From 0eea2323e1c06fd432c3eefd792a6e510d61eeb0 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ren=C3=A9=20Helmke?= Date: Mon, 15 May 2023 22:00:27 +0200 Subject: [PATCH] Auto-Update: 2023-05-15T20:00:24.845893+00:00 --- CVE-2015/CVE-2015-88xx/CVE-2015-8823.json | 243 ++++++++++---------- CVE-2020/CVE-2020-161xx/CVE-2020-16170.json | 29 +-- CVE-2020/CVE-2020-182xx/CVE-2020-18280.json | 64 +++++- CVE-2020/CVE-2020-233xx/CVE-2020-23363.json | 64 +++++- CVE-2022/CVE-2022-288xx/CVE-2022-28893.json | 35 ++- CVE-2022/CVE-2022-339xx/CVE-2022-33961.json | 47 +++- CVE-2022/CVE-2022-373xx/CVE-2022-37306.json | 156 ++++++++++++- CVE-2022/CVE-2022-436xx/CVE-2022-43696.json | 156 ++++++++++++- CVE-2022/CVE-2022-436xx/CVE-2022-43697.json | 156 ++++++++++++- CVE-2022/CVE-2022-436xx/CVE-2022-43698.json | 156 ++++++++++++- CVE-2022/CVE-2022-468xx/CVE-2022-46817.json | 47 +++- CVE-2023/CVE-2023-06xx/CVE-2023-0614.json | 46 ++-- CVE-2023/CVE-2023-16xx/CVE-2023-1681.json | 8 +- CVE-2023/CVE-2023-16xx/CVE-2023-1682.json | 8 +- CVE-2023/CVE-2023-16xx/CVE-2023-1683.json | 8 +- CVE-2023/CVE-2023-227xx/CVE-2023-22711.json | 47 +++- CVE-2023/CVE-2023-237xx/CVE-2023-23701.json | 47 +++- CVE-2023/CVE-2023-237xx/CVE-2023-23788.json | 47 +++- CVE-2023/CVE-2023-237xx/CVE-2023-23789.json | 47 +++- CVE-2023/CVE-2023-238xx/CVE-2023-23812.json | 47 +++- CVE-2023/CVE-2023-245xx/CVE-2023-24505.json | 68 +++++- CVE-2023/CVE-2023-245xx/CVE-2023-24506.json | 68 +++++- CVE-2023/CVE-2023-248xx/CVE-2023-24898.json | 40 +++- CVE-2023/CVE-2023-248xx/CVE-2023-24899.json | 51 +++- CVE-2023/CVE-2023-249xx/CVE-2023-24900.json | 117 +++++++++- CVE-2023/CVE-2023-249xx/CVE-2023-24901.json | 107 ++++++++- CVE-2023/CVE-2023-249xx/CVE-2023-24902.json | 46 +++- CVE-2023/CVE-2023-249xx/CVE-2023-24903.json | 111 ++++++++- CVE-2023/CVE-2023-249xx/CVE-2023-24904.json | 44 +++- CVE-2023/CVE-2023-249xx/CVE-2023-24905.json | 64 +++++- CVE-2023/CVE-2023-249xx/CVE-2023-24932.json | 117 +++++++++- CVE-2023/CVE-2023-249xx/CVE-2023-24939.json | 107 ++++++++- CVE-2023/CVE-2023-249xx/CVE-2023-24940.json | 117 +++++++++- CVE-2023/CVE-2023-249xx/CVE-2023-24941.json | 60 ++++- CVE-2023/CVE-2023-249xx/CVE-2023-24942.json | 117 +++++++++- CVE-2023/CVE-2023-249xx/CVE-2023-24943.json | 117 +++++++++- CVE-2023/CVE-2023-249xx/CVE-2023-24944.json | 80 ++++++- CVE-2023/CVE-2023-249xx/CVE-2023-24945.json | 117 +++++++++- CVE-2023/CVE-2023-249xx/CVE-2023-24946.json | 97 +++++++- CVE-2023/CVE-2023-249xx/CVE-2023-24947.json | 74 +++++- CVE-2023/CVE-2023-249xx/CVE-2023-24948.json | 96 +++++++- CVE-2023/CVE-2023-249xx/CVE-2023-24949.json | 80 ++++++- CVE-2023/CVE-2023-249xx/CVE-2023-24950.json | 49 +++- CVE-2023/CVE-2023-258xx/CVE-2023-25829.json | 36 ++- CVE-2023/CVE-2023-258xx/CVE-2023-25830.json | 41 +++- CVE-2023/CVE-2023-25xx/CVE-2023-2594.json | 57 ++++- CVE-2023/CVE-2023-25xx/CVE-2023-2595.json | 63 ++++- CVE-2023/CVE-2023-25xx/CVE-2023-2596.json | 63 ++++- CVE-2023/CVE-2023-270xx/CVE-2023-27010.json | 6 +- CVE-2023/CVE-2023-274xx/CVE-2023-27407.json | 73 +++++- CVE-2023/CVE-2023-274xx/CVE-2023-27408.json | 39 +++- CVE-2023/CVE-2023-274xx/CVE-2023-27409.json | 61 ++++- CVE-2023/CVE-2023-274xx/CVE-2023-27410.json | 39 +++- CVE-2023/CVE-2023-282xx/CVE-2023-28251.json | 112 ++++++++- CVE-2023/CVE-2023-282xx/CVE-2023-28283.json | 112 ++++++++- CVE-2023/CVE-2023-282xx/CVE-2023-28290.json | 40 +++- CVE-2023/CVE-2023-288xx/CVE-2023-28832.json | 66 +++++- CVE-2023/CVE-2023-290xx/CVE-2023-29092.json | 151 +++++++++++- CVE-2023/CVE-2023-291xx/CVE-2023-29103.json | 68 +++++- CVE-2023/CVE-2023-291xx/CVE-2023-29104.json | 88 ++++++- CVE-2023/CVE-2023-291xx/CVE-2023-29105.json | 90 +++++++- CVE-2023/CVE-2023-291xx/CVE-2023-29106.json | 88 ++++++- CVE-2023/CVE-2023-291xx/CVE-2023-29107.json | 78 ++++++- CVE-2023/CVE-2023-291xx/CVE-2023-29128.json | 88 ++++++- CVE-2023/CVE-2023-293xx/CVE-2023-29324.json | 134 ++++++++++- CVE-2023/CVE-2023-293xx/CVE-2023-29325.json | 134 ++++++++++- CVE-2023/CVE-2023-293xx/CVE-2023-29333.json | 49 +++- CVE-2023/CVE-2023-293xx/CVE-2023-29335.json | 152 +++++++++++- CVE-2023/CVE-2023-300xx/CVE-2023-30088.json | 65 +++++- CVE-2023/CVE-2023-305xx/CVE-2023-30512.json | 6 +- CVE-2023/CVE-2023-306xx/CVE-2023-30614.json | 6 +- CVE-2023/CVE-2023-307xx/CVE-2023-30746.json | 47 +++- CVE-2023/CVE-2023-308xx/CVE-2023-30840.json | 65 +++++- CVE-2023/CVE-2023-308xx/CVE-2023-30844.json | 80 ++++++- CVE-2023/CVE-2023-311xx/CVE-2023-31125.json | 70 +++++- CVE-2023/CVE-2023-311xx/CVE-2023-31127.json | 69 +++++- CVE-2023/CVE-2023-311xx/CVE-2023-31129.json | 65 +++++- CVE-2023/CVE-2023-311xx/CVE-2023-31133.json | 69 +++++- CVE-2023/CVE-2023-311xx/CVE-2023-31140.json | 65 +++++- CVE-2023/CVE-2023-311xx/CVE-2023-31141.json | 67 +++++- CVE-2023/CVE-2023-315xx/CVE-2023-31566.json | 65 +++++- CVE-2023/CVE-2023-315xx/CVE-2023-31567.json | 65 +++++- CVE-2023/CVE-2023-315xx/CVE-2023-31568.json | 65 +++++- CVE-2023/CVE-2023-322xx/CVE-2023-32233.json | 119 +++++++++- README.md | 164 +++++++------ 85 files changed, 5964 insertions(+), 518 deletions(-) diff --git a/CVE-2015/CVE-2015-88xx/CVE-2015-8823.json b/CVE-2015/CVE-2015-88xx/CVE-2015-8823.json index aaeb4ca13a1..d4d4007dd68 100644 --- a/CVE-2015/CVE-2015-88xx/CVE-2015-8823.json +++ b/CVE-2015/CVE-2015-88xx/CVE-2015-8823.json @@ -2,9 +2,9 @@ "id": "CVE-2015-8823", "sourceIdentifier": "psirt@adobe.com", "published": "2016-04-22T18:59:00.110", - "lastModified": "2016-05-26T17:32:04.250", - "vulnStatus": "Undergoing Analysis", - "evaluatorComment": "CWE-416: Use After Free", + "lastModified": "2023-05-15T18:57:00.297", + "vulnStatus": "Analyzed", + "evaluatorComment": "CWE-416: Use After Free", "descriptions": [ { "lang": "en", @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -71,7 +71,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-416" } ] } @@ -131,13 +131,18 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } @@ -164,78 +169,13 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionEndIncluding": "19.0.0.245", - "matchCriteriaId": "0469E9D7-B43B-44BC-B52D-A1466FE96801" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", - "matchCriteriaId": "130D56D9-BFAD-44AB-BA04-1E6E2F18A049" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", - "matchCriteriaId": "A0CE2650-25EB-446E-B2C9-631177740E87" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", - "matchCriteriaId": "CBAE999D-B558-4714-854D-42D45A7A48BB" - } - ] - }, - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" - }, - { - "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" - } - ] - } - ] - }, - { - "operator": "AND", - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:air:*:*:*:*:*:android:*:*", - "versionEndIncluding": "19.0.0.241", - "matchCriteriaId": "8A673D80-8381-4E73-BA12-AA66D91A7E1D" + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } @@ -262,23 +202,23 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*", - "matchCriteriaId": "5ACCACAF-7BD6-4C0A-8E6A-67E13D5E341D" + "criteria": "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D32ACF6F-5FF7-4815-8EAD-4719F5FC9B79" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37" + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } @@ -294,8 +234,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", - "versionEndIncluding": "11.2.202.554", - "matchCriteriaId": "140657B1-1638-48BD-95B5-565EF5CF5BE5" + "versionEndIncluding": "11.2.202.548", + "matchCriteriaId": "A02328C4-D810-4774-8F28-2B5FB6C7CDB5" } ] }, @@ -305,8 +245,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "matchCriteriaId": "155AD4FB-E527-4103-BCEF-801B653DEA37" + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" } ] } @@ -321,8 +261,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", - "matchCriteriaId": "FBC814B4-7DEC-4EFC-ABFF-08FFD9FD16AA" + "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0" } ] }, @@ -335,12 +275,6 @@ "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "versionEndIncluding": "19.0.0.245", "matchCriteriaId": "C5C96375-3919-417F-ADDC-657F3676EF91" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", - "versionEndIncluding": "19.0.0.245", - "matchCriteriaId": "9A6F84D7-62F0-45C0-962B-5EC8946B67AA" } ] } @@ -367,23 +301,23 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", - "matchCriteriaId": "340C4071-1447-477F-942A-8E09EA29F917" + "criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", - "matchCriteriaId": "8255F035-04C8-4158-B301-82101711939C" + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } @@ -410,23 +344,94 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", - "matchCriteriaId": "340C4071-1447-477F-942A-8E09EA29F917" + "criteria": "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5415705-33E5-46D5-8E4D-9EBADC8C5705" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0FF5999A-9D12-4CDD-8DE9-A89C10B2D574" + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", - "matchCriteriaId": "8255F035-04C8-4158-B301-82101711939C" + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", - "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256" + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*", + "versionEndIncluding": "19.0.0.245", + "matchCriteriaId": "60921187-5894-4500-A822-02986DC497C9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4781BF1E-8A4E-4AFF-9540-23D523EE30DD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", + "matchCriteriaId": "FBC814B4-7DEC-4EFC-ABFF-08FFD9FD16AA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", + "versionEndIncluding": "19.0.0.245", + "matchCriteriaId": "9A6F84D7-62F0-45C0-962B-5EC8946B67AA" } ] } @@ -436,7 +441,11 @@ "references": [ { "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-665", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://helpx.adobe.com/security/products/flash-player/apsb15-32.html", diff --git a/CVE-2020/CVE-2020-161xx/CVE-2020-16170.json b/CVE-2020/CVE-2020-161xx/CVE-2020-16170.json index c6e00075bf4..05293b263b2 100644 --- a/CVE-2020/CVE-2020-161xx/CVE-2020-16170.json +++ b/CVE-2020/CVE-2020-161xx/CVE-2020-16170.json @@ -2,8 +2,8 @@ "id": "CVE-2020-16170", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-11T20:15:13.073", - "lastModified": "2020-09-02T19:15:17.830", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-15T18:56:11.143", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,20 +21,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" }, "exploitabilityScore": 3.9, - "impactScore": 5.9 + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -43,18 +43,18 @@ "type": "Primary", "cvssData": { "version": "2.0", - "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", - "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 7.5 + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0 }, - "baseSeverity": "HIGH", + "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, - "impactScore": 6.4, + "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, @@ -99,6 +99,7 @@ "url": "https://www.mcafee.com/blogs/other-blogs/mcafee-labs/call-an-exorcist-my-robots-possessed/", "source": "cve@mitre.org", "tags": [ + "Exploit", "Third Party Advisory" ] }, diff --git a/CVE-2020/CVE-2020-182xx/CVE-2020-18280.json b/CVE-2020/CVE-2020-182xx/CVE-2020-18280.json index 67180f72475..89932846b3b 100644 --- a/CVE-2020/CVE-2020-182xx/CVE-2020-18280.json +++ b/CVE-2020/CVE-2020-182xx/CVE-2020-18280.json @@ -2,19 +2,75 @@ "id": "CVE-2020-18280", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T16:15:13.690", - "lastModified": "2023-05-09T17:37:00.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:32:44.127", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability found in Phodal CMD v.1.0 allows a local attacker to execute arbitrary code via the EMBED SRC function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:md_project:md:1.0:*:*:*:*:wechat:*:*", + "matchCriteriaId": "57E51B10-D8B1-455E-9D8C-71E59C88D892" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/phodal/md/issues/20", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-233xx/CVE-2020-23363.json b/CVE-2020/CVE-2020-233xx/CVE-2020-23363.json index 7144c273959..e6e4e28c86b 100644 --- a/CVE-2020/CVE-2020-233xx/CVE-2020-23363.json +++ b/CVE-2020/CVE-2020-233xx/CVE-2020-23363.json @@ -2,19 +2,75 @@ "id": "CVE-2020-23363", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T16:15:14.090", - "lastModified": "2023-05-09T17:37:00.247", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:41:05.847", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross Site Request Forgery (CSRF) vulnerability found in Verytops Verydows all versions that allows an attacker to execute arbitrary code via a crafted script." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:verydows:verydows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88077CEC-9C13-4061-9A3C-AB0E61FF0587" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Verytops/verydows/issues/17", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-288xx/CVE-2022-28893.json b/CVE-2022/CVE-2022-288xx/CVE-2022-28893.json index 45a23c57e45..c5f78a67080 100644 --- a/CVE-2022/CVE-2022-288xx/CVE-2022-28893.json +++ b/CVE-2022/CVE-2022-288xx/CVE-2022-28893.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28893", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-11T05:15:07.700", - "lastModified": "2022-10-08T03:21:08.610", + "lastModified": "2023-05-15T18:45:04.213", "vulnStatus": "Analyzed", "descriptions": [ { @@ -86,8 +86,37 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "5.17.2", - "matchCriteriaId": "37FB86B9-21E2-405C-851C-F8EB696C74DA" + "versionStartIncluding": "5.1", + "versionEndExcluding": "5.4.196", + "matchCriteriaId": "2A3398EE-92F2-4D11-AE56-12A63F3AF811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.117", + "matchCriteriaId": "29E8F4A8-0245-410B-A451-FF3789D4811C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.41", + "matchCriteriaId": "DADAACF4-4A4D-4391-BC86-006141B25D65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.20", + "matchCriteriaId": "ABBBA66E-0244-4621-966B-9790AF1EEB00" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.17", + "versionEndExcluding": "5.17.3", + "matchCriteriaId": "AE420AC7-1E59-4398-B84F-71F4B4337762" } ] } diff --git a/CVE-2022/CVE-2022-339xx/CVE-2022-33961.json b/CVE-2022/CVE-2022-339xx/CVE-2022-33961.json index e3bdc662240..79af127044d 100644 --- a/CVE-2022/CVE-2022-339xx/CVE-2022-33961.json +++ b/CVE-2022/CVE-2022-339xx/CVE-2022-33961.