7FDBF67C8F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*",
"matchCriteriaId": "4DA042D4-B14E-4DDF-8423-DFB255679EFE"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29335",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-30088",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-09T16:15:14.583",
"lastModified": "2023-05-09T17:36:56.357",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:37:58.970",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "An issue found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_execute function in mjs.c."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/cesanta/mjs/issues/243",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30512",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-12T06:15:07.580",
"lastModified": "2023-04-19T19:16:09.160",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-15T19:26:44.667",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-732"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30614",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-04-19T18:15:07.637",
"lastModified": "2023-05-01T18:14:48.710",
"lastModified": "2023-05-15T19:27:42.637",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -75,9 +75,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pay_project:pay:*:*:*:*:*:rails:*:*",
"criteria": "cpe:2.3:a:pay_project:pay:*:*:*:*:*:ruby:*:*",
"versionEndExcluding": "6.3.2",
"matchCriteriaId": "48D1A98B-0606-4A99-BFA3-188B1D93EA38"
"matchCriteriaId": "088D4CFF-C244-4E06-A3C4-667D1CDE88CC"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30746",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:14.360",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T19:46:09.433",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:booqable:rental_software_booqable_rental:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.4.15",
"matchCriteriaId": "B9007CC3-7370-4C05-8DF1-15ADA7DD0886"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/booqable-rental-reservations/wordpress-booqable-rental-plugin-plugin-2-4-12-cross-site-scripting-xss?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30840",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-08T18:15:14.187",
"lastModified": "2023-05-09T12:47:05.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:32:12.513",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,22 +66,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:fluid:*:*:*:*:*:*:*:*",
"versionStartIncluding": "0.7.0",
"versionEndExcluding": "0.8.6",
"matchCriteriaId": "95A42FEF-1F23-4E3A-BA75-99863B965ADF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/fluid-cloudnative/fluid/commit/77c8110a3d1ec077ae2bce6bd88d296505db1550",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/fluid-cloudnative/fluid/commit/91c05c32db131997b5ca065e869c9918a125c149",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/fluid-cloudnative/fluid/releases/tag/v0.8.6",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/fluid-cloudnative/fluid/security/advisories/GHSA-93xx-cvmc-9w3v",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30844",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-08T18:15:14.280",
"lastModified": "2023-05-09T12:47:05.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:07:21.737",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,18 +76,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutagen:mutagen:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.16.6",
