diff --git a/CVE-2018/CVE-2018-80xx/CVE-2018-8035.json b/CVE-2018/CVE-2018-80xx/CVE-2018-8035.json index 51ad19a9731..570cc49d440 100644 --- a/CVE-2018/CVE-2018-80xx/CVE-2018-8035.json +++ b/CVE-2018/CVE-2018-80xx/CVE-2018-8035.json @@ -2,7 +2,7 @@ "id": "CVE-2018-8035", "sourceIdentifier": "security@apache.org", "published": "2019-05-01T21:29:00.550", - "lastModified": "2019-06-06T20:29:00.277", + "lastModified": "2023-05-22T11:36:12.143", "vulnStatus": "Modified", "descriptions": [ { @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:unstructured_information_management_architecture_distributed_uima_cluster_computing:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:apache:uimaducc:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.2.2", - "matchCriteriaId": "8EA699CC-FDC8-4E23-9645-EEB8A6D44BA3" + "matchCriteriaId": "15F3BA52-F186-4864-B61F-F180A9350878" } ] } diff --git a/CVE-2019/CVE-2019-124xx/CVE-2019-12413.json b/CVE-2019/CVE-2019-124xx/CVE-2019-12413.json index f81199d32e9..ecc5ede7fde 100644 --- a/CVE-2019/CVE-2019-124xx/CVE-2019-12413.json +++ b/CVE-2019/CVE-2019-124xx/CVE-2019-12413.json @@ -2,7 +2,7 @@ "id": "CVE-2019-12413", "sourceIdentifier": "security@apache.org", "published": "2019-12-16T22:15:11.120", - "lastModified": "2020-08-24T17:37:01.140", + "lastModified": "2023-05-22T11:36:12.143", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:incubator_superset:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.31", - "matchCriteriaId": "AC1ABE25-D2C1-484A-9FD5-50EDD392E321" + "matchCriteriaId": "0A255AB8-8F25-4B67-98F4-4684869E7D72" } ] } diff --git a/CVE-2019/CVE-2019-124xx/CVE-2019-12414.json b/CVE-2019/CVE-2019-124xx/CVE-2019-12414.json index 9812a064791..119de22f308 100644 --- a/CVE-2019/CVE-2019-124xx/CVE-2019-12414.json +++ b/CVE-2019/CVE-2019-124xx/CVE-2019-12414.json @@ -2,7 +2,7 @@ "id": "CVE-2019-12414", "sourceIdentifier": "security@apache.org", "published": "2019-12-16T22:15:11.197", - "lastModified": "2019-12-19T18:24:12.077", + "lastModified": "2023-05-22T11:36:12.143", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:apache:incubator_superset:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.32", - "matchCriteriaId": "3E88118A-FAFD-4FCF-BC3F-ADA276E4BEFE" + "matchCriteriaId": "3F696084-BE8C-41F6-AAEA-77D28B4C7E37" } ] } diff --git a/CVE-2020/CVE-2020-366xx/CVE-2020-36694.json b/CVE-2020/CVE-2020-366xx/CVE-2020-36694.json index 81bb330888d..6223a694161 100644 --- a/CVE-2020/CVE-2020-366xx/CVE-2020-36694.json +++ b/CVE-2020/CVE-2020-366xx/CVE-2020-36694.json @@ -2,8 +2,8 @@ "id": "CVE-2020-36694", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-21T23:15:08.960", - "lastModified": "2023-05-21T23:15:08.960", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-468xx/CVE-2021-46888.json b/CVE-2021/CVE-2021-468xx/CVE-2021-46888.json index 9db8e0c0319..a943c4904f4 100644 --- a/CVE-2021/CVE-2021-468xx/CVE-2021-46888.json +++ b/CVE-2021/CVE-2021-468xx/CVE-2021-46888.json @@ -2,8 +2,8 @@ "id": "CVE-2021-46888", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-21T20:15:09.240", - "lastModified": "2023-05-21T20:15:09.240", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-00xx/CVE-2022-0010.json b/CVE-2022/CVE-2022-00xx/CVE-2022-0010.json index 937ef68636c..a1c95fb45a8 100644 --- a/CVE-2022/CVE-2022-00xx/CVE-2022-0010.json +++ b/CVE-2022/CVE-2022-00xx/CVE-2022-0010.json @@ -2,8 +2,8 @@ "id": "CVE-2022-0010", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2023-05-22T08:15:08.920", - "lastModified": "2023-05-22T08:15:08.920", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-416xx/CVE-2022-41608.json b/CVE-2022/CVE-2022-416xx/CVE-2022-41608.json new file mode 100644 index 00000000000..60a994a5248 --- /dev/null +++ b/CVE-2022/CVE-2022-416xx/CVE-2022-41608.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-41608", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-22T10:15:09.920", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Thomas Belser Asgaros Forum plugin <=\u00a02.2.0 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/asgaros-forum/wordpress-asgaros-forum-plugin-2-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-447xx/CVE-2022-44739.json b/CVE-2022/CVE-2022-447xx/CVE-2022-44739.json new file mode 100644 index 00000000000..eb47c6abab3 --- /dev/null +++ b/CVE-2022/CVE-2022-447xx/CVE-2022-44739.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-44739", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-22T10:15:10.337", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ThingsForRestaurants Quick Restaurant Reservations plugin <=\u00a01.5.4 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/quick-restaurant-reservations/wordpress-quick-restaurant-reservations-plugin-1-5-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-450xx/CVE-2022-45076.json b/CVE-2022/CVE-2022-450xx/CVE-2022-45076.json new file mode 100644 index 00000000000..52cb2a822ed --- /dev/null +++ b/CVE-2022/CVE-2022-450xx/CVE-2022-45076.