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33961", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-10T10:15:09.490", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:45:43.933", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:waspthemes:visual_css_style_editor:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "7.5.8", + "matchCriteriaId": "AF34AB03-8DEF-463D-9919-F636441D241C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/yellow-pencil-visual-theme-customizer/wordpress-visual-css-style-editor-plugin-7-5-8-auth-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37306.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37306.json index 22f15e2f9a3..650c6422a8f 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37306.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37306.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37306", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T02:15:08.077", - "lastModified": "2023-04-21T04:15:55.170", + "lastModified": "2023-05-15T19:27:12.643", "vulnStatus": "Analyzed", "descriptions": [ { @@ -56,8 +56,158 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*", - "versionEndExcluding": "7.10.6-rev30", - "matchCriteriaId": "1D5FBAE3-4578-4C2C-853E-FDB3DC49F738" + "versionEndExcluding": "7.10.6", + "matchCriteriaId": "5BBF1862-B6FF-4F32-A3C1-59D28BA25F81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:-:*:*:*:*:*:*", + "matchCriteriaId": "3A4EAD2E-C3C3-4C79-8C42-375FFE638486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev01:*:*:*:*:*:*", + "matchCriteriaId": "39198733-D227-4935-9A60-1026040D262F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev02:*:*:*:*:*:*", + "matchCriteriaId": "3C86EE81-8CD4-4131-969A-BDA24B9B48E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev03:*:*:*:*:*:*", + "matchCriteriaId": "F9E9C869-7DA9-4EFA-B613-82BA127F6CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev04:*:*:*:*:*:*", + "matchCriteriaId": "F8FAA329-5893-412B-8349-4DA3023CC76E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev05:*:*:*:*:*:*", + "matchCriteriaId": "BB6A57A4-B18D-498D-9A8C-406797A6255C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev06:*:*:*:*:*:*", + "matchCriteriaId": "7F0977F0-90B4-48B4-BED6-C218B5CA5E03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev07:*:*:*:*:*:*", + "matchCriteriaId": "4D55DE67-8F93-48F3-BE54-D3A065479281" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev08:*:*:*:*:*:*", + "matchCriteriaId": "D27980B4-B71B-4DA8-B130-F0B5929F8E65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev09:*:*:*:*:*:*", + "matchCriteriaId": "DD1709BC-7DEB-4508-B3C3-B20F5FD001A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev10:*:*:*:*:*:*", + "matchCriteriaId": "08A6BDD5-259E-4DC3-A548-00CD0D459749" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev11:*:*:*:*:*:*", + "matchCriteriaId": "B8166FF4-77D8-4A12-92E5-615B3DA2E602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev12:*:*:*:*:*:*", + "matchCriteriaId": "999F057B-7918-461A-B60C-3BE72E92CDC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev13:*:*:*:*:*:*", + "matchCriteriaId": "88FD1550-3715-493E-B674-9ECF3DD7A813" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev14:*:*:*:*:*:*", + "matchCriteriaId": "F31A4949-397F-4D1B-8AEA-AC7B335722F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev15:*:*:*:*:*:*", + "matchCriteriaId": "D33A91D4-CE21-486D-9469-B09060B8C637" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev16:*:*:*:*:*:*", + "matchCriteriaId": "5E3E5CD2-7631-4DBE-AB4D-669E82BCCAD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev17:*:*:*:*:*:*", + "matchCriteriaId": "2BEE0AF0-3D22-4DE7-9E71-A4469D9CA2EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev18:*:*:*:*:*:*", + "matchCriteriaId": "AAFB199C-1D66-442D-AD7E-414DD339E1D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev19:*:*:*:*:*:*", + "matchCriteriaId": "26322561-2491-4DC7-B974-0B92B61A5BDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev20:*:*:*:*:*:*", + "matchCriteriaId": "A6BA6C2B-F2D5-4FF7-B316-C8E99C2B464B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev21:*:*:*:*:*:*", + "matchCriteriaId": "733E4A65-821B-4187-AA3A-1ACD3E882C07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev22:*:*:*:*:*:*", + "matchCriteriaId": "6B0A0043-33E8-4440-92AC-DDD70EA39535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev23:*:*:*:*:*:*", + "matchCriteriaId": "303205CC-8BDE-47EE-A675-9BA19983139A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev24:*:*:*:*:*:*", + "matchCriteriaId": "8C088014-47D6-4632-9FB5-2C7B1085B762" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev25:*:*:*:*:*:*", + "matchCriteriaId": "42CF6057-EB40-4208-9F1E-83213E97987C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev26:*:*:*:*:*:*", + "matchCriteriaId": "966BC23E-B8CE-4F98-B3A6-4B620E8808BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev27:*:*:*:*:*:*", + "matchCriteriaId": "7409CE19-ACC1-4AF4-8C8A-AE2CDBB63D3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev28:*:*:*:*:*:*", + "matchCriteriaId": "17D71CDE-3111-459B-8520-F62E0D5D2972" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev29:*:*:*:*:*:*", + "matchCriteriaId": "6D808ED6-F819-4014-BD24-4537D52DDFB0" } ] } diff --git a/CVE-2022/CVE-2022-436xx/CVE-2022-43696.json b/CVE-2022/CVE-2022-436xx/CVE-2022-43696.json index e7225146b6d..9cd2247130c 100644 --- a/CVE-2022/CVE-2022-436xx/CVE-2022-43696.json +++ b/CVE-2022/CVE-2022-436xx/CVE-2022-43696.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43696", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-15T02:15:07.097", - "lastModified": "2023-04-21T04:16:22.603", + "lastModified": "2023-05-15T19:26:57.757", "vulnStatus": "Analyzed", "descriptions": [ { @@ -56,8 +56,158 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*", - "versionEndExcluding": "7.10.6-rev30", - "matchCriteriaId": "1D5FBAE3-4578-4C2C-853E-FDB3DC49F738" + "versionEndExcluding": "7.10.6", + "matchCriteriaId": "5BBF1862-B6FF-4F32-A3C1-59D28BA25F81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:-:*:*:*:*:*:*", + "matchCriteriaId": "3A4EAD2E-C3C3-4C79-8C42-375FFE638486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev01:*:*:*:*:*:*", + "matchCriteriaId": "39198733-D227-4935-9A60-1026040D262F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev02:*:*:*:*:*:*", + "matchCriteriaId": "3C86EE81-8CD4-4131-969A-BDA24B9B48E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev03:*:*:*:*:*:*", + "matchCriteriaId": "F9E9C869-7DA9-4EFA-B613-82BA127F6CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev04:*:*:*:*:*:*", + "matchCriteriaId": "F8FAA329-5893-412B-8349-4DA3023CC76E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev05:*:*:*:*:*:*", + "matchCriteriaId": "BB6A57A4-B18D-498D-9A8C-406797A6255C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev06:*:*:*:*:*:*", + "matchCriteriaId": "7F0977F0-90B4-48B4-BED6-C218B5CA5E03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev07:*:*:*:*:*:*", + "matchCriteriaId": "4D55DE67-8F93-48F3-BE54-D3A065479281" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev08:*:*:*:*:*:*", + "matchCriteriaId": "D27980B4-B71B-4DA8-B130-F0B5929F8E65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev09:*:*:*:*:*:*", + "matchCriteriaId": "DD1709BC-7DEB-4508-B3C3-B20F5FD001A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev10:*:*:*:*:*:*", + "matchCriteriaId": "08A6BDD5-259E-4DC3-A548-00CD0D459749" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev11:*:*:*:*:*:*", + "matchCriteriaId": "B8166FF4-77D8-4A12-92E5-615B3DA2E602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev12:*:*:*:*:*:*", + "matchCriteriaId": "999F057B-7918-461A-B60C-3BE72E92CDC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev13:*:*:*:*:*:*", + "matchCriteriaId": "88FD1550-3715-493E-B674-9ECF3DD7A813" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev14:*:*:*:*:*:*", + "matchCriteriaId": "F31A4949-397F-4D1B-8AEA-AC7B335722F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev15:*:*:*:*:*:*", + "matchCriteriaId": "D33A91D4-CE21-486D-9469-B09060B8C637" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev16:*:*:*:*:*:*", + "matchCriteriaId": "5E3E5CD2-7631-4DBE-AB4D-669E82BCCAD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev17:*:*:*:*:*:*", + "matchCriteriaId": "2BEE0AF0-3D22-4DE7-9E71-A4469D9CA2EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev18:*:*:*:*:*:*", + "matchCriteriaId": "AAFB199C-1D66-442D-AD7E-414DD339E1D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev19:*:*:*:*:*:*", + "matchCriteriaId": "26322561-2491-4DC7-B974-0B92B61A5BDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev20:*:*:*:*:*:*", + "matchCriteriaId": "A6BA6C2B-F2D5-4FF7-B316-C8E99C2B464B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev21:*:*:*:*:*:*", + "matchCriteriaId": "733E4A65-821B-4187-AA3A-1ACD3E882C07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev22:*:*:*:*:*:*", + "matchCriteriaId": "6B0A0043-33E8-4440-92AC-DDD70EA39535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev23:*:*:*:*:*:*", + "matchCriteriaId": "303205CC-8BDE-47EE-A675-9BA19983139A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev24:*:*:*:*:*:*", + "matchCriteriaId": "8C088014-47D6-4632-9FB5-2C7B1085B762" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev25:*:*:*:*:*:*", + "matchCriteriaId": "42CF6057-EB40-4208-9F1E-83213E97987C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev26:*:*:*:*:*:*", + "matchCriteriaId": "966BC23E-B8CE-4F98-B3A6-4B620E8808BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev27:*:*:*:*:*:*", + "matchCriteriaId": "7409CE19-ACC1-4AF4-8C8A-AE2CDBB63D3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev28:*:*:*:*:*:*", + "matchCriteriaId": "17D71CDE-3111-459B-8520-F62E0D5D2972" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev29:*:*:*:*:*:*", + "matchCriteriaId": "6D808ED6-F819-4014-BD24-4537D52DDFB0" } ] } diff --git a/CVE-2022/CVE-2022-436xx/CVE-2022-43697.json b/CVE-2022/CVE-2022-436xx/CVE-2022-43697.json index 5d3f4dffcd2..34bec820de8 100644 --- a/CVE-2022/CVE-2022-436xx/CVE-2022-43697.json +++ b/CVE-2022/CVE-2022-436xx/CVE-2022-43697.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43697", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-15T02:15:07.147", - "lastModified": "2023-04-21T04:16:20.190", + "lastModified": "2023-05-15T19:27:03.377", "vulnStatus": "Analyzed", "descriptions": [ { @@ -56,8 +56,158 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*", - "versionEndExcluding": "7.10.6-rev30", - "matchCriteriaId": "1D5FBAE3-4578-4C2C-853E-FDB3DC49F738" + "versionEndExcluding": "7.10.6", + "matchCriteriaId": "5BBF1862-B6FF-4F32-A3C1-59D28BA25F81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:-:*:*:*:*:*:*", + "matchCriteriaId": "3A4EAD2E-C3C3-4C79-8C42-375FFE638486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev01:*:*:*:*:*:*", + "matchCriteriaId": "39198733-D227-4935-9A60-1026040D262F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev02:*:*:*:*:*:*", + "matchCriteriaId": "3C86EE81-8CD4-4131-969A-BDA24B9B48E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev03:*:*:*:*:*:*", + "matchCriteriaId": "F9E9C869-7DA9-4EFA-B613-82BA127F6CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev04:*:*:*:*:*:*", + "matchCriteriaId": "F8FAA329-5893-412B-8349-4DA3023CC76E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev05:*:*:*:*:*:*", + "matchCriteriaId": "BB6A57A4-B18D-498D-9A8C-406797A6255C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev06:*:*:*:*:*:*", + "matchCriteriaId": "7F0977F0-90B4-48B4-BED6-C218B5CA5E03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev07:*:*:*:*:*:*", + "matchCriteriaId": "4D55DE67-8F93-48F3-BE54-D3A065479281" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev08:*:*:*:*:*:*", + "matchCriteriaId": "D27980B4-B71B-4DA8-B130-F0B5929F8E65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev09:*:*:*:*:*:*", + "matchCriteriaId": "DD1709BC-7DEB-4508-B3C3-B20F5FD001A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev10:*:*:*:*:*:*", + "matchCriteriaId": "08A6BDD5-259E-4DC3-A548-00CD0D459749" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev11:*:*:*:*:*:*", + "matchCriteriaId": "B8166FF4-77D8-4A12-92E5-615B3DA2E602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev12:*:*:*:*:*:*", + "matchCriteriaId": "999F057B-7918-461A-B60C-3BE72E92CDC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev13:*:*:*:*:*:*", + "matchCriteriaId": "88FD1550-3715-493E-B674-9ECF3DD7A813" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev14:*:*:*:*:*:*", + "matchCriteriaId": "F31A4949-397F-4D1B-8AEA-AC7B335722F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev15:*:*:*:*:*:*", + "matchCriteriaId": "D33A91D4-CE21-486D-9469-B09060B8C637" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev16:*:*:*:*:*:*", + "matchCriteriaId": "5E3E5CD2-7631-4DBE-AB4D-669E82BCCAD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev17:*:*:*:*:*:*", + "matchCriteriaId": "2BEE0AF0-3D22-4DE7-9E71-A4469D9CA2EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev18:*:*:*:*:*:*", + "matchCriteriaId": "AAFB199C-1D66-442D-AD7E-414DD339E1D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev19:*:*:*:*:*:*", + "matchCriteriaId": "26322561-2491-4DC7-B974-0B92B61A5BDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev20:*:*:*:*:*:*", + "matchCriteriaId": "A6BA6C2B-F2D5-4FF7-B316-C8E99C2B464B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev21:*:*:*:*:*:*", + "matchCriteriaId": "733E4A65-821B-4187-AA3A-1ACD3E882C07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev22:*:*:*:*:*:*", + "matchCriteriaId": "6B0A0043-33E8-4440-92AC-DDD70EA39535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev23:*:*:*:*:*:*", + "matchCriteriaId": "303205CC-8BDE-47EE-A675-9BA19983139A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev24:*:*:*:*:*:*", + "matchCriteriaId": "8C088014-47D6-4632-9FB5-2C7B1085B762" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev25:*:*:*:*:*:*", + "matchCriteriaId": "42CF6057-EB40-4208-9F1E-83213E97987C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev26:*:*:*:*:*:*", + "matchCriteriaId": "966BC23E-B8CE-4F98-B3A6-4B620E8808BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev27:*:*:*:*:*:*", + "matchCriteriaId": "7409CE19-ACC1-4AF4-8C8A-AE2CDBB63D3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev28:*:*:*:*:*:*", + "matchCriteriaId": "17D71CDE-3111-459B-8520-F62E0D5D2972" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev29:*:*:*:*:*:*", + "matchCriteriaId": "6D808ED6-F819-4014-BD24-4537D52DDFB0" } ] } diff --git a/CVE-2022/CVE-2022-436xx/CVE-2022-43698.json b/CVE-2022/CVE-2022-436xx/CVE-2022-43698.json index 5ef9414def2..1c650c501e6 100644 --- a/CVE-2022/CVE-2022-436xx/CVE-2022-43698.json +++ b/CVE-2022/CVE-2022-436xx/CVE-2022-43698.