Auto-Update: 2023-05-31T16:00:27.551754+00:00

This commit is contained in:
cad-safe-bot 2023-05-31 16:00:30 +00:00
parent 738a78f2f1
commit 33c6ff9827
32 changed files with 2724 additions and 79 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47311",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-05-22T23:15:09.423",
"lastModified": "2023-05-23T13:04:39.657",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T15:57:37.190",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -46,14 +66,640 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "05060302-F6DE-4EAF-9356-8CD785ABDE7D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "936B8451-A674-49D7-91EC-A03599A6D6AE"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "6D2071B9-BF2C-4A12-BA35-32BB59E210DB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1469E464-6784-4B0B-9895-79BA5A1A1CB8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "166422E2-0734-4F7E-B2FE-0EB461AFDD32"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "82C1859A-0D39-4D69-B89F-E6AB92D71A38"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "80159239-E373-4399-AF14-5FC3B1F7BFBF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A017B904-A3C4-4070-96F7-9679FD2383C9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "7FCCC5B8-ED6E-4FCA-BA07-4D2AA1D26F50"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23BC31CA-2061-4141-8600-EF4A9AE7DD2A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "D43D904E-6B72-44B4-A158-D6A7C30504A3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1A43409-AF18-4BD5-A0D4-D27CDD6ABBE6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "AB35A114-99E7-44C6-B53B-B293AA9D9815"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56E2CAAD-8A4D-4F1A-AEF0-034C02965935"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "C37DFE8A-F733-48D3-8BF6-ECC98A476C54"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ACA11FBB-1B4C-4F66-89EF-2D91C0161C4C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "DAD2CA81-44E6-4499-9F5C-502F060A3B8F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58CE9F4A-74BD-4AFC-B019-5D750E2D1E16"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "6E012434-72F0-4BD6-ACA4-DF7E12FB9033"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B64FEC33-D6D9-4F4C-BE43-31D637E6B01F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "F08FCBA2-94B8-44F9-921F-0CDD03D7903A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B1D3E7F-9C2F-48F8-BF49-539570A0986A"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "3577400F-ADC8-4EBF-AFEE-DE165391BE12"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0DFC4885-AF94-471E-AE4E-DD26A6A91667"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "02EF4F49-FCB7-44C8-BC83-8A3519807338"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-c20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "12B9705B-B21D-450B-A62B-933DC81A19E1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "B170FD2A-0422-4778-812F-EBCDF19A1253"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B786B2F4-6586-4E05-BDE9-DFDBA7BD3739"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "2CC4192B-D9F4-4886-BDDE-5859A89B6221"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CEBA453E-67D9-4760-89A6-6CF8C632C6A4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "A64CD7F9-D8BB-4717-90B5-FBFE01B00CB5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5042C3C1-3964-437B-98C1-0458F73B7197"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "AB49899D-165E-4B57-A3F5-D6ADDD138E12"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBD2B738-620D-42F8-881C-A6B293B724BA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "E032CC0E-0E19-490A-B3A2-5BA82DA52FC0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C46D12-6699-4BAC-AC47-7B150AECAF9B"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "CE9621CA-4AC7-4BA5-940D-E76E795502A2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1139B205-02DA-4155-897C-F5D4191686A8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "BC0AB74D-DFDD-4B8F-9AFB-158E8C09A6F4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C10BFD7F-0EDC-4CA0-9BEE-2CD0C83CAA05"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "EF765E11-57A1-444F-840B-321944679F4B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "518EE433-9E08-40FE-90F7-48E8AC934743"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.42.06162022",
"matchCriteriaId": "D4AD7C27-EFF5-4302-9B7F-0AFF190F1893"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1522EB30-AB31-47E3-B2EB-90CE231C284B"
}
]
}
]
}
],
"references": [
{
"url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25183",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-05-22T21:15:13.633",
"lastModified": "2023-05-23T13:04:39.657",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T15:31:11.450",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,14 +76,51 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*",
"versionEndExcluding": "7.3.0",
"matchCriteriaId": "415E3C3D-6B2F-4095-B7F1-E3F777E01172"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5B44DFB-CC8D-4342-907B-D34F9EAB5CEB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-r.pdf",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2504",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-05-22T22:15:10.277",