"matchCriteriaId": "0FC7EAD0-2199-4FFD-93B0-31A6CE866C9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutagen:mutagen:0.17.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DA304563-83C6-4344-9B53-B46EDC40C9FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mutagen:mutagen_compose:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.17.1",
"matchCriteriaId": "F67B41B1-5C50-4FFC-8453-326C21D54AED"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/mutagen-io/mutagen/releases/tag/v0.16.6",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/mutagen-io/mutagen/releases/tag/v0.17.1",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/mutagen-io/mutagen/security/advisories/GHSA-jmp2-wc4p-wfh2",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31125",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-08T21:15:11.347",
"lastModified": "2023-05-09T12:47:05.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:33:24.077",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,18 +76,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:socket:engine.io:*:*:*:*:*:node.js:*:*",
"versionStartIncluding": "5.1.0",
"versionEndExcluding": "6.4.2",
"matchCriteriaId": "9E9DF47D-3B77-4A1B-BE6F-03F9F532FA9D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/socketio/engine.io/commit/fc480b4f305e16fe5972cf337d055e598372dc44",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/socketio/engine.io/releases/tag/6.4.2",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/socketio/engine.io/security/advisories/GHSA-q9mw-68c2-j6m5",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31127",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-08T21:15:11.427",
"lastModified": "2023-05-09T12:47:05.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:08:38.267",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -50,18 +80,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dmtf:libspdm:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.3.2",
"matchCriteriaId": "CBDE3981-9A20-48AB-BF8D-847EFCF3B31D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/DMTF/libspdm/pull/2006",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/DMTF/libspdm/pull/2007",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/DMTF/libspdm/security/advisories/GHSA-qw76-4v8p-xq9f",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31129",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-08T21:15:11.513",
"lastModified": "2023-05-09T12:47:05.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:05:51.943",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,7 +56,7 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,16 +64,51 @@
"value": "CWE-476"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.8",
"matchCriteriaId": "729B4607-C6BD-42DE-91BF-918A57D29A77"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/contiki-ng/contiki-ng/pull/2271",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-x29r-5qjg-75mq",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31133",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-08T21:15:11.600",
"lastModified": "2023-05-09T12:47:05.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:19:28.143",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,18 +76,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "5.46.1",