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-45076", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-22T10:15:10.823", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in WebMat Flexible Elementor Panel plugin <=\u00a02.3.8 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/flexible-elementor-panel/wordpress-flexible-elementor-panel-plugin-2-3-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-450xx/CVE-2022-45079.json b/CVE-2022/CVE-2022-450xx/CVE-2022-45079.json new file mode 100644 index 00000000000..aece5d5cd45 --- /dev/null +++ b/CVE-2022/CVE-2022-450xx/CVE-2022-45079.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-45079", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-22T10:15:11.203", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Softaculous Loginizer plugin <=\u00a01.7.5 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/loginizer/wordpress-loginizer-plugin-1-7-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-453xx/CVE-2022-45376.json b/CVE-2022/CVE-2022-453xx/CVE-2022-45376.json new file mode 100644 index 00000000000..b5dbf0f8529 --- /dev/null +++ b/CVE-2022/CVE-2022-453xx/CVE-2022-45376.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-45376", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-22T10:15:11.587", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in XootiX Side Cart Woocommerce (Ajax) <\u00a02.1 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/side-cart-woocommerce/wordpress-side-cart-woocommerce-ajax-plugin-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-471xx/CVE-2022-47134.json b/CVE-2022/CVE-2022-471xx/CVE-2022-47134.json index 0d5c2a6df92..7a3635c71d6 100644 --- a/CVE-2022/CVE-2022-471xx/CVE-2022-47134.json +++ b/CVE-2022/CVE-2022-471xx/CVE-2022-47134.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47134", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-20T23:15:09.017", - "lastModified": "2023-05-20T23:15:09.017", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-471xx/CVE-2022-47142.json b/CVE-2022/CVE-2022-471xx/CVE-2022-47142.json index 9ce6e6d03c9..e634d29adee 100644 --- a/CVE-2022/CVE-2022-471xx/CVE-2022-47142.json +++ b/CVE-2022/CVE-2022-471xx/CVE-2022-47142.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47142", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-22T09:15:09.830", - "lastModified": "2023-05-22T09:15:09.830", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-471xx/CVE-2022-47167.json b/CVE-2022/CVE-2022-471xx/CVE-2022-47167.json new file mode 100644 index 00000000000..eedcacb2872 --- /dev/null +++ b/CVE-2022/CVE-2022-471xx/CVE-2022-47167.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-47167", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-22T10:15:11.957", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Aram Kocharyan Crayon Syntax Highlighter plugin <=\u00a02.8.4 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/crayon-syntax-highlighter/wordpress-crayon-syntax-highlighter-plugin-2-8-4-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-471xx/CVE-2022-47183.json b/CVE-2022/CVE-2022-471xx/CVE-2022-47183.json new file mode 100644 index 00000000000..97340357ddd --- /dev/null +++ b/CVE-2022/CVE-2022-471xx/CVE-2022-47183.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-47183", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-22T10:15:12.310", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in StylistWP Extra Block Design, Style, CSS for ANY Gutenberg Blocks plugin <=\u00a00.2.6 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/stylist/wordpress-extra-block-design-style-css-for-any-gutenberg-blocks-plugin-0-2-6-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47609.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47609.json index 144522a7c7e..5b21fea65ce 100644 --- a/CVE-2022/CVE-2022-476xx/CVE-2022-47609.json +++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47609.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47609", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-22T09:15:10.457", - "lastModified": "2023-05-22T09:15:10.457", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-476xx/CVE-2022-47611.json b/CVE-2022/CVE-2022-476xx/CVE-2022-47611.json new file mode 100644 index 00000000000..62b344c50fc --- /dev/null +++ b/CVE-2022/CVE-2022-476xx/CVE-2022-47611.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-47611", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-22T10:15:12.683", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Julian Weinert // cs&m Hover Image plugin <=\u00a01.4.1 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/hover-image/wordpress-hover-image-plugin-1-4-1-cross-site-request-forgery-csrf?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1692.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1692.json index 63df3254a5d..144613a9029 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1692.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1692.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1692", "sourceIdentifier": "psirt@huawei.com", "published": "2023-05-20T15:15:08.717", - "lastModified": "2023-05-20T15:15:08.717", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:57:01.797", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1693.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1693.json index 8648c4e9aa5..21f1e715c09 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1693.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1693.