"lastModified": "2023-05-23T13:04:39.657",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T14:07:28.177",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -46,14 +66,136 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:birddog:a300_firmware:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D819BA91-D975-418C-A6BD-5CD06E543541"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:birddog:a300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5473E936-1D6A-49D2-AF43-1F4CFBF5480D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:birddog:mini_firmware:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DF87B2F2-CFD3-4269-A4CF-FAD8A4B531DF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:birddog:mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6A930E2-D903-4E40-8346-2829BAFC9999"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:birddog:4k_quad_firmware:4.5.181:*:*:*:*:*:*:*",
"matchCriteriaId": "34578ED0-FEBC-4FEE-893E-54FCF0269C92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:birddog:4k_quad_firmware:4.5.196:*:*:*:*:*:*:*",
"matchCriteriaId": "0D5B2472-6862-4ED3-A7AB-84F7E9847E46"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:birddog:4k_quad:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE7B5236-6A39-43C7-9EAD-30EB15CCFAE9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:birddog:studio_r3_firmware:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4D3FB3C3-C2EB-41D1-9334-C25EC95FC045"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:birddog:studio_r3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "696D1E43-79CB-47A9-BA0A-87699EB4ACF0"
}
]
}
]
}
],
"references": [
{
"url": "https://birddog.tv/downloads/",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-11",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2505",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-05-22T22:15:10.350",
"lastModified": "2023-05-23T13:04:39.657",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T14:01:22.207",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -46,14 +66,136 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:birddog:a300_firmware:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D819BA91-D975-418C-A6BD-5CD06E543541"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:birddog:a300:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5473E936-1D6A-49D2-AF43-1F4CFBF5480D"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:birddog:mini_firmware:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DF87B2F2-CFD3-4269-A4CF-FAD8A4B531DF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:birddog:mini:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6A930E2-D903-4E40-8346-2829BAFC9999"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:birddog:4k_quad_firmware:4.5.181:*:*:*:*:*:*:*",
"matchCriteriaId": "34578ED0-FEBC-4FEE-893E-54FCF0269C92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:birddog:4k_quad_firmware:4.5.196:*:*:*:*:*:*:*",
"matchCriteriaId": "0D5B2472-6862-4ED3-A7AB-84F7E9847E46"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:birddog:4k_quad:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE7B5236-6A39-43C7-9EAD-30EB15CCFAE9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:birddog:studio_r3_firmware:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4D3FB3C3-C2EB-41D1-9334-C25EC95FC045"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:birddog:studio_r3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "696D1E43-79CB-47A9-BA0A-87699EB4ACF0"
}
]
}
]
}
],
"references": [
{
"url": "https://birddog.tv/downloads/",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-11",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-26842",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T14:15:10.067",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A stored Cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the OptionManager.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26842",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2629",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-10T16:15:10.660",
"lastModified": "2023-05-17T17:15:23.327",
"lastModified": "2023-05-31T14:02:09.597",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -77,9 +77,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pimcore:customer-data-framework:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:pimcore:customer_management_framework:*:*:*:*:*:pimcore:*:*",
"versionEndExcluding": "3.3.9",
"matchCriteriaId": "E0297967-D5F3-423C-B673-60697D285E62"
"matchCriteriaId": "11F1B8A1-060A-495D-81D3-46BF6E471CFB"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2758",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-05-31T15:15:09.473",
"lastModified": "2023-05-31T15:15:09.473",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A denial of service vulnerability exists in Contec CONPROSYS HMI System versions 3.5.2 and prior. When there is a time-zone mismatch in certain configuration files, a remote, unauthenticated attacker may deny logins for an extended period of time."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-799"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU93372935/index.html",