"matchCriteriaId": "019CF5DA-91CB-485C-8C00-7E82585A682E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/TryGhost/Ghost/commit/b3caf16005289cc9909488391b4a26f3f4a66a90",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/TryGhost/Ghost/releases/tag/v5.46.1",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/TryGhost/Ghost/security/advisories/GHSA-r97q-ghch-82j9",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31140",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-08T21:15:11.693",
"lastModified": "2023-05-09T12:47:05.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:07:30.537",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,22 +66,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "12.5.4",
"matchCriteriaId": "14C47747-7F2C-4C04-ADA2-10AC21D73708"
}
]
}
]
}
],
"references": [
{
"url": "https://community.openproject.org/wp/48035",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/opf/openproject/pull/12508",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/opf/openproject/security/advisories/GHSA-xfp9-qqfj-x28q",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://www.openproject.org/docs/release-notes/12-5-4/",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31141",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-08T21:15:11.783",
"lastModified": "2023-05-09T12:47:05.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:47:12.577",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,10 +66,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amazon:opensearch:*:*:*:*:*:docker:*:*",
"versionEndExcluding": "1.3.10",
"matchCriteriaId": "02F37153-8577-40FE-8306-998CFF26C3D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amazon:opensearch:*:*:*:*:*:docker:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.7.0",
"matchCriteriaId": "5A0107FD-9F14-47A5-8995-AF65862055E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amazon:opensearch_security:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.3.10",
"matchCriteriaId": "4646FDBE-3F9C-48C3-9C17-E4DC273AD2DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:amazon:opensearch_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.7.0",
"matchCriteriaId": "9DDB430A-3C8B-4E3C-968A-E4C1AC52A18E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/opensearch-project/security/security/advisories/GHSA-g8xc-6mf7-h28h",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-31566",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T16:15:12.567",
"lastModified": "2023-05-10T17:06:24.873",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:35:26.847",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Podofo v0.10.0 was discovered to contain a heap-use-after-free via the component PoDoFo::PdfEncrypt::IsMetadataEncrypted()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:podofo_project:podofo:0.10.0:-:*:*:*:*:*:*",
"matchCriteriaId": "E83D1F81-EBA4-47E8-BA9A-23EBABDB99BD"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/podofo/podofo/issues/70",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-31567",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T16:15:12.720",
