diff --git a/CVE-2013/CVE-2013-100xx/CVE-2013-10026.json b/CVE-2013/CVE-2013-100xx/CVE-2013-10026.json index c59a18360d0..8746e97b6b2 100644 --- a/CVE-2013/CVE-2013-100xx/CVE-2013-10026.json +++ b/CVE-2013/CVE-2013-100xx/CVE-2013-10026.json @@ -2,8 +2,8 @@ "id": "CVE-2013-10026", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-02T02:15:27.267", - "lastModified": "2023-05-02T02:15:27.267", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125100.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125100.json index 209060969b7..a9b4916c269 100644 --- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125100.json +++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125100.json @@ -2,8 +2,8 @@ "id": "CVE-2014-125100", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-02T02:15:27.423", - "lastModified": "2023-05-02T02:15:27.423", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-257xx/CVE-2022-25713.json b/CVE-2022/CVE-2022-257xx/CVE-2022-25713.json index b4bc604177f..3adbe70172f 100644 --- a/CVE-2022/CVE-2022-257xx/CVE-2022-25713.json +++ b/CVE-2022/CVE-2022-257xx/CVE-2022-25713.json @@ -2,8 +2,8 @@ "id": "CVE-2022-25713", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:08.500", - "lastModified": "2023-05-02T06:15:08.500", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33273.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33273.json index 521b552cb0a..c1b1827568a 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33273.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33273.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33273", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T08:15:08.763", - "lastModified": "2023-05-02T08:15:08.763", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33281.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33281.json index c3a13124939..113ef85954e 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33281.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33281.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33281", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:09.507", - "lastModified": "2023-05-02T06:15:09.507", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33292.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33292.json index 39a6dc68d61..0221db94405 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33292.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33292.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33292", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:09.757", - "lastModified": "2023-05-02T06:15:09.757", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-333xx/CVE-2022-33304.json b/CVE-2022/CVE-2022-333xx/CVE-2022-33304.json index effe859f068..565baf64563 100644 --- a/CVE-2022/CVE-2022-333xx/CVE-2022-33304.json +++ b/CVE-2022/CVE-2022-333xx/CVE-2022-33304.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33304", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:09.910", - "lastModified": "2023-05-02T06:15:09.910", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-333xx/CVE-2022-33305.json b/CVE-2022/CVE-2022-333xx/CVE-2022-33305.json index 23dd990a593..16ee3314768 100644 --- a/CVE-2022/CVE-2022-333xx/CVE-2022-33305.json +++ b/CVE-2022/CVE-2022-333xx/CVE-2022-33305.json @@ -2,8 +2,8 @@ "id": "CVE-2022-33305", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:09.997", - "lastModified": "2023-05-02T06:15:09.997", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34144.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34144.json index 1ded5c9dcb2..d04c83de5ff 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34144.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34144.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34144", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:10.077", - "lastModified": "2023-05-02T06:15:10.077", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-358xx/CVE-2022-35898.json b/CVE-2022/CVE-2022-358xx/CVE-2022-35898.json index 882effd5270..3ad7b8e4635 100644 --- a/CVE-2022/CVE-2022-358xx/CVE-2022-35898.json +++ b/CVE-2022/CVE-2022-358xx/CVE-2022-35898.json @@ -2,8 +2,8 @@ "id": "CVE-2022-35898", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-01T20:15:14.463", - "lastModified": "2023-05-01T20:15:14.463", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:26.420", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40504.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40504.json index c6555ce64f2..4bcad75eafa 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40504.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40504.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40504", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T08:15:09.437", - "lastModified": "2023-05-02T08:15:09.437", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40505.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40505.json index 3bf8a1038af..29040e8de6f 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40505.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40505.