mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 11:37:26 +00:00
Auto-Update: 2023-05-02T14:00:24.246120+00:00
This commit is contained in:
parent
0533eea5b7
commit
35ea0652b6
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2013-10026",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-02T02:15:27.267",
|
||||
"lastModified": "2023-05-02T02:15:27.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2014-125100",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-02T02:15:27.423",
|
||||
"lastModified": "2023-05-02T02:15:27.423",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-25713",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-05-02T06:15:08.500",
|
||||
"lastModified": "2023-05-02T06:15:08.500",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-33273",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-05-02T08:15:08.763",
|
||||
"lastModified": "2023-05-02T08:15:08.763",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-33281",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-05-02T06:15:09.507",
|
||||
"lastModified": "2023-05-02T06:15:09.507",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-33292",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-05-02T06:15:09.757",
|
||||
"lastModified": "2023-05-02T06:15:09.757",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-33304",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-05-02T06:15:09.910",
|
||||
"lastModified": "2023-05-02T06:15:09.910",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-33305",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-05-02T06:15:09.997",
|
||||
"lastModified": "2023-05-02T06:15:09.997",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-34144",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-05-02T06:15:10.077",
|
||||
"lastModified": "2023-05-02T06:15:10.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-35898",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-01T20:15:14.463",
|
||||
"lastModified": "2023-05-01T20:15:14.463",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:26.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-40504",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-05-02T08:15:09.437",
|
||||
"lastModified": "2023-05-02T08:15:09.437",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-40505",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-05-02T06:15:10.173",
|
||||
"lastModified": "2023-05-02T06:15:10.173",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-40508",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-05-02T06:15:10.263",
|
||||
"lastModified": "2023-05-02T06:15:10.263",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48482",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T05:15:27.407",
|
||||
"lastModified": "2023-05-02T05:15:27.407",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48483",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T05:15:28.057",
|
||||
"lastModified": "2023-05-02T05:15:28.057",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0203",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2023-04-22T03:15:09.270",
|
||||
"lastModified": "2023-04-24T13:02:13.210",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-02T13:53:49.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.0
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:nvidia:connectx_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "35.1012",
|
||||
"matchCriteriaId": "22D68BAB-D2DD-4997-9881-15F3243A9D7B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:nvidia:connectx-5:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85FBF3A9-B6C3-4705-A2E1-2503E7A6725D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:nvidia:connectx-6:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8421C891-26D3-4845-A20A-80E4769D4E25"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:nvidia:connectx-6-dx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6BAADC39-548E-44E4-AD25-74A7CEBCC2EB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5459",
|
||||
"source": "psirt@nvidia.com"
|
||||
"source": "psirt@nvidia.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0204",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2023-04-22T03:15:09.330",
|
||||
"lastModified": "2023-04-24T13:02:13.210",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-02T13:56:56.390",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.0
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-755"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:nvidia:connectx_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "35.1012",
|
||||
"matchCriteriaId": "22D68BAB-D2DD-4997-9881-15F3243A9D7B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:nvidia:connectx-5:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85FBF3A9-B6C3-4705-A2E1-2503E7A6725D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:nvidia:connectx-6:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8421C891-26D3-4845-A20A-80E4769D4E25"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:nvidia:connectx-6-dx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6BAADC39-548E-44E4-AD25-74A7CEBCC2EB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5459",
|
||||
"source": "psirt@nvidia.com"
|
||||
"source": "psirt@nvidia.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0205",
|
||||
"sourceIdentifier": "psirt@nvidia.com",
|
||||
"published": "2023-04-22T03:15:09.387",
|
||||
"lastModified": "2023-04-24T13:02:13.210",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-02T13:58:32.890",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.0
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "psirt@nvidia.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +76,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:nvidia:connectx_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "35.1012",
|
||||
