Auto-Update: 2023-06-14T20:00:28.659696+00:00

This commit is contained in:
cad-safe-bot 2023-06-14 20:00:32 +00:00
parent d36469d684
commit 1e9df8cf8d
47 changed files with 2120 additions and 211 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-25142",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-07T02:15:10.250",
"lastModified": "2023-06-07T02:45:10.733",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:33:53.987",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -46,34 +76,84 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:extendthemes:materialis:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.173",
"matchCriteriaId": "81C9AC6F-D2F5-484E-AD9C-102766E4F4DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:extendthemes:mesmerize:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.6.90",
"matchCriteriaId": "B7A2CA85-3E8B-4E08-82BA-FCB39AC29518"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.nintechnet.com/wordpress-mesmerize-and-materialis-themes-fixed-an-authenticated-options-change-vulnerability/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=121290%40materialis&new=121290%40materialis&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch",
"Release Notes"
]
},
{
"url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=121291%40mesmerize&new=121291%40mesmerize&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch",
"Release Notes"
]
},
{
"url": "https://wordpress.org/themes/materialis/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://wordpress.org/themes/mesmerize/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://wpscan.com/vulnerability/e4d70f03-69d5-4cca-8300-985f68d19ddc",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8c9c3302-47cd-4dbe-b79e-5e6032928074?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-36705",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-07T13:15:09.167",
"lastModified": "2023-06-07T14:35:57.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T18:58:50.610",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -46,26 +66,60 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tunasite:adning_advertising:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.6",
"matchCriteriaId": "C722C1E8-9862-45EF-B5A4-7716E9D2B168"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.nintechnet.com/critical-vulnerability-in-adning-advertising-plugin-actively-exploited-in-the-wild/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://codecanyon.net/item/wp-pro-advertising-system-all-in-one-ad-manager/269693",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://wpscan.com/vulnerability/e9873fe3-fc06-4a52-aa32-6922cab7830c",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/blog/2020/07/critical-vulnerabilities-patched-in-adning-advertising-plugin/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4a263b74-e9ae-4fd2-be9b-9b8e9eee5982?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-36707",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-07T02:15:11.440",
"lastModified": "2023-06-07T02:45:04.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T18:21:04.313",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -46,22 +76,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpconcern:coming_soon_\\&_maintenance_mode_page:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.58",
"matchCriteriaId": "1610943D-0510-4414-AD5C-D49814BA5292"
}
]
}
]
}
],
"references": [
{
"url": "https://jetpack.com/features/security/library/nifty-coming-soon-and-under-construction-page-plugin/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://wpscan.com/vulnerability/aa47a464-af97-43bc-b6cb-75a08ce3ece7",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-coming-soon-maintenance-mode-page-cross-site-request-forgery-1-57/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/59278214-b0ce-44bf-8d8f-265c5c50006a?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-36728",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-07T13:15:09.330",
"lastModified": "2023-06-07T14:35:57.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:08:54.210",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -46,22 +66,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tunasite:adning_advertising:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.6",
"matchCriteriaId": "C722C1E8-9862-45EF-B5A4-7716E9D2B168"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.nintechnet.com/critical-vulnerability-in-adning-advertising-plugin-actively-exploited-in-the-wild/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://codecanyon.net/item/wp-pro-advertising-system-all-in-one-ad-manager/269693",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/blog/2020/07/critical-vulnerabilities-patched-in-adning-advertising-plugin/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7506429-7f8a-45b5-b1b0-6fdb39599ee5?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-4354",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-07T02:15:13.927",