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43698", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-15T02:15:07.183", - "lastModified": "2023-04-21T04:16:17.983", + "lastModified": "2023-05-15T19:27:09.167", "vulnStatus": "Analyzed", "descriptions": [ { @@ -56,8 +56,158 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*", - "versionEndExcluding": "7.10.6-rev30", - "matchCriteriaId": "1D5FBAE3-4578-4C2C-853E-FDB3DC49F738" + "versionEndExcluding": "7.10.6", + "matchCriteriaId": "5BBF1862-B6FF-4F32-A3C1-59D28BA25F81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:-:*:*:*:*:*:*", + "matchCriteriaId": "3A4EAD2E-C3C3-4C79-8C42-375FFE638486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev01:*:*:*:*:*:*", + "matchCriteriaId": "39198733-D227-4935-9A60-1026040D262F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev02:*:*:*:*:*:*", + "matchCriteriaId": "3C86EE81-8CD4-4131-969A-BDA24B9B48E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev03:*:*:*:*:*:*", + "matchCriteriaId": "F9E9C869-7DA9-4EFA-B613-82BA127F6CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev04:*:*:*:*:*:*", + "matchCriteriaId": "F8FAA329-5893-412B-8349-4DA3023CC76E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev05:*:*:*:*:*:*", + "matchCriteriaId": "BB6A57A4-B18D-498D-9A8C-406797A6255C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev06:*:*:*:*:*:*", + "matchCriteriaId": "7F0977F0-90B4-48B4-BED6-C218B5CA5E03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev07:*:*:*:*:*:*", + "matchCriteriaId": "4D55DE67-8F93-48F3-BE54-D3A065479281" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev08:*:*:*:*:*:*", + "matchCriteriaId": "D27980B4-B71B-4DA8-B130-F0B5929F8E65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev09:*:*:*:*:*:*", + "matchCriteriaId": "DD1709BC-7DEB-4508-B3C3-B20F5FD001A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev10:*:*:*:*:*:*", + "matchCriteriaId": "08A6BDD5-259E-4DC3-A548-00CD0D459749" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev11:*:*:*:*:*:*", + "matchCriteriaId": "B8166FF4-77D8-4A12-92E5-615B3DA2E602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev12:*:*:*:*:*:*", + "matchCriteriaId": "999F057B-7918-461A-B60C-3BE72E92CDC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev13:*:*:*:*:*:*", + "matchCriteriaId": "88FD1550-3715-493E-B674-9ECF3DD7A813" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev14:*:*:*:*:*:*", + "matchCriteriaId": "F31A4949-397F-4D1B-8AEA-AC7B335722F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev15:*:*:*:*:*:*", + "matchCriteriaId": "D33A91D4-CE21-486D-9469-B09060B8C637" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev16:*:*:*:*:*:*", + "matchCriteriaId": "5E3E5CD2-7631-4DBE-AB4D-669E82BCCAD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev17:*:*:*:*:*:*", + "matchCriteriaId": "2BEE0AF0-3D22-4DE7-9E71-A4469D9CA2EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev18:*:*:*:*:*:*", + "matchCriteriaId": "AAFB199C-1D66-442D-AD7E-414DD339E1D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev19:*:*:*:*:*:*", + "matchCriteriaId": "26322561-2491-4DC7-B974-0B92B61A5BDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev20:*:*:*:*:*:*", + "matchCriteriaId": "A6BA6C2B-F2D5-4FF7-B316-C8E99C2B464B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev21:*:*:*:*:*:*", + "matchCriteriaId": "733E4A65-821B-4187-AA3A-1ACD3E882C07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev22:*:*:*:*:*:*", + "matchCriteriaId": "6B0A0043-33E8-4440-92AC-DDD70EA39535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev23:*:*:*:*:*:*", + "matchCriteriaId": "303205CC-8BDE-47EE-A675-9BA19983139A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev24:*:*:*:*:*:*", + "matchCriteriaId": "8C088014-47D6-4632-9FB5-2C7B1085B762" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev25:*:*:*:*:*:*", + "matchCriteriaId": "42CF6057-EB40-4208-9F1E-83213E97987C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev26:*:*:*:*:*:*", + "matchCriteriaId": "966BC23E-B8CE-4F98-B3A6-4B620E8808BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev27:*:*:*:*:*:*", + "matchCriteriaId": "7409CE19-ACC1-4AF4-8C8A-AE2CDBB63D3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev28:*:*:*:*:*:*", + "matchCriteriaId": "17D71CDE-3111-459B-8520-F62E0D5D2972" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev29:*:*:*:*:*:*", + "matchCriteriaId": "6D808ED6-F819-4014-BD24-4537D52DDFB0" } ] } diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46817.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46817.json index 70ed06d62c2..d8c722432ec 100644 --- a/CVE-2022/CVE-2022-468xx/CVE-2022-46817.json +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46817.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46817", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-10T10:15:10.223", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:45:11.683", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flyzoo:flyzoo_chat:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.3.3", + "matchCriteriaId": "F9F69D9D-1FAC-419F-9E0A-9EEF333EAD27" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/flyzoo/wordpress-flyzoo-chat-plugin-2-3-3-cross-site-scripting-xss?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0614.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0614.json index 003699c8972..795a2ea7e6e 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0614.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0614.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0614", "sourceIdentifier": "secalert@redhat.com", "published": "2023-04-03T23:15:06.957", - "lastModified": "2023-04-16T04:15:08.097", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-15T18:44:56.913", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -67,29 +67,40 @@ "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.0.0", - "versionEndExcluding": "4.6.16", - "matchCriteriaId": "B3FDA4C7-6C53-401C-A133-D5B4299FE185" + "versionEndExcluding": "4.16.10", + "matchCriteriaId": "4199E7A4-284A-45D7-84C7-AF0141FD94EE" }, { "vulnerable": true, "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.7.0", - "versionEndExcluding": "4.7.9", - "matchCriteriaId": "D2D88D65-4DCC-44B4-9671-1D2C5FE598D9" + "versionStartIncluding": "4.17.0", + "versionEndExcluding": "4.17.7", + "matchCriteriaId": "2F914D5D-6211-4CF3-87AB-71284AD225A3" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.8.0", - "versionEndExcluding": "4.8.4", - "matchCriteriaId": "24E405D2-03BC-4808-A8F1-1C4BF24CFCCA" + "criteria": "cpe:2.3:a:samba:samba:4.18.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D9A6E955-CE26-405F-9468-4557A256CA8A" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", - "versionStartIncluding": "4.9.0", - "versionEndExcluding": "4.9.4", - "matchCriteriaId": "902B65DD-745F-4588-80D6-E529F0862B95" + "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E9604B46-FDA2-4CA1-971F-315AFD250033" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "1C209E4C-098B-4D49-A21B-AC8154FE3D85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc3:*:*:*:*:*:*", + "matchCriteriaId": "2849132A-18B1-4A49-8B2E-8B6DCFCC0501" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc4:*:*:*:*:*:*", + "matchCriteriaId": "F657608C-18FB-49FA-A73E-F9BF5CD95B17" } ] } @@ -99,7 +110,10 @@ "references": [ { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20230406-0007/", diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1681.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1681.json index 50a2dabd43d..6f5542a786e 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1681.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1681.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1681", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-28T23:15:09.070", - "lastModified": "2023-04-04T19:32:04.267", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-15T19:26:01.047", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -112,8 +112,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:xunruicms:xunrui_cms:4.61:*:*:*:*:*:*:*", - "matchCriteriaId": "C5E41FB0-7E67-4C28-8B96-2FD5AC3CD1F5" + "criteria": "cpe:2.3:a:xunruicms:xunruicms:4.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F87320D5-95B1-4484-AC76-9E22F5B26B94" } ] } diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1682.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1682.json index 83bfeb94ced..31671df810d 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1682.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1682.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1682", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-29T00:15:08.903", - "lastModified": "2023-04-05T01:52:40.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-15T19:26:12.580", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -112,8 +112,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:xunruicms:xunruicms:4.61:*:*:*:*:*:*:*", - "matchCriteriaId": "578806FE-ED42-476F-A690-CCBB6A9F2382" + "criteria": "cpe:2.3:a:xunruicms:xunruicms:4.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F87320D5-95B1-4484-AC76-9E22F5B26B94" } ] } diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1683.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1683.json index 1f95a14fa11..0f6dbba6b24 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1683.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1683.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1683", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-29T01:15:10.443", - "lastModified": "2023-04-05T01:57:37.367", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-15T19:26:18.010", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -112,8 +112,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:xunruicms:xunruicms:4.61:*:*:*:*:*:*:*", - "matchCriteriaId": "578806FE-ED42-476F-A690-CCBB6A9F2382" + "criteria": "cpe:2.3:a:xunruicms:xunruicms:4.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F87320D5-95B1-4484-AC76-9E22F5B26B94" } ] } diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22711.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22711.json index a97eeaccf1c..141f780bcb8 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22711.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22711.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22711", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-10T08:15:09.767", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:44:29.450", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:agentevolution:impress_listings:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.6.2", + "matchCriteriaId": "C1C4D053-DD4F-48BC-AAC4-52A27FD21389" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-listings/wordpress-impress-listings-plugin-2-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23701.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23701.json index e3fd3d38c3c..f097f45b1f2 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23701.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23701.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23701", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-10T08:15:10.980", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:43:41.283", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:web_design_easy_sign_up_project:web_design_easy_sign_up:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.4.1", + "matchCriteriaId": "24AE9D79-C77A-4F50-B1FA-3FB0638980DC" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/easy-sign-up/wordpress-easy-sign-up-plugin-3-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23788.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23788.json index 8127f585533..3e350294371 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23788.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23788.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23788", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-10T08:15:11.163", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:43:07.003", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:custom_more_link_complete_project:custom_more_link_complete:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.4.1", + "matchCriteriaId": "15046E03-EBD6-4390-BE5D-2FD1DA571E08" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/custom-more-link-complete/wordpress-custom-more-link-complete-plugin-1-4-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23789.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23789.json index be75c64d4dd..62868727629 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23789.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23789.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23789", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-10T08:15:11.230", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:47:30.610", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:premmerce:premmerce_redirect_manager:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.9", + "matchCriteriaId": "5CC40127-3680-47F4-B825-BAB6D9040FB7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/premmerce-redirect-manager/wordpress-premmerce-redirect-manager-plugin-1-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23812.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23812.json index 98d9810784a..139174f7828 100644 --- a/CVE-2023/CVE-2023-238xx/CVE-2023-23812.json +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23812.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23812", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-10T08:15:11.310", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:47:13.493", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enhanced_wp_contact_form_project:enhanced_wp_contact_form:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.2.3", + "matchCriteriaId": "A0D03077-6C10-4D3E-B411-7AFD05DCA2CF" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/enhanced-wordpress-contactform/wordpress-enhanced-wp-contact-form-plugin-2-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24505.