"matchCriteriaId": "22D68BAB-D2DD-4997-9881-15F3243A9D7B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:nvidia:connectx-5:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "85FBF3A9-B6C3-4705-A2E1-2503E7A6725D"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:nvidia:connectx-6:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8421C891-26D3-4845-A20A-80E4769D4E25"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:nvidia:connectx-6-dx:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6BAADC39-548E-44E4-AD25-74A7CEBCC2EB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5459",
|
||||
"source": "psirt@nvidia.com"
|
||||
"source": "psirt@nvidia.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0891",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:09.513",
|
||||
"lastModified": "2023-05-02T08:15:09.513",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0924",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:09.620",
|
||||
"lastModified": "2023-05-02T08:15:09.620",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1021",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:09.693",
|
||||
"lastModified": "2023-05-02T08:15:09.693",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1090",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:09.753",
|
||||
"lastModified": "2023-05-02T08:15:09.753",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1125",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:09.823",
|
||||
"lastModified": "2023-05-02T08:15:09.823",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1196",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T09:15:09.280",
|
||||
"lastModified": "2023-05-02T09:15:09.280",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1525",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:09.893",
|
||||
"lastModified": "2023-05-02T08:15:09.893",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1546",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:09.957",
|
||||
"lastModified": "2023-05-02T08:15:09.957",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1554",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.023",
|
||||
"lastModified": "2023-05-02T08:15:10.023",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1614",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.097",
|
||||
"lastModified": "2023-05-02T08:15:10.097",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1669",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.180",
|
||||
"lastModified": "2023-05-02T08:15:10.180",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1730",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.267",
|
||||
"lastModified": "2023-05-02T08:15:10.267",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1804",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.337",
|
||||
"lastModified": "2023-05-02T08:15:10.337",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1805",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.393",
|
||||
"lastModified": "2023-05-02T08:15:10.393",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1809",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.453",
|
||||
"lastModified": "2023-05-02T08:15:10.453",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1861",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.517",
|
||||
"lastModified": "2023-05-02T08:15:10.517",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1911",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.570",
|
||||
"lastModified": "2023-05-02T08:15:10.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2000",
|
||||
"sourceIdentifier": "responsibledisclosure@mattermost.com",
|
||||
"published": "2023-05-02T09:15:10.013",
|
||||
"lastModified": "2023-05-02T09:15:10.013",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21642",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-05-02T06:15:10.347",
|
||||
"lastModified": "2023-05-02T06:15:10.347",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21665",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-05-02T06:15:10.433",
|
||||
"lastModified": "2023-05-02T06:15:10.433",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-21666",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2023-05-02T06:15:10.510",
|
||||
"lastModified": "2023-05-02T06:15:10.510",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2197",
|
||||
"sourceIdentifier": "security@hashicorp.com",
|
||||
"published": "2023-05-01T20:15:14.597",
|
||||
"lastModified": "2023-05-01T20:15:14.597",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:26.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2210",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-21T09:15:07.970",
|
||||
"lastModified": "2023-04-24T13:02:28.070",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-02T13:36:03.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
@ -71,18 +93,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:coffee_shop_pos_system_project:coffee_shop_pos_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0F4D1D90-B3B0-4E6B-9B75-C6A2C6FF6909"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Coffee%20Shop%20POS%20System/Coffee%20Shop%20POS%20System%20-%20vuln%202.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.226975",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.226975",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2247",
|
||||
"sourceIdentifier": "security@octopus.com",
|
||||
"published": "2023-05-02T05:15:28.113",
|
||||
"lastModified": "2023-05-02T05:15:28.113",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:18.213",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2023/CVE-2023-237xx/CVE-2023-23723.json
Normal file
55
CVE-2023/CVE-2023-237xx/CVE-2023-23723.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-23723",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-02T12:15:22.430",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Winwar Media WP Email Capture plugin <=\u00a03.9.3 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wp-email-capture/wordpress-wordpress-email-marketing-plugin-wp-email-capture-plugin-3-9-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-24xx/CVE-2023-2473.json