"lastModified": "2023-05-10T17:06:24.873",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:35:16.757",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Podofo v0.10.0 was discovered to contain a heap buffer overflow via the component PoDoFo::PdfEncryptAESV3::PdfEncryptAESV3."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:podofo_project:podofo:0.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9D2B6FCB-1882-4BAA-B8BE-25E150D012D7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/podofo/podofo/issues/71",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-31568",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T16:15:12.810",
"lastModified": "2023-05-10T17:06:24.873",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-15T18:35:10.000",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Podofo v0.10.0 was discovered to contain a heap buffer overflow via the component PoDoFo::PdfEncryptRC4::PdfEncryptRC4."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:podofo_project:podofo:0.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9D2B6FCB-1882-4BAA-B8BE-25E150D012D7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/podofo/podofo/issues/72",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
}
]
}

View File

@ -2,39 +2,140 @@
"id": "CVE-2023-32233",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-08T20:15:20.267",
"lastModified": "2023-05-14T00:15:46.770",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-05-15T18:27:02.080",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "6.3.1",
"matchCriteriaId": "46382B63-ECFA-4AD8-86B1-4D291CD276C0"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196105",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://news.ycombinator.com/item?id=35879660",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5402",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.openwall.com/lists/oss-security/2023/05/08/4",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
]
}
]
}

164
README.md
View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-15T18:00:24.360770+00:00
2023-05-15T20:00:24.845893+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-15T17:56:53.340000+00:00
2023-05-15T19:47:30.610000+00:00
```
### Last Data Feed Release
@ -34,86 +34,98 @@ Download and Changelog: [Click](releases/latest)
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `0`
* [CVE-2023-30245](CVE-2023/CVE-2023-302xx/CVE-2023-30245.json) (`2023-05-15T16:15:09.980`)
### CVEs modified in the last Commit
Recently modified CVEs: `71`
Recently modified CVEs: `84`
* [CVE-2015-5698](CVE-2015/CVE-2015-56xx/CVE-2015-5698.json) (`2023-05-15T17:15:09.500`)
* [CVE-2021-28999](CVE-2021/CVE-2021-289xx/CVE-2021-28999.json) (`2023-05-15T16:07:22.790`)
* [CVE-2021-31240](CVE-2021/CVE-2021-312xx/CVE-2021-31240.json) (`2023-05-15T17:36:26.413`)
* [CVE-2022-2591](CVE-2022/CVE-2022-25xx/CVE-2022-2591.json) (`2023-05-15T17:15:09.673`)
* [CVE-2022-36354](CVE-2022/CVE-2022-363xx/CVE-2022-36354.json) (`2023-05-15T16:07:42.633`)
* [CVE-2022-38143](CVE-2022/CVE-2022-381xx/CVE-2022-38143.json) (`2023-05-15T16:07:28.197`)
* [CVE-2022-41380](CVE-2022/CVE-2022-413xx/CVE-2022-41380.json) (`2023-05-15T16:12:13.783`)
* [CVE-2022-41381](CVE-2022/CVE-2022-413xx/CVE-2022-41381.json) (`2023-05-15T16:12:02.357`)
* [CVE-2022-41382](CVE-2022/CVE-2022-413xx/CVE-2022-41382.json) (`2023-05-15T16:11:38.777`)
* [CVE-2022-41383](CVE-2022/CVE-2022-413xx/CVE-2022-41383.json) (`2023-05-15T16:11:08.403`)