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24505.json index aad29e272b8..2b853b35e26 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24505.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24505.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24505", "sourceIdentifier": "cna@cyber.gov.il", "published": "2023-05-08T21:15:10.797", - "lastModified": "2023-05-09T12:47:05.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:18:10.547", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@cyber.gov.il", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cna@cyber.gov.il", "type": "Secondary", @@ -46,10 +76,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ncr\\/camera_firmware:71.8.0.6-r5:*:*:*:*:*:*:*", + "matchCriteriaId": "932A78A4-FA43-4247-9F25-A4AE5FDDC9A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ncr\\/camera:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88745DC8-B8DA-4CF1-A03D-4913809A8715" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24506.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24506.json index bcc49a3a158..0db23e1c5ce 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24506.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24506.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24506", "sourceIdentifier": "cna@cyber.gov.il", "published": "2023-05-08T21:15:10.867", - "lastModified": "2023-05-09T12:47:05.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:01:57.487", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@cyber.gov.il", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + }, { "source": "cna@cyber.gov.il", "type": "Secondary", @@ -46,10 +76,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:milesight:ncr\\/camera_firmware:71.8.0.6-r5:*:*:*:*:*:*:*", + "matchCriteriaId": "932A78A4-FA43-4247-9F25-A4AE5FDDC9A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:milesight:ncr\\/camera:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88745DC8-B8DA-4CF1-A03D-4913809A8715" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24898.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24898.json index eeee5801adc..e3fc6c6a912 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24898.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24898.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24898", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:11.913", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:39:58.677", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.1724", + "matchCriteriaId": "D67CFE7C-A12C-407A-8658-E717F78400B4" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24898", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24899.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24899.json index c8afb710cbb..e48d6bb8abb 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24899.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24899.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24899", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:11.970", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:40:29.773", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,55 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "54CA9311-FE54-44E3-9EC5-257B8167F535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24899", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24900.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24900.json index cac89ebe056..b30609a3eb9 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24900.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24900.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24900", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.033", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:40:49.847", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,121 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24900", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24901.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24901.json index 3b262bea76a..89a46f05c50 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24901.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24901.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24901", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.097", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:33:54.050", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,111 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "06DC17AF-48FE-4237-8479-F36205326BBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24901", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24902.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24902.json index 882ac598f69..c65ee4b2cdc 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24902.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24902.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24902", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.157", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:35:05.153", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24902", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24903.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24903.json index 115369f45fe..8a2d45a1d43 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24903.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24903.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24903", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.217", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:39:34.700", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,115 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24903", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24904.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24904.json index 1f167ade4a4..432ad21907a 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24904.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24904.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24904", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.280", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:31:50.367", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,48 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24904", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24905.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24905.json index c3424ff40b0..22db3672962 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24905.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24905.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24905", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.347", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:06:58.340", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,68 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24905", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json index f53edb50e40..c59dc2f03d1 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24932.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24932", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.407", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:18:30.897", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,121 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24932", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24939.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24939.json index 3a1895cef2b..a653b72dd11 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24939.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24939.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24939", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.467", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:31:01.027", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,111 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24939", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24940.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24940.json index 10246479d25..c9e877b65e1 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24940.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24940.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24940", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.527", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:28:15.157", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,121 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24940", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24941.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24941.json index 3b91fb04656..bbb92100aa2 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24941.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24941.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24941", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.587", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:28:47.743", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24941", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Mitigation", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24942.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24942.json index dff48edf727..bded9a841f3 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24942.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24942.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24942", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.643", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:29:01.270", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,121 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24942", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24943.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24943.json index 6bd91a391cc..c67ce9d9697 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24943.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24943.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24943", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.720", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:27:43.557", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,121 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24943", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24944.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24944.json index 2b00d35b08c..63856573090 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24944.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24944.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24944", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.780", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:27:29.400", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,84 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24944", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24945.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24945.json index 3cb97fd1444..d40b6479fed 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24945.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24945.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24945", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.840", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:16:12.817", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,121 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24945", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24946.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24946.json index 5e541c85311..79b41f1ce1a 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24946.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24946.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24946", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.900", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:16:24.293", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,101 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24946", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24947.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24947.json index c6511f1bc60..3819b2e85c5 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24947.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24947.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24947", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:12.960", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:26:43.583", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24947", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24948.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24948.json index d471da7b6ee..6107030b2e3 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24948.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24948.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24948", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:13.017", - "lastModified": "2023-05-09T18:23:34.853", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:54:58.640", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,100 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24948", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24949.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24949.json index ce084777e00..51a3e66f2dd 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24949.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24949.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24949", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:13.080", - "lastModified": "2023-05-09T18:23:25.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:14:25.917", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,84 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24949", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24950.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24950.json index 06779ae28ef..9ec3d075dc0 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24950.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24950.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24950", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:13.143", - "lastModified": "2023-05-09T18:23:25.