"source": "vulnreport@tenable.com"
},
{
"url": "https://www.tenable.com/security/research/tra-2023-21",
"source": "vulnreport@tenable.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2863",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-24T10:15:09.407",
"lastModified": "2023-05-24T12:59:09.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T14:27:53.370",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -61,8 +83,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -71,18 +103,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:simpledesign:diary_with_lock\\:_daily_journal:1.012.gp.b:*:*:*:*:android:*:*",
"matchCriteriaId": "89AC64D2-461C-47A9-B983-B018F0F50F38"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.229819",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.229819",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.youtube.com/watch?v=V0u9C5RVSic",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-3012",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-31T14:15:11.097",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://github.com/gpac/gpac/commit/53387aa86c1af1228d0fa57c67f9c7330716d5a7",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-3013",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-31T14:15:11.157",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Unchecked Return Value in GitHub repository gpac/gpac prior to 2.2.2."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-252"
}
]
}
],
"references": [
{
"url": "https://github.com/gpac/gpac/commit/78e539b43293829a14a32e821f5267e3b7417594",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/52f95edc-cc03-4a9f-9bf8-74f641260073",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-3014",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T14:15:11.223",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in BeipyVideoResolution up to 2.6. Affected is an unknown function of the file admin/admincore.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-230358 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/BeipyVideoResolution/xss.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.230358",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.230358",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-3015",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T14:15:11.290",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in yiwent Vip Video Analysis 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file data/title.php. The manipulation of the argument titurl leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230359."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/VIP-video-analysis/SSRF.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.230359",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.230359",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-3016",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T14:15:11.353",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in yiwent Vip Video Analysis 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file admin/admincore.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230360."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/VIP-video-analysis/XSS.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.230360",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.230360",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-3017",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T15:15:09.627",
"lastModified": "2023-05-31T15:15:09.627",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been classified as problematic. This affects an unknown part of the file admin/?page=user/manage_user of the component Manage User Page. The manipulation of the argument First Name/Middle Name/Last Name leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230361 was assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.3
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.4,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://medium.com/@akashpandey380/lost-and-found-information-system-v1-0-html-injection-3596f2b856c0",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.230361",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.230361",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-3018",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T15:15:09.713",
"lastModified": "2023-05-31T15:15:09.713",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/?page=user/list. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230362 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://medium.com/@akashpandey380/lost-and-found-information-system-v1-0-idor-cve-2023-977966c4450d",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.230362",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.230362",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31240",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-05-22T20:15:10.633",
"lastModified": "2023-05-23T13:04:43.693",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T14:45:46.857",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -46,14 +66,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*",