* [CVE-2022-41384](CVE-2022/CVE-2022-413xx/CVE-2022-41384.json) (`2023-05-15T16:11:17.347`)
* [CVE-2022-41385](CVE-2022/CVE-2022-413xx/CVE-2022-41385.json) (`2023-05-15T16:11:34.127`)
* [CVE-2022-41386](CVE-2022/CVE-2022-413xx/CVE-2022-41386.json) (`2023-05-15T16:12:07.010`)
* [CVE-2022-41387](CVE-2022/CVE-2022-413xx/CVE-2022-41387.json) (`2023-05-15T16:11:51.680`)
* [CVE-2022-41639](CVE-2022/CVE-2022-416xx/CVE-2022-41639.json) (`2023-05-15T16:08:16.143`)
* [CVE-2022-41649](CVE-2022/CVE-2022-416xx/CVE-2022-41649.json) (`2023-05-15T16:08:00.147`)
* [CVE-2022-41794](CVE-2022/CVE-2022-417xx/CVE-2022-41794.json) (`2023-05-15T16:08:30.263`)
* [CVE-2022-41837](CVE-2022/CVE-2022-418xx/CVE-2022-41837.json) (`2023-05-15T16:04:40.127`)
* [CVE-2022-41981](CVE-2022/CVE-2022-419xx/CVE-2022-41981.json) (`2023-05-15T16:07:18.440`)
* [CVE-2022-41988](CVE-2022/CVE-2022-419xx/CVE-2022-41988.json) (`2023-05-15T16:04:55.250`)
* [CVE-2022-42036](CVE-2022/CVE-2022-420xx/CVE-2022-42036.json) (`2023-05-15T16:11:58.717`)
* [CVE-2022-42037](CVE-2022/CVE-2022-420xx/CVE-2022-42037.json) (`2023-05-15T16:11:24.777`)
* [CVE-2022-42039](CVE-2022/CVE-2022-420xx/CVE-2022-42039.json) (`2023-05-15T16:11:44.113`)
* [CVE-2022-42040](CVE-2022/CVE-2022-420xx/CVE-2022-42040.json) (`2023-05-15T16:11:01.057`)
* [CVE-2022-42041](CVE-2022/CVE-2022-420xx/CVE-2022-42041.json) (`2023-05-15T16:11:29.793`)
* [CVE-2022-42042](CVE-2022/CVE-2022-420xx/CVE-2022-42042.json) (`2023-05-15T16:11:47.833`)
* [CVE-2022-42043](CVE-2022/CVE-2022-420xx/CVE-2022-42043.json) (`2023-05-15T16:12:10.443`)
* [CVE-2022-42044](CVE-2022/CVE-2022-420xx/CVE-2022-42044.json) (`2023-05-15T16:11:12.797`)
* [CVE-2022-43592](CVE-2022/CVE-2022-435xx/CVE-2022-43592.json) (`2023-05-15T16:05:30.497`)
* [CVE-2022-43596](CVE-2022/CVE-2022-435xx/CVE-2022-43596.json) (`2023-05-15T16:05:13.157`)
* [CVE-2022-43599](CVE-2022/CVE-2022-435xx/CVE-2022-43599.json) (`2023-05-15T16:03:55.077`)
* [CVE-2022-43600](CVE-2022/CVE-2022-436xx/CVE-2022-43600.json) (`2023-05-15T16:04:17.423`)
* [CVE-2023-0421](CVE-2023/CVE-2023-04xx/CVE-2023-0421.json) (`2023-05-15T16:05:27.957`)
* [CVE-2023-21404](CVE-2023/CVE-2023-214xx/CVE-2023-21404.json) (`2023-05-15T16:58:09.600`)
* [CVE-2023-24507](CVE-2023/CVE-2023-245xx/CVE-2023-24507.json) (`2023-05-15T17:20:08.537`)
* [CVE-2023-2478](CVE-2023/CVE-2023-24xx/CVE-2023-2478.json) (`2023-05-15T17:04:56.630`)
* [CVE-2023-24957](CVE-2023/CVE-2023-249xx/CVE-2023-24957.json) (`2023-05-15T16:40:11.497`)
* [CVE-2023-2513](CVE-2023/CVE-2023-25xx/CVE-2023-2513.json) (`2023-05-15T17:56:53.340`)
* [CVE-2023-2582](CVE-2023/CVE-2023-25xx/CVE-2023-2582.json) (`2023-05-15T17:53:18.677`)
* [CVE-2023-29022](CVE-2023/CVE-2023-290xx/CVE-2023-29022.json) (`2023-05-15T17:43:54.580`)
* [CVE-2023-29023](CVE-2023/CVE-2023-290xx/CVE-2023-29023.json) (`2023-05-15T17:45:08.583`)
* [CVE-2023-29024](CVE-2023/CVE-2023-290xx/CVE-2023-29024.json) (`2023-05-15T17:45:04.930`)
* [CVE-2023-29025](CVE-2023/CVE-2023-290xx/CVE-2023-29025.json) (`2023-05-15T17:45:31.340`)
* [CVE-2023-29026](CVE-2023/CVE-2023-290xx/CVE-2023-29026.json) (`2023-05-15T17:45:45.433`)
* [CVE-2023-29027](CVE-2023/CVE-2023-290xx/CVE-2023-29027.json) (`2023-05-15T17:46:11.773`)
* [CVE-2023-29028](CVE-2023/CVE-2023-290xx/CVE-2023-29028.json) (`2023-05-15T17:46:07.767`)
