mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2023-05-22 12:00:27.102713+00:00
This commit is contained in:
parent
81fa4dcc82
commit
3c35bf33e8
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-8035",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2019-05-01T21:29:00.550",
|
||||
"lastModified": "2019-06-06T20:29:00.277",
|
||||
"lastModified": "2023-05-22T11:36:12.143",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,9 +84,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:unstructured_information_management_architecture_distributed_uima_cluster_computing:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:apache:uimaducc:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.2.2",
|
||||
"matchCriteriaId": "8EA699CC-FDC8-4E23-9645-EEB8A6D44BA3"
|
||||
"matchCriteriaId": "15F3BA52-F186-4864-B61F-F180A9350878"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-12413",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2019-12-16T22:15:11.120",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"lastModified": "2023-05-22T11:36:12.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,9 +84,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:incubator_superset:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.31",
|
||||
"matchCriteriaId": "AC1ABE25-D2C1-484A-9FD5-50EDD392E321"
|
||||
"matchCriteriaId": "0A255AB8-8F25-4B67-98F4-4684869E7D72"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-12414",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2019-12-16T22:15:11.197",
|
||||
"lastModified": "2019-12-19T18:24:12.077",
|
||||
"lastModified": "2023-05-22T11:36:12.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -84,9 +84,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apache:incubator_superset:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "0.32",
|
||||
"matchCriteriaId": "3E88118A-FAFD-4FCF-BC3F-ADA276E4BEFE"
|
||||
"matchCriteriaId": "3F696084-BE8C-41F6-AAEA-77D28B4C7E37"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-36694",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-21T23:15:08.960",
|
||||
"lastModified": "2023-05-21T23:15:08.960",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-46888",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-21T20:15:09.240",
|
||||
"lastModified": "2023-05-21T20:15:09.240",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-0010",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2023-05-22T08:15:08.920",
|
||||
"lastModified": "2023-05-22T08:15:08.920",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2022/CVE-2022-416xx/CVE-2022-41608.json
Normal file
55
CVE-2022/CVE-2022-416xx/CVE-2022-41608.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2022-41608",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T10:15:09.920",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Thomas Belser Asgaros Forum plugin <=\u00a02.2.0 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/asgaros-forum/wordpress-asgaros-forum-plugin-2-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2022/CVE-2022-447xx/CVE-2022-44739.json
Normal file
55
CVE-2022/CVE-2022-447xx/CVE-2022-44739.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2022-44739",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T10:15:10.337",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in ThingsForRestaurants Quick Restaurant Reservations plugin <=\u00a01.5.4 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/quick-restaurant-reservations/wordpress-quick-restaurant-reservations-plugin-1-5-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2022/CVE-2022-450xx/CVE-2022-45076.json
Normal file
55
CVE-2022/CVE-2022-450xx/CVE-2022-45076.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2022-45076",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T10:15:10.823",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in WebMat Flexible Elementor Panel plugin <=\u00a02.3.8 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/flexible-elementor-panel/wordpress-flexible-elementor-panel-plugin-2-3-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2022/CVE-2022-450xx/CVE-2022-45079.json
Normal file
55
CVE-2022/CVE-2022-450xx/CVE-2022-45079.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2022-45079",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T10:15:11.203",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Softaculous Loginizer plugin <=\u00a01.7.5 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/loginizer/wordpress-loginizer-plugin-1-7-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2022/CVE-2022-453xx/CVE-2022-45376.json
Normal file
55
CVE-2022/CVE-2022-453xx/CVE-2022-45376.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2022-45376",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T10:15:11.587",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in XootiX Side Cart Woocommerce (Ajax) <\u00a02.1 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/side-cart-woocommerce/wordpress-side-cart-woocommerce-ajax-plugin-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47134",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-20T23:15:09.017",
|
||||
"lastModified": "2023-05-20T23:15:09.017",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47142",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T09:15:09.830",
|
||||
