From 3dbda27e205fb47ba5d95ab730744ffc213f2d3b Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 20 Jun 2023 22:00:30 +0000 Subject: [PATCH] Auto-Update: 2023-06-20T22:00:27.192145+00:00 --- CVE-2023/CVE-2023-18xx/CVE-2023-1899.json | 59 ++++++- CVE-2023/CVE-2023-215xx/CVE-2023-21565.json | 49 +++++- CVE-2023/CVE-2023-215xx/CVE-2023-21569.json | 49 +++++- CVE-2023/CVE-2023-249xx/CVE-2023-24938.json | 122 ++++++++++++- CVE-2023/CVE-2023-286xx/CVE-2023-28620.json | 46 ++++- CVE-2023/CVE-2023-293xx/CVE-2023-29346.json | 176 ++++++++++++++++++- CVE-2023/CVE-2023-293xx/CVE-2023-29351.json | 176 ++++++++++++++++++- CVE-2023/CVE-2023-293xx/CVE-2023-29352.json | 92 +++++++++- CVE-2023/CVE-2023-293xx/CVE-2023-29353.json | 46 ++++- CVE-2023/CVE-2023-293xx/CVE-2023-29355.json | 59 ++++++- CVE-2023/CVE-2023-293xx/CVE-2023-29357.json | 39 ++++- CVE-2023/CVE-2023-293xx/CVE-2023-29358.json | 176 ++++++++++++++++++- CVE-2023/CVE-2023-293xx/CVE-2023-29359.json | 176 ++++++++++++++++++- CVE-2023/CVE-2023-293xx/CVE-2023-29360.json | 139 ++++++++++++++- CVE-2023/CVE-2023-293xx/CVE-2023-29361.json | 99 ++++++++++- CVE-2023/CVE-2023-293xx/CVE-2023-29370.json | 151 +++++++++++++++- CVE-2023/CVE-2023-293xx/CVE-2023-29371.json | 176 ++++++++++++++++++- CVE-2023/CVE-2023-293xx/CVE-2023-29372.json | 176 ++++++++++++++++++- CVE-2023/CVE-2023-293xx/CVE-2023-29373.json | 180 +++++++++++++++++++- CVE-2023/CVE-2023-30xx/CVE-2023-3047.json | 45 ++++- CVE-2023/CVE-2023-31xx/CVE-2023-3159.json | 92 +++++++++- CVE-2023/CVE-2023-31xx/CVE-2023-3198.json | 57 ++++++- CVE-2023/CVE-2023-320xx/CVE-2023-32008.json | 151 +++++++++++++++- CVE-2023/CVE-2023-320xx/CVE-2023-32009.json | 139 ++++++++++++++- CVE-2023/CVE-2023-320xx/CVE-2023-32010.json | 46 ++++- CVE-2023/CVE-2023-320xx/CVE-2023-32011.json | 176 ++++++++++++++++++- CVE-2023/CVE-2023-320xx/CVE-2023-32013.json | 108 +++++++++++- CVE-2023/CVE-2023-320xx/CVE-2023-32019.json | 134 ++++++++++++++- CVE-2023/CVE-2023-320xx/CVE-2023-32020.json | 96 ++++++++++- CVE-2023/CVE-2023-322xx/CVE-2023-32274.json | 55 ++++++ CVE-2023/CVE-2023-32xx/CVE-2023-3200.json | 57 ++++++- CVE-2023/CVE-2023-32xx/CVE-2023-3201.json | 57 ++++++- CVE-2023/CVE-2023-32xx/CVE-2023-3203.json | 69 +++++++- CVE-2023/CVE-2023-32xx/CVE-2023-3220.json | 32 ++++ CVE-2023/CVE-2023-338xx/CVE-2023-33869.json | 55 ++++++ CVE-2023/CVE-2023-345xx/CVE-2023-34563.json | 24 +++ CVE-2023/CVE-2023-351xx/CVE-2023-35166.json | 63 +++++++ CVE-2023/CVE-2023-358xx/CVE-2023-35866.json | 12 +- CVE-2023/CVE-2023-358xx/CVE-2023-35885.json | 20 +++ README.md | 66 +++---- 40 files changed, 3599 insertions(+), 141 deletions(-) create mode 100644 CVE-2023/CVE-2023-322xx/CVE-2023-32274.json create mode 100644 CVE-2023/CVE-2023-32xx/CVE-2023-3220.json create mode 100644 CVE-2023/CVE-2023-338xx/CVE-2023-33869.json create mode 100644 CVE-2023/CVE-2023-345xx/CVE-2023-34563.json create mode 100644 CVE-2023/CVE-2023-351xx/CVE-2023-35166.json create mode 100644 CVE-2023/CVE-2023-358xx/CVE-2023-35885.json diff --git a/CVE-2023/CVE-2023-18xx/CVE-2023-1899.json b/CVE-2023/CVE-2023-18xx/CVE-2023-1899.json index 271fa2fa939..a09434b0af3 100644 --- a/CVE-2023/CVE-2023-18xx/CVE-2023-1899.json +++ b/CVE-2023/CVE-2023-18xx/CVE-2023-1899.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1899", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-06-12T20:15:11.610", - "lastModified": "2023-06-13T13:01:10.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:12:47.793", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -46,10 +66,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:atlascopco:power_focus_6000_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E95BFC78-DFF2-43D1-8649-97F3B3AEEA99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:atlascopco:power_focus_6000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1C7C93-A752-4905-AFD7-366DC6E1E7E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-159-01", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21565.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21565.json index bd8e3ca1bcd..b8bc68b0fb7 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21565.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21565.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21565", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:09.433", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T21:22:02.110", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,53 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:azure_devops_server:2020.1.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A8F7E9F3-B3DC-4161-AA99-DF4E17599868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:azure_devops_server:2022:-:*:*:*:*:*:*", + "matchCriteriaId": "17B4B344-7600-4E89-B2ED-F97792D5746B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:azure_devops_server:2022.0.1:-:*:*:*:*:*:*", + "matchCriteriaId": "890F7135-DCF3-40A6-9FFE-F048EE7E1565" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21565", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-215xx/CVE-2023-21569.json b/CVE-2023/CVE-2023-215xx/CVE-2023-21569.json index 16dc3e99a87..6e0500832a5 100644 --- a/CVE-2023/CVE-2023-215xx/CVE-2023-21569.json +++ b/CVE-2023/CVE-2023-215xx/CVE-2023-21569.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21569", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:09.497", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T21:21:52.057", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,53 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:azure_devops_server:2020.1.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A8F7E9F3-B3DC-4161-AA99-DF4E17599868" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:azure_devops_server:2022:-:*:*:*:*:*:*", + "matchCriteriaId": "17B4B344-7600-4E89-B2ED-F97792D5746B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:azure_devops_server:2022.0.1:-:*:*:*:*:*:*", + "matchCriteriaId": "890F7135-DCF3-40A6-9FFE-F048EE7E1565" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21569", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24938.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24938.json index 3fca449cdfc..23498942514 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24938.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24938.