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:15:22.023", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,53 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "9C082CC4-6128-475D-BC19-B239E348FDB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*", + "matchCriteriaId": "AC8BB33F-44C4-41FE-8B17-68E3C4B38142" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24950", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-258xx/CVE-2023-25829.json b/CVE-2023/CVE-2023-258xx/CVE-2023-25829.json index 21b7c1e8620..bf72cf501c9 100644 --- a/CVE-2023/CVE-2023-258xx/CVE-2023-25829.json +++ b/CVE-2023/CVE-2023-258xx/CVE-2023-25829.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25829", "sourceIdentifier": "psirt@esri.com", "published": "2023-05-09T17:15:10.387", - "lastModified": "2023-05-09T17:36:56.357", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:50:04.493", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,14 +46,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1DCD5CA4-4423-4AC2-A9B8-3FCACC4E43ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2A62FCB5-12A6-487C-BCA9-0AD3F11354CD" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8095", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-258xx/CVE-2023-25830.json b/CVE-2023/CVE-2023-258xx/CVE-2023-25830.json index cbbf49f52a2..5deff9f45a0 100644 --- a/CVE-2023/CVE-2023-258xx/CVE-2023-25830.json +++ b/CVE-2023/CVE-2023-258xx/CVE-2023-25830.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25830", "sourceIdentifier": "psirt@esri.com", "published": "2023-05-09T17:15:10.567", - "lastModified": "2023-05-09T17:36:56.357", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:49:22.937", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,14 +46,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "81C43246-F8AC-4A3D-8F43-8280E1AD3007" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE382B5-E228-4803-A3FC-B803C7838777" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1DCD5CA4-4423-4AC2-A9B8-3FCACC4E43ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.esri.com/en-us/patches-updates/2023/portal-for-arcgis-security-2023-update-1-patch-8095", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2023-update-1-patch-is-now-available/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2594.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2594.json index 076bd0c51f8..a677951d060 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2594.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2594.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2594", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-09T13:15:17.910", - "lastModified": "2023-05-09T14:30:54.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:48:44.910", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,14 +93,41 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:food_ordering_management_system_project:food_ordering_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "041627BE-2E8A-46EE-9B11-07AC3EB4B969" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.228396", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.228396", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2595.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2595.json index c3fc8cbc4fc..807ce009761 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2595.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2595.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2595", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-09T13:15:17.980", - "lastModified": "2023-05-09T14:30:54.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:48:27.957", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,18 +93,49 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:billing_management_system_project:billing_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA3E27C8-B58D-4F75-BC4E-B076575833E2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Yastar/bug_report/blob/main/SQLi-1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.228397", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.228397", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2596.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2596.json index edbaf347a14..b33c9874b2c 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2596.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2596.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2596", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-09T13:15:18.043", - "lastModified": "2023-05-09T14:30:54.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:48:06.217", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,18 +93,49 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:online_reviewer_system_project:online_reviewer_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7DF1563B-E1A7-44A3-ACE0-5C00BCBA51FB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/rick13795/bug_report/blob/main/SQLi-1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.228398", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.228398", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27010.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27010.json index 51354962944..2091c69898f 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27010.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27010.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27010", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-13T19:15:22.617", - "lastModified": "2023-03-22T18:18:56.817", + "lastModified": "2023-05-15T19:25:41.970", "vulnStatus": "Analyzed", "descriptions": [ { @@ -55,8 +55,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wondershare:dr.phone:12.9.6:*:*:*:*:*:*:*", - "matchCriteriaId": "8013624C-30CD-429F-A56F-0CFC2017505B" + "criteria": "cpe:2.3:a:wondershare:dr.fone:12.9.6:*:*:*:*:windows:*:*", + "matchCriteriaId": "C2C2D87E-8A0C-4686-BA5A-C8DB098ED33F" } ] } diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27407.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27407.json index 53f63f46d70..5d02fe18df6 100644 --- a/CVE-2023/CVE-2023-274xx/CVE-2023-27407.json +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27407.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27407", "sourceIdentifier": "productcert@siemens.com", "published": "2023-05-09T13:15:16.640", - "lastModified": "2023-05-09T14:30:54.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:47:18.340", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,7 +13,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -31,13 +31,43 @@ }, "exploitabilityScore": 3.1, "impactScore": 6.0 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 } ] }, "weaknesses": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +76,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "E4B6DB46-5FD2-4ABD-B1A5-7AB8BB3724BB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52A77C9D-E59C-4397-B834-797D7B334A6B" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-325383.pdf", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27408.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27408.json index 29a73ab80ab..a776b9240af 100644 --- a/CVE-2023/CVE-2023-274xx/CVE-2023-27408.json +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27408.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27408", "sourceIdentifier": "productcert@siemens.com", "published": "2023-05-09T13:15:16.727", - "lastModified": "2023-05-09T14:30:54.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:46:34.533", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,10 +46,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "E4B6DB46-5FD2-4ABD-B1A5-7AB8BB3724BB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52A77C9D-E59C-4397-B834-797D7B334A6B" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-325383.pdf", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27409.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27409.json index 00e502538f9..c83cfdc38ff 100644 --- a/CVE-2023/CVE-2023-274xx/CVE-2023-27409.json +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27409.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27409", "sourceIdentifier": "productcert@siemens.com", "published": "2023-05-09T13:15:16.800", - "lastModified": "2023-05-09T14:30:54.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:45:55.523", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -46,10 +66,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "E4B6DB46-5FD2-4ABD-B1A5-7AB8BB3724BB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52A77C9D-E59C-4397-B834-797D7B334A6B" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-325383.pdf", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-274xx/CVE-2023-27410.json b/CVE-2023/CVE-2023-274xx/CVE-2023-27410.json index 8997c552e2b..fa7e4001974 100644 --- a/CVE-2023/CVE-2023-274xx/CVE-2023-27410.json +++ b/CVE-2023/CVE-2023-274xx/CVE-2023-27410.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27410", "sourceIdentifier": "productcert@siemens.com", "published": "2023-05-09T13:15:16.873", - "lastModified": "2023-05-09T14:30:54.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:44:29.897", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,10 +46,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:scalance_lpe9403_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "E4B6DB46-5FD2-4ABD-B1A5-7AB8BB3724BB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:scalance_lpe9403:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52A77C9D-E59C-4397-B834-797D7B334A6B" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-325383.pdf", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28251.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28251.json index 3784be3526b..e3725f4f4f1 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28251.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28251.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28251", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:13.433", - "lastModified": "2023-05-09T18:23:25.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:40:19.857", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,116 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", + "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28251", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28283.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28283.json index db13cbc6d0d..8bf751016b4 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28283.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28283.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28283", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:13.490", - "lastModified": "2023-05-09T18:23:25.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:39:36.323", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,116 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", + "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28283", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28290.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28290.json index b0cef4d24c3..c153f158641 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28290.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28290.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28290", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:13.547", - "lastModified": "2023-05-09T18:23:25.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:39:22.090", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:remote_desktop:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.2.3006.0", + "matchCriteriaId": "A967D3CD-57A5-404B-91EF-5AE2F24A6370" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28290", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28832.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28832.json index d2db045504f..04bd93aae96 100644 --- a/CVE-2023/CVE-2023-288xx/CVE-2023-28832.json +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28832.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28832", "sourceIdentifier": "productcert@siemens.com", "published": "2023-05-09T13:15:17.373", - "lastModified": "2023-05-09T14:30:54.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:49:38.067", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,10 +46,70 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:6gk1411-1ac00_firmware:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1F685FA-A737-4D3D-AF47-837D30EBD898" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A62A87CC-250C-469E-9D2C-187271020EE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:6gk1411-5ac00_firmware:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CAD8CE67-41F5-4673-BC79-EF290971FF20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7804B194-FECA-4D73-9D49-4B7E8FD49258" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29092.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29092.json index bc74c3b3cb9..96501837c19 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29092.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29092.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29092", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T02:15:12.127", - "lastModified": "2023-05-09T12:46:35.530", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:57:52.217", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "cve@mitre.org", "type": "Secondary", @@ -34,10 +54,135 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_5123_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFFB4DF2-B55C-45BD-9073-56299E19B6DE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_5123:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5954D95-E12B-487D-9744-361566788A2D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_5300_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E2E6EE0-4271-43A3-9439-49F332D1FE1C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_5300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F9B26D9-AA50-4652-AFC0-A6AC966B4770" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F18F62E-2012-442E-BE60-6E76325D1824" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D8701B6-6989-44D1-873A-A1823BFD7CCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:exynos_1080_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "43DE4D6F-D662-46F2-93BC-9AE950320BDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:samsung:exynos_1080:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE06CD56-8BFD-4208-843A-179E3E6F5C10" + } + ] + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29103.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29103.json index 83a57c970e9..1e219f0ae12 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29103.