diff --git a/CVE-2022/CVE-2022-473xx/CVE-2022-47311.json b/CVE-2022/CVE-2022-473xx/CVE-2022-47311.json index 59546280fc5..091d94929c5 100644 --- a/CVE-2022/CVE-2022-473xx/CVE-2022-47311.json +++ b/CVE-2022/CVE-2022-473xx/CVE-2022-47311.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47311", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T23:15:09.423", - "lastModified": "2023-05-23T13:04:39.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T15:57:37.190", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,14 +66,640 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "05060302-F6DE-4EAF-9356-8CD785ABDE7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "936B8451-A674-49D7-91EC-A03599A6D6AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "6D2071B9-BF2C-4A12-BA35-32BB59E210DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1469E464-6784-4B0B-9895-79BA5A1A1CB8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "166422E2-0734-4F7E-B2FE-0EB461AFDD32" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82C1859A-0D39-4D69-B89F-E6AB92D71A38" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "80159239-E373-4399-AF14-5FC3B1F7BFBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A017B904-A3C4-4070-96F7-9679FD2383C9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "7FCCC5B8-ED6E-4FCA-BA07-4D2AA1D26F50" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23BC31CA-2061-4141-8600-EF4A9AE7DD2A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "D43D904E-6B72-44B4-A158-D6A7C30504A3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1A43409-AF18-4BD5-A0D4-D27CDD6ABBE6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "AB35A114-99E7-44C6-B53B-B293AA9D9815" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56E2CAAD-8A4D-4F1A-AEF0-034C02965935" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "C37DFE8A-F733-48D3-8BF6-ECC98A476C54" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACA11FBB-1B4C-4F66-89EF-2D91C0161C4C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n15_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "DAD2CA81-44E6-4499-9F5C-502F060A3B8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58CE9F4A-74BD-4AFC-B019-5D750E2D1E16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "6E012434-72F0-4BD6-ACA4-DF7E12FB9033" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B64FEC33-D6D9-4F4C-BE43-31D637E6B01F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "F08FCBA2-94B8-44F9-921F-0CDD03D7903A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B1D3E7F-9C2F-48F8-BF49-539570A0986A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2n20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "3577400F-ADC8-4EBF-AFEE-DE165391BE12" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2n20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DFC4885-AF94-471E-AE4E-DD26A6A91667" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "02EF4F49-FCB7-44C8-BC83-8A3519807338" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12B9705B-B21D-450B-A62B-933DC81A19E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "B170FD2A-0422-4778-812F-EBCDF19A1253" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B786B2F4-6586-4E05-BDE9-DFDBA7BD3739" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "2CC4192B-D9F4-4886-BDDE-5859A89B6221" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEBA453E-67D9-4760-89A6-6CF8C632C6A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "A64CD7F9-D8BB-4717-90B5-FBFE01B00CB5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5042C3C1-3964-437B-98C1-0458F73B7197" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8sa-c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "AB49899D-165E-4B57-A3F5-D6ADDD138E12" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8sa-c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBD2B738-620D-42F8-881C-A6B293B724BA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "E032CC0E-0E19-490A-B3A2-5BA82DA52FC0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1C46D12-6699-4BAC-AC47-7B150AECAF9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4sa-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "CE9621CA-4AC7-4BA5-940D-E76E795502A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4sa-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1139B205-02DA-4155-897C-F5D4191686A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu4a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "BC0AB74D-DFDD-4B8F-9AFB-158E8C09A6F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu4a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C10BFD7F-0EDC-4CA0-9BEE-2CD0C83CAA05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-2c10_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "EF765E11-57A1-444F-840B-321944679F4B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-2c10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "518EE433-9E08-40FE-90F7-48E8AC934743" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dataprobe:iboot-pdu8a-c20_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.42.06162022", + "matchCriteriaId": "D4AD7C27-EFF5-4302-9B7F-0AFF190F1893" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dataprobe:iboot-pdu8a-c20:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1522EB30-AB31-47E3-B2EB-90CE231C284B" + } + ] + } + ] + } + ], "references": [ { "url": "https://dataprobe.com/support/iboot-pdu/local_upgrade_pdu_procedure.pdf", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Product" + ] }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-263-03", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Patch", + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25183.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25183.json index 10150949adc..77af4780198 100644 --- a/CVE-2023/CVE-2023-251xx/CVE-2023-25183.json +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25183.