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40505", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:10.173", - "lastModified": "2023-05-02T06:15:10.173", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-405xx/CVE-2022-40508.json b/CVE-2022/CVE-2022-405xx/CVE-2022-40508.json index 74d3cb08e2b..a0763bcbf03 100644 --- a/CVE-2022/CVE-2022-405xx/CVE-2022-40508.json +++ b/CVE-2022/CVE-2022-405xx/CVE-2022-40508.json @@ -2,8 +2,8 @@ "id": "CVE-2022-40508", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:10.263", - "lastModified": "2023-05-02T06:15:10.263", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48482.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48482.json index 1019632f9ad..005bca5141a 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48482.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48482.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48482", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-02T05:15:27.407", - "lastModified": "2023-05-02T05:15:27.407", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48483.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48483.json index e8f975523b8..41b61a02fc2 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48483.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48483.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48483", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-02T05:15:28.057", - "lastModified": "2023-05-02T05:15:28.057", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0203.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0203.json index e576bc94ca2..1277eb87578 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0203.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0203.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0203", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-22T03:15:09.270", - "lastModified": "2023-04-24T13:02:13.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-02T13:53:49.337", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + }, { "source": "psirt@nvidia.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "psirt@nvidia.com", "type": "Secondary", @@ -46,10 +76,53 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nvidia:connectx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "35.1012", + "matchCriteriaId": "22D68BAB-D2DD-4997-9881-15F3243A9D7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nvidia:connectx-5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85FBF3A9-B6C3-4705-A2E1-2503E7A6725D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nvidia:connectx-6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8421C891-26D3-4845-A20A-80E4769D4E25" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nvidia:connectx-6-dx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BAADC39-548E-44E4-AD25-74A7CEBCC2EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5459", - "source": "psirt@nvidia.com" + "source": "psirt@nvidia.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0204.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0204.json index fe9ce0d5c66..a4ecbd311ff 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0204.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0204.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0204", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-22T03:15:09.330", - "lastModified": "2023-04-24T13:02:13.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-02T13:56:56.390", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + }, { "source": "psirt@nvidia.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + }, { "source": "psirt@nvidia.com", "type": "Secondary", @@ -46,10 +76,53 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nvidia:connectx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "35.1012", + "matchCriteriaId": "22D68BAB-D2DD-4997-9881-15F3243A9D7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nvidia:connectx-5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85FBF3A9-B6C3-4705-A2E1-2503E7A6725D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nvidia:connectx-6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8421C891-26D3-4845-A20A-80E4769D4E25" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nvidia:connectx-6-dx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BAADC39-548E-44E4-AD25-74A7CEBCC2EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5459", - "source": "psirt@nvidia.com" + "source": "psirt@nvidia.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0205.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0205.json index 985deb30e85..e1764890764 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0205.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0205.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0205", "sourceIdentifier": "psirt@nvidia.com", "published": "2023-04-22T03:15:09.387", - "lastModified": "2023-04-24T13:02:13.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-02T13:58:32.890", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + }, { "source": "psirt@nvidia.com", "type": "Secondary", @@ -35,6 +55,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "psirt@nvidia.com", "type": "Secondary", @@ -46,10 +76,53 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:nvidia:connectx_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "35.1012", + "matchCriteriaId": "22D68BAB-D2DD-4997-9881-15F3243A9D7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nvidia:connectx-5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85FBF3A9-B6C3-4705-A2E1-2503E7A6725D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nvidia:connectx-6:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8421C891-26D3-4845-A20A-80E4769D4E25" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:nvidia:connectx-6-dx:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BAADC39-548E-44E4-AD25-74A7CEBCC2EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5459", - "source": "psirt@nvidia.com" + "source": "psirt@nvidia.