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1693", "sourceIdentifier": "psirt@huawei.com", "published": "2023-05-20T15:15:08.767", - "lastModified": "2023-05-20T15:15:08.767", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:57:01.797", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1694.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1694.json index ca9b8277484..380f70c92f2 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1694.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1694.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1694", "sourceIdentifier": "psirt@huawei.com", "published": "2023-05-20T15:15:08.810", - "lastModified": "2023-05-20T15:15:08.810", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:57:01.797", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1696.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1696.json index 3347fec916a..00a59ae8ee7 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1696.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1696.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1696", "sourceIdentifier": "psirt@huawei.com", "published": "2023-05-20T15:15:08.847", - "lastModified": "2023-05-20T15:15:08.847", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:57:01.797", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22688.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22688.json index cc794e3f5d3..5e0c5793f3d 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22688.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22688.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22688", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-22T09:15:10.540", - "lastModified": "2023-05-22T09:15:10.540", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22689.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22689.json index ad66693fb7f..3c6b8b6547d 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22689.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22689.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22689", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-20T23:15:09.097", - "lastModified": "2023-05-20T23:15:09.097", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22692.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22692.json index 2b112ca5a0d..4c1a7242af2 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22692.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22692.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22692", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-22T09:15:10.623", - "lastModified": "2023-05-22T09:15:10.623", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22709.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22709.json index 0ab735fc1b2..0699e1a3796 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22709.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22709.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22709", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-22T09:15:10.693", - "lastModified": "2023-05-22T09:15:10.693", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22714.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22714.json index 0be6c777f7c..e83e32a4dda 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22714.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22714.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22714", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-22T09:15:10.767", - "lastModified": "2023-05-22T09:15:10.767", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-236xx/CVE-2023-23680.json b/CVE-2023/CVE-2023-236xx/CVE-2023-23680.json index 08ea012130e..179e494f66e 100644 --- a/CVE-2023/CVE-2023-236xx/CVE-2023-23680.json +++ b/CVE-2023/CVE-2023-236xx/CVE-2023-23680.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23680", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-22T09:15:10.837", - "lastModified": "2023-05-22T09:15:10.837", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23712.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23712.json index 65530e90033..0f540aa950b 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23712.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23712.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23712", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-22T09:15:10.903", - "lastModified": "2023-05-22T09:15:10.903", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23797.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23797.json new file mode 100644 index 00000000000..4e72df74afe --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23797.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23797", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-22T11:15:09.237", + "lastModified": "2023-05-22T11:15:09.237", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in SecondLineThemes Auto YouTube Importer plugin <=\u00a01.0.3 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/auto-youtube-importer/wordpress-auto-youtube-importer-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23813.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23813.json index c233527e4a5..9ff042226a6 100644 --- a/CVE-2023/CVE-2023-238xx/CVE-2023-23813.json +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23813.