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25183", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T21:15:13.633", - "lastModified": "2023-05-23T13:04:39.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T15:31:11.450", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "ics-cert@hq.dhs.gov", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,14 +76,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*", + "versionEndExcluding": "7.3.0", + "matchCriteriaId": "415E3C3D-6B2F-4095-B7F1-E3F777E01172" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5B44DFB-CC8D-4342-907B-D34F9EAB5CEB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] }, { "url": "https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-r.pdf", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2504.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2504.json index 3d37083df7c..5b47fec2612 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2504.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2504.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2504", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T22:15:10.277", - "lastModified": "2023-05-23T13:04:39.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T14:07:28.177", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,14 +66,136 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:birddog:a300_firmware:3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "D819BA91-D975-418C-A6BD-5CD06E543541" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:birddog:a300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5473E936-1D6A-49D2-AF43-1F4CFBF5480D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:birddog:mini_firmware:2.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "DF87B2F2-CFD3-4269-A4CF-FAD8A4B531DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:birddog:mini:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6A930E2-D903-4E40-8346-2829BAFC9999" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:birddog:4k_quad_firmware:4.5.181:*:*:*:*:*:*:*", + "matchCriteriaId": "34578ED0-FEBC-4FEE-893E-54FCF0269C92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:birddog:4k_quad_firmware:4.5.196:*:*:*:*:*:*:*", + "matchCriteriaId": "0D5B2472-6862-4ED3-A7AB-84F7E9847E46" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:birddog:4k_quad:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE7B5236-6A39-43C7-9EAD-30EB15CCFAE9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:birddog:studio_r3_firmware:3.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "4D3FB3C3-C2EB-41D1-9334-C25EC95FC045" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:birddog:studio_r3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "696D1E43-79CB-47A9-BA0A-87699EB4ACF0" + } + ] + } + ] + } + ], "references": [ { "url": "https://birddog.tv/downloads/", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Product" + ] }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-11", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2505.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2505.json index a072d2f741d..5c12f9360f7 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2505.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2505.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2505", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T22:15:10.350", - "lastModified": "2023-05-23T13:04:39.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T14:01:22.207", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,14 +66,136 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:birddog:a300_firmware:3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "D819BA91-D975-418C-A6BD-5CD06E543541" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:birddog:a300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5473E936-1D6A-49D2-AF43-1F4CFBF5480D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:birddog:mini_firmware:2.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "DF87B2F2-CFD3-4269-A4CF-FAD8A4B531DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:birddog:mini:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6A930E2-D903-4E40-8346-2829BAFC9999" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:birddog:4k_quad_firmware:4.5.181:*:*:*:*:*:*:*", + "matchCriteriaId": "34578ED0-FEBC-4FEE-893E-54FCF0269C92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:birddog:4k_quad_firmware:4.5.196:*:*:*:*:*:*:*", + "matchCriteriaId": "0D5B2472-6862-4ED3-A7AB-84F7E9847E46" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:birddog:4k_quad:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE7B5236-6A39-43C7-9EAD-30EB15CCFAE9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:birddog:studio_r3_firmware:3.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "4D3FB3C3-C2EB-41D1-9334-C25EC95FC045" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:birddog:studio_r3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "696D1E43-79CB-47A9-BA0A-87699EB4ACF0" + } + ] + } + ] + } + ], "references": [ { "url": "https://birddog.tv/downloads/", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Product" + ] }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-11", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26842.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26842.json new file mode 100644 index 00000000000..c524f6bad45 --- /dev/null +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26842.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-26842", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-31T14:15:10.067", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A stored Cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the OptionManager.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26842", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2629.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2629.json index 206d6cb497d..8645bd55504 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2629.