"lastModified": "2023-06-07T02:44:53.933",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T18:20:06.937",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -46,14 +76,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magazine3:pwa_for_wp_\\&_amp:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.7.33",
"matchCriteriaId": "4FCFE3DF-9457-4215-814B-E147873A0C1C"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.nintechnet.com/wordpress-pwa-for-wp-and-amp-plugin-fixed-vulnerabilities/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6082791e-feac-41f7-b565-9d98624ddf50?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-4379",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-07T13:15:09.527",
"lastModified": "2023-06-07T14:35:57.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T18:22:04.353",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -46,18 +66,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:villatheme:woocommerce_multi_currency:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.1.18",
"matchCriteriaId": "5AE02FFF-35D4-4239-B4AB-0EC7A5E5FC72"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.nintechnet.com/vulnerability-fixed-in-wordpress-woocommerce-multi-currency-plugin/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://codecanyon.net/item/woocommerce-multi-currency/20948446",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e2318ae9-4115-442e-9293-a9251787c5f3?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-4380",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-07T13:15:09.623",
"lastModified": "2023-06-07T14:35:57.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T18:27:19.547",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,22 +76,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:valvepress:pinterest_automatic_pin:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.14.4",
"matchCriteriaId": "9E16E725-2DED-45D8-9051-0167C9DA03E8"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.nintechnet.com/critical-vulnerability-fixed-in-wordpress-pinterest-automatic-plugin/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://wpscan.com/vulnerability/ffd344fd-de2c-4f27-8932-41aa0a3c3d05",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-pinterest-automatic-pin-security-bypass-4-14-3/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4fdc902-4cfe-4116-a294-9a0fcb2de346?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31640",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-06-14T17:15:08.893",
"lastModified": "2023-06-14T17:15:08.893",
"vulnStatus": "Received",
"lastModified": "2023-06-14T18:20:18.790",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31641",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-06-14T17:15:08.943",
"lastModified": "2023-06-14T17:15:08.943",
"vulnStatus": "Received",
"lastModified": "2023-06-14T18:20:18.790",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31642",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-06-14T17:15:08.987",
"lastModified": "2023-06-14T17:15:08.987",
"vulnStatus": "Received",
"lastModified": "2023-06-14T18:20:18.790",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-31644",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-06-14T18:15:09.363",
"lastModified": "2023-06-14T18:20:18.790",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure."
}
],
"metrics": {},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_6664419-6664458-16/hpsbhf03806",
"source": "hp-security-alert@hp.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-31645",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-06-14T18:15:09.413",
"lastModified": "2023-06-14T18:20:18.790",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure. "
}
],
"metrics": {},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_6664419-6664458-16/hpsbhf03806",
"source": "hp-security-alert@hp.com"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2022-31646",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2023-06-14T18:15:09.457",
"lastModified": "2023-06-14T18:20:18.790",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Potential vulnerabilities have been identified in the system BIOS of certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure."
}
],
"metrics": {},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_6664419-6664458-16/hpsbhf03806",
"source": "hp-security-alert@hp.com"
}
]
}

View File

@ -0,0 +1,15 @@
{
"id": "CVE-2022-4284",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T19:15:09.187",
"lastModified": "2023-06-14T19:15:09.187",
"vulnStatus": "Rejected",
"descriptions": [
{
"lang": "en",
"value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0009",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2023-06-14T17:15:09.043",