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24938", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:09.557", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T21:21:33.567", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,126 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "C5F955D6-1553-4C59-9DD0-C875FB3D1199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "70A25108-6F9B-4D9A-8776-25F869CD95A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "A6C6E459-F691-4B83-94B5-62607ED91406" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "20834FD7-6DA0-44F2-9D03-42F8A0B0A504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "DFCEE4E3-FD34-4A17-ACA8-15F617104185" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "690CB61E-C65F-4F3C-A82E-96F3DF4FA25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8B3DF61B-DCBB-4FB0-A0EF-1E5829941C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24938", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28620.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28620.json index ca94ab3f34c..b70c828f14e 100644 --- a/CVE-2023/CVE-2023-286xx/CVE-2023-28620.json +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28620.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28620", "sourceIdentifier": "audit@patchstack.com", "published": "2023-06-13T15:15:14.043", - "lastModified": "2023-06-13T16:54:51.953", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:54:26.943", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cyberuslabs:cyberus_key:1.0:*:*:*:*:wordpress:*:*", + "matchCriteriaId": "886B7D67-A020-4064-920F-D1C9D9E87079" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/cyberus-key/wordpress-cyberus-key-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29346.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29346.json index 8b23ad48c4b..1710dee1078 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29346.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29346.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29346", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:09.620", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T21:19:38.503", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,180 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "992E86DA-C9EA-48FD-8CE5-F44864A81924" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "9FA87858-6343-4542-9EED-9B19C7CA0DA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "CB89DC1F-2A03-4235-B6FD-EF80FF8B3C1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "E5B21E84-205B-4407-90AF-4775E5D2E882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "C5F955D6-1553-4C59-9DD0-C875FB3D1199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "70A25108-6F9B-4D9A-8776-25F869CD95A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "A6C6E459-F691-4B83-94B5-62607ED91406" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "20834FD7-6DA0-44F2-9D03-42F8A0B0A504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "DFCEE4E3-FD34-4A17-ACA8-15F617104185" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "690CB61E-C65F-4F3C-A82E-96F3DF4FA25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8B3DF61B-DCBB-4FB0-A0EF-1E5829941C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29346", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29351.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29351.json index 2f5df2c7f47..d0c6b768c1d 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29351.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29351.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29351", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:09.677", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T21:13:19.193", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,180 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "992E86DA-C9EA-48FD-8CE5-F44864A81924" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "9FA87858-6343-4542-9EED-9B19C7CA0DA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "CB89DC1F-2A03-4235-B6FD-EF80FF8B3C1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "E5B21E84-205B-4407-90AF-4775E5D2E882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "C5F955D6-1553-4C59-9DD0-C875FB3D1199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "70A25108-6F9B-4D9A-8776-25F869CD95A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "A6C6E459-F691-4B83-94B5-62607ED91406" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "20834FD7-6DA0-44F2-9D03-42F8A0B0A504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "DFCEE4E3-FD34-4A17-ACA8-15F617104185" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "690CB61E-C65F-4F3C-A82E-96F3DF4FA25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8B3DF61B-DCBB-4FB0-A0EF-1E5829941C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29351", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29352.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29352.json index e25b8fa5712..f0449f7824d 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29352.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29352.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29352", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:09.733", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T21:05:34.610", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,96 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:remote_desktop:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "1.2.4337.0", + "matchCriteriaId": "7DC7E27B-4261-4DD2-87A0-E2944758233A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "20834FD7-6DA0-44F2-9D03-42F8A0B0A504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29352", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29353.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29353.json index a021229991a..1ff56fefeee 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29353.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29353.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29353", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:09.790", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:48:59.790", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sysinternals:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.6", + "matchCriteriaId": "7D4C674C-003C-4C25-ACCA-82D042570BCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sysinternals_process_monitor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.94", + "matchCriteriaId": "E3BC7825-726C-42F4-A244-0B540DE509DF" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29353", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29355.