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2629.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2629", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-10T16:15:10.660", - "lastModified": "2023-05-17T17:15:23.327", + "lastModified": "2023-05-31T14:02:09.597", "vulnStatus": "Analyzed", "descriptions": [ { @@ -77,9 +77,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:pimcore:customer-data-framework:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:pimcore:customer_management_framework:*:*:*:*:*:pimcore:*:*", "versionEndExcluding": "3.3.9", - "matchCriteriaId": "E0297967-D5F3-423C-B673-60697D285E62" + "matchCriteriaId": "11F1B8A1-060A-495D-81D3-46BF6E471CFB" } ] } diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2758.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2758.json new file mode 100644 index 00000000000..019d8df7e13 --- /dev/null +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2758.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-2758", + "sourceIdentifier": "vulnreport@tenable.com", + "published": "2023-05-31T15:15:09.473", + "lastModified": "2023-05-31T15:15:09.473", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A denial of service vulnerability exists in Contec CONPROSYS HMI System versions 3.5.2 and prior. When there is a time-zone mismatch in certain configuration files, a remote, unauthenticated attacker may deny logins for an extended period of time." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "vulnreport@tenable.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "vulnreport@tenable.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-799" + } + ] + } + ], + "references": [ + { + "url": "https://jvn.jp/en/vu/JVNVU93372935/index.html", + "source": "vulnreport@tenable.com" + }, + { + "url": "https://www.tenable.com/security/research/tra-2023-21", + "source": "vulnreport@tenable.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2863.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2863.json index 50e84d25774..bbc191bad95 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2863.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2863.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2863", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-24T10:15:09.407", - "lastModified": "2023-05-24T12:59:09.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T14:27:53.370", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -61,8 +83,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -71,18 +103,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:simpledesign:diary_with_lock\\:_daily_journal:1.012.gp.b:*:*:*:*:android:*:*", + "matchCriteriaId": "89AC64D2-461C-47A9-B983-B018F0F50F38" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.229819", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.229819", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.youtube.com/watch?v=V0u9C5RVSic", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3012.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3012.json new file mode 100644 index 00000000000..28df69b726f --- /dev/null +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3012.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-3012", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-05-31T14:15:11.097", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "NULL Pointer Dereference in GitHub repository gpac/gpac prior to 2.2.2." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gpac/gpac/commit/53387aa86c1af1228d0fa57c67f9c7330716d5a7", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/916b787a-c603-409d-afc6-25bb02070e69", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3013.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3013.json new file mode 100644 index 00000000000..3539241d36a --- /dev/null +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3013.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-3013", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-05-31T14:15:11.157", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Unchecked Return Value in GitHub repository gpac/gpac prior to 2.2.2." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-252" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gpac/gpac/commit/78e539b43293829a14a32e821f5267e3b7417594", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/52f95edc-cc03-4a9f-9bf8-74f641260073", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3014.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3014.json new file mode 100644 index 00000000000..5501d7921c6 --- /dev/null +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3014.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-3014", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-05-31T14:15:11.223", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in BeipyVideoResolution up to 2.6. Affected is an unknown function of the file admin/admincore.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-230358 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/BeipyVideoResolution/xss.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.230358", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.230358", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3015.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3015.json new file mode 100644 index 00000000000..849f20b672f --- /dev/null +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3015.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-3015", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-05-31T14:15:11.290", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in yiwent Vip Video Analysis 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file data/title.php. The manipulation of the argument titurl leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230359." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/VIP-video-analysis/SSRF.