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23813", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-22T09:15:10.973", - "lastModified": "2023-05-22T09:15:10.973", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23890.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23890.json index fe103f44776..d85af17aecf 100644 --- a/CVE-2023/CVE-2023-238xx/CVE-2023-23890.json +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23890.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23890", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-20T23:15:09.160", - "lastModified": "2023-05-20T23:15:09.160", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24414.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24414.json index 3528090d072..6abef6c9cc1 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24414.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24414.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24414", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-20T23:15:09.227", - "lastModified": "2023-05-20T23:15:09.227", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-255xx/CVE-2023-25537.json b/CVE-2023/CVE-2023-255xx/CVE-2023-25537.json new file mode 100644 index 00000000000..304bd15574b --- /dev/null +++ b/CVE-2023/CVE-2023-255xx/CVE-2023-25537.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25537", + "sourceIdentifier": "security_alert@emc.com", + "published": "2023-05-22T11:15:09.333", + "lastModified": "2023-05-22T11:15:09.333", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nDell PowerEdge 14G server BIOS versions prior to 2.18.1 and Dell Precision BIOS versions prior to 2.18.2, contain an Out of Bounds write vulnerability. A local attacker with low privileges could potentially exploit this vulnerability leading to exposure of some SMRAM stack/data/code in System Management Mode, leading to arbitrary code execution or escalation of privilege.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000213550/dsa-2023-098-security-update-for-dell-poweredge-14g-server-bios-for-an-out-of-bounds-write-vulnerability", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28709.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28709.json new file mode 100644 index 00000000000..8dd090420a5 --- /dev/null +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28709.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-28709", + "sourceIdentifier": "security@apache.org", + "published": "2023-05-22T11:15:09.423", + "lastModified": "2023-05-22T11:15:09.423", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount\u00a0could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters\u00a0in the query string, the limit for uploaded request parts could be\u00a0bypassed with the potential for a denial of service to occur.\n\n\n\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-193" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/7wvxonzwb7k9hx9jt3q33cmy7j97jo3j", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json index e646d627fb1..c09559d3ba7 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2826.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2826", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-21T08:15:08.643", - "lastModified": "2023-05-21T08:15:08.643", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2832.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2832.json new file mode 100644 index 00000000000..f3116538f8b --- /dev/null +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2832.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-2832", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-05-22T11:15:09.493", + "lastModified": "2023-05-22T11:15:09.493", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": " SQL Injection in GitHub repository unilogies/bumsys prior to 2.2.0." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/37b80402-0edf-4f26-a668-b6f8b48dcdfb", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32336.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32336.json index 68c753105ed..38ebcf267e4 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32336.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32336.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32336", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-05-22T01:15:42.787", - "lastModified": "2023-05-22T01:15:42.787", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-325xx/CVE-2023-32589.json b/CVE-2023/CVE-2023-325xx/CVE-2023-32589.json index fae63e6a02b..6d04f2aef34 100644 --- a/CVE-2023/CVE-2023-325xx/CVE-2023-32589.json +++ b/CVE-2023/CVE-2023-325xx/CVE-2023-32589.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32589", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-20T23:15:09.287", - "lastModified": "2023-05-20T23:15:09.287", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-327xx/CVE-2023-32700.json b/CVE-2023/CVE-2023-327xx/CVE-2023-32700.json index ca78e4008a6..0b12c3ef1e3 100644 --- a/CVE-2023/CVE-2023-327xx/CVE-2023-32700.json +++ b/CVE-2023/CVE-2023-327xx/CVE-2023-32700.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32700", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-20T18:15:09.370", - "lastModified": "2023-05-20T18:15:09.370", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33235.