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29103.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29103", "sourceIdentifier": "productcert@siemens.com", "published": "2023-05-09T13:15:17.447", - "lastModified": "2023-05-09T14:30:54.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:38:37.257", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,10 +46,72 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:6gk1411-1ac00_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "F167D4D5-349A-4A2B-90E8-7EF29991F135" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A62A87CC-250C-469E-9D2C-187271020EE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:6gk1411-5ac00_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "3DFB8EBF-5050-4AA9-8BD1-51CC51E9E4CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7804B194-FECA-4D73-9D49-4B7E8FD49258" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29104.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29104.json index 778430a97a1..03a88bd2829 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29104.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29104.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29104", "sourceIdentifier": "productcert@siemens.com", "published": "2023-05-09T13:15:17.547", - "lastModified": "2023-05-09T14:30:54.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:37:59.890", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 7.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H", @@ -46,10 +66,70 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:6gk1411-1ac00_firmware:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1F685FA-A737-4D3D-AF47-837D30EBD898" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A62A87CC-250C-469E-9D2C-187271020EE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:6gk1411-5ac00_firmware:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CAD8CE67-41F5-4673-BC79-EF290971FF20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7804B194-FECA-4D73-9D49-4B7E8FD49258" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29105.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29105.json index 2ed59f524d3..fcab5365565 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29105.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29105.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29105", "sourceIdentifier": "productcert@siemens.com", "published": "2023-05-09T13:15:17.627", - "lastModified": "2023-05-09T14:30:54.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:36:17.447", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -46,10 +66,72 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:6gk1411-1ac00_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "F167D4D5-349A-4A2B-90E8-7EF29991F135" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A62A87CC-250C-469E-9D2C-187271020EE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:6gk1411-5ac00_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "3DFB8EBF-5050-4AA9-8BD1-51CC51E9E4CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7804B194-FECA-4D73-9D49-4B7E8FD49258" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29106.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29106.json index 60382afc83e..e104d182ab6 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29106.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29106.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29106", "sourceIdentifier": "productcert@siemens.com", "published": "2023-05-09T13:15:17.703", - "lastModified": "2023-05-09T14:30:54.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:34:08.910", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", @@ -46,10 +66,70 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:6gk1411-1ac00_firmware:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1F685FA-A737-4D3D-AF47-837D30EBD898" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A62A87CC-250C-469E-9D2C-187271020EE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:6gk1411-5ac00_firmware:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CAD8CE67-41F5-4673-BC79-EF290971FF20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7804B194-FECA-4D73-9D49-4B7E8FD49258" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29107.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29107.json index 4be07fa20aa..365a1c2b97c 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29107.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29107.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29107", "sourceIdentifier": "productcert@siemens.com", "published": "2023-05-09T13:15:17.777", - "lastModified": "2023-05-09T14:30:54.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:33:18.470", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -36,7 +36,7 @@ }, "weaknesses": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -44,12 +44,82 @@ "value": "CWE-552" } ] + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:6gk1411-1ac00_firmware:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1F685FA-A737-4D3D-AF47-837D30EBD898" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A62A87CC-250C-469E-9D2C-187271020EE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:6gk1411-5ac00_firmware:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CAD8CE67-41F5-4673-BC79-EF290971FF20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7804B194-FECA-4D73-9D49-4B7E8FD49258" + } + ] + } + ] } ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29128.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29128.json index 876925d9626..107d5da0a65 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29128.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29128.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29128", "sourceIdentifier": "productcert@siemens.com", "published": "2023-05-09T13:15:17.843", - "lastModified": "2023-05-09T14:30:54.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:21:42.613", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L", @@ -46,10 +66,70 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:6gk1411-1ac00_firmware:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A1F685FA-A737-4D3D-AF47-837D30EBD898" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:6gk1411-1ac00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A62A87CC-250C-469E-9D2C-187271020EE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:6gk1411-5ac00_firmware:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CAD8CE67-41F5-4673-BC79-EF290971FF20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:6gk1411-5ac00:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7804B194-FECA-4D73-9D49-4B7E8FD49258" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-555292.pdf", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29324.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29324.json index 3f67c4331cc..8e160132dc9 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29324.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29324.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29324", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:13.607", - "lastModified": "2023-05-09T18:23:25.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:37:30.953", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,7 +13,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -31,13 +31,139 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", + "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29324", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29325.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29325.json index fada20b8bb6..3e7dea9d232 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29325.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29325.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29325", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:13.667", - "lastModified": "2023-05-09T18:23:25.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:35:37.617", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -34,10 +54,116 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", + "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29325", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json index 1d8992d162c..9a9087d279a 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29333.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29333", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:13.727", - "lastModified": "2023-05-09T18:23:25.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:33:19.563", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,53 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:*:*", + "matchCriteriaId": "25D63F31-2978-4C24-B7CA-6A0398012700" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29333", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29335.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29335.json index d898a379068..c9d00fee2ed 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29335.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29335.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29335", "sourceIdentifier": "secure@microsoft.com", "published": "2023-05-09T18:15:13.783", - "lastModified": "2023-05-09T18:23:25.203", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:32:59.537", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,156 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.10240.19926", + "matchCriteriaId": "0855C3A7-36C3-4398-9208-1FC8A02F40D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.5921", + "matchCriteriaId": "BAB00F09-4CCF-4AB6-85CE-07298A21C1D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.4377", + "matchCriteriaId": "DAF1C808-45D2-4C43-81F0-0E3DC697A31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19042.2965", + "matchCriteriaId": "8B7C959F-A277-4B18-B7D8-6CC8A5D01469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.2965", + "matchCriteriaId": "B1DB7F7A-A2CA-462C-A75C-A6739899C14B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.2965", + "matchCriteriaId": "A7450AB6-B09E-4C37-82FD-274675C0F8AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1936", + "matchCriteriaId": "7E42EF0F-F78C-49E8-BC26-09AF1C0730E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.1702", + "matchCriteriaId": "C8267EF4-E3E6-4FA1-8090-965AE770B313" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", + "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", + "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:*:*", + "matchCriteriaId": "25D63F31-2978-4C24-B7CA-6A0398012700" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:word:2013:*:*:*:rt:*:*:*", + "matchCriteriaId": "3C81544A-00F9-4B20-B679-CFE60D5B23CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*", + "matchCriteriaId": "45E21528-4B0F-4A6F-82AD-DF7FDBF67C8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "4DA042D4-B14E-4DDF-8423-DFB255679EFE" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29335", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30088.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30088.json index dd3f6f20b96..0877e1af5e3 100644 --- a/CVE-2023/CVE-2023-300xx/CVE-2023-30088.json +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30088.json @@ -2,19 +2,76 @@ "id": "CVE-2023-30088", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T16:15:14.583", - "lastModified": "2023-05-09T17:36:56.357", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:37:58.970", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "An issue found in Cesanta MJS v.1.26 allows a local attacker to cause a denial of service via the mjs_execute function in mjs.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cesanta:mjs:1.26:*:*:*:*:*:*:*", + "matchCriteriaId": "25C97820-C80A-41CE-B510-F292D2AF665E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/cesanta/mjs/issues/243", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-305xx/CVE-2023-30512.json b/CVE-2023/CVE-2023-305xx/CVE-2023-30512.json index d90bb08ae3b..4d39b457fd6 100644 --- a/CVE-2023/CVE-2023-305xx/CVE-2023-30512.json +++ b/CVE-2023/CVE-2023-305xx/CVE-2023-30512.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30512", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-12T06:15:07.580", - "lastModified": "2023-04-19T19:16:09.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-15T19:26:44.667", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -41,7 +41,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-732" } ] } diff --git a/CVE-2023/CVE-2023-306xx/CVE-2023-30614.json b/CVE-2023/CVE-2023-306xx/CVE-2023-30614.json index 17e9b9b3b1e..a54a1693884 100644 --- a/CVE-2023/CVE-2023-306xx/CVE-2023-30614.json +++ b/CVE-2023/CVE-2023-306xx/CVE-2023-30614.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30614", "sourceIdentifier": "security-advisories@github.com", "published": "2023-04-19T18:15:07.637", - "lastModified": "2023-05-01T18:14:48.710", + "lastModified": "2023-05-15T19:27:42.637", "vulnStatus": "Analyzed", "descriptions": [ { @@ -75,9 +75,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:pay_project:pay:*:*:*:*:*:rails:*:*", + "criteria": "cpe:2.3:a:pay_project:pay:*:*:*:*:*:ruby:*:*", "versionEndExcluding": "6.3.2", - "matchCriteriaId": "48D1A98B-0606-4A99-BFA3-188B1D93EA38" + "matchCriteriaId": "088D4CFF-C244-4E06-A3C4-667D1CDE88CC" } ] } diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30746.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30746.json index 79c589bb28d..78f366aa1fc 100644 --- a/CVE-2023/CVE-2023-307xx/CVE-2023-30746.json +++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30746.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30746", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-10T09:15:14.360", - "lastModified": "2023-05-10T13:06:16.563", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T19:46:09.433", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:booqable:rental_software_booqable_rental:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.4.15", + "matchCriteriaId": "B9007CC3-7370-4C05-8DF1-15ADA7DD0886" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/booqable-rental-reservations/wordpress-booqable-rental-plugin-plugin-2-4-12-cross-site-scripting-xss?