"lastModified": "2023-05-22T09:15:09.830",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2022/CVE-2022-471xx/CVE-2022-47167.json
Normal file
55
CVE-2022/CVE-2022-471xx/CVE-2022-47167.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2022-47167",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T10:15:11.957",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Aram Kocharyan Crayon Syntax Highlighter plugin <=\u00a02.8.4 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/crayon-syntax-highlighter/wordpress-crayon-syntax-highlighter-plugin-2-8-4-cross-site-request-forgery-csrf?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2022/CVE-2022-471xx/CVE-2022-47183.json
Normal file
55
CVE-2022/CVE-2022-471xx/CVE-2022-47183.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2022-47183",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T10:15:12.310",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in StylistWP Extra Block Design, Style, CSS for ANY Gutenberg Blocks plugin <=\u00a00.2.6 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/stylist/wordpress-extra-block-design-style-css-for-any-gutenberg-blocks-plugin-0-2-6-cross-site-request-forgery-csrf?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47609",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T09:15:10.457",
|
||||
"lastModified": "2023-05-22T09:15:10.457",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2022/CVE-2022-476xx/CVE-2022-47611.json
Normal file
55
CVE-2022/CVE-2022-476xx/CVE-2022-47611.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2022-47611",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T10:15:12.683",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Julian Weinert // cs&m Hover Image plugin <=\u00a01.4.1 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/hover-image/wordpress-hover-image-plugin-1-4-1-cross-site-request-forgery-csrf?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1692",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-05-20T15:15:08.717",
|
||||
"lastModified": "2023-05-20T15:15:08.717",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:57:01.797",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1693",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-05-20T15:15:08.767",
|
||||
"lastModified": "2023-05-20T15:15:08.767",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:57:01.797",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1694",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-05-20T15:15:08.810",
|
||||
"lastModified": "2023-05-20T15:15:08.810",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:57:01.797",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1696",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2023-05-20T15:15:08.847",
|
||||
"lastModified": "2023-05-20T15:15:08.847",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:57:01.797",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22688",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T09:15:10.540",
|
||||
"lastModified": "2023-05-22T09:15:10.540",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22689",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-20T23:15:09.097",
|
||||
"lastModified": "2023-05-20T23:15:09.097",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22692",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T09:15:10.623",
|
||||
"lastModified": "2023-05-22T09:15:10.623",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22709",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T09:15:10.693",
|
||||
"lastModified": "2023-05-22T09:15:10.693",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22714",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T09:15:10.767",
|
||||
"lastModified": "2023-05-22T09:15:10.767",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23680",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T09:15:10.837",
|
||||
"lastModified": "2023-05-22T09:15:10.837",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23712",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T09:15:10.903",
|
||||
"lastModified": "2023-05-22T09:15:10.903",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2023/CVE-2023-237xx/CVE-2023-23797.json
Normal file
55
CVE-2023/CVE-2023-237xx/CVE-2023-23797.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-23797",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T11:15:09.237",
|
||||
"lastModified": "2023-05-22T11:15:09.237",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) vulnerability in SecondLineThemes Auto YouTube Importer plugin <=\u00a01.0.3 versions."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/auto-youtube-importer/wordpress-auto-youtube-importer-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23813",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-22T09:15:10.973",
|
||||
"lastModified": "2023-05-22T09:15:10.973",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23890",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-20T23:15:09.160",
|
||||
"lastModified": "2023-05-20T23:15:09.160",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24414",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-20T23:15:09.227",
|
||||
"lastModified": "2023-05-20T23:15:09.227",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2023/CVE-2023-255xx/CVE-2023-25537.json
Normal file
55