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33235.json index c2a70e92eb4..0eec24fa6f3 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33235.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33235.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33235", "sourceIdentifier": "psirt@moxa.com", "published": "2023-05-22T06:15:11.020", - "lastModified": "2023-05-22T06:15:11.020", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33236.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33236.json index 6955a7fbacd..b471ad1f7c7 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33236.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33236.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33236", "sourceIdentifier": "psirt@moxa.com", "published": "2023-05-22T07:15:09.257", - "lastModified": "2023-05-22T07:15:09.257", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:50.933", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33244.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33244.json index 14aed1301dd..cf1a2b86af9 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33244.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33244.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33244", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-20T19:15:08.817", - "lastModified": "2023-05-20T19:15:08.817", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33250.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33250.json index d4b5b332533..5f55e97fcbc 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33250.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33250.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33250", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-21T21:15:08.737", - "lastModified": "2023-05-21T21:15:08.737", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33251.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33251.json index 62ae8b093e0..ffa6220bacd 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33251.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33251.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33251", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-21T21:15:08.790", - "lastModified": "2023-05-21T21:15:08.790", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33252.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33252.json index 559e3fa8945..2329b6279bd 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33252.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33252.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33252", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-21T22:15:14.940", - "lastModified": "2023-05-21T22:15:14.940", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33254.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33254.json index 9a71df71bdc..e76238d22bf 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33254.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33254.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33254", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-21T22:15:15.067", - "lastModified": "2023-05-21T22:15:15.067", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33264.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33264.json index 675e2570b67..4e5e87f5a51 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33264.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33264.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33264", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T01:15:44.333", - "lastModified": "2023-05-22T01:15:44.333", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33281.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33281.json index fa64adb0367..1a342218b3a 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33281.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33281.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33281", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T02:15:11.837", - "lastModified": "2023-05-22T02:15:11.837", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33285.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33285.json index 4c4f5de4cbb..9ff9bb9e73f 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33285.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33285.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33285", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T03:15:09.720", - "lastModified": "2023-05-22T03:15:09.720", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33288.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33288.json index 13966bcd7c6..752b6e98da1 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33288.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33288.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33288", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T03:15:09.797", - "lastModified": "2023-05-22T03:15:09.797", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33297.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33297.json index 193ac9b6533..bd4a314f2e5 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33297.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33297.