"versionEndExcluding": "7.2.0",
"matchCriteriaId": "0F5719DE-ACD6-4044-BBF8-B00CE2E39AEF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-r.pdf",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31241",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-05-22T20:15:10.720",
"lastModified": "2023-05-23T13:04:39.657",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T14:59:11.060",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,10 +76,99 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*",
"versionEndExcluding": "7.3.0",
"matchCriteriaId": "415E3C3D-6B2F-4095-B7F1-E3F777E01172"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:control4:ca-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "910274AB-35AF-428C-84D7-36774DEB59D8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:control4:ca-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "852189C9-7720-468D-BCE0-28DFC051AEDC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:control4:ea-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C61FA2AE-A962-4D60-BBCF-751FDB5215B9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:control4:ea-3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6310809-0890-4113-837C-0074706B4E6B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:control4:ea-5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7ADAAF7-9B0B-4002-8158-FC6B0EAB6055"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:snapone:an-110-rt-2l1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5B50505-B496-4172-813E-CA174EE2D4DF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:snapone:an-110-rt-2l1w-wifi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04744281-B935-4272-8582-85C6162881F8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:snapone:an-310-rt-4l2w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD83E46-F84F-49F8-9601-ABC03292E0F6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5B44DFB-CC8D-4342-907B-D34F9EAB5CEB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:snapone:pakedge_rk-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2982D38-80BF-4041-9F59-D26C152D24D9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:snapone:pakedge_rt-3100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "061055F0-D742-4227-ADC2-1793979F9463"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:snapone:pakedge_wr-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7BD251-BB2F-4C49-8B1E-8EB26580DFDB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31245",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-05-22T20:15:10.807",
"lastModified": "2023-05-23T13:04:39.657",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T15:23:25.923",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -46,14 +66,106 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*",
"versionEndExcluding": "7.3.0",
"matchCriteriaId": "415E3C3D-6B2F-4095-B7F1-E3F777E01172"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:control4:ca-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "910274AB-35AF-428C-84D7-36774DEB59D8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:control4:ca-10:-:*:*:*:*:*:*:*",
"matchCriteriaId": "852189C9-7720-468D-BCE0-28DFC051AEDC"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:control4:ea-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C61FA2AE-A962-4D60-BBCF-751FDB5215B9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:control4:ea-3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B6310809-0890-4113-837C-0074706B4E6B"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:control4:ea-5:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7ADAAF7-9B0B-4002-8158-FC6B0EAB6055"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:snapone:an-110-rt-2l1w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B5B50505-B496-4172-813E-CA174EE2D4DF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:snapone:an-110-rt-2l1w-wifi:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04744281-B935-4272-8582-85C6162881F8"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:snapone:an-310-rt-4l2w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD83E46-F84F-49F8-9601-ABC03292E0F6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5B44DFB-CC8D-4342-907B-D34F9EAB5CEB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:snapone:pakedge_rk-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2982D38-80BF-4041-9F59-D26C152D24D9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:snapone:pakedge_rt-3100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "061055F0-D742-4227-ADC2-1793979F9463"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:snapone:pakedge_wr-1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7BD251-BB2F-4C49-8B1E-8EB26580DFDB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-31548",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T14:15:10.187",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "A stored Cross-site scripting (XSS) vulnerability in the FundRaiserEditor.php component of ChurchCRM v4.