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.230359", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.230359", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3016.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3016.json new file mode 100644 index 00000000000..4336ddf9798 --- /dev/null +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3016.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-3016", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-05-31T14:15:11.353", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in yiwent Vip Video Analysis 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file admin/admincore.php. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-230360." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/VIP-video-analysis/XSS.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.230360", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.230360", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3017.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3017.json new file mode 100644 index 00000000000..fdf45f54921 --- /dev/null +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3017.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-3017", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-05-31T15:15:09.627", + "lastModified": "2023-05-31T15:15:09.627", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been classified as problematic. This affects an unknown part of the file admin/?page=user/manage_user of the component Manage User Page. The manipulation of the argument First Name/Middle Name/Last Name leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230361 was assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 3.3 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://medium.com/@akashpandey380/lost-and-found-information-system-v1-0-html-injection-3596f2b856c0", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.230361", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.230361", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3018.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3018.json new file mode 100644 index 00000000000..b0b52369ccb --- /dev/null +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3018.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-3018", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-05-31T15:15:09.713", + "lastModified": "2023-05-31T15:15:09.713", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /admin/?page=user/list. The manipulation leads to improper access controls. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-230362 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://medium.com/@akashpandey380/lost-and-found-information-system-v1-0-idor-cve-2023-977966c4450d", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.230362", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.230362", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31240.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31240.json index acaaa93eaae..c86790fad75 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31240.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31240.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31240", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T20:15:10.633", - "lastModified": "2023-05-23T13:04:43.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T14:45:46.857", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,14 +66,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*", + "versionEndExcluding": "7.2.0", + "matchCriteriaId": "0F5719DE-ACD6-4044-BBF8-B00CE2E39AEF" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] }, { "url": "https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-r.pdf", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31241.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31241.json index 96edc54641e..0cf130e944e 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31241.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31241.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31241", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T20:15:10.720", - "lastModified": "2023-05-23T13:04:39.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T14:59:11.060", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "ics-cert@hq.dhs.gov", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +76,99 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*", + "versionEndExcluding": "7.3.0", + "matchCriteriaId": "415E3C3D-6B2F-4095-B7F1-E3F777E01172" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:control4:ca-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "910274AB-35AF-428C-84D7-36774DEB59D8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:control4:ca-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "852189C9-7720-468D-BCE0-28DFC051AEDC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:control4:ea-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C61FA2AE-A962-4D60-BBCF-751FDB5215B9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:control4:ea-3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6310809-0890-4113-837C-0074706B4E6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:control4:ea-5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7ADAAF7-9B0B-4002-8158-FC6B0EAB6055" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:snapone:an-110-rt-2l1w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5B50505-B496-4172-813E-CA174EE2D4DF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:snapone:an-110-rt-2l1w-wifi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04744281-B935-4272-8582-85C6162881F8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:snapone:an-310-rt-4l2w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCD83E46-F84F-49F8-9601-ABC03292E0F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5B44DFB-CC8D-4342-907B-D34F9EAB5CEB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:snapone:pakedge_rk-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2982D38-80BF-4041-9F59-D26C152D24D9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:snapone:pakedge_rt-3100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "061055F0-D742-4227-ADC2-1793979F9463" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:snapone:pakedge_wr-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF7BD251-BB2F-4C49-8B1E-8EB26580DFDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31245.