"lastModified": "2023-06-14T17:15:09.043",
"vulnStatus": "Received",
"lastModified": "2023-06-14T18:20:18.790",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0010",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2023-06-14T17:15:09.127",
"lastModified": "2023-06-14T17:15:09.127",
"vulnStatus": "Received",
"lastModified": "2023-06-14T18:20:18.790",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0666",
"sourceIdentifier": "cve@takeonme.org",
"published": "2023-06-07T03:15:09.000",
"lastModified": "2023-06-13T18:50:23.657",
"lastModified": "2023-06-14T18:12:46.100",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -21,20 +21,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0692",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:51.070",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:41:44.033",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -46,18 +66,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmet:metform_elementor_contact_form_builder:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.3.1",
"matchCriteriaId": "22EE9B5A-DBD2-49A0-92E8-F69359E40B3C"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/metform/trunk/base/shortcode.php?rev=2845078",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/2910040/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ddd85ff2-6607-4ac8-b91c-88f6f2fa6c56?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0992",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:15:54.777",
"lastModified": "2023-06-09T13:03:43.237",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T18:07:48.307",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -36,7 +56,7 @@
},
"weaknesses": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,20 +64,57 @@
"value": "CWE-79"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getshieldsecurity:shield_security:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "17.0.17",
"matchCriteriaId": "26C21257-912C-4614-927D-680366EFE994"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2883864%40wp-simple-firewall%2Ftrunk&old=2883536%40wp-simple-firewall%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/wp-simple-firewall/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/162dff28-94ea-4a47-a6cb-a13317cf1a04?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1709",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-06-07T21:15:12.933",
"lastModified": "2023-06-07T21:36:36.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:14:50.197",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,14 +76,75 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:jt2go:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.2.0.2",
"matchCriteriaId": "1B3490BB-3AD4-43FC-BBEC-BB160B3F7BF8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.2.0",
"versionEndExcluding": "13.2.0.13",
"matchCriteriaId": "FC06105E-8D31-4AFD-88C6-2E58D01CFFE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.3.0",
"versionEndExcluding": "13.3.0.9",
"matchCriteriaId": "1925F7E3-339D-4355-B74D-CFA74B7F9394"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.0.0.5",
"matchCriteriaId": "E6570A4C-C453-4565-957B-82546859D633"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.1",
"versionEndExcluding": "14.1.0.7",
"matchCriteriaId": "EDFCD6E0-1039-4E41-9DFE-393765EE100B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:teamcenter_visualization:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.2",
"versionEndExcluding": "14.2.0.2",
"matchCriteriaId": "938ADB8D-1C22-460C-B712-F091553487C5"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-629917.html",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Broken Link",
"Vendor Advisory"
]
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-103-11",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,19 +2,77 @@
"id": "CVE-2023-20887",
"sourceIdentifier": "security@vmware.com",
"published": "2023-06-07T15:15:09.190",
"lastModified": "2023-06-07T16:18:07.597",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T18:40:01.347",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Aria Operations for Networks contains a command injection vulnerability. A malicious actor with network access to VMware Aria Operations for Networks may be able to perform a command injection attack resulting in remote code execution."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vrealize_network_insight:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndIncluding": "6.10.0",
"matchCriteriaId": "6D313849-EA07-4CB9-9F94-AE78D290D0AE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.vmware.com/security/advisories/VMSA-2023-0012.html",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,77 @@
"id": "CVE-2023-20888",
"sourceIdentifier": "security@vmware.com",
"published": "2023-06-07T15:15:09.263",