Normal file
88
CVE-2023/CVE-2023-24xx/CVE-2023-2473.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-2473",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-02T13:15:25.090",
|
||||
"lastModified": "2023-05-02T13:29:57.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Dreamer CMS up to 4.1.3. It has been declared as problematic. This vulnerability affects the function updatePwd of the file UserController.java of the component Password Hash Calculation. The manipulation leads to inefficient algorithmic complexity. The attack can be initiated remotely. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227860."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-407"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/isoftforce/dreamer_cms/issues/I6WHO7",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227860",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227860",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-24xx/CVE-2023-2474.json
Normal file
88
CVE-2023/CVE-2023-24xx/CVE-2023-2474.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-2474",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-02T13:15:25.197",
|
||||
"lastModified": "2023-05-02T13:29:57.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Rebuild 3.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. VDB-227866 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/getrebuild/rebuild/issues/I6W4M2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227866",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227866",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
92
CVE-2023/CVE-2023-24xx/CVE-2023-2475.json
Normal file
92
CVE-2023/CVE-2023-24xx/CVE-2023-2475.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2023-2475",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-02T13:15:25.287",
|
||||
"lastModified": "2023-05-02T13:29:57.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Dromara J2eeFAST up to 2.6.0 and classified as problematic. This issue affects some unknown processing of the component System Message Handler. The manipulation of the argument ?? leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-227867."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/dromara/J2EEFAST/commit/7a9e1a00e3329fdc0ae05f7a8257cce77037134d",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://gitee.com/dromara/J2EEFAST/issues/I6W390",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227867",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227867",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26987",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-01T22:15:09.483",
|
||||
"lastModified": "2023-05-01T22:15:09.483",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:26.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27035",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-01T22:15:09.547",
|
||||
"lastModified": "2023-05-01T22:15:09.547",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:26.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27108",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-01T22:15:09.617",
|
||||
"lastModified": "2023-05-01T22:15:09.617",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:26.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29680",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-01T22:15:09.673",
|
||||
"lastModified": "2023-05-01T22:15:09.673",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:26.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29681",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-01T22:15:09.723",
|
||||
"lastModified": "2023-05-01T22:15:09.723",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:26.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2023/CVE-2023-297xx/CVE-2023-29772.json
Normal file
20
CVE-2023/CVE-2023-297xx/CVE-2023-29772.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-29772",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T13:15:24.957",
|
||||
"lastModified": "2023-05-02T13:29:57.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross-site scripting (XSS) vulnerability in the System Log/General Log page of the administrator web UI in ASUS RT-AC51U wireless router firmware version up to and including 3.0.0.4.380.8591 allows remote attackers to inject arbitrary web script or HTML via a malicious network request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/donnm/cves/-/blob/master/xss_rtac51u_syslog.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30639",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-01T22:15:09.770",
|
||||
"lastModified": "2023-05-01T22:15:09.770",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:26.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30869",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-02T10:15:09.357",
|
||||
"lastModified": "2023-05-02T10:15:09.357",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31207",
|
||||
"sourceIdentifier": "security@checkmk.com",
|
||||
"published": "2023-05-02T09:15:10.120",
|
||||
"lastModified": "2023-05-02T09:15:10.120",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32007",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-02T09:15:10.207",
|
||||
"lastModified": "2023-05-02T09:15:10.207",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-02T12:56:12.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
69
README.md
69
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-05-02T12:00:24.363206+00:00
|
||||
2023-05-02T14:00:24.246120+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-05-02T10:15:09.357000+00:00
|
||||
2023-05-02T13:58:32.890000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,22 +29,75 @@ Download and Changelog: [Click](releases/latest)
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
213915
|
||||
213920
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `1`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