* [CVE-2023-29029](CVE-2023/CVE-2023-290xx/CVE-2023-29029.json) (`2023-05-15T17:46:26.207`)
* [CVE-2023-29030](CVE-2023/CVE-2023-290xx/CVE-2023-29030.json) (`2023-05-15T17:46:39.870`)
* [CVE-2023-29031](CVE-2023/CVE-2023-290xx/CVE-2023-29031.json) (`2023-05-15T17:46:57.373`)
* [CVE-2023-30083](CVE-2023/CVE-2023-300xx/CVE-2023-30083.json) (`2023-05-15T17:48:24.027`)
* [CVE-2023-30084](CVE-2023/CVE-2023-300xx/CVE-2023-30084.json) (`2023-05-15T17:48:13.800`)
* [CVE-2023-30085](CVE-2023/CVE-2023-300xx/CVE-2023-30085.json) (`2023-05-15T17:48:06.330`)
* [CVE-2023-30334](CVE-2023/CVE-2023-303xx/CVE-2023-30334.json) (`2023-05-15T17:34:04.023`)
* [CVE-2023-30740](CVE-2023/CVE-2023-307xx/CVE-2023-30740.json) (`2023-05-15T17:52:11.647`)
* [CVE-2023-30741](CVE-2023/CVE-2023-307xx/CVE-2023-30741.json) (`2023-05-15T17:51:34.233`)
* [CVE-2023-30742](CVE-2023/CVE-2023-307xx/CVE-2023-30742.json) (`2023-05-15T17:51:13.520`)
* [CVE-2023-30743](CVE-2023/CVE-2023-307xx/CVE-2023-30743.json) (`2023-05-15T17:48:15.840`)
* [CVE-2023-30744](CVE-2023/CVE-2023-307xx/CVE-2023-30744.json) (`2023-05-15T17:33:39.963`)
* [CVE-2023-31038](CVE-2023/CVE-2023-310xx/CVE-2023-31038.json) (`2023-05-15T16:10:47.323`)
* [CVE-2023-31047](CVE-2023/CVE-2023-310xx/CVE-2023-31047.json) (`2023-05-15T16:43:47.707`)
* [CVE-2023-31123](CVE-2023/CVE-2023-311xx/CVE-2023-31123.json) (`2023-05-15T17:13:24.947`)
* [CVE-2023-31178](CVE-2023/CVE-2023-311xx/CVE-2023-31178.json) (`2023-05-15T17:20:51.523`)
* [CVE-2023-31179](CVE-2023/CVE-2023-311xx/CVE-2023-31179.json) (`2023-05-15T17:20:40.377`)
* [CVE-2023-31182](CVE-2023/CVE-2023-311xx/CVE-2023-31182.json) (`2023-05-15T16:50:15.150`)
* [CVE-2023-31404](CVE-2023/CVE-2023-314xx/CVE-2023-31404.json) (`2023-05-15T17:32:45.030`)
* [CVE-2023-31406](CVE-2023/CVE-2023-314xx/CVE-2023-31406.json) (`2023-05-15T17:32:21.943`)
* [CVE-2023-31407](CVE-2023/CVE-2023-314xx/CVE-2023-31407.json) (`2023-05-15T17:32:12.417`)
* [CVE-2023-31508](CVE-2023/CVE-2023-315xx/CVE-2023-31508.json) (`2023-05-15T17:47:09.600`)
* [CVE-2023-32111](CVE-2023/CVE-2023-321xx/CVE-2023-32111.json) (`2023-05-15T17:28:48.667`)
* [CVE-2023-32112](CVE-2023/CVE-2023-321xx/CVE-2023-32112.json) (`2023-05-15T17:23:48.290`)
* [CVE-2023-32113](CVE-2023/CVE-2023-321xx/CVE-2023-32113.json) (`2023-05-15T17:53:22.927`)
* [CVE-2015-8823](CVE-2015/CVE-2015-88xx/CVE-2015-8823.json) (`2023-05-15T18:57:00.297`)
* [CVE-2020-16170](CVE-2020/CVE-2020-161xx/CVE-2020-16170.json) (`2023-05-15T18:56:11.143`)
* [CVE-2020-18280](CVE-2020/CVE-2020-182xx/CVE-2020-18280.json) (`2023-05-15T18:32:44.127`)
* [CVE-2020-23363](CVE-2020/CVE-2020-233xx/CVE-2020-23363.json) (`2023-05-15T18:41:05.847`)
* [CVE-2022-28893](CVE-2022/CVE-2022-288xx/CVE-2022-28893.json) (`2023-05-15T18:45:04.213`)
* [CVE-2022-33961](CVE-2022/CVE-2022-339xx/CVE-2022-33961.json) (`2023-05-15T19:45:43.933`)
* [CVE-2022-37306](CVE-2022/CVE-2022-373xx/CVE-2022-37306.json) (`2023-05-15T19:27:12.643`)
* [CVE-2022-43696](CVE-2022/CVE-2022-436xx/CVE-2022-43696.json) (`2023-05-15T19:26:57.757`)
* [CVE-2022-43697](CVE-2022/CVE-2022-436xx/CVE-2022-43697.json) (`2023-05-15T19:27:03.377`)
* [CVE-2022-43698](CVE-2022/CVE-2022-436xx/CVE-2022-43698.json) (`2023-05-15T19:27:09.167`)
* [CVE-2022-46817](CVE-2022/CVE-2022-468xx/CVE-2022-46817.json) (`2023-05-15T19:45:11.683`)