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31245.json index ea67d099046..709e29d5622 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31245.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31245.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31245", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-05-22T20:15:10.807", - "lastModified": "2023-05-23T13:04:39.657", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T15:23:25.923", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,14 +66,106 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*", + "versionEndExcluding": "7.3.0", + "matchCriteriaId": "415E3C3D-6B2F-4095-B7F1-E3F777E01172" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:control4:ca-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "910274AB-35AF-428C-84D7-36774DEB59D8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:control4:ca-10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "852189C9-7720-468D-BCE0-28DFC051AEDC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:control4:ea-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C61FA2AE-A962-4D60-BBCF-751FDB5215B9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:control4:ea-3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6310809-0890-4113-837C-0074706B4E6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:control4:ea-5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7ADAAF7-9B0B-4002-8158-FC6B0EAB6055" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:snapone:an-110-rt-2l1w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5B50505-B496-4172-813E-CA174EE2D4DF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:snapone:an-110-rt-2l1w-wifi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04744281-B935-4272-8582-85C6162881F8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:snapone:an-310-rt-4l2w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCD83E46-F84F-49F8-9601-ABC03292E0F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5B44DFB-CC8D-4342-907B-D34F9EAB5CEB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:snapone:pakedge_rk-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2982D38-80BF-4041-9F59-D26C152D24D9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:snapone:pakedge_rt-3100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "061055F0-D742-4227-ADC2-1793979F9463" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:snapone:pakedge_wr-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF7BD251-BB2F-4C49-8B1E-8EB26580DFDB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] }, { "url": "https://www.control4.com/docs/product/ovrc-software/release-notes/english/latest/ovrc-software-release-notes-rev-p.pdf", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31548.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31548.json new file mode 100644 index 00000000000..b87aee606f1 --- /dev/null +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31548.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-31548", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-31T14:15:10.187", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A stored Cross-site scripting (XSS) vulnerability in the FundRaiserEditor.php component of ChurchCRM v4.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-31548", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34218.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34218.json new file mode 100644 index 00000000000..b7287155838 --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34218.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34218", + "sourceIdentifier": "security@jetbrains.com", + "published": "2023-05-31T14:15:10.230", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2023.05 bypass of permission checks allowing to perform admin actions was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "security@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34219.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34219.json new file mode 100644 index 00000000000..c29acdfc286 --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34219.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34219", + "sourceIdentifier": "security@jetbrains.com", + "published": "2023-05-31T14:15:10.300", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2023.05 improper permission checks allowed users without appropriate permissions to edit Build Configuration settings via REST API" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "security@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34220.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34220.json new file mode 100644 index 00000000000..14b689f616e --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34220.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34220", + "sourceIdentifier": "security@jetbrains.com", + "published": "2023-05-31T14:15:10.367", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2023.05 stored XSS in the Commit Status Publisher window was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "security@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34221.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34221.json new file mode 100644 index 00000000000..fb8cd70b47c --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34221.