"lastModified": "2023-06-07T16:18:07.597",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:10:16.743",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Aria Operations for Networks contains an authenticated deserialization vulnerability.\u00a0A malicious actor with network access to VMware Aria Operations for Networks and valid 'member' role credentials may be able to perform a deserialization attack resulting in remote code execution."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vrealize_network_insight:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndIncluding": "6.10.0",
"matchCriteriaId": "6D313849-EA07-4CB9-9F94-AE78D290D0AE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.vmware.com/security/advisories/VMSA-2023-0012.html",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,77 @@
"id": "CVE-2023-20889",
"sourceIdentifier": "security@vmware.com",
"published": "2023-06-07T15:15:09.317",
"lastModified": "2023-06-07T16:18:07.597",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:35:42.450",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Aria Operations for Networks contains an information disclosure vulnerability.\u00a0A malicious actor with network access to VMware Aria Operations for Networks may be able to perform a command injection attack resulting in information disclosure."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vmware:vrealize_network_insight:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2.0",
"versionEndIncluding": "6.10.0",
"matchCriteriaId": "6D313849-EA07-4CB9-9F94-AE78D290D0AE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.vmware.com/security/advisories/VMSA-2023-0012.html",
"source": "security@vmware.com"
"source": "security@vmware.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2402",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:06.847",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T18:13:39.543",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -46,14 +66,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:i13websolution:photo_gallery_slideshow_\\&_masonry_tiled_gallery:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.13",
"matchCriteriaId": "2FEAD844-D8D2-44B7-92BB-7F5DDA76D109"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2808029%40wp-responsive-photo-gallery%2Ftags%2F1.0.13&new=2905480%40wp-responsive-photo-gallery%2Ftags%2F1.0.14",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/51a1c2de-56be-4487-874a-a916e8a6992a?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25367",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T17:15:09.193",
"lastModified": "2023-06-14T17:15:09.193",
"vulnStatus": "Received",
"lastModified": "2023-06-14T18:20:18.790",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,16 +2,49 @@
"id": "CVE-2023-2530",
"sourceIdentifier": "security@puppet.com",
"published": "2023-06-07T20:15:09.557",
"lastModified": "2023-06-07T20:24:12.193",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T18:31:32.977",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A privilege escalation allowing remote code execution was discovered in the orchestration service."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security@puppet.com",
"type": "Secondary",
@ -23,10 +56,42 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2021.7.0",
"versionEndIncluding": "2021.7.3",
"matchCriteriaId": "1FFD6BC9-7CFB-43BE-8412-B49BA3B42AF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2023.0:*:*:*:*:*:*:*",
"matchCriteriaId": "079FC111-2839-4137-929E-A7B9C5483B17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:puppet:puppet_enterprise:2023.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "911A002E-5837-4119-A21E-E245FBF1F61E"
}
]
}
]
}
],
"references": [
{
"url": "https://www.puppet.com/security/cve/cve-2023-2530-remote-code-execution-orchestrator",
"source": "security@puppet.com"
"source": "security@puppet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2555",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:08.673",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:26:15.310",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -46,14 +66,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pluginus:wordpress_currency_switcher_professional:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1.9",
"matchCriteriaId": "5C5C0188-097C-4742-B3BD-E3468E1A3845"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/2911049/currency-switcher",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd6b5d6d-5f5b-4b38-a25a-02cc1c041d37?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2557",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:09.247",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:26:43.670",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -36,7 +56,7 @@
},
"weaknesses": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,16 +64,50 @@