* [CVE-2023-0614](CVE-2023/CVE-2023-06xx/CVE-2023-0614.json) (`2023-05-15T18:44:56.913`)
* [CVE-2023-1681](CVE-2023/CVE-2023-16xx/CVE-2023-1681.json) (`2023-05-15T19:26:01.047`)
* [CVE-2023-1682](CVE-2023/CVE-2023-16xx/CVE-2023-1682.json) (`2023-05-15T19:26:12.580`)
* [CVE-2023-1683](CVE-2023/CVE-2023-16xx/CVE-2023-1683.json) (`2023-05-15T19:26:18.010`)
* [CVE-2023-22711](CVE-2023/CVE-2023-227xx/CVE-2023-22711.json) (`2023-05-15T19:44:29.450`)
* [CVE-2023-23701](CVE-2023/CVE-2023-237xx/CVE-2023-23701.json) (`2023-05-15T19:43:41.283`)
* [CVE-2023-23788](CVE-2023/CVE-2023-237xx/CVE-2023-23788.json) (`2023-05-15T19:43:07.003`)
* [CVE-2023-23789](CVE-2023/CVE-2023-237xx/CVE-2023-23789.json) (`2023-05-15T19:47:30.610`)
* [CVE-2023-23812](CVE-2023/CVE-2023-238xx/CVE-2023-23812.json) (`2023-05-15T19:47:13.493`)
* [CVE-2023-24505](CVE-2023/CVE-2023-245xx/CVE-2023-24505.json) (`2023-05-15T18:18:10.547`)
* [CVE-2023-24506](CVE-2023/CVE-2023-245xx/CVE-2023-24506.json) (`2023-05-15T18:01:57.487`)
* [CVE-2023-24898](CVE-2023/CVE-2023-248xx/CVE-2023-24898.json) (`2023-05-15T18:39:58.677`)
* [CVE-2023-24899](CVE-2023/CVE-2023-248xx/CVE-2023-24899.json) (`2023-05-15T18:40:29.773`)
* [CVE-2023-24900](CVE-2023/CVE-2023-249xx/CVE-2023-24900.json) (`2023-05-15T18:40:49.847`)
* [CVE-2023-24901](CVE-2023/CVE-2023-249xx/CVE-2023-24901.json) (`2023-05-15T18:33:54.050`)
* [CVE-2023-24902](CVE-2023/CVE-2023-249xx/CVE-2023-24902.json) (`2023-05-15T18:35:05.153`)
* [CVE-2023-24903](CVE-2023/CVE-2023-249xx/CVE-2023-24903.json) (`2023-05-15T18:39:34.700`)
* [CVE-2023-24904](CVE-2023/CVE-2023-249xx/CVE-2023-24904.json) (`2023-05-15T18:31:50.367`)
* [CVE-2023-24905](CVE-2023/CVE-2023-249xx/CVE-2023-24905.json) (`2023-05-15T18:06:58.340`)
* [CVE-2023-24932](CVE-2023/CVE-2023-249xx/CVE-2023-24932.json) (`2023-05-15T18:18:30.897`)
* [CVE-2023-24939](CVE-2023/CVE-2023-249xx/CVE-2023-24939.json) (`2023-05-15T18:31:01.027`)
* [CVE-2023-24940](CVE-2023/CVE-2023-249xx/CVE-2023-24940.json) (`2023-05-15T19:28:15.157`)
* [CVE-2023-24941](CVE-2023/CVE-2023-249xx/CVE-2023-24941.json) (`2023-05-15T19:28:47.743`)
* [CVE-2023-24942](CVE-2023/CVE-2023-249xx/CVE-2023-24942.json) (`2023-05-15T19:29:01.270`)
* [CVE-2023-24943](CVE-2023/CVE-2023-249xx/CVE-2023-24943.json) (`2023-05-15T19:27:43.557`)
* [CVE-2023-24944](CVE-2023/CVE-2023-249xx/CVE-2023-24944.json) (`2023-05-15T19:27:29.400`)
* [CVE-2023-24945](CVE-2023/CVE-2023-249xx/CVE-2023-24945.json) (`2023-05-15T19:16:12.817`)
* [CVE-2023-24946](CVE-2023/CVE-2023-249xx/CVE-2023-24946.json) (`2023-05-15T19:16:24.293`)
* [CVE-2023-24947](CVE-2023/CVE-2023-249xx/CVE-2023-24947.json) (`2023-05-15T19:26:43.583`)
* [CVE-2023-24948](CVE-2023/CVE-2023-249xx/CVE-2023-24948.json) (`2023-05-15T18:54:58.640`)
* [CVE-2023-24949](CVE-2023/CVE-2023-249xx/CVE-2023-24949.json) (`2023-05-15T19:14:25.917`)
* [CVE-2023-24950](CVE-2023/CVE-2023-249xx/CVE-2023-24950.json) (`2023-05-15T19:15:22.023`)
* [CVE-2023-25829](CVE-2023/CVE-2023-258xx/CVE-2023-25829.json) (`2023-05-15T18:50:04.493`)
* [CVE-2023-25830](CVE-2023/CVE-2023-258xx/CVE-2023-25830.json) (`2023-05-15T18:49:22.937`)
* [CVE-2023-2594](CVE-2023/CVE-2023-25xx/CVE-2023-2594.json) (`2023-05-15T18:48:44.910`)
* [CVE-2023-2595](CVE-2023/CVE-2023-25xx/CVE-2023-2595.json) (`2023-05-15T18:48:27.957`)
* [CVE-2023-2596](CVE-2023/CVE-2023-25xx/CVE-2023-2596.json) (`2023-05-15T18:48:06.217`)