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34221", + "sourceIdentifier": "security@jetbrains.com", + "published": "2023-05-31T14:15:10.427", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2023.05 stored XSS in the Show Connection page was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "security@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34222.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34222.json new file mode 100644 index 00000000000..7f3d0af7629 --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34222.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34222", + "sourceIdentifier": "security@jetbrains.com", + "published": "2023-05-31T14:15:10.487", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2023.05 possible XSS in the Plugin Vendor URL was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "security@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34223.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34223.json new file mode 100644 index 00000000000..1eba3a62a94 --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34223.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34223", + "sourceIdentifier": "security@jetbrains.com", + "published": "2023-05-31T14:15:10.557", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2023.05 parameters of the \"password\" type from build dependencies could be logged in some cases" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "security@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34224.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34224.json new file mode 100644 index 00000000000..d63ed87c786 --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34224.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34224", + "sourceIdentifier": "security@jetbrains.com", + "published": "2023-05-31T14:15:10.630", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2023.05 open redirect during oAuth configuration was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "security@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34225.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34225.json new file mode 100644 index 00000000000..ab05e3ae877 --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34225.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34225", + "sourceIdentifier": "security@jetbrains.com", + "published": "2023-05-31T14:15:10.697", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2023.05 stored XSS in the NuGet feed page was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "security@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34226.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34226.json new file mode 100644 index 00000000000..3227b609dce --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34226.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34226", + "sourceIdentifier": "security@jetbrains.com", + "published": "2023-05-31T14:15:10.763", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2023.05 reflected XSS in the Subscriptions page was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "security@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34227.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34227.json new file mode 100644 index 00000000000..ee907a6dc07 --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34227.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34227", + "sourceIdentifier": "security@jetbrains.com", + "published": "2023-05-31T14:15:10.823", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2023.05 a specific endpoint was vulnerable to brute force attacks" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-749" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "security@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34228.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34228.json new file mode 100644 index 00000000000..58173df64e0 --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34228.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34228", + "sourceIdentifier": "security@jetbrains.com", + "published": "2023-05-31T14:15:10.887", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2023.05 authentication checks were missing \u2013 2FA was not checked for some sensitive account actions" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-308" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "security@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-342xx/CVE-2023-34229.json b/CVE-2023/CVE-2023-342xx/CVE-2023-34229.json new file mode 100644 index 00000000000..39b941b4068 --- /dev/null +++ b/CVE-2023/CVE-2023-342xx/CVE-2023-34229.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34229", + "sourceIdentifier": "security@jetbrains.com", + "published": "2023-05-31T14:15:10.957", + "lastModified": "2023-05-31T14:22:04.583", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains TeamCity before 2023.05 stored XSS in GitLab Connection page was possible" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "security@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0d3d3df16c3..6fb20662483 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-31T14:00:27.749582+00:00 +2023-05-31T16:00:27.551754+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-31T13:59:37.380000+00:00 +2023-05-31T15:57:37.190000+00:00 ``` ### Last Data Feed Release @@ -29,55 +29,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -216498 +216520 ``` ### CVEs added in the last Commit -Recently added CVEs: `11` +Recently added CVEs: `22` -* [CVE-2023-30285](CVE-2023/CVE-2023-302xx/CVE-2023-30285.json) (`2023-05-31T12:15:09.410`) -* [CVE-2023-3007](CVE-2023/CVE-2023-30xx/CVE-2023-3007.json) (`2023-05-31T12:15:09.550`) -* [CVE-2023-3008](CVE-2023/CVE-2023-30xx/CVE-2023-3008.json) (`2023-05-31T12:15:09.640`) -* [CVE-2023-33485](CVE-2023/CVE-2023-334xx/CVE-2023-33485.json) (`2023-05-31T13:15:09.637`) -* [CVE-2023-33486](CVE-2023/CVE-2023-334xx/CVE-2023-33486.json) (`2023-05-31T13:15:09.697`) -* [CVE-2023-33487](CVE-2023/CVE-2023-334xx/CVE-2023-33487.json) (`2023-05-31T13:15:09.753`) -* [CVE-2023-33507](CVE-2023/CVE-2023-335xx/CVE-2023-33507.json) (`2023-05-31T13:15:09.880`) -* [CVE-2023-33508](CVE-2023/CVE-2023-335xx/CVE-2023-33508.json) (`2023-05-31T13:15:09.960`) -* [CVE-2023-33509](CVE-2023/CVE-2023-335xx/CVE-2023-33509.json) (`2023-05-31T13:15:10.220`) -* [CVE-2023-33736](CVE-2023/CVE-2023-337xx/CVE-2023-33736.json) (`2023-05-31T13:15:10.270`) -* [CVE-2023-3009](CVE-2023/CVE-2023-30xx/CVE-2023-3009.json) (`2023-05-31T13:15:10.367`) +* [CVE-2023-26842](CVE-2023/CVE-2023-268xx/CVE-2023-26842.json) (`2023-05-31T14:15:10.067`) +* [CVE-2023-31548](CVE-2023/CVE-2023-315xx/CVE-2023-31548.json) (`2023-05-31T14:15:10.187`) +* [CVE-2023-34218](CVE-2023/CVE-2023-342xx/CVE-2023-34218.json) (`2023-05-31T14:15:10.230`) +* [CVE-2023-34219](CVE-2023/CVE-2023-342xx/CVE-2023-34219.json) (`2023-05-31T14:15:10.300`) +* [CVE-2023-34220](CVE-2023/CVE-2023-342xx/CVE-2023-34220.json) (`2023-05-31T14:15:10.367`) +* [CVE-2023-34221](CVE-2023/CVE-2023-342xx/CVE-2023-34221.json) (`2023-05-31T14:15:10.427`) +* [CVE-2023-34222](CVE-2023/CVE-2023-342xx/CVE-2023-34222.json) (`2023-05-31T14:15:10.487`) +* [CVE-2023-34223](CVE-2023/CVE-2023-342xx/CVE-2023-34223.json) (`2023-05-31T14:15:10.557`) +* [CVE-2023-34224](CVE-2023/CVE-2023-342xx/CVE-2023-34224.json) (`2023-05-31T14:15:10.630`) +* [CVE-2023-34225](CVE-2023/CVE-2023-342xx/CVE-2023-34225.json) (`2023-05-31T14:15:10.697`) +* [CVE-2023-34226](CVE-2023/CVE-2023-342xx/CVE-2023-34226.json) (`2023-05-31T14:15:10.763`) +* [CVE-2023-34227](CVE-2023/CVE-2023-342xx/CVE-2023-34227.json) (`2023-05-31T14:15:10.823`) +* [CVE-2023-34228](CVE-2023/CVE-2023-342xx/CVE-2023-34228.json) (`2023-05-31T14:15:10.887`) +* [CVE-2023-34229](CVE-2023/CVE-2023-342xx/CVE-2023-34229.json) (`2023-05-31T14:15:10.957`) +* [CVE-2023-3012](CVE-2023/CVE-2023-30xx/CVE-2023-3012.json) (`2023-05-31T14:15:11.097`) +* [CVE-2023-3013](CVE-2023/CVE-2023-30xx/CVE-2023-3013.json) (`2023-05-31T14:15:11.157`) +* [CVE-2023-3014](CVE-2023/CVE-2023-30xx/CVE-2023-3014.json) (`2023-05-31T14:15:11.223`) +* [CVE-2023-3015](CVE-2023/CVE-2023-30xx/CVE-2023-3015.json) (`2023-05-31T14:15:11.290`) +* [CVE-2023-3016](CVE-2023/CVE-2023-30xx/CVE-2023-3016.json) (`2023-05-31T14:15:11.353`) +* [CVE-2023-2758](CVE-2023/CVE-2023-27xx/CVE-2023-2758.json) (`2023-05-31T15:15:09.473`) +* [CVE-2023-3017](CVE-2023/CVE-2023-30xx/CVE-2023-3017.json) (`2023-05-31T15:15:09.627`) +* [CVE-2023-3018](CVE-2023/CVE-2023-30xx/CVE-2023-3018.json) (`2023-05-31T15:15:09.713`) ### CVEs modified in the last Commit -Recently modified CVEs: `117` +Recently modified CVEs: `9` -* [CVE-2023-2435](CVE-2023/CVE-2023-24xx/CVE-2023-2435.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-2436](CVE-2023/CVE-2023-24xx/CVE-2023-2436.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-2545](CVE-2023/CVE-2023-25xx/CVE-2023-2545.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-2547](CVE-2023/CVE-2023-25xx/CVE-2023-2547.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-2549](CVE-2023/CVE-2023-25xx/CVE-2023-2549.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-2987](CVE-2023/CVE-2023-29xx/CVE-2023-2987.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-1661](CVE-2023/CVE-2023-16xx/CVE-2023-1661.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-2434](CVE-2023/CVE-2023-24xx/CVE-2023-2434.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-2836](CVE-2023/CVE-2023-28xx/CVE-2023-2836.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-25539](CVE-2023/CVE-2023-255xx/CVE-2023-25539.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-26131](CVE-2023/CVE-2023-261xx/CVE-2023-26131.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-2304](CVE-2023/CVE-2023-23xx/CVE-2023-2304.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-2749](CVE-2023/CVE-2023-27xx/CVE-2023-2749.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-3003](CVE-2023/CVE-2023-30xx/CVE-2023-3003.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-3004](CVE-2023/CVE-2023-30xx/CVE-2023-3004.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-3005](CVE-2023/CVE-2023-30xx/CVE-2023-3005.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-2909](CVE-2023/CVE-2023-29xx/CVE-2023-2909.json) (`2023-05-31T13:02:26.480`) -* [CVE-2023-31779](CVE-2023/CVE-2023-317xx/CVE-2023-31779.json) (`2023-05-31T13:38:31.893`) -* [CVE-2023-2854](CVE-2023/CVE-2023-28xx/CVE-2023-2854.json) (`2023-05-31T13:46:36.100`) -* [CVE-2023-2855](CVE-2023/CVE-2023-28xx/CVE-2023-2855.json) (`2023-05-31T13:46:47.347`) -* [CVE-2023-2858](CVE-2023/CVE-2023-28xx/CVE-2023-2858.json) (`2023-05-31T13:47:28.550`) -* [CVE-2023-2857](CVE-2023/CVE-2023-28xx/CVE-2023-2857.json) (`2023-05-31T13:47:35.877`) -* [CVE-2023-31098](CVE-2023/CVE-2023-310xx/CVE-2023-31098.json) (`2023-05-31T13:55:07.513`) -* [CVE-2023-33751](CVE-2023/CVE-2023-337xx/CVE-2023-33751.json) (`2023-05-31T13:58:58.493`) -* [CVE-2023-33750](CVE-2023/CVE-2023-337xx/CVE-2023-33750.json) (`2023-05-31T13:59:37.380`) +* [CVE-2022-47311](CVE-2022/CVE-2022-473xx/CVE-2022-47311.json) (`2023-05-31T15:57:37.190`) +* [CVE-2023-2505](CVE-2023/CVE-2023-25xx/CVE-2023-2505.json) (`2023-05-31T14:01:22.207`) +* [CVE-2023-2629](CVE-2023/CVE-2023-26xx/CVE-2023-2629.json) (`2023-05-31T14:02:09.597`) +* [CVE-2023-2504](CVE-2023/CVE-2023-25xx/CVE-2023-2504.json) (`2023-05-31T14:07:28.177`) +* [CVE-2023-2863](CVE-2023/CVE-2023-28xx/CVE-2023-2863.json) (`2023-05-31T14:27:53.370`) +* [CVE-2023-31240](CVE-2023/CVE-2023-312xx/CVE-2023-31240.json) (`2023-05-31T14:45:46.857`) +* [CVE-2023-31241](CVE-2023/CVE-2023-312xx/CVE-2023-31241.json) (`2023-05-31T14:59:11.060`) +* [CVE-2023-31245](CVE-2023/CVE-2023-312xx/CVE-2023-31245.json) (`2023-05-31T15:23:25.923`) +* [CVE-2023-25183](CVE-2023/CVE-2023-251xx/CVE-2023-25183.json) (`2023-05-31T15:31:11.450`) ## Download and Usage