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-31548",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34218",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-05-31T14:15:10.230",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2023.05 bypass of permission checks allowing to perform admin actions was possible"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34219",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-05-31T14:15:10.300",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2023.05 improper permission checks allowed users without appropriate permissions to edit Build Configuration settings via REST API"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34220",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-05-31T14:15:10.367",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2023.05 stored XSS in the Commit Status Publisher window was possible"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34221",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-05-31T14:15:10.427",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2023.05 stored XSS in the Show Connection page was possible"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34222",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-05-31T14:15:10.487",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2023.05 possible XSS in the Plugin Vendor URL was possible"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34223",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-05-31T14:15:10.557",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2023.05 parameters of the \"password\" type from build dependencies could be logged in some cases"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34224",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-05-31T14:15:10.630",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2023.05 open redirect during oAuth configuration was possible"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34225",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-05-31T14:15:10.697",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2023.05 stored XSS in the NuGet feed page was possible"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34226",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-05-31T14:15:10.763",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2023.05 reflected XSS in the Subscriptions page was possible"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34227",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-05-31T14:15:10.823",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2023.05 a specific endpoint was vulnerable to brute force attacks"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-749"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34228",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-05-31T14:15:10.887",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2023.05 authentication checks were missing \u2013 2FA was not checked for some sensitive account actions"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-308"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
}
]
}

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2023-34229",
"sourceIdentifier": "security@jetbrains.com",
"published": "2023-05-31T14:15:10.957",
"lastModified": "2023-05-31T14:22:04.583",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "In JetBrains TeamCity before 2023.05 stored XSS in GitLab Connection page was possible"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@jetbrains.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@jetbrains.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.jetbrains.com/privacy-security/issues-fixed/",
"source": "security@jetbrains.com"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-31T14:00:27.749582+00:00
2023-05-31T16:00:27.551754+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-31T13:59:37.380000+00:00
2023-05-31T15:57:37.190000+00:00
```
### Last Data Feed Release
@ -29,55 +29,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
216498
216520
```
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `22`
* [CVE-2023-30285](CVE-2023/CVE-2023-302xx/CVE-2023-30285.json) (`2023-05-31T12:15:09.410`)
* [CVE-2023-3007](CVE-2023/CVE-2023-30xx/CVE-2023-3007.json) (`2023-05-31T12:15:09.550`)
* [CVE-2023-3008](CVE-2023/CVE-2023-30xx/CVE-2023-3008.json) (`2023-05-31T12:15:09.640`)
* [CVE-2023-33485](CVE-2023/CVE-2023-334xx/CVE-2023-33485.json) (`2023-05-31T13:15:09.637`)
* [CVE-2023-33486](CVE-2023/CVE-2023-334xx/CVE-2023-33486.json) (`2023-05-31T13:15:09.697`)
* [CVE-2023-33487](CVE-2023/CVE-2023-334xx/CVE-2023-33487.json) (`2023-05-31T13:15:09.753`)
* [CVE-2023-33507](CVE-2023/CVE-2023-335xx/CVE-2023-33507.json) (`2023-05-31T13:15:09.880`)
* [CVE-2023-33508](CVE-2023/CVE-2023-335xx/CVE-2023-33508.json) (`2023-05-31T13:15:09.960`)
* [CVE-2023-33509](CVE-2023/CVE-2023-335xx/CVE-2023-33509.json) (`2023-05-31T13:15:10.220`)
* [CVE-2023-33736](CVE-2023/CVE-2023-337xx/CVE-2023-33736.json) (`2023-05-31T13:15:10.270`)
* [CVE-2023-3009](CVE-2023/CVE-2023-30xx/CVE-2023-3009.json) (`2023-05-31T13:15:10.367`)
* [CVE-2023-26842](CVE-2023/CVE-2023-268xx/CVE-2023-26842.json) (`2023-05-31T14:15:10.067`)