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29355.json index 478a738ffe2..4a4765853e1 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29355.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29355.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29355", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:09.847", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:48:16.660", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,63 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-668" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29355", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29357.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29357.json index fcc9d897d8a..b75a258db75 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29357.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29357.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29357", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:09.903", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:35:11.730", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,43 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*", + "matchCriteriaId": "6122D014-5BF1-4AF4-8B4D-80205ED7785E" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29357", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29358.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29358.json index 519e3674bb5..a871370bd3e 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29358.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29358.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29358", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:09.957", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:34:44.957", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,180 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "992E86DA-C9EA-48FD-8CE5-F44864A81924" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "9FA87858-6343-4542-9EED-9B19C7CA0DA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "CB89DC1F-2A03-4235-B6FD-EF80FF8B3C1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "E5B21E84-205B-4407-90AF-4775E5D2E882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "C5F955D6-1553-4C59-9DD0-C875FB3D1199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "70A25108-6F9B-4D9A-8776-25F869CD95A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "A6C6E459-F691-4B83-94B5-62607ED91406" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "20834FD7-6DA0-44F2-9D03-42F8A0B0A504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "DFCEE4E3-FD34-4A17-ACA8-15F617104185" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "690CB61E-C65F-4F3C-A82E-96F3DF4FA25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8B3DF61B-DCBB-4FB0-A0EF-1E5829941C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29358", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29359.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29359.json index 7efa561f70e..3cc8a77b762 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29359.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29359.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29359", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:10.010", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:07:19.560", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,180 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "992E86DA-C9EA-48FD-8CE5-F44864A81924" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "9FA87858-6343-4542-9EED-9B19C7CA0DA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "CB89DC1F-2A03-4235-B6FD-EF80FF8B3C1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "E5B21E84-205B-4407-90AF-4775E5D2E882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "C5F955D6-1553-4C59-9DD0-C875FB3D1199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "70A25108-6F9B-4D9A-8776-25F869CD95A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "A6C6E459-F691-4B83-94B5-62607ED91406" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "20834FD7-6DA0-44F2-9D03-42F8A0B0A504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "DFCEE4E3-FD34-4A17-ACA8-15F617104185" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "690CB61E-C65F-4F3C-A82E-96F3DF4FA25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8B3DF61B-DCBB-4FB0-A0EF-1E5829941C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29359", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29360.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29360.json index 4fb458f86aa..82fac9b5afc 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29360.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29360.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29360", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:10.067", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:05:47.983", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,143 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "CB89DC1F-2A03-4235-B6FD-EF80FF8B3C1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "E5B21E84-205B-4407-90AF-4775E5D2E882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "C5F955D6-1553-4C59-9DD0-C875FB3D1199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "70A25108-6F9B-4D9A-8776-25F869CD95A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "A6C6E459-F691-4B83-94B5-62607ED91406" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "20834FD7-6DA0-44F2-9D03-42F8A0B0A504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "DFCEE4E3-FD34-4A17-ACA8-15F617104185" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "690CB61E-C65F-4F3C-A82E-96F3DF4FA25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8B3DF61B-DCBB-4FB0-A0EF-1E5829941C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29360", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29361.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29361.json index c6f888b1bfd..3780e6d5cae 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29361.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29361.