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0891.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0891.json index b330cbb110e..93c90dfe78e 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0891.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0891.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0891", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:09.513", - "lastModified": "2023-05-02T08:15:09.513", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0924.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0924.json index cdc940f9657..cde1c3836f8 100644 --- a/CVE-2023/CVE-2023-09xx/CVE-2023-0924.json +++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0924.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0924", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:09.620", - "lastModified": "2023-05-02T08:15:09.620", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1021.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1021.json index f98e1b797cb..0bb2f724c7d 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1021.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1021.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1021", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:09.693", - "lastModified": "2023-05-02T08:15:09.693", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1090.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1090.json index 3b6d8751d4a..fbadcdc09fd 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1090.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1090.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1090", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:09.753", - "lastModified": "2023-05-02T08:15:09.753", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1125.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1125.json index ec5b32e8917..df6eb6149e2 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1125.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1125.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1125", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:09.823", - "lastModified": "2023-05-02T08:15:09.823", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-11xx/CVE-2023-1196.json b/CVE-2023/CVE-2023-11xx/CVE-2023-1196.json index 81093302400..2aba24743c8 100644 --- a/CVE-2023/CVE-2023-11xx/CVE-2023-1196.json +++ b/CVE-2023/CVE-2023-11xx/CVE-2023-1196.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1196", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T09:15:09.280", - "lastModified": "2023-05-02T09:15:09.280", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1525.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1525.json index 37ac1755972..1551a80bd03 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1525.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1525.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1525", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:09.893", - "lastModified": "2023-05-02T08:15:09.893", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1546.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1546.json index c3a26c09a94..a02e32c193c 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1546.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1546.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1546", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:09.957", - "lastModified": "2023-05-02T08:15:09.957", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1554.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1554.json index 95316b1390e..e6e296778b5 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1554.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1554.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1554", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:10.023", - "lastModified": "2023-05-02T08:15:10.023", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1614.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1614.json index 4d972a2797e..a82c6af3e38 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1614.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1614.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1614", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:10.097", - "lastModified": "2023-05-02T08:15:10.097", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1669.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1669.json index 56b3b9fb58b..5596dbe947d 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1669.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1669.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1669", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:10.180", - "lastModified": "2023-05-02T08:15:10.180", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1730.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1730.json index b328e80a53b..2cf5a5d6919 100644 --- a/CVE-2023/CVE-2023-17xx/CVE-2023-1730.json +++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1730.