* [CVE-2023-31548](CVE-2023/CVE-2023-315xx/CVE-2023-31548.json) (`2023-05-31T14:15:10.187`)
* [CVE-2023-34218](CVE-2023/CVE-2023-342xx/CVE-2023-34218.json) (`2023-05-31T14:15:10.230`)
* [CVE-2023-34219](CVE-2023/CVE-2023-342xx/CVE-2023-34219.json) (`2023-05-31T14:15:10.300`)
* [CVE-2023-34220](CVE-2023/CVE-2023-342xx/CVE-2023-34220.json) (`2023-05-31T14:15:10.367`)
* [CVE-2023-34221](CVE-2023/CVE-2023-342xx/CVE-2023-34221.json) (`2023-05-31T14:15:10.427`)
* [CVE-2023-34222](CVE-2023/CVE-2023-342xx/CVE-2023-34222.json) (`2023-05-31T14:15:10.487`)
* [CVE-2023-34223](CVE-2023/CVE-2023-342xx/CVE-2023-34223.json) (`2023-05-31T14:15:10.557`)
* [CVE-2023-34224](CVE-2023/CVE-2023-342xx/CVE-2023-34224.json) (`2023-05-31T14:15:10.630`)
* [CVE-2023-34225](CVE-2023/CVE-2023-342xx/CVE-2023-34225.json) (`2023-05-31T14:15:10.697`)
* [CVE-2023-34226](CVE-2023/CVE-2023-342xx/CVE-2023-34226.json) (`2023-05-31T14:15:10.763`)
* [CVE-2023-34227](CVE-2023/CVE-2023-342xx/CVE-2023-34227.json) (`2023-05-31T14:15:10.823`)
* [CVE-2023-34228](CVE-2023/CVE-2023-342xx/CVE-2023-34228.json) (`2023-05-31T14:15:10.887`)
* [CVE-2023-34229](CVE-2023/CVE-2023-342xx/CVE-2023-34229.json) (`2023-05-31T14:15:10.957`)
* [CVE-2023-3012](CVE-2023/CVE-2023-30xx/CVE-2023-3012.json) (`2023-05-31T14:15:11.097`)
* [CVE-2023-3013](CVE-2023/CVE-2023-30xx/CVE-2023-3013.json) (`2023-05-31T14:15:11.157`)
* [CVE-2023-3014](CVE-2023/CVE-2023-30xx/CVE-2023-3014.json) (`2023-05-31T14:15:11.223`)
* [CVE-2023-3015](CVE-2023/CVE-2023-30xx/CVE-2023-3015.json) (`2023-05-31T14:15:11.290`)
* [CVE-2023-3016](CVE-2023/CVE-2023-30xx/CVE-2023-3016.json) (`2023-05-31T14:15:11.353`)
* [CVE-2023-2758](CVE-2023/CVE-2023-27xx/CVE-2023-2758.json) (`2023-05-31T15:15:09.473`)
* [CVE-2023-3017](CVE-2023/CVE-2023-30xx/CVE-2023-3017.json) (`2023-05-31T15:15:09.627`)
* [CVE-2023-3018](CVE-2023/CVE-2023-30xx/CVE-2023-3018.json) (`2023-05-31T15:15:09.713`)
### CVEs modified in the last Commit
Recently modified CVEs: `117`
Recently modified CVEs: `9`
* [CVE-2023-2435](CVE-2023/CVE-2023-24xx/CVE-2023-2435.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-2436](CVE-2023/CVE-2023-24xx/CVE-2023-2436.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-2545](CVE-2023/CVE-2023-25xx/CVE-2023-2545.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-2547](CVE-2023/CVE-2023-25xx/CVE-2023-2547.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-2549](CVE-2023/CVE-2023-25xx/CVE-2023-2549.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-2987](CVE-2023/CVE-2023-29xx/CVE-2023-2987.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-1661](CVE-2023/CVE-2023-16xx/CVE-2023-1661.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-2434](CVE-2023/CVE-2023-24xx/CVE-2023-2434.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-2836](CVE-2023/CVE-2023-28xx/CVE-2023-2836.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-25539](CVE-2023/CVE-2023-255xx/CVE-2023-25539.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-26131](CVE-2023/CVE-2023-261xx/CVE-2023-26131.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-2304](CVE-2023/CVE-2023-23xx/CVE-2023-2304.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-2749](CVE-2023/CVE-2023-27xx/CVE-2023-2749.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-3003](CVE-2023/CVE-2023-30xx/CVE-2023-3003.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-3004](CVE-2023/CVE-2023-30xx/CVE-2023-3004.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-3005](CVE-2023/CVE-2023-30xx/CVE-2023-3005.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-2909](CVE-2023/CVE-2023-29xx/CVE-2023-2909.json) (`2023-05-31T13:02:26.480`)
* [CVE-2023-31779](CVE-2023/CVE-2023-317xx/CVE-2023-31779.json) (`2023-05-31T13:38:31.893`)
* [CVE-2023-2854](CVE-2023/CVE-2023-28xx/CVE-2023-2854.json) (`2023-05-31T13:46:36.100`)
* [CVE-2023-2855](CVE-2023/CVE-2023-28xx/CVE-2023-2855.json) (`2023-05-31T13:46:47.347`)
* [CVE-2023-2858](CVE-2023/CVE-2023-28xx/CVE-2023-2858.json) (`2023-05-31T13:47:28.550`)
* [CVE-2023-2857](CVE-2023/CVE-2023-28xx/CVE-2023-2857.json) (`2023-05-31T13:47:35.877`)
* [CVE-2023-31098](CVE-2023/CVE-2023-310xx/CVE-2023-31098.json) (`2023-05-31T13:55:07.513`)
* [CVE-2023-33751](CVE-2023/CVE-2023-337xx/CVE-2023-33751.json) (`2023-05-31T13:58:58.493`)
* [CVE-2023-33750](CVE-2023/CVE-2023-337xx/CVE-2023-33750.json) (`2023-05-31T13:59:37.380`)
* [CVE-2022-47311](CVE-2022/CVE-2022-473xx/CVE-2022-47311.json) (`2023-05-31T15:57:37.190`)
* [CVE-2023-2505](CVE-2023/CVE-2023-25xx/CVE-2023-2505.json) (`2023-05-31T14:01:22.207`)
* [CVE-2023-2629](CVE-2023/CVE-2023-26xx/CVE-2023-2629.json) (`2023-05-31T14:02:09.597`)
* [CVE-2023-2504](CVE-2023/CVE-2023-25xx/CVE-2023-2504.json) (`2023-05-31T14:07:28.177`)
* [CVE-2023-2863](CVE-2023/CVE-2023-28xx/CVE-2023-2863.json) (`2023-05-31T14:27:53.370`)
* [CVE-2023-31240](CVE-2023/CVE-2023-312xx/CVE-2023-31240.json) (`2023-05-31T14:45:46.857`)
* [CVE-2023-31241](CVE-2023/CVE-2023-312xx/CVE-2023-31241.json) (`2023-05-31T14:59:11.060`)
* [CVE-2023-31245](CVE-2023/CVE-2023-312xx/CVE-2023-31245.json) (`2023-05-31T15:23:25.923`)
* [CVE-2023-25183](CVE-2023/CVE-2023-251xx/CVE-2023-25183.json) (`2023-05-31T15:31:11.450`)
## Download and Usage