CVE-2023/CVE-2023-255xx/CVE-2023-25537.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-25537",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2023-05-22T11:15:09.333",
|
||||
"lastModified": "2023-05-22T11:15:09.333",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nDell PowerEdge 14G server BIOS versions prior to 2.18.1 and Dell Precision BIOS versions prior to 2.18.2, contain an Out of Bounds write vulnerability. A local attacker with low privileges could potentially exploit this vulnerability leading to exposure of some SMRAM stack/data/code in System Management Mode, leading to arbitrary code execution or escalation of privilege.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security_alert@emc.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.dell.com/support/kbdoc/en-us/000213550/dsa-2023-098-security-update-for-dell-poweredge-14g-server-bios-for-an-out-of-bounds-write-vulnerability",
|
||||
"source": "security_alert@emc.com"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-287xx/CVE-2023-28709.json
Normal file
32
CVE-2023/CVE-2023-287xx/CVE-2023-28709.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-28709",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-05-22T11:15:09.423",
|
||||
"lastModified": "2023-05-22T11:15:09.423",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount\u00a0could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters\u00a0in the query string, the limit for uploaded request parts could be\u00a0bypassed with the potential for a denial of service to occur.\n\n\n\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@apache.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-193"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lists.apache.org/thread/7wvxonzwb7k9hx9jt3q33cmy7j97jo3j",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2826",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-21T08:15:08.643",
|
||||
"lastModified": "2023-05-21T08:15:08.643",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2023/CVE-2023-28xx/CVE-2023-2832.json
Normal file
59
CVE-2023/CVE-2023-28xx/CVE-2023-2832.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-2832",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-22T11:15:09.493",
|
||||
"lastModified": "2023-05-22T11:15:09.493",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": " SQL Injection in GitHub repository unilogies/bumsys prior to 2.2.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/37b80402-0edf-4f26-a668-b6f8b48dcdfb",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32336",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-05-22T01:15:42.787",
|
||||
"lastModified": "2023-05-22T01:15:42.787",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32589",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-20T23:15:09.287",
|
||||
"lastModified": "2023-05-20T23:15:09.287",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32700",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-20T18:15:09.370",
|
||||
"lastModified": "2023-05-20T18:15:09.370",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33235",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-05-22T06:15:11.020",
|
||||
"lastModified": "2023-05-22T06:15:11.020",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33236",
|
||||
"sourceIdentifier": "psirt@moxa.com",
|
||||
"published": "2023-05-22T07:15:09.257",
|
||||
"lastModified": "2023-05-22T07:15:09.257",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:50.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33244",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-20T19:15:08.817",
|
||||
"lastModified": "2023-05-20T19:15:08.817",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33250",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-21T21:15:08.737",
|
||||
"lastModified": "2023-05-21T21:15:08.737",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33251",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-21T21:15:08.790",
|
||||
"lastModified": "2023-05-21T21:15:08.790",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33252",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-21T22:15:14.940",
|
||||
"lastModified": "2023-05-21T22:15:14.940",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33254",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-21T22:15:15.067",
|
||||
"lastModified": "2023-05-21T22:15:15.067",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33264",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-22T01:15:44.333",
|
||||
"lastModified": "2023-05-22T01:15:44.333",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33281",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-22T02:15:11.837",
|
||||
"lastModified": "2023-05-22T02:15:11.837",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33285",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-22T03:15:09.720",
|
||||
"lastModified": "2023-05-22T03:15:09.720",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33288",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-22T03:15:09.797",
|
||||
"lastModified": "2023-05-22T03:15:09.797",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33297",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-22T05:15:09.460",
|
||||
"lastModified": "2023-05-22T05:15:09.460",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-22T10:56:56.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