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1730", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:10.267", - "lastModified": "2023-05-02T08:15:10.267", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1804.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1804.json index 44fe65aef5e..ef5fb95a1a2 100644 --- a/CVE-2023/CVE-2023-18xx/CVE-2023-1804.json +++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1804.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1804", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:10.337", - "lastModified": "2023-05-02T08:15:10.337", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1805.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1805.json index ad55ebd8021..cfda4439630 100644 --- a/CVE-2023/CVE-2023-18xx/CVE-2023-1805.json +++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1805.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1805", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:10.393", - "lastModified": "2023-05-02T08:15:10.393", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1809.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1809.json index e4ec5235fcc..2c3fb5814a5 100644 --- a/CVE-2023/CVE-2023-18xx/CVE-2023-1809.json +++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1809.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1809", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:10.453", - "lastModified": "2023-05-02T08:15:10.453", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1861.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1861.json index aa711f25876..08a4db031eb 100644 --- a/CVE-2023/CVE-2023-18xx/CVE-2023-1861.json +++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1861.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1861", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:10.517", - "lastModified": "2023-05-02T08:15:10.517", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1911.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1911.json index af5eb508a1b..c8650003da4 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1911.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1911.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1911", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-02T08:15:10.570", - "lastModified": "2023-05-02T08:15:10.570", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2000.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2000.json index 2cb7890de39..e623ae89191 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2000.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2000.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2000", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2023-05-02T09:15:10.013", - "lastModified": "2023-05-02T09:15:10.013", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21642.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21642.json index 0b24fdc0ab8..f08c4e8f6ec 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21642.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21642.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21642", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:10.347", - "lastModified": "2023-05-02T06:15:10.347", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21665.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21665.json index fb5191976eb..6bd36f9ca51 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21665.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21665.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21665", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:10.433", - "lastModified": "2023-05-02T06:15:10.433", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-216xx/CVE-2023-21666.json b/CVE-2023/CVE-2023-216xx/CVE-2023-21666.json index 84e5a0b9f99..b85e560b6b4 100644 --- a/CVE-2023/CVE-2023-216xx/CVE-2023-21666.json +++ b/CVE-2023/CVE-2023-216xx/CVE-2023-21666.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21666", "sourceIdentifier": "product-security@qualcomm.com", "published": "2023-05-02T06:15:10.510", - "lastModified": "2023-05-02T06:15:10.510", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2197.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2197.json index ef4ce28213a..f8116be03dd 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2197.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2197.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2197", "sourceIdentifier": "security@hashicorp.com", "published": "2023-05-01T20:15:14.597", - "lastModified": "2023-05-01T20:15:14.597", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:26.420", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2210.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2210.json index ef644e4171e..eb251c71d43 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2210.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2210.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2210", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-21T09:15:07.970", - "lastModified": "2023-04-24T13:02:28.070", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-02T13:36:03.597", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,18 +93,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:coffee_shop_pos_system_project:coffee_shop_pos_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0F4D1D90-B3B0-4E6B-9B75-C6A2C6FF6909" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Coffee%20Shop%20POS%20System/Coffee%20Shop%20POS%20System%20-%20vuln%202.