"value": "CWE-862"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pluginus:wordpress_currency_switcher_professional:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1.9",
"matchCriteriaId": "5C5C0188-097C-4742-B3BD-E3468E1A3845"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/2911049/currency-switcher",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4c79242-5c89-40c0-abcc-c112f7a64a74?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2558",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-09T06:16:09.583",
"lastModified": "2023-06-09T13:03:29.543",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:24:54.113",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -46,14 +66,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pluginus:wordpress_currency_switcher_professional:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1.9",
"matchCriteriaId": "5C5C0188-097C-4742-B3BD-E3468E1A3845"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/2911049/currency-switcher",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/be054481-89b4-47d8-ad06-8622edea367f?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,49 @@
"id": "CVE-2023-2602",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-06T20:15:12.760",
"lastModified": "2023-06-07T02:45:15.873",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T18:07:39.807",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in the pthread_create() function in libcap. This issue may allow a malicious actor to use cause __real_pthread_create() to return an error, which can exhaust the process memory."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -23,14 +56,114 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:libcap_project:libcap:2.66:*:*:*:*:*:*:*",
"matchCriteriaId": "B52864EF-C6F1-44F5-904B-8E2B8ADC705B"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209114",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29345",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-06-07T18:15:09.673",
"lastModified": "2023-06-07T20:24:12.193",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T18:35:45.610",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -34,10 +34,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*",
"versionEndExcluding": "114.0.1823.37",
"matchCriteriaId": "66F72334-CC96-4F73-B765-30069339A8E3"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29345",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2023-2976",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-06-14T18:15:09.513",
"lastModified": "2023-06-14T18:20:18.790",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Use of Java's default temporary directory for file creation in `FileBackedOutputStream` in Google Guava versions 1.0 to 31.1 on Unix systems and Android Ice Cream Sandwich allows other users and apps on the machine with access to the default Java temporary directory to be able to access the files created by the class.\n\nEven though the security vulnerability is fixed in version 32.0.0, we recommend using version 32.0.1 as version 32.0.0 breaks some functionality under Windows.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@google.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://github.com/google/guava/issues/2575",
"source": "cve-coordination@google.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30608",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-04-18T22:15:08.267",
"lastModified": "2023-05-16T14:15:09.417",
"vulnStatus": "Modified",
"lastModified": "2023-06-14T18:14:15.733",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -56,7 +56,7 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -64,6 +64,16 @@
"value": "CWE-1333"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
],
"configurations": [
@ -77,8 +87,23 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:sqlparse_project:sqlparse:*:*:*:*:*:python:*:*",
"versionStartIncluding": "0.1.15",
"versionEndIncluding": "0.4.4",
"matchCriteriaId": "D5C04FBE-2FC6-407E-8D84-9D493B86E0EB"
"versionEndExcluding": "0.4.4",
"matchCriteriaId": "EF2A5C27-B4D8-494B-B864-F00E0002B511"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
@ -97,25 +122,30 @@
"url": "https://github.com/andialbrecht/sqlparse/commit/e75e35869473832a1eb67772b1adfee2db11b85a",
"source": "security-advisories@github.com",
"tags": [
"Product"
"Patch"
]
},
{
"url": "https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-rrm6-wvj7-cwh2",
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00017.html",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS",
"source": "security-advisories@github.com",
"tags": [
"Not Applicable"
"Technical Description"
]
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30948",
"sourceIdentifier": "cve-coordination@palantir.com",
"published": "2023-06-06T15:15:09.350",
"lastModified": "2023-06-06T18:34:03.700",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:53:58.033",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "cve-coordination@palantir.com",