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33297", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T05:15:09.460", - "lastModified": "2023-05-22T05:15:09.460", - "vulnStatus": "Received", + "lastModified": "2023-05-22T10:56:56.373", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 3ad29fe2ea1..db6c2918019 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-22T10:00:32.773486+00:00 +2023-05-22T12:00:27.102713+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-22T09:15:10.973000+00:00 +2023-05-22T11:36:12.143000+00:00 ``` ### Last Data Feed Release @@ -29,29 +29,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -215722 +215734 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `12` -* [CVE-2022-0010](CVE-2022/CVE-2022-00xx/CVE-2022-0010.json) (`2023-05-22T08:15:08.920`) -* [CVE-2022-47142](CVE-2022/CVE-2022-471xx/CVE-2022-47142.json) (`2023-05-22T09:15:09.830`) -* [CVE-2022-47609](CVE-2022/CVE-2022-476xx/CVE-2022-47609.json) (`2023-05-22T09:15:10.457`) -* [CVE-2023-22688](CVE-2023/CVE-2023-226xx/CVE-2023-22688.json) (`2023-05-22T09:15:10.540`) -* [CVE-2023-22692](CVE-2023/CVE-2023-226xx/CVE-2023-22692.json) (`2023-05-22T09:15:10.623`) -* [CVE-2023-22709](CVE-2023/CVE-2023-227xx/CVE-2023-22709.json) (`2023-05-22T09:15:10.693`) -* [CVE-2023-22714](CVE-2023/CVE-2023-227xx/CVE-2023-22714.json) (`2023-05-22T09:15:10.767`) -* [CVE-2023-23680](CVE-2023/CVE-2023-236xx/CVE-2023-23680.json) (`2023-05-22T09:15:10.837`) -* [CVE-2023-23712](CVE-2023/CVE-2023-237xx/CVE-2023-23712.json) (`2023-05-22T09:15:10.903`) -* [CVE-2023-23813](CVE-2023/CVE-2023-238xx/CVE-2023-23813.json) (`2023-05-22T09:15:10.973`) +* [CVE-2022-41608](CVE-2022/CVE-2022-416xx/CVE-2022-41608.json) (`2023-05-22T10:15:09.920`) +* [CVE-2022-44739](CVE-2022/CVE-2022-447xx/CVE-2022-44739.json) (`2023-05-22T10:15:10.337`) +* [CVE-2022-45076](CVE-2022/CVE-2022-450xx/CVE-2022-45076.json) (`2023-05-22T10:15:10.823`) +* [CVE-2022-45079](CVE-2022/CVE-2022-450xx/CVE-2022-45079.json) (`2023-05-22T10:15:11.203`) +* [CVE-2022-45376](CVE-2022/CVE-2022-453xx/CVE-2022-45376.json) (`2023-05-22T10:15:11.587`) +* [CVE-2022-47167](CVE-2022/CVE-2022-471xx/CVE-2022-47167.json) (`2023-05-22T10:15:11.957`) +* [CVE-2022-47183](CVE-2022/CVE-2022-471xx/CVE-2022-47183.json) (`2023-05-22T10:15:12.310`) +* [CVE-2022-47611](CVE-2022/CVE-2022-476xx/CVE-2022-47611.json) (`2023-05-22T10:15:12.683`) +* [CVE-2023-23797](CVE-2023/CVE-2023-237xx/CVE-2023-23797.json) (`2023-05-22T11:15:09.237`) +* [CVE-2023-25537](CVE-2023/CVE-2023-255xx/CVE-2023-25537.json) (`2023-05-22T11:15:09.333`) +* [CVE-2023-28709](CVE-2023/CVE-2023-287xx/CVE-2023-28709.json) (`2023-05-22T11:15:09.423`) +* [CVE-2023-2832](CVE-2023/CVE-2023-28xx/CVE-2023-2832.json) (`2023-05-22T11:15:09.493`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `39` +* [CVE-2023-22714](CVE-2023/CVE-2023-227xx/CVE-2023-22714.json) (`2023-05-22T10:56:50.933`) +* [CVE-2023-23680](CVE-2023/CVE-2023-236xx/CVE-2023-23680.json) (`2023-05-22T10:56:50.933`) +* [CVE-2023-23712](CVE-2023/CVE-2023-237xx/CVE-2023-23712.json) (`2023-05-22T10:56:50.933`) +* [CVE-2023-23813](CVE-2023/CVE-2023-238xx/CVE-2023-23813.json) (`2023-05-22T10:56:50.933`) +* [CVE-2023-32700](CVE-2023/CVE-2023-327xx/CVE-2023-32700.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-33244](CVE-2023/CVE-2023-332xx/CVE-2023-33244.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-22689](CVE-2023/CVE-2023-226xx/CVE-2023-22689.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-23890](CVE-2023/CVE-2023-238xx/CVE-2023-23890.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-24414](CVE-2023/CVE-2023-244xx/CVE-2023-24414.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-32589](CVE-2023/CVE-2023-325xx/CVE-2023-32589.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-2826](CVE-2023/CVE-2023-28xx/CVE-2023-2826.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-33250](CVE-2023/CVE-2023-332xx/CVE-2023-33250.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-33251](CVE-2023/CVE-2023-332xx/CVE-2023-33251.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-33252](CVE-2023/CVE-2023-332xx/CVE-2023-33252.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-33254](CVE-2023/CVE-2023-332xx/CVE-2023-33254.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-32336](CVE-2023/CVE-2023-323xx/CVE-2023-32336.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-33264](CVE-2023/CVE-2023-332xx/CVE-2023-33264.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-33281](CVE-2023/CVE-2023-332xx/CVE-2023-33281.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-33285](CVE-2023/CVE-2023-332xx/CVE-2023-33285.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-33288](CVE-2023/CVE-2023-332xx/CVE-2023-33288.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-33297](CVE-2023/CVE-2023-332xx/CVE-2023-33297.json) (`2023-05-22T10:56:56.373`) +* [CVE-2023-1692](CVE-2023/CVE-2023-16xx/CVE-2023-1692.json) (`2023-05-22T10:57:01.797`) +* [CVE-2023-1693](CVE-2023/CVE-2023-16xx/CVE-2023-1693.json) (`2023-05-22T10:57:01.797`) +* [CVE-2023-1694](CVE-2023/CVE-2023-16xx/CVE-2023-1694.json) (`2023-05-22T10:57:01.797`) +* [CVE-2023-1696](CVE-2023/CVE-2023-16xx/CVE-2023-1696.json) (`2023-05-22T10:57:01.797`) ## Download and Usage