* [CVE-2023-27010](CVE-2023/CVE-2023-270xx/CVE-2023-27010.json) (`2023-05-15T19:25:41.970`)
* [CVE-2023-27407](CVE-2023/CVE-2023-274xx/CVE-2023-27407.json) (`2023-05-15T18:47:18.340`)
* [CVE-2023-27408](CVE-2023/CVE-2023-274xx/CVE-2023-27408.json) (`2023-05-15T18:46:34.533`)
* [CVE-2023-27409](CVE-2023/CVE-2023-274xx/CVE-2023-27409.json) (`2023-05-15T18:45:55.523`)
* [CVE-2023-27410](CVE-2023/CVE-2023-274xx/CVE-2023-27410.json) (`2023-05-15T18:44:29.897`)
* [CVE-2023-28251](CVE-2023/CVE-2023-282xx/CVE-2023-28251.json) (`2023-05-15T19:40:19.857`)
* [CVE-2023-28283](CVE-2023/CVE-2023-282xx/CVE-2023-28283.json) (`2023-05-15T19:39:36.323`)
* [CVE-2023-28290](CVE-2023/CVE-2023-282xx/CVE-2023-28290.json) (`2023-05-15T19:39:22.090`)
* [CVE-2023-28832](CVE-2023/CVE-2023-288xx/CVE-2023-28832.json) (`2023-05-15T18:49:38.067`)
* [CVE-2023-29092](CVE-2023/CVE-2023-290xx/CVE-2023-29092.json) (`2023-05-15T18:57:52.217`)
* [CVE-2023-29103](CVE-2023/CVE-2023-291xx/CVE-2023-29103.json) (`2023-05-15T18:38:37.257`)
* [CVE-2023-29104](CVE-2023/CVE-2023-291xx/CVE-2023-29104.json) (`2023-05-15T18:37:59.890`)
* [CVE-2023-29105](CVE-2023/CVE-2023-291xx/CVE-2023-29105.json) (`2023-05-15T18:36:17.447`)
* [CVE-2023-29106](CVE-2023/CVE-2023-291xx/CVE-2023-29106.json) (`2023-05-15T18:34:08.910`)
* [CVE-2023-29107](CVE-2023/CVE-2023-291xx/CVE-2023-29107.json) (`2023-05-15T18:33:18.470`)
* [CVE-2023-29128](CVE-2023/CVE-2023-291xx/CVE-2023-29128.json) (`2023-05-15T18:21:42.613`)
* [CVE-2023-29324](CVE-2023/CVE-2023-293xx/CVE-2023-29324.json) (`2023-05-15T19:37:30.953`)
* [CVE-2023-29325](CVE-2023/CVE-2023-293xx/CVE-2023-29325.json) (`2023-05-15T19:35:37.617`)
* [CVE-2023-29333](CVE-2023/CVE-2023-293xx/CVE-2023-29333.json) (`2023-05-15T19:33:19.563`)
* [CVE-2023-29335](CVE-2023/CVE-2023-293xx/CVE-2023-29335.json) (`2023-05-15T19:32:59.537`)
* [CVE-2023-30088](CVE-2023/CVE-2023-300xx/CVE-2023-30088.json) (`2023-05-15T18:37:58.970`)
* [CVE-2023-30512](CVE-2023/CVE-2023-305xx/CVE-2023-30512.json) (`2023-05-15T19:26:44.667`)
* [CVE-2023-30614](CVE-2023/CVE-2023-306xx/CVE-2023-30614.json) (`2023-05-15T19:27:42.637`)
* [CVE-2023-30746](CVE-2023/CVE-2023-307xx/CVE-2023-30746.json) (`2023-05-15T19:46:09.433`)
* [CVE-2023-30840](CVE-2023/CVE-2023-308xx/CVE-2023-30840.json) (`2023-05-15T18:32:12.513`)
* [CVE-2023-30844](CVE-2023/CVE-2023-308xx/CVE-2023-30844.json) (`2023-05-15T18:07:21.737`)
* [CVE-2023-31125](CVE-2023/CVE-2023-311xx/CVE-2023-31125.json) (`2023-05-15T18:33:24.077`)
* [CVE-2023-31127](CVE-2023/CVE-2023-311xx/CVE-2023-31127.json) (`2023-05-15T18:08:38.267`)
* [CVE-2023-31129](CVE-2023/CVE-2023-311xx/CVE-2023-31129.json) (`2023-05-15T18:05:51.943`)
* [CVE-2023-31133](CVE-2023/CVE-2023-311xx/CVE-2023-31133.json) (`2023-05-15T18:19:28.143`)
* [CVE-2023-31140](CVE-2023/CVE-2023-311xx/CVE-2023-31140.json) (`2023-05-15T18:07:30.537`)
* [CVE-2023-31141](CVE-2023/CVE-2023-311xx/CVE-2023-31141.json) (`2023-05-15T18:47:12.577`)
* [CVE-2023-31566](CVE-2023/CVE-2023-315xx/CVE-2023-31566.json) (`2023-05-15T18:35:26.847`)
* [CVE-2023-31567](CVE-2023/CVE-2023-315xx/CVE-2023-31567.json) (`2023-05-15T18:35:16.757`)
* [CVE-2023-31568](CVE-2023/CVE-2023-315xx/CVE-2023-31568.json) (`2023-05-15T18:35:10.000`)
* [CVE-2023-32233](CVE-2023/CVE-2023-322xx/CVE-2023-32233.json) (`2023-05-15T18:27:02.080`)
## Download and Usage