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.226975", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.226975", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2247.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2247.json index ac372092461..8d149216943 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2247.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2247.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2247", "sourceIdentifier": "security@octopus.com", "published": "2023-05-02T05:15:28.113", - "lastModified": "2023-05-02T05:15:28.113", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:18.213", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23723.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23723.json new file mode 100644 index 00000000000..8de04083141 --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23723.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23723", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-02T12:15:22.430", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Winwar Media WP Email Capture plugin <=\u00a03.9.3 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-email-capture/wordpress-wordpress-email-marketing-plugin-wp-email-capture-plugin-3-9-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2473.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2473.json new file mode 100644 index 00000000000..57cbcf7895e --- /dev/null +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2473.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-2473", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-05-02T13:15:25.090", + "lastModified": "2023-05-02T13:29:57.300", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Dreamer CMS up to 4.1.3. It has been declared as problematic. This vulnerability affects the function updatePwd of the file UserController.java of the component Password Hash Calculation. The manipulation leads to inefficient algorithmic complexity. The attack can be initiated remotely. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227860." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-407" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/isoftforce/dreamer_cms/issues/I6WHO7", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.227860", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.227860", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2474.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2474.json new file mode 100644 index 00000000000..885b1e72cee --- /dev/null +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2474.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-2474", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-05-02T13:15:25.197", + "lastModified": "2023-05-02T13:29:57.300", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in Rebuild 3.2 and classified as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. VDB-227866 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/getrebuild/rebuild/issues/I6W4M2", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.227866", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.227866", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2475.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2475.json new file mode 100644 index 00000000000..37f8e63f52d --- /dev/null +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2475.json @@ -0,0 +1,92 @@ +{ + "id": "CVE-2023-2475", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-05-02T13:15:25.287", + "lastModified": "2023-05-02T13:29:57.300", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Dromara J2eeFAST up to 2.6.0 and classified as problematic. This issue affects some unknown processing of the component System Message Handler. The manipulation of the argument ?? leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 7a9e1a00e3329fdc0ae05f7a8257cce77037134d. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-227867." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/dromara/J2EEFAST/commit/7a9e1a00e3329fdc0ae05f7a8257cce77037134d", + "source": "cna@vuldb.com" + }, + { + "url": "https://gitee.com/dromara/J2EEFAST/issues/I6W390", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.227867", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.227867", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26987.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26987.json index 1472f81770a..8c7191772fb 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26987.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26987.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26987", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-01T22:15:09.483", - "lastModified": "2023-05-01T22:15:09.483", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:26.420", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27035.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27035.json index e682389bdd6..4990f546936 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27035.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27035.