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-308xx/CVE-2023-30840.json b/CVE-2023/CVE-2023-308xx/CVE-2023-30840.json index 1c712b20de8..7d4f32e1383 100644 --- a/CVE-2023/CVE-2023-308xx/CVE-2023-30840.json +++ b/CVE-2023/CVE-2023-308xx/CVE-2023-30840.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30840", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-08T18:15:14.187", - "lastModified": "2023-05-09T12:47:05.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:32:12.513", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,22 +66,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linuxfoundation:fluid:*:*:*:*:*:*:*:*", + "versionStartIncluding": "0.7.0", + "versionEndExcluding": "0.8.6", + "matchCriteriaId": "95A42FEF-1F23-4E3A-BA75-99863B965ADF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/fluid-cloudnative/fluid/commit/77c8110a3d1ec077ae2bce6bd88d296505db1550", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/fluid-cloudnative/fluid/commit/91c05c32db131997b5ca065e869c9918a125c149", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/fluid-cloudnative/fluid/releases/tag/v0.8.6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/fluid-cloudnative/fluid/security/advisories/GHSA-93xx-cvmc-9w3v", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mitigation", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-308xx/CVE-2023-30844.json b/CVE-2023/CVE-2023-308xx/CVE-2023-30844.json index f14ac8d80cf..95ce13ddf99 100644 --- a/CVE-2023/CVE-2023-308xx/CVE-2023-30844.json +++ b/CVE-2023/CVE-2023-308xx/CVE-2023-30844.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30844", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-08T18:15:14.280", - "lastModified": "2023-05-09T12:47:05.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:07:21.737", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,18 +76,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mutagen:mutagen:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.16.6", + "matchCriteriaId": "0FC7EAD0-2199-4FFD-93B0-31A6CE866C9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mutagen:mutagen:0.17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DA304563-83C6-4344-9B53-B46EDC40C9FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mutagen:mutagen_compose:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.17.1", + "matchCriteriaId": "F67B41B1-5C50-4FFC-8453-326C21D54AED" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mutagen-io/mutagen/releases/tag/v0.16.6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/mutagen-io/mutagen/releases/tag/v0.17.1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/mutagen-io/mutagen/security/advisories/GHSA-jmp2-wc4p-wfh2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31125.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31125.json index 0001b627873..66571a4a16d 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31125.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31125.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31125", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-08T21:15:11.347", - "lastModified": "2023-05-09T12:47:05.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:33:24.077", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,18 +76,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:socket:engine.io:*:*:*:*:*:node.js:*:*", + "versionStartIncluding": "5.1.0", + "versionEndExcluding": "6.4.2", + "matchCriteriaId": "9E9DF47D-3B77-4A1B-BE6F-03F9F532FA9D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/socketio/engine.io/commit/fc480b4f305e16fe5972cf337d055e598372dc44", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/socketio/engine.io/releases/tag/6.4.2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/socketio/engine.io/security/advisories/GHSA-q9mw-68c2-j6m5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31127.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31127.json index 071805187f1..2d0dfa2dc3b 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31127.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31127.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31127", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-08T21:15:11.427", - "lastModified": "2023-05-09T12:47:05.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:08:38.267", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,18 +80,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dmtf:libspdm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.2", + "matchCriteriaId": "CBDE3981-9A20-48AB-BF8D-847EFCF3B31D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DMTF/libspdm/pull/2006", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/DMTF/libspdm/pull/2007", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/DMTF/libspdm/security/advisories/GHSA-qw76-4v8p-xq9f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31129.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31129.json index 3fdd4be2dac..6f6f746643d 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31129.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31129.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31129", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-08T21:15:11.513", - "lastModified": "2023-05-09T12:47:05.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:05:51.943", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,7 +56,7 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -44,16 +64,51 @@ "value": "CWE-476" } ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.8", + "matchCriteriaId": "729B4607-C6BD-42DE-91BF-918A57D29A77" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/contiki-ng/contiki-ng/pull/2271", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/contiki-ng/contiki-ng/security/advisories/GHSA-x29r-5qjg-75mq", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31133.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31133.json index 6bc12f7a197..1e79f6d992f 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31133.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31133.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31133", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-08T21:15:11.600", - "lastModified": "2023-05-09T12:47:05.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:19:28.143", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,18 +76,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ghost:ghost:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "5.46.1", + "matchCriteriaId": "019CF5DA-91CB-485C-8C00-7E82585A682E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/TryGhost/Ghost/commit/b3caf16005289cc9909488391b4a26f3f4a66a90", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/TryGhost/Ghost/releases/tag/v5.46.1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/TryGhost/Ghost/security/advisories/GHSA-r97q-ghch-82j9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31140.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31140.json index 5cbcd93a95d..5808ac94bb0 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31140.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31140.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31140", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-08T21:15:11.693", - "lastModified": "2023-05-09T12:47:05.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:07:30.537", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,22 +66,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openproject:openproject:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.4.0", + "versionEndExcluding": "12.5.4", + "matchCriteriaId": "14C47747-7F2C-4C04-ADA2-10AC21D73708" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.openproject.org/wp/48035", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/opf/openproject/pull/12508", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/opf/openproject/security/advisories/GHSA-xfp9-qqfj-x28q", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://www.openproject.org/docs/release-notes/12-5-4/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mitigation", + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31141.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31141.json index ade50bf009d..611d0b96874 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31141.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31141.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31141", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-08T21:15:11.783", - "lastModified": "2023-05-09T12:47:05.663", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:47:12.577", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,10 +66,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amazon:opensearch:*:*:*:*:*:docker:*:*", + "versionEndExcluding": "1.3.10", + "matchCriteriaId": "02F37153-8577-40FE-8306-998CFF26C3D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amazon:opensearch:*:*:*:*:*:docker:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.7.0", + "matchCriteriaId": "5A0107FD-9F14-47A5-8995-AF65862055E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amazon:opensearch_security:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3.10", + "matchCriteriaId": "4646FDBE-3F9C-48C3-9C17-E4DC273AD2DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amazon:opensearch_security:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.0.0", + "versionEndExcluding": "2.7.0", + "matchCriteriaId": "9DDB430A-3C8B-4E3C-968A-E4C1AC52A18E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/opensearch-project/security/security/advisories/GHSA-g8xc-6mf7-h28h", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31566.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31566.json index 1e7f2f08c96..18333ef83ac 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31566.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31566.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31566", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T16:15:12.567", - "lastModified": "2023-05-10T17:06:24.873", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:35:26.847", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Podofo v0.10.0 was discovered to contain a heap-use-after-free via the component PoDoFo::PdfEncrypt::IsMetadataEncrypted()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podofo_project:podofo:0.10.0:-:*:*:*:*:*:*", + "matchCriteriaId": "E83D1F81-EBA4-47E8-BA9A-23EBABDB99BD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/podofo/podofo/issues/70", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31567.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31567.json index fe03ef3e155..e57df6655ce 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31567.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31567.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31567", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T16:15:12.720", - "lastModified": "2023-05-10T17:06:24.873", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:35:16.757", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Podofo v0.10.0 was discovered to contain a heap buffer overflow via the component PoDoFo::PdfEncryptAESV3::PdfEncryptAESV3." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podofo_project:podofo:0.10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2B6FCB-1882-4BAA-B8BE-25E150D012D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/podofo/podofo/issues/71", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31568.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31568.json index cc134fb7ea5..428af45d39e 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31568.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31568.json @@ -2,19 +2,76 @@ "id": "CVE-2023-31568", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T16:15:12.810", - "lastModified": "2023-05-10T17:06:24.873", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-15T18:35:10.000", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Podofo v0.10.0 was discovered to contain a heap buffer overflow via the component PoDoFo::PdfEncryptRC4::PdfEncryptRC4." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:podofo_project:podofo:0.10.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9D2B6FCB-1882-4BAA-B8BE-25E150D012D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/podofo/podofo/issues/72", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32233.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32233.json index b41d697e597..c247a6b82dd 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32233.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32233.json @@ -2,39 +2,140 @@ "id": "CVE-2023-32233", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-08T20:15:20.267", - "lastModified": "2023-05-14T00:15:46.770", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-15T18:27:02.080", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "In the Linux kernel through 6.3.1, a use-after-free in Netfilter nf_tables when processing batch requests can be abused to perform arbitrary read and write operations on kernel memory. Unprivileged local users can obtain root privileges. This occurs because anonymous sets are mishandled." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.3.1", + "matchCriteriaId": "46382B63-ECFA-4AD8-86B1-4D291CD276C0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196105", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://github.com/torvalds/linux/commit/c1592a89942e9678f7d9c8030efa777c0d57edab", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://news.ycombinator.com/item?id=35879660", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.debian.org/security/2023/dsa-5402", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.openwall.com/lists/oss-security/2023/05/08/4", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Patch", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index e4bc5a6b94e..2cd75cf8392 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-15T18:00:24.360770+00:00 +2023-05-15T20:00:24.845893+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-15T17:56:53.340000+00:00 +2023-05-15T19:47:30.610000+00:00 ``` ### Last Data Feed Release @@ -34,86 +34,98 @@ Download and Changelog: [Click](releases/latest) ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `0` -* [CVE-2023-30245](CVE-2023/CVE-2023-302xx/CVE-2023-30245.json) (`2023-05-15T16:15:09.980`) ### CVEs modified in the last Commit -Recently modified CVEs: `71` +Recently modified CVEs: `84` -* [CVE-2015-5698](CVE-2015/CVE-2015-56xx/CVE-2015-5698.json) (`2023-05-15T17:15:09.500`) -* [CVE-2021-28999](CVE-2021/CVE-2021-289xx/CVE-2021-28999.json) (`2023-05-15T16:07:22.790`) -* [CVE-2021-31240](CVE-2021/CVE-2021-312xx/CVE-2021-31240.json) (`2023-05-15T17:36:26.413`) -* [CVE-2022-2591](CVE-2022/CVE-2022-25xx/CVE-2022-2591.json) (`2023-05-15T17:15:09.673`) -* [CVE-2022-36354](CVE-2022/CVE-2022-363xx/CVE-2022-36354.json) (`2023-05-15T16:07:42.633`) -* [CVE-2022-38143](CVE-2022/CVE-2022-381xx/CVE-2022-38143.json) (`2023-05-15T16:07:28.197`) -* [CVE-2022-41380](CVE-2022/CVE-2022-413xx/CVE-2022-41380.json) (`2023-05-15T16:12:13.783`) -* [CVE-2022-41381](CVE-2022/CVE-2022-413xx/CVE-2022-41381.json) (`2023-05-15T16:12:02.357`) -* [CVE-2022-41382](CVE-2022/CVE-2022-413xx/CVE-2022-41382.json) (`2023-05-15T16:11:38.777`) -* [CVE-2022-41383](CVE-2022/CVE-2022-413xx/CVE-2022-41383.json) (`2023-05-15T16:11:08.403`) -* [CVE-2022-41384](CVE-2022/CVE-2022-413xx/CVE-2022-41384.json) (`2023-05-15T16:11:17.347`) -* [CVE-2022-41385](CVE-2022/CVE-2022-413xx/CVE-2022-41385.json) (`2023-05-15T16:11:34.127`) -* [CVE-2022-41386](CVE-2022/CVE-2022-413xx/CVE-2022-41386.json) (`2023-05-15T16:12:07.010`) -* [CVE-2022-41387](CVE-2022/CVE-2022-413xx/CVE-2022-41387.json) (`2023-05-15T16:11:51.680`) -* [CVE-2022-41639](CVE-2022/CVE-2022-416xx/CVE-2022-41639.json) (`2023-05-15T16:08:16.143`) -* [CVE-2022-41649](CVE-2022/CVE-2022-416xx/CVE-2022-41649.json) (`2023-05-15T16:08:00.147`) -* [CVE-2022-41794](CVE-2022/CVE-2022-417xx/CVE-2022-41794.json) (`2023-05-15T16:08:30.263`) -* [CVE-2022-41837](CVE-2022/CVE-2022-418xx/CVE-2022-41837.json) (`2023-05-15T16:04:40.127`) -* [CVE-2022-41981](CVE-2022/CVE-2022-419xx/CVE-2022-41981.json) (`2023-05-15T16:07:18.440`) -* [CVE-2022-41988](CVE-2022/CVE-2022-419xx/CVE-2022-41988.json) (`2023-05-15T16:04:55.250`) -* [CVE-2022-42036](CVE-2022/CVE-2022-420xx/CVE-2022-42036.json) (`2023-05-15T16:11:58.717`) -* [CVE-2022-42037](CVE-2022/CVE-2022-420xx/CVE-2022-42037.json) (`2023-05-15T16:11:24.777`) -* [CVE-2022-42039](CVE-2022/CVE-2022-420xx/CVE-2022-42039.json) (`2023-05-15T16:11:44.113`) -* [CVE-2022-42040](CVE-2022/CVE-2022-420xx/CVE-2022-42040.json) (`2023-05-15T16:11:01.057`) -* [CVE-2022-42041](CVE-2022/CVE-2022-420xx/CVE-2022-42041.json) (`2023-05-15T16:11:29.793`) -* [CVE-2022-42042](CVE-2022/CVE-2022-420xx/CVE-2022-42042.json) (`2023-05-15T16:11:47.833`) -* [CVE-2022-42043](CVE-2022/CVE-2022-420xx/CVE-2022-42043.json) (`2023-05-15T16:12:10.443`) -* [CVE-2022-42044](CVE-2022/CVE-2022-420xx/CVE-2022-42044.json) (`2023-05-15T16:11:12.797`) -* [CVE-2022-43592](CVE-2022/CVE-2022-435xx/CVE-2022-43592.json) (`2023-05-15T16:05:30.497`) -* [CVE-2022-43596](CVE-2022/CVE-2022-435xx/CVE-2022-43596.json) (`2023-05-15T16:05:13.157`) -* [CVE-2022-43599](CVE-2022/CVE-2022-435xx/CVE-2022-43599.json) (`2023-05-15T16:03:55.077`) -* [CVE-2022-43600](CVE-2022/CVE-2022-436xx/CVE-2022-43600.json) (`2023-05-15T16:04:17.423`) -* [CVE-2023-0421](CVE-2023/CVE-2023-04xx/CVE-2023-0421.json) (`2023-05-15T16:05:27.957`) -* [CVE-2023-21404](CVE-2023/CVE-2023-214xx/CVE-2023-21404.json) (`2023-05-15T16:58:09.600`) -* [CVE-2023-24507](CVE-2023/CVE-2023-245xx/CVE-2023-24507.json) (`2023-05-15T17:20:08.537`) -* [CVE-2023-2478](CVE-2023/CVE-2023-24xx/CVE-2023-2478.json) (`2023-05-15T17:04:56.630`) -* [CVE-2023-24957](CVE-2023/CVE-2023-249xx/CVE-2023-24957.json) (`2023-05-15T16:40:11.497`) -* [CVE-2023-2513](CVE-2023/CVE-2023-25xx/CVE-2023-2513.json) (`2023-05-15T17:56:53.340`) -* [CVE-2023-2582](CVE-2023/CVE-2023-25xx/CVE-2023-2582.json) (`2023-05-15T17:53:18.677`) -* [CVE-2023-29022](CVE-2023/CVE-2023-290xx/CVE-2023-29022.json) (`2023-05-15T17:43:54.580`) -* [CVE-2023-29023](CVE-2023/CVE-2023-290xx/CVE-2023-29023.json) (`2023-05-15T17:45:08.583`) -* [CVE-2023-29024](CVE-2023/CVE-2023-290xx/CVE-2023-29024.json) (`2023-05-15T17:45:04.930`) -* [CVE-2023-29025](CVE-2023/CVE-2023-290xx/CVE-2023-29025.json) (`2023-05-15T17:45:31.340`) -* [CVE-2023-29026](CVE-2023/CVE-2023-290xx/CVE-2023-29026.json) (`2023-05-15T17:45:45.433`) -* [CVE-2023-29027](CVE-2023/CVE-2023-290xx/CVE-2023-29027.json) (`2023-05-15T17:46:11.773`) -* [CVE-2023-29028](CVE-2023/CVE-2023-290xx/CVE-2023-29028.json) (`2023-05-15T17:46:07.767`) -* [CVE-2023-29029](CVE-2023/CVE-2023-290xx/CVE-2023-29029.json) (`2023-05-15T17:46:26.207`) -* [CVE-2023-29030](CVE-2023/CVE-2023-290xx/CVE-2023-29030.json) (`2023-05-15T17:46:39.870`) -* [CVE-2023-29031](CVE-2023/CVE-2023-290xx/CVE-2023-29031.json) (`2023-05-15T17:46:57.373`) -* [CVE-2023-30083](CVE-2023/CVE-2023-300xx/CVE-2023-30083.json) (`2023-05-15T17:48:24.027`) -* [CVE-2023-30084](CVE-2023/CVE-2023-300xx/CVE-2023-30084.json) (`2023-05-15T17:48:13.800`) -* [CVE-2023-30085](CVE-2023/CVE-2023-300xx/CVE-2023-30085.json) (`2023-05-15T17:48:06.330`) -* [CVE-2023-30334](CVE-2023/CVE-2023-303xx/CVE-2023-30334.json) (`2023-05-15T17:34:04.023`) -* [CVE-2023-30740](CVE-2023/CVE-2023-307xx/CVE-2023-30740.json) (`2023-05-15T17:52:11.647`) -* [CVE-2023-30741](CVE-2023/CVE-2023-307xx/CVE-2023-30741.json) (`2023-05-15T17:51:34.233`) -* [CVE-2023-30742](CVE-2023/CVE-2023-307xx/CVE-2023-30742.json) (`2023-05-15T17:51:13.520`) -* [CVE-2023-30743](CVE-2023/CVE-2023-307xx/CVE-2023-30743.json) (`2023-05-15T17:48:15.840`) -* [CVE-2023-30744](CVE-2023/CVE-2023-307xx/CVE-2023-30744.json) (`2023-05-15T17:33:39.963`) -* [CVE-2023-31038](CVE-2023/CVE-2023-310xx/CVE-2023-31038.json) (`2023-05-15T16:10:47.323`) -* [CVE-2023-31047](CVE-2023/CVE-2023-310xx/CVE-2023-31047.json) (`2023-05-15T16:43:47.707`) -* [CVE-2023-31123](CVE-2023/CVE-2023-311xx/CVE-2023-31123.json) (`2023-05-15T17:13:24.947`) -* [CVE-2023-31178](CVE-2023/CVE-2023-311xx/CVE-2023-31178.json) (`2023-05-15T17:20:51.523`) -* [CVE-2023-31179](CVE-2023/CVE-2023-311xx/CVE-2023-31179.json) (`2023-05-15T17:20:40.377`) -* [CVE-2023-31182](CVE-2023/CVE-2023-311xx/CVE-2023-31182.json) (`2023-05-15T16:50:15.150`) -* [CVE-2023-31404](CVE-2023/CVE-2023-314xx/CVE-2023-31404.json) (`2023-05-15T17:32:45.030`) -* [CVE-2023-31406](CVE-2023/CVE-2023-314xx/CVE-2023-31406.json) (`2023-05-15T17:32:21.943`) -* [CVE-2023-31407](CVE-2023/CVE-2023-314xx/CVE-2023-31407.json) (`2023-05-15T17:32:12.417`) -* [CVE-2023-31508](CVE-2023/CVE-2023-315xx/CVE-2023-31508.json) (`2023-05-15T17:47:09.600`) -* [CVE-2023-32111](CVE-2023/CVE-2023-321xx/CVE-2023-32111.json) (`2023-05-15T17:28:48.667`) -* [CVE-2023-32112](CVE-2023/CVE-2023-321xx/CVE-2023-32112.json) (`2023-05-15T17:23:48.290`) -* [CVE-2023-32113](CVE-2023/CVE-2023-321xx/CVE-2023-32113.json) (`2023-05-15T17:53:22.927`) +* [CVE-2015-8823](CVE-2015/CVE-2015-88xx/CVE-2015-8823.json) (`2023-05-15T18:57:00.297`) +* [CVE-2020-16170](CVE-2020/CVE-2020-161xx/CVE-2020-16170.json) (`2023-05-15T18:56:11.143`) +* [CVE-2020-18280](CVE-2020/CVE-2020-182xx/CVE-2020-18280.json) (`2023-05-15T18:32:44.127`) +* [CVE-2020-23363](CVE-2020/CVE-2020-233xx/CVE-2020-23363.json) (`2023-05-15T18:41:05.847`) +* [CVE-2022-28893](CVE-2022/CVE-2022-288xx/CVE-2022-28893.json) (`2023-05-15T18:45:04.213`) +* [CVE-2022-33961](CVE-2022/CVE-2022-339xx/CVE-2022-33961.json) (`2023-05-15T19:45:43.933`) +* [CVE-2022-37306](CVE-2022/CVE-2022-373xx/CVE-2022-37306.json) (`2023-05-15T19:27:12.643`) +* [CVE-2022-43696](CVE-2022/CVE-2022-436xx/CVE-2022-43696.json) (`2023-05-15T19:26:57.757`) +* [CVE-2022-43697](CVE-2022/CVE-2022-436xx/CVE-2022-43697.json) (`2023-05-15T19:27:03.377`) +* [CVE-2022-43698](CVE-2022/CVE-2022-436xx/CVE-2022-43698.json) (`2023-05-15T19:27:09.167`) +* [CVE-2022-46817](CVE-2022/CVE-2022-468xx/CVE-2022-46817.json) (`2023-05-15T19:45:11.683`) +* [CVE-2023-0614](CVE-2023/CVE-2023-06xx/CVE-2023-0614.json) (`2023-05-15T18:44:56.913`) +* [CVE-2023-1681](CVE-2023/CVE-2023-16xx/CVE-2023-1681.json) (`2023-05-15T19:26:01.047`) +* [CVE-2023-1682](CVE-2023/CVE-2023-16xx/CVE-2023-1682.json) (`2023-05-15T19:26:12.580`) +* [CVE-2023-1683](CVE-2023/CVE-2023-16xx/CVE-2023-1683.json) (`2023-05-15T19:26:18.010`) +* [CVE-2023-22711](CVE-2023/CVE-2023-227xx/CVE-2023-22711.json) (`2023-05-15T19:44:29.450`) +* [CVE-2023-23701](CVE-2023/CVE-2023-237xx/CVE-2023-23701.json) (`2023-05-15T19:43:41.283`) +* [CVE-2023-23788](CVE-2023/CVE-2023-237xx/CVE-2023-23788.json) (`2023-05-15T19:43:07.003`) +* [CVE-2023-23789](CVE-2023/CVE-2023-237xx/CVE-2023-23789.json) (`2023-05-15T19:47:30.610`) +* [CVE-2023-23812](CVE-2023/CVE-2023-238xx/CVE-2023-23812.json) (`2023-05-15T19:47:13.493`) +* [CVE-2023-24505](CVE-2023/CVE-2023-245xx/CVE-2023-24505.json) (`2023-05-15T18:18:10.547`) +* [CVE-2023-24506](CVE-2023/CVE-2023-245xx/CVE-2023-24506.json) (`2023-05-15T18:01:57.487`) +* [CVE-2023-24898](CVE-2023/CVE-2023-248xx/CVE-2023-24898.json) (`2023-05-15T18:39:58.677`) +* [CVE-2023-24899](CVE-2023/CVE-2023-248xx/CVE-2023-24899.json) (`2023-05-15T18:40:29.773`) +* [CVE-2023-24900](CVE-2023/CVE-2023-249xx/CVE-2023-24900.json) (`2023-05-15T18:40:49.847`) +* [CVE-2023-24901](CVE-2023/CVE-2023-249xx/CVE-2023-24901.json) (`2023-05-15T18:33:54.050`) +* [CVE-2023-24902](CVE-2023/CVE-2023-249xx/CVE-2023-24902.json) (`2023-05-15T18:35:05.153`) +* [CVE-2023-24903](CVE-2023/CVE-2023-249xx/CVE-2023-24903.json) (`2023-05-15T18:39:34.700`) +* [CVE-2023-24904](CVE-2023/CVE-2023-249xx/CVE-2023-24904.json) (`2023-05-15T18:31:50.367`) +* [CVE-2023-24905](CVE-2023/CVE-2023-249xx/CVE-2023-24905.json) (`2023-05-15T18:06:58.340`) +* [CVE-2023-24932](CVE-2023/CVE-2023-249xx/CVE-2023-24932.json) (`2023-05-15T18:18:30.897`) +* [CVE-2023-24939](CVE-2023/CVE-2023-249xx/CVE-2023-24939.json) (`2023-05-15T18:31:01.027`) +* [CVE-2023-24940](CVE-2023/CVE-2023-249xx/CVE-2023-24940.json) (`2023-05-15T19:28:15.157`) +* [CVE-2023-24941](CVE-2023/CVE-2023-249xx/CVE-2023-24941.json) (`2023-05-15T19:28:47.743`) +* [CVE-2023-24942](CVE-2023/CVE-2023-249xx/CVE-2023-24942.json) (`2023-05-15T19:29:01.270`) +* [CVE-2023-24943](CVE-2023/CVE-2023-249xx/CVE-2023-24943.json) (`2023-05-15T19:27:43.557`) +* [CVE-2023-24944](CVE-2023/CVE-2023-249xx/CVE-2023-24944.json) (`2023-05-15T19:27:29.400`) +* [CVE-2023-24945](CVE-2023/CVE-2023-249xx/CVE-2023-24945.json) (`2023-05-15T19:16:12.817`) +* [CVE-2023-24946](CVE-2023/CVE-2023-249xx/CVE-2023-24946.json) (`2023-05-15T19:16:24.293`) +* [CVE-2023-24947](CVE-2023/CVE-2023-249xx/CVE-2023-24947.json) (`2023-05-15T19:26:43.583`) +* [CVE-2023-24948](CVE-2023/CVE-2023-249xx/CVE-2023-24948.json) (`2023-05-15T18:54:58.640`) +* [CVE-2023-24949](CVE-2023/CVE-2023-249xx/CVE-2023-24949.json) (`2023-05-15T19:14:25.917`) +* [CVE-2023-24950](CVE-2023/CVE-2023-249xx/CVE-2023-24950.json) (`2023-05-15T19:15:22.023`) +* [CVE-2023-25829](CVE-2023/CVE-2023-258xx/CVE-2023-25829.json) (`2023-05-15T18:50:04.493`) +* [CVE-2023-25830](CVE-2023/CVE-2023-258xx/CVE-2023-25830.json) (`2023-05-15T18:49:22.937`) +* [CVE-2023-2594](CVE-2023/CVE-2023-25xx/CVE-2023-2594.json) (`2023-05-15T18:48:44.910`) +* [CVE-2023-2595](CVE-2023/CVE-2023-25xx/CVE-2023-2595.json) (`2023-05-15T18:48:27.957`) +* [CVE-2023-2596](CVE-2023/CVE-2023-25xx/CVE-2023-2596.json) (`2023-05-15T18:48:06.217`) +* [CVE-2023-27010](CVE-2023/CVE-2023-270xx/CVE-2023-27010.json) (`2023-05-15T19:25:41.970`) +* [CVE-2023-27407](CVE-2023/CVE-2023-274xx/CVE-2023-27407.json) (`2023-05-15T18:47:18.340`) +* [CVE-2023-27408](CVE-2023/CVE-2023-274xx/CVE-2023-27408.json) (`2023-05-15T18:46:34.533`) +* [CVE-2023-27409](CVE-2023/CVE-2023-274xx/CVE-2023-27409.json) (`2023-05-15T18:45:55.523`) +* [CVE-2023-27410](CVE-2023/CVE-2023-274xx/CVE-2023-27410.json) (`2023-05-15T18:44:29.897`) +* [CVE-2023-28251](CVE-2023/CVE-2023-282xx/CVE-2023-28251.json) (`2023-05-15T19:40:19.857`) +* [CVE-2023-28283](CVE-2023/CVE-2023-282xx/CVE-2023-28283.json) (`2023-05-15T19:39:36.323`) +* [CVE-2023-28290](CVE-2023/CVE-2023-282xx/CVE-2023-28290.json) (`2023-05-15T19:39:22.090`) +* [CVE-2023-28832](CVE-2023/CVE-2023-288xx/CVE-2023-28832.json) (`2023-05-15T18:49:38.067`) +* [CVE-2023-29092](CVE-2023/CVE-2023-290xx/CVE-2023-29092.json) (`2023-05-15T18:57:52.217`) +* [CVE-2023-29103](CVE-2023/CVE-2023-291xx/CVE-2023-29103.json) (`2023-05-15T18:38:37.257`) +* [CVE-2023-29104](CVE-2023/CVE-2023-291xx/CVE-2023-29104.json) (`2023-05-15T18:37:59.890`) +* [CVE-2023-29105](CVE-2023/CVE-2023-291xx/CVE-2023-29105.json) (`2023-05-15T18:36:17.447`) +* [CVE-2023-29106](CVE-2023/CVE-2023-291xx/CVE-2023-29106.json) (`2023-05-15T18:34:08.910`) +* [CVE-2023-29107](CVE-2023/CVE-2023-291xx/CVE-2023-29107.json) (`2023-05-15T18:33:18.470`) +* [CVE-2023-29128](CVE-2023/CVE-2023-291xx/CVE-2023-29128.json) (`2023-05-15T18:21:42.613`) +* [CVE-2023-29324](CVE-2023/CVE-2023-293xx/CVE-2023-29324.json) (`2023-05-15T19:37:30.953`) +* [CVE-2023-29325](CVE-2023/CVE-2023-293xx/CVE-2023-29325.json) (`2023-05-15T19:35:37.617`) +* [CVE-2023-29333](CVE-2023/CVE-2023-293xx/CVE-2023-29333.json) (`2023-05-15T19:33:19.563`) +* [CVE-2023-29335](CVE-2023/CVE-2023-293xx/CVE-2023-29335.json) (`2023-05-15T19:32:59.537`) +* [CVE-2023-30088](CVE-2023/CVE-2023-300xx/CVE-2023-30088.json) (`2023-05-15T18:37:58.970`) +* [CVE-2023-30512](CVE-2023/CVE-2023-305xx/CVE-2023-30512.json) (`2023-05-15T19:26:44.667`) +* [CVE-2023-30614](CVE-2023/CVE-2023-306xx/CVE-2023-30614.json) (`2023-05-15T19:27:42.637`) +* [CVE-2023-30746](CVE-2023/CVE-2023-307xx/CVE-2023-30746.json) (`2023-05-15T19:46:09.433`) +* [CVE-2023-30840](CVE-2023/CVE-2023-308xx/CVE-2023-30840.json) (`2023-05-15T18:32:12.513`) +* [CVE-2023-30844](CVE-2023/CVE-2023-308xx/CVE-2023-30844.json) (`2023-05-15T18:07:21.737`) +* [CVE-2023-31125](CVE-2023/CVE-2023-311xx/CVE-2023-31125.json) (`2023-05-15T18:33:24.077`) +* [CVE-2023-31127](CVE-2023/CVE-2023-311xx/CVE-2023-31127.json) (`2023-05-15T18:08:38.267`) +* [CVE-2023-31129](CVE-2023/CVE-2023-311xx/CVE-2023-31129.json) (`2023-05-15T18:05:51.943`) +* [CVE-2023-31133](CVE-2023/CVE-2023-311xx/CVE-2023-31133.json) (`2023-05-15T18:19:28.143`) +* [CVE-2023-31140](CVE-2023/CVE-2023-311xx/CVE-2023-31140.json) (`2023-05-15T18:07:30.537`) +* [CVE-2023-31141](CVE-2023/CVE-2023-311xx/CVE-2023-31141.json) (`2023-05-15T18:47:12.577`) +* [CVE-2023-31566](CVE-2023/CVE-2023-315xx/CVE-2023-31566.json) (`2023-05-15T18:35:26.847`) +* [CVE-2023-31567](CVE-2023/CVE-2023-315xx/CVE-2023-31567.json) (`2023-05-15T18:35:16.757`) +* [CVE-2023-31568](CVE-2023/CVE-2023-315xx/CVE-2023-31568.json) (`2023-05-15T18:35:10.000`) +* [CVE-2023-32233](CVE-2023/CVE-2023-322xx/CVE-2023-32233.json) (`2023-05-15T18:27:02.080`) ## Download and Usage