"type": "Secondary",
@ -34,10 +54,43 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:palantir:foundry_comments:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.249.0",
"matchCriteriaId": "17A99FCB-A846-4921-9370-767988FD292B"
}
]
}
]
}
],
"references": [
{
"url": "https://palantir.safebase.us/?tcuUid=101b083b-6389-4261-98f8-23448e133a62",
"source": "cve-coordination@palantir.com"
"source": "cve-coordination@palantir.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-31671",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T18:15:09.573",
"lastModified": "2023-06-14T18:20:18.790",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "PrestaShop postfinance <= 17.1.13 is vulnerable to SQL Injection via PostfinanceValidationModuleFrontController::postProcess()."
}
],
"metrics": {},
"references": [
{
"url": "https://friends-of-presta.github.io/security-advisories/modules/2023/06/13/postfinance.html",
"source": "cve@mitre.org"
},
{
"url": "https://shop.webbax.ch/modules-de-paiement/123-module-postfinance.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3165",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-08T17:15:09.987",
"lastModified": "2023-06-09T13:03:52.847",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T18:57:13.767",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -61,7 +83,7 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -69,20 +91,56 @@
"value": "CWE-79"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:life_insurance_management_system_project:life_insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F62AFE90-B9EE-49C4-B46D-54A738A49E36"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Hanwengao/CVERequests/blob/main/XSS.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.231109",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.231109",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3172",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-06-09T01:15:30.237",
"lastModified": "2023-06-09T13:03:48.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T18:21:14.247",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -15,6 +15,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -50,14 +72,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:froxlor:froxlor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.20",
"matchCriteriaId": "7FE0153D-83B4-43BA-A1F8-D90020C9B465"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/froxlor/froxlor/commit/da810ea95393dfaec68a70e30b7c887c50563a7e",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.dev/bounties/e50966cd-9222-46b9-aedc-1feb3f2a0b0e",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32551",
"sourceIdentifier": "security@ubuntu.com",
"published": "2023-06-06T16:15:10.813",
"lastModified": "2023-06-06T18:33:59.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:58:43.870",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security@ubuntu.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
},
{
"source": "security@ubuntu.com",
"type": "Secondary",
@ -46,10 +76,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:canonical:landscape:*:*:*:*:*:*:*:*",
"versionEndExcluding": "19.10.5",
"matchCriteriaId": "4E6417F0-0BD2-493C-A7DF-929B95D2D124"
}
]
}
]
}
],
"references": [
{
"url": "https://bugs.launchpad.net/landscape/+bug/1929620",
"source": "security@ubuntu.com"
"source": "security@ubuntu.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,19 +2,80 @@
"id": "CVE-2023-33284",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-07T20:15:09.833",
"lastModified": "2023-06-07T20:24:12.193",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:21:44.847",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Marval MSM through 14.19.0.12476 and 15.0 has a Remote Code Execution vulnerability. A remote attacker authenticated as any user is able to execute code in context of the web server."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvalglobal:msm:*:*:*:*:*:*:*:*",
"versionEndIncluding": "14.19.0.12476",
"matchCriteriaId": "82AD0D2F-E9D5-4BC2-96E1-6D7F0B260B9D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marvalglobal:msm:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F24D5289-D1C3-4D57-9B61-FF1D7F2160D7"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cyberskydd.se/cve/2023/CVE-2023-33284.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,86 @@
"id": "CVE-2023-33443",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-08T14:15:15.860",