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27035", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-01T22:15:09.547", - "lastModified": "2023-05-01T22:15:09.547", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:26.420", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27108.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27108.json index dc46fc8d3fa..be52ed3bfa8 100644 --- a/CVE-2023/CVE-2023-271xx/CVE-2023-27108.json +++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27108.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27108", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-01T22:15:09.617", - "lastModified": "2023-05-01T22:15:09.617", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:26.420", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-296xx/CVE-2023-29680.json b/CVE-2023/CVE-2023-296xx/CVE-2023-29680.json index e3c201e92f9..9d51b0a98ee 100644 --- a/CVE-2023/CVE-2023-296xx/CVE-2023-29680.json +++ b/CVE-2023/CVE-2023-296xx/CVE-2023-29680.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29680", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-01T22:15:09.673", - "lastModified": "2023-05-01T22:15:09.673", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:26.420", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-296xx/CVE-2023-29681.json b/CVE-2023/CVE-2023-296xx/CVE-2023-29681.json index 5398af263e4..f7a185a3473 100644 --- a/CVE-2023/CVE-2023-296xx/CVE-2023-29681.json +++ b/CVE-2023/CVE-2023-296xx/CVE-2023-29681.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29681", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-01T22:15:09.723", - "lastModified": "2023-05-01T22:15:09.723", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:26.420", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29772.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29772.json new file mode 100644 index 00000000000..839aef14696 --- /dev/null +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29772.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-29772", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-02T13:15:24.957", + "lastModified": "2023-05-02T13:29:57.300", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A Cross-site scripting (XSS) vulnerability in the System Log/General Log page of the administrator web UI in ASUS RT-AC51U wireless router firmware version up to and including 3.0.0.4.380.8591 allows remote attackers to inject arbitrary web script or HTML via a malicious network request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitlab.com/donnm/cves/-/blob/master/xss_rtac51u_syslog.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-306xx/CVE-2023-30639.json b/CVE-2023/CVE-2023-306xx/CVE-2023-30639.json index b608b0dbff1..93fe6f1957d 100644 --- a/CVE-2023/CVE-2023-306xx/CVE-2023-30639.json +++ b/CVE-2023/CVE-2023-306xx/CVE-2023-30639.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30639", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-01T22:15:09.770", - "lastModified": "2023-05-01T22:15:09.770", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:26.420", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-308xx/CVE-2023-30869.json b/CVE-2023/CVE-2023-308xx/CVE-2023-30869.json index 7dcf7b8f4fb..fadffaa0433 100644 --- a/CVE-2023/CVE-2023-308xx/CVE-2023-30869.json +++ b/CVE-2023/CVE-2023-308xx/CVE-2023-30869.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30869", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-02T10:15:09.357", - "lastModified": "2023-05-02T10:15:09.357", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31207.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31207.json index a81c927a51d..ef54bc50dbc 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31207.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31207.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31207", "sourceIdentifier": "security@checkmk.com", "published": "2023-05-02T09:15:10.120", - "lastModified": "2023-05-02T09:15:10.120", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32007.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32007.json index 7aa1b92e6c6..154cde54cc4 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32007.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32007.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32007", "sourceIdentifier": "security@apache.org", "published": "2023-05-02T09:15:10.207", - "lastModified": "2023-05-02T09:15:10.207", - "vulnStatus": "Received", + "lastModified": "2023-05-02T12:56:12.940", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 22321dcc3d7..bf9c74a5c5e 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-02T12:00:24.363206+00:00 +2023-05-02T14:00:24.246120+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-02T10:15:09.357000+00:00 +2023-05-02T13:58:32.890000+00:00 ``` ### Last Data Feed Release @@ -29,22 +29,75 @@ Download and Changelog: [Click](releases/latest) ### Total Number of included CVEs ```plain -213915 +213920 