57
README.md
57
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-05-22T10:00:32.773486+00:00
|
||||
2023-05-22T12:00:27.102713+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-05-22T09:15:10.973000+00:00
|
||||
2023-05-22T11:36:12.143000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,29 +29,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
215722
|
||||
215734
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `10`
|
||||
Recently added CVEs: `12`
|
||||
|
||||
* [CVE-2022-0010](CVE-2022/CVE-2022-00xx/CVE-2022-0010.json) (`2023-05-22T08:15:08.920`)
|
||||
* [CVE-2022-47142](CVE-2022/CVE-2022-471xx/CVE-2022-47142.json) (`2023-05-22T09:15:09.830`)
|
||||
* [CVE-2022-47609](CVE-2022/CVE-2022-476xx/CVE-2022-47609.json) (`2023-05-22T09:15:10.457`)
|
||||
* [CVE-2023-22688](CVE-2023/CVE-2023-226xx/CVE-2023-22688.json) (`2023-05-22T09:15:10.540`)
|
||||
* [CVE-2023-22692](CVE-2023/CVE-2023-226xx/CVE-2023-22692.json) (`2023-05-22T09:15:10.623`)
|
||||
* [CVE-2023-22709](CVE-2023/CVE-2023-227xx/CVE-2023-22709.json) (`2023-05-22T09:15:10.693`)
|
||||
* [CVE-2023-22714](CVE-2023/CVE-2023-227xx/CVE-2023-22714.json) (`2023-05-22T09:15:10.767`)
|
||||
* [CVE-2023-23680](CVE-2023/CVE-2023-236xx/CVE-2023-23680.json) (`2023-05-22T09:15:10.837`)
|
||||
* [CVE-2023-23712](CVE-2023/CVE-2023-237xx/CVE-2023-23712.json) (`2023-05-22T09:15:10.903`)
|
||||
* [CVE-2023-23813](CVE-2023/CVE-2023-238xx/CVE-2023-23813.json) (`2023-05-22T09:15:10.973`)
|
||||
* [CVE-2022-41608](CVE-2022/CVE-2022-416xx/CVE-2022-41608.json) (`2023-05-22T10:15:09.920`)
|
||||
* [CVE-2022-44739](CVE-2022/CVE-2022-447xx/CVE-2022-44739.json) (`2023-05-22T10:15:10.337`)
|
||||
* [CVE-2022-45076](CVE-2022/CVE-2022-450xx/CVE-2022-45076.json) (`2023-05-22T10:15:10.823`)
|
||||
* [CVE-2022-45079](CVE-2022/CVE-2022-450xx/CVE-2022-45079.json) (`2023-05-22T10:15:11.203`)
|
||||
* [CVE-2022-45376](CVE-2022/CVE-2022-453xx/CVE-2022-45376.json) (`2023-05-22T10:15:11.587`)
|
||||
* [CVE-2022-47167](CVE-2022/CVE-2022-471xx/CVE-2022-47167.json) (`2023-05-22T10:15:11.957`)
|
||||
* [CVE-2022-47183](CVE-2022/CVE-2022-471xx/CVE-2022-47183.json) (`2023-05-22T10:15:12.310`)
|
||||
* [CVE-2022-47611](CVE-2022/CVE-2022-476xx/CVE-2022-47611.json) (`2023-05-22T10:15:12.683`)
|
||||
* [CVE-2023-23797](CVE-2023/CVE-2023-237xx/CVE-2023-23797.json) (`2023-05-22T11:15:09.237`)
|
||||
* [CVE-2023-25537](CVE-2023/CVE-2023-255xx/CVE-2023-25537.json) (`2023-05-22T11:15:09.333`)
|
||||
* [CVE-2023-28709](CVE-2023/CVE-2023-287xx/CVE-2023-28709.json) (`2023-05-22T11:15:09.423`)
|
||||
* [CVE-2023-2832](CVE-2023/CVE-2023-28xx/CVE-2023-2832.json) (`2023-05-22T11:15:09.493`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `0`
|
||||
Recently modified CVEs: `39`
|
||||
|
||||
* [CVE-2023-22714](CVE-2023/CVE-2023-227xx/CVE-2023-22714.json) (`2023-05-22T10:56:50.933`)
|
||||
* [CVE-2023-23680](CVE-2023/CVE-2023-236xx/CVE-2023-23680.json) (`2023-05-22T10:56:50.933`)
|
||||
* [CVE-2023-23712](CVE-2023/CVE-2023-237xx/CVE-2023-23712.json) (`2023-05-22T10:56:50.933`)
|
||||
* [CVE-2023-23813](CVE-2023/CVE-2023-238xx/CVE-2023-23813.json) (`2023-05-22T10:56:50.933`)
|
||||
* [CVE-2023-32700](CVE-2023/CVE-2023-327xx/CVE-2023-32700.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-33244](CVE-2023/CVE-2023-332xx/CVE-2023-33244.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-22689](CVE-2023/CVE-2023-226xx/CVE-2023-22689.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-23890](CVE-2023/CVE-2023-238xx/CVE-2023-23890.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-24414](CVE-2023/CVE-2023-244xx/CVE-2023-24414.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-32589](CVE-2023/CVE-2023-325xx/CVE-2023-32589.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-2826](CVE-2023/CVE-2023-28xx/CVE-2023-2826.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-33250](CVE-2023/CVE-2023-332xx/CVE-2023-33250.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-33251](CVE-2023/CVE-2023-332xx/CVE-2023-33251.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-33252](CVE-2023/CVE-2023-332xx/CVE-2023-33252.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-33254](CVE-2023/CVE-2023-332xx/CVE-2023-33254.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-32336](CVE-2023/CVE-2023-323xx/CVE-2023-32336.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-33264](CVE-2023/CVE-2023-332xx/CVE-2023-33264.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-33281](CVE-2023/CVE-2023-332xx/CVE-2023-33281.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-33285](CVE-2023/CVE-2023-332xx/CVE-2023-33285.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-33288](CVE-2023/CVE-2023-332xx/CVE-2023-33288.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-33297](CVE-2023/CVE-2023-332xx/CVE-2023-33297.json) (`2023-05-22T10:56:56.373`)
|
||||
* [CVE-2023-1692](CVE-2023/CVE-2023-16xx/CVE-2023-1692.json) (`2023-05-22T10:57:01.797`)
|
||||
* [CVE-2023-1693](CVE-2023/CVE-2023-16xx/CVE-2023-1693.json) (`2023-05-22T10:57:01.797`)
|
||||
* [CVE-2023-1694](CVE-2023/CVE-2023-16xx/CVE-2023-1694.json) (`2023-05-22T10:57:01.797`)
|
||||
* [CVE-2023-1696](CVE-2023/CVE-2023-16xx/CVE-2023-1696.json) (`2023-05-22T10:57:01.797`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user