"lastModified": "2023-06-08T17:08:49.797",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:13:04.663",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in the administrative functionalities of BES--6024PB-I50H1 VideoPlayTool v2.0.1.0 allow attackers to execute arbitrary administrative commands via a crafted payload sent to the desired endpoints."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:besder:videoplaytool:2.0.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "50DE45A7-A704-46FD-9E0C-ACBF1945AED4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:besder:bes--6024pb-i50h1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05E6E1EC-FD94-4A24-A98C-8EDF98821ADD"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.com/FallFur/exploiting-unprotected-admin-funcionalities-on-besder-ip-cameras/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,27 +2,88 @@
"id": "CVE-2023-33658",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-08T12:15:09.240",
"lastModified": "2023-06-08T17:08:49.797",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:12:15.637",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A heap buffer overflow vulnerability exists in NanoMQ 0.17.2. The vulnerability can be triggered by calling the function nni_msg_get_pub_pid() in the file message.c. An attacker could exploit this vulnerability to cause a denial of service attack."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emqx:nanomq:0.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0898CABA-5930-437A-8300-4D91648091F1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/emqx/nanomq",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/emqx/nanomq/issues/1153",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/nanomq/NanoNNG/commit/657e6c81c474bdee0e6413483b990e90610030c1",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,31 +2,101 @@
"id": "CVE-2023-33863",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-07T20:15:09.963",
"lastModified": "2023-06-08T17:15:09.817",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:44:08.787",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "RenderDoc through 1.26 allows an Integer Overflow with a resultant Buffer Overflow (issue 1 of 2)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:renderdoc:renderdoc:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.26",
"matchCriteriaId": "2A659FB0-27D6-48C3-94FB-0442989375B5"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Jun/2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://renderdoc.org/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,31 +2,101 @@
"id": "CVE-2023-33864",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-07T20:15:10.007",
"lastModified": "2023-06-08T17:15:09.870",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-14T19:48:06.770",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "RenderDoc through 1.26 allows an Integer Overflow with a resultant Buffer Overflow (issue 2 of 2)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:renderdoc:renderdoc:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.26",
"matchCriteriaId": "2A659FB0-27D6-48C3-94FB-0442989375B5"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/172804/RenderDoc-1.26-Local-Privilege-Escalation-Remote-Code-Execution.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://seclists.org/fulldisclosure/2023/Jun/2",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://renderdoc.org/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://www.qualys.com/2023/06/06/renderdoc/renderdoc.txt",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34095",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-06-14T17:15:09.243",
"lastModified": "2023-06-14T17:15:09.243",
"vulnStatus": "Received",
"lastModified": "2023-06-14T18:20:18.790",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34867",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T16:15:20.277",
"lastModified": "2023-06-14T16:15:20.277",
"vulnStatus": "Received",
"lastModified": "2023-06-14T18:20:18.790",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-34868",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-14T16:15:20.323",
"lastModified": "2023-06-14T16:15:20.323",
"vulnStatus": "Received",
"lastModified": "2023-06-14T18:20:18.790",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-06-14T18:00:28.314661+00:00
2023-06-14T20:00:28.659696+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-06-14T17:58:43.697000+00:00
2023-06-14T19:58:43.870000+00:00
```
### Last Data Feed Release
@ -29,47 +29,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
217769
217775
```
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `6`
* [CVE-2022-31640](CVE-2022/CVE-2022-316xx/CVE-2022-31640.json) (`2023-06-14T17:15:08.893`)
* [CVE-2022-31641](CVE-2022/CVE-2022-316xx/CVE-2022-31641.json) (`2023-06-14T17:15:08.943`)
* [CVE-2022-31642](CVE-2022/CVE-2022-316xx/CVE-2022-31642.json) (`2023-06-14T17:15:08.987`)
* [CVE-2023-34867](CVE-2023/CVE-2023-348xx/CVE-2023-34867.json) (`2023-06-14T16:15:20.277`)
* [CVE-2023-34868](CVE-2023/CVE-2023-348xx/CVE-2023-34868.json) (`2023-06-14T16:15:20.323`)
* [CVE-2023-0009](CVE-2023/CVE-2023-00xx/CVE-2023-0009.json) (`2023-06-14T17:15:09.043`)