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `5` -* [CVE-2023-30869](CVE-2023/CVE-2023-308xx/CVE-2023-30869.json) (`2023-05-02T10:15:09.357`) +* [CVE-2023-23723](CVE-2023/CVE-2023-237xx/CVE-2023-23723.json) (`2023-05-02T12:15:22.430`) +* [CVE-2023-2473](CVE-2023/CVE-2023-24xx/CVE-2023-2473.json) (`2023-05-02T13:15:25.090`) +* [CVE-2023-2474](CVE-2023/CVE-2023-24xx/CVE-2023-2474.json) (`2023-05-02T13:15:25.197`) +* [CVE-2023-2475](CVE-2023/CVE-2023-24xx/CVE-2023-2475.json) (`2023-05-02T13:15:25.287`) +* [CVE-2023-29772](CVE-2023/CVE-2023-297xx/CVE-2023-29772.json) (`2023-05-02T13:15:24.957`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `51` -* [CVE-2022-1113](CVE-2022/CVE-2022-11xx/CVE-2022-1113.json) (`2023-05-02T10:15:08.983`) -* [CVE-2022-4471](CVE-2022/CVE-2022-44xx/CVE-2022-4471.json) (`2023-05-02T10:15:09.250`) +* [CVE-2013-10026](CVE-2013/CVE-2013-100xx/CVE-2013-10026.json) (`2023-05-02T12:56:18.213`) +* [CVE-2014-125100](CVE-2014/CVE-2014-1251xx/CVE-2014-125100.json) (`2023-05-02T12:56:18.213`) +* [CVE-2022-25713](CVE-2022/CVE-2022-257xx/CVE-2022-25713.json) (`2023-05-02T12:56:18.213`) +* [CVE-2022-33273](CVE-2022/CVE-2022-332xx/CVE-2022-33273.json) (`2023-05-02T12:56:18.213`) +* [CVE-2022-33281](CVE-2022/CVE-2022-332xx/CVE-2022-33281.json) (`2023-05-02T12:56:18.213`) +* [CVE-2022-33292](CVE-2022/CVE-2022-332xx/CVE-2022-33292.json) (`2023-05-02T12:56:18.213`) +* [CVE-2022-33304](CVE-2022/CVE-2022-333xx/CVE-2022-33304.json) (`2023-05-02T12:56:18.213`) +* [CVE-2022-33305](CVE-2022/CVE-2022-333xx/CVE-2022-33305.json) (`2023-05-02T12:56:18.213`) +* [CVE-2022-34144](CVE-2022/CVE-2022-341xx/CVE-2022-34144.json) (`2023-05-02T12:56:18.213`) +* [CVE-2022-35898](CVE-2022/CVE-2022-358xx/CVE-2022-35898.json) (`2023-05-02T12:56:26.420`) +* [CVE-2022-40504](CVE-2022/CVE-2022-405xx/CVE-2022-40504.json) (`2023-05-02T12:56:18.213`) +* [CVE-2022-40505](CVE-2022/CVE-2022-405xx/CVE-2022-40505.json) (`2023-05-02T12:56:18.213`) +* [CVE-2022-40508](CVE-2022/CVE-2022-405xx/CVE-2022-40508.json) (`2023-05-02T12:56:18.213`) +* [CVE-2022-48482](CVE-2022/CVE-2022-484xx/CVE-2022-48482.json) (`2023-05-02T12:56:18.213`) +* [CVE-2022-48483](CVE-2022/CVE-2022-484xx/CVE-2022-48483.json) (`2023-05-02T12:56:18.213`) +* [CVE-2023-0203](CVE-2023/CVE-2023-02xx/CVE-2023-0203.json) (`2023-05-02T13:53:49.337`) +* [CVE-2023-0204](CVE-2023/CVE-2023-02xx/CVE-2023-0204.json) (`2023-05-02T13:56:56.390`) +* [CVE-2023-0205](CVE-2023/CVE-2023-02xx/CVE-2023-0205.json) (`2023-05-02T13:58:32.890`) +* [CVE-2023-0891](CVE-2023/CVE-2023-08xx/CVE-2023-0891.json) (`2023-05-02T12:56:18.213`) +* [CVE-2023-0924](CVE-2023/CVE-2023-09xx/CVE-2023-0924.json) (`2023-05-02T12:56:18.213`) +* [CVE-2023-1021](CVE-2023/CVE-2023-10xx/CVE-2023-1021.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-1090](CVE-2023/CVE-2023-10xx/CVE-2023-1090.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-1125](CVE-2023/CVE-2023-11xx/CVE-2023-1125.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-1196](CVE-2023/CVE-2023-11xx/CVE-2023-1196.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-1525](CVE-2023/CVE-2023-15xx/CVE-2023-1525.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-1546](CVE-2023/CVE-2023-15xx/CVE-2023-1546.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-1554](CVE-2023/CVE-2023-15xx/CVE-2023-1554.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-1614](CVE-2023/CVE-2023-16xx/CVE-2023-1614.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-1669](CVE-2023/CVE-2023-16xx/CVE-2023-1669.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-1730](CVE-2023/CVE-2023-17xx/CVE-2023-1730.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-1804](CVE-2023/CVE-2023-18xx/CVE-2023-1804.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-1805](CVE-2023/CVE-2023-18xx/CVE-2023-1805.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-1809](CVE-2023/CVE-2023-18xx/CVE-2023-1809.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-1861](CVE-2023/CVE-2023-18xx/CVE-2023-1861.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-1911](CVE-2023/CVE-2023-19xx/CVE-2023-1911.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-2000](CVE-2023/CVE-2023-20xx/CVE-2023-2000.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-21642](CVE-2023/CVE-2023-216xx/CVE-2023-21642.json) (`2023-05-02T12:56:18.213`) +* [CVE-2023-21665](CVE-2023/CVE-2023-216xx/CVE-2023-21665.json) (`2023-05-02T12:56:18.213`) +* [CVE-2023-21666](CVE-2023/CVE-2023-216xx/CVE-2023-21666.json) (`2023-05-02T12:56:18.213`) +* [CVE-2023-2197](CVE-2023/CVE-2023-21xx/CVE-2023-2197.json) (`2023-05-02T12:56:26.420`) +* [CVE-2023-2210](CVE-2023/CVE-2023-22xx/CVE-2023-2210.json) (`2023-05-02T13:36:03.597`) +* [CVE-2023-2247](CVE-2023/CVE-2023-22xx/CVE-2023-2247.json) (`2023-05-02T12:56:18.213`) +* [CVE-2023-26987](CVE-2023/CVE-2023-269xx/CVE-2023-26987.json) (`2023-05-02T12:56:26.420`) +* [CVE-2023-27035](CVE-2023/CVE-2023-270xx/CVE-2023-27035.json) (`2023-05-02T12:56:26.420`) +* [CVE-2023-27108](CVE-2023/CVE-2023-271xx/CVE-2023-27108.json) (`2023-05-02T12:56:26.420`) +* [CVE-2023-29680](CVE-2023/CVE-2023-296xx/CVE-2023-29680.json) (`2023-05-02T12:56:26.420`) +* [CVE-2023-29681](CVE-2023/CVE-2023-296xx/CVE-2023-29681.json) (`2023-05-02T12:56:26.420`) +* [CVE-2023-30639](CVE-2023/CVE-2023-306xx/CVE-2023-30639.json) (`2023-05-02T12:56:26.420`) +* [CVE-2023-30869](CVE-2023/CVE-2023-308xx/CVE-2023-30869.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-31207](CVE-2023/CVE-2023-312xx/CVE-2023-31207.json) (`2023-05-02T12:56:12.940`) +* [CVE-2023-32007](CVE-2023/CVE-2023-320xx/CVE-2023-32007.json) (`2023-05-02T12:56:12.940`) ## Download and Usage