* [CVE-2023-30869](CVE-2023/CVE-2023-308xx/CVE-2023-30869.json) (`2023-05-02T10:15:09.357`)
|
||||
* [CVE-2023-23723](CVE-2023/CVE-2023-237xx/CVE-2023-23723.json) (`2023-05-02T12:15:22.430`)
|
||||
* [CVE-2023-2473](CVE-2023/CVE-2023-24xx/CVE-2023-2473.json) (`2023-05-02T13:15:25.090`)
|
||||
* [CVE-2023-2474](CVE-2023/CVE-2023-24xx/CVE-2023-2474.json) (`2023-05-02T13:15:25.197`)
|
||||
* [CVE-2023-2475](CVE-2023/CVE-2023-24xx/CVE-2023-2475.json) (`2023-05-02T13:15:25.287`)
|
||||
* [CVE-2023-29772](CVE-2023/CVE-2023-297xx/CVE-2023-29772.json) (`2023-05-02T13:15:24.957`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `2`
|
||||
Recently modified CVEs: `51`
|
||||
|
||||
* [CVE-2022-1113](CVE-2022/CVE-2022-11xx/CVE-2022-1113.json) (`2023-05-02T10:15:08.983`)
|
||||
* [CVE-2022-4471](CVE-2022/CVE-2022-44xx/CVE-2022-4471.json) (`2023-05-02T10:15:09.250`)
|
||||
* [CVE-2013-10026](CVE-2013/CVE-2013-100xx/CVE-2013-10026.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2014-125100](CVE-2014/CVE-2014-1251xx/CVE-2014-125100.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2022-25713](CVE-2022/CVE-2022-257xx/CVE-2022-25713.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2022-33273](CVE-2022/CVE-2022-332xx/CVE-2022-33273.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2022-33281](CVE-2022/CVE-2022-332xx/CVE-2022-33281.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2022-33292](CVE-2022/CVE-2022-332xx/CVE-2022-33292.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2022-33304](CVE-2022/CVE-2022-333xx/CVE-2022-33304.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2022-33305](CVE-2022/CVE-2022-333xx/CVE-2022-33305.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2022-34144](CVE-2022/CVE-2022-341xx/CVE-2022-34144.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2022-35898](CVE-2022/CVE-2022-358xx/CVE-2022-35898.json) (`2023-05-02T12:56:26.420`)
|
||||
* [CVE-2022-40504](CVE-2022/CVE-2022-405xx/CVE-2022-40504.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2022-40505](CVE-2022/CVE-2022-405xx/CVE-2022-40505.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2022-40508](CVE-2022/CVE-2022-405xx/CVE-2022-40508.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2022-48482](CVE-2022/CVE-2022-484xx/CVE-2022-48482.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2022-48483](CVE-2022/CVE-2022-484xx/CVE-2022-48483.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2023-0203](CVE-2023/CVE-2023-02xx/CVE-2023-0203.json) (`2023-05-02T13:53:49.337`)
|
||||
* [CVE-2023-0204](CVE-2023/CVE-2023-02xx/CVE-2023-0204.json) (`2023-05-02T13:56:56.390`)
|
||||
* [CVE-2023-0205](CVE-2023/CVE-2023-02xx/CVE-2023-0205.json) (`2023-05-02T13:58:32.890`)
|
||||
* [CVE-2023-0891](CVE-2023/CVE-2023-08xx/CVE-2023-0891.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2023-0924](CVE-2023/CVE-2023-09xx/CVE-2023-0924.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2023-1021](CVE-2023/CVE-2023-10xx/CVE-2023-1021.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-1090](CVE-2023/CVE-2023-10xx/CVE-2023-1090.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-1125](CVE-2023/CVE-2023-11xx/CVE-2023-1125.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-1196](CVE-2023/CVE-2023-11xx/CVE-2023-1196.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-1525](CVE-2023/CVE-2023-15xx/CVE-2023-1525.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-1546](CVE-2023/CVE-2023-15xx/CVE-2023-1546.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-1554](CVE-2023/CVE-2023-15xx/CVE-2023-1554.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-1614](CVE-2023/CVE-2023-16xx/CVE-2023-1614.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-1669](CVE-2023/CVE-2023-16xx/CVE-2023-1669.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-1730](CVE-2023/CVE-2023-17xx/CVE-2023-1730.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-1804](CVE-2023/CVE-2023-18xx/CVE-2023-1804.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-1805](CVE-2023/CVE-2023-18xx/CVE-2023-1805.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-1809](CVE-2023/CVE-2023-18xx/CVE-2023-1809.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-1861](CVE-2023/CVE-2023-18xx/CVE-2023-1861.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-1911](CVE-2023/CVE-2023-19xx/CVE-2023-1911.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-2000](CVE-2023/CVE-2023-20xx/CVE-2023-2000.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-21642](CVE-2023/CVE-2023-216xx/CVE-2023-21642.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2023-21665](CVE-2023/CVE-2023-216xx/CVE-2023-21665.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2023-21666](CVE-2023/CVE-2023-216xx/CVE-2023-21666.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2023-2197](CVE-2023/CVE-2023-21xx/CVE-2023-2197.json) (`2023-05-02T12:56:26.420`)
|
||||
* [CVE-2023-2210](CVE-2023/CVE-2023-22xx/CVE-2023-2210.json) (`2023-05-02T13:36:03.597`)
|
||||
* [CVE-2023-2247](CVE-2023/CVE-2023-22xx/CVE-2023-2247.json) (`2023-05-02T12:56:18.213`)
|
||||
* [CVE-2023-26987](CVE-2023/CVE-2023-269xx/CVE-2023-26987.json) (`2023-05-02T12:56:26.420`)
|
||||
* [CVE-2023-27035](CVE-2023/CVE-2023-270xx/CVE-2023-27035.json) (`2023-05-02T12:56:26.420`)
|
||||
* [CVE-2023-27108](CVE-2023/CVE-2023-271xx/CVE-2023-27108.json) (`2023-05-02T12:56:26.420`)
|
||||
* [CVE-2023-29680](CVE-2023/CVE-2023-296xx/CVE-2023-29680.json) (`2023-05-02T12:56:26.420`)
|
||||
* [CVE-2023-29681](CVE-2023/CVE-2023-296xx/CVE-2023-29681.json) (`2023-05-02T12:56:26.420`)
|
||||
* [CVE-2023-30639](CVE-2023/CVE-2023-306xx/CVE-2023-30639.json) (`2023-05-02T12:56:26.420`)
|
||||
* [CVE-2023-30869](CVE-2023/CVE-2023-308xx/CVE-2023-30869.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-31207](CVE-2023/CVE-2023-312xx/CVE-2023-31207.json) (`2023-05-02T12:56:12.940`)
|
||||
* [CVE-2023-32007](CVE-2023/CVE-2023-320xx/CVE-2023-32007.json) (`2023-05-02T12:56:12.940`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user