* [CVE-2023-0010](CVE-2023/CVE-2023-00xx/CVE-2023-0010.json) (`2023-06-14T17:15:09.127`)
* [CVE-2023-25367](CVE-2023/CVE-2023-253xx/CVE-2023-25367.json) (`2023-06-14T17:15:09.193`)
* [CVE-2023-34095](CVE-2023/CVE-2023-340xx/CVE-2023-34095.json) (`2023-06-14T17:15:09.243`)
* [CVE-2022-31644](CVE-2022/CVE-2022-316xx/CVE-2022-31644.json) (`2023-06-14T18:15:09.363`)
* [CVE-2022-31645](CVE-2022/CVE-2022-316xx/CVE-2022-31645.json) (`2023-06-14T18:15:09.413`)
* [CVE-2022-31646](CVE-2022/CVE-2022-316xx/CVE-2022-31646.json) (`2023-06-14T18:15:09.457`)
* [CVE-2022-4284](CVE-2022/CVE-2022-42xx/CVE-2022-4284.json) (`2023-06-14T19:15:09.187`)
* [CVE-2023-2976](CVE-2023/CVE-2023-29xx/CVE-2023-2976.json) (`2023-06-14T18:15:09.513`)
* [CVE-2023-31671](CVE-2023/CVE-2023-316xx/CVE-2023-31671.json) (`2023-06-14T18:15:09.573`)
### CVEs modified in the last Commit
Recently modified CVEs: `19`
Recently modified CVEs: `40`
* [CVE-2021-4348](CVE-2021/CVE-2021-43xx/CVE-2021-4348.json) (`2023-06-14T16:02:25.853`)
* [CVE-2021-4366](CVE-2021/CVE-2021-43xx/CVE-2021-4366.json) (`2023-06-14T17:48:30.860`)
* [CVE-2021-4358](CVE-2021/CVE-2021-43xx/CVE-2021-4358.json) (`2023-06-14T17:53:02.130`)
* [CVE-2023-3163](CVE-2023/CVE-2023-31xx/CVE-2023-3163.json) (`2023-06-14T16:02:52.813`)
* [CVE-2023-27476](CVE-2023/CVE-2023-274xx/CVE-2023-27476.json) (`2023-06-14T16:15:20.153`)
* [CVE-2023-34570](CVE-2023/CVE-2023-345xx/CVE-2023-34570.json) (`2023-06-14T16:30:12.287`)
* [CVE-2023-34571](CVE-2023/CVE-2023-345xx/CVE-2023-34571.json) (`2023-06-14T16:30:26.197`)
* [CVE-2023-3065](CVE-2023/CVE-2023-30xx/CVE-2023-3065.json) (`2023-06-14T16:49:24.173`)
* [CVE-2023-34568](CVE-2023/CVE-2023-345xx/CVE-2023-34568.json) (`2023-06-14T17:05:04.107`)
* [CVE-2023-34569](CVE-2023/CVE-2023-345xx/CVE-2023-34569.json) (`2023-06-14T17:10:07.267`)
* [CVE-2023-34567](CVE-2023/CVE-2023-345xx/CVE-2023-34567.json) (`2023-06-14T17:13:19.143`)
* [CVE-2023-3066](CVE-2023/CVE-2023-30xx/CVE-2023-3066.json) (`2023-06-14T17:15:44.867`)
* [CVE-2023-33652](CVE-2023/CVE-2023-336xx/CVE-2023-33652.json) (`2023-06-14T17:25:10.197`)
* [CVE-2023-33657](CVE-2023/CVE-2023-336xx/CVE-2023-33657.json) (`2023-06-14T17:25:26.513`)
* [CVE-2023-33653](CVE-2023/CVE-2023-336xx/CVE-2023-33653.json) (`2023-06-14T17:34:14.437`)
* [CVE-2023-33660](CVE-2023/CVE-2023-336xx/CVE-2023-33660.json) (`2023-06-14T17:45:29.743`)
* [CVE-2023-0832](CVE-2023/CVE-2023-08xx/CVE-2023-0832.json) (`2023-06-14T17:52:12.437`)
* [CVE-2023-0831](CVE-2023/CVE-2023-08xx/CVE-2023-0831.json) (`2023-06-14T17:53:15.107`)
* [CVE-2023-0729](CVE-2023/CVE-2023-07xx/CVE-2023-0729.json) (`2023-06-14T17:58:43.697`)
* [CVE-2023-34867](CVE-2023/CVE-2023-348xx/CVE-2023-34867.json) (`2023-06-14T18:20:18.790`)
* [CVE-2023-34868](CVE-2023/CVE-2023-348xx/CVE-2023-34868.json) (`2023-06-14T18:20:18.790`)
* [CVE-2023-0009](CVE-2023/CVE-2023-00xx/CVE-2023-0009.json) (`2023-06-14T18:20:18.790`)
* [CVE-2023-0010](CVE-2023/CVE-2023-00xx/CVE-2023-0010.json) (`2023-06-14T18:20:18.790`)
* [CVE-2023-25367](CVE-2023/CVE-2023-253xx/CVE-2023-25367.json) (`2023-06-14T18:20:18.790`)
* [CVE-2023-34095](CVE-2023/CVE-2023-340xx/CVE-2023-34095.json) (`2023-06-14T18:20:18.790`)
* [CVE-2023-3172](CVE-2023/CVE-2023-31xx/CVE-2023-3172.json) (`2023-06-14T18:21:14.247`)
* [CVE-2023-2530](CVE-2023/CVE-2023-25xx/CVE-2023-2530.json) (`2023-06-14T18:31:32.977`)
* [CVE-2023-29345](CVE-2023/CVE-2023-293xx/CVE-2023-29345.json) (`2023-06-14T18:35:45.610`)
* [CVE-2023-20887](CVE-2023/CVE-2023-208xx/CVE-2023-20887.json) (`2023-06-14T18:40:01.347`)
* [CVE-2023-3165](CVE-2023/CVE-2023-31xx/CVE-2023-3165.json) (`2023-06-14T18:57:13.767`)
* [CVE-2023-20888](CVE-2023/CVE-2023-208xx/CVE-2023-20888.json) (`2023-06-14T19:10:16.743`)
* [CVE-2023-33658](CVE-2023/CVE-2023-336xx/CVE-2023-33658.json) (`2023-06-14T19:12:15.637`)
* [CVE-2023-33443](CVE-2023/CVE-2023-334xx/CVE-2023-33443.json) (`2023-06-14T19:13:04.663`)
* [CVE-2023-1709](CVE-2023/CVE-2023-17xx/CVE-2023-1709.json) (`2023-06-14T19:14:50.197`)
* [CVE-2023-33284](CVE-2023/CVE-2023-332xx/CVE-2023-33284.json) (`2023-06-14T19:21:44.847`)
* [CVE-2023-2558](CVE-2023/CVE-2023-25xx/CVE-2023-2558.json) (`2023-06-14T19:24:54.113`)
* [CVE-2023-2555](CVE-2023/CVE-2023-25xx/CVE-2023-2555.json) (`2023-06-14T19:26:15.310`)
* [CVE-2023-2557](CVE-2023/CVE-2023-25xx/CVE-2023-2557.json) (`2023-06-14T19:26:43.670`)
* [CVE-2023-20889](CVE-2023/CVE-2023-208xx/CVE-2023-20889.json) (`2023-06-14T19:35:42.450`)
* [CVE-2023-0692](CVE-2023/CVE-2023-06xx/CVE-2023-0692.json) (`2023-06-14T19:41:44.033`)
* [CVE-2023-33863](CVE-2023/CVE-2023-338xx/CVE-2023-33863.json) (`2023-06-14T19:44:08.787`)
* [CVE-2023-33864](CVE-2023/CVE-2023-338xx/CVE-2023-33864.json) (`2023-06-14T19:48:06.770`)
* [CVE-2023-30948](CVE-2023/CVE-2023-309xx/CVE-2023-30948.json) (`2023-06-14T19:53:58.033`)
* [CVE-2023-32551](CVE-2023/CVE-2023-325xx/CVE-2023-32551.json) (`2023-06-14T19:58:43.870`)
## Download and Usage