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29361", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:10.117", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:05:34.557", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,103 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "A6C6E459-F691-4B83-94B5-62607ED91406" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "20834FD7-6DA0-44F2-9D03-42F8A0B0A504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "DFCEE4E3-FD34-4A17-ACA8-15F617104185" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "690CB61E-C65F-4F3C-A82E-96F3DF4FA25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8B3DF61B-DCBB-4FB0-A0EF-1E5829941C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29361", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29370.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29370.json index 1c96ff7f868..9113edb5f71 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29370.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29370.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29370", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:10.640", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:30:08.680", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,155 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "992E86DA-C9EA-48FD-8CE5-F44864A81924" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "9FA87858-6343-4542-9EED-9B19C7CA0DA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "CB89DC1F-2A03-4235-B6FD-EF80FF8B3C1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "E5B21E84-205B-4407-90AF-4775E5D2E882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "C5F955D6-1553-4C59-9DD0-C875FB3D1199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "70A25108-6F9B-4D9A-8776-25F869CD95A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "A6C6E459-F691-4B83-94B5-62607ED91406" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "20834FD7-6DA0-44F2-9D03-42F8A0B0A504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "DFCEE4E3-FD34-4A17-ACA8-15F617104185" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "690CB61E-C65F-4F3C-A82E-96F3DF4FA25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8B3DF61B-DCBB-4FB0-A0EF-1E5829941C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29370", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29371.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29371.json index 6bdd592fca1..79302878905 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29371.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29371.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29371", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:10.697", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:28:47.430", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,180 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "992E86DA-C9EA-48FD-8CE5-F44864A81924" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "9FA87858-6343-4542-9EED-9B19C7CA0DA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "CB89DC1F-2A03-4235-B6FD-EF80FF8B3C1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "E5B21E84-205B-4407-90AF-4775E5D2E882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "C5F955D6-1553-4C59-9DD0-C875FB3D1199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "70A25108-6F9B-4D9A-8776-25F869CD95A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "A6C6E459-F691-4B83-94B5-62607ED91406" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "20834FD7-6DA0-44F2-9D03-42F8A0B0A504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "DFCEE4E3-FD34-4A17-ACA8-15F617104185" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "690CB61E-C65F-4F3C-A82E-96F3DF4FA25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8B3DF61B-DCBB-4FB0-A0EF-1E5829941C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29371", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29372.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29372.json index 1a0f1856531..fa356a6d5af 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29372.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29372.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29372", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:10.753", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:34:25.470", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,180 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "992E86DA-C9EA-48FD-8CE5-F44864A81924" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "9FA87858-6343-4542-9EED-9B19C7CA0DA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "CB89DC1F-2A03-4235-B6FD-EF80FF8B3C1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "E5B21E84-205B-4407-90AF-4775E5D2E882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "C5F955D6-1553-4C59-9DD0-C875FB3D1199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "70A25108-6F9B-4D9A-8776-25F869CD95A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "A6C6E459-F691-4B83-94B5-62607ED91406" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "20834FD7-6DA0-44F2-9D03-42F8A0B0A504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "DFCEE4E3-FD34-4A17-ACA8-15F617104185" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "690CB61E-C65F-4F3C-A82E-96F3DF4FA25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8B3DF61B-DCBB-4FB0-A0EF-1E5829941C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29372", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29373.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29373.json index ce6531804b7..77fa9c7c774 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29373.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29373.json @@ -2,12 +2,16 @@ "id": "CVE-2023-29373", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:10.807", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:27:52.463", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Microsoft ODBC Driver Remote Code Execution Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de Ejecuci\u00f3n de C\u00f3digo Remota de Microsoft ODBC Driver" } ], "metrics": { @@ -34,10 +38,180 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "992E86DA-C9EA-48FD-8CE5-F44864A81924" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "9FA87858-6343-4542-9EED-9B19C7CA0DA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "CB89DC1F-2A03-4235-B6FD-EF80FF8B3C1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "E5B21E84-205B-4407-90AF-4775E5D2E882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "C5F955D6-1553-4C59-9DD0-C875FB3D1199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "70A25108-6F9B-4D9A-8776-25F869CD95A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "A6C6E459-F691-4B83-94B5-62607ED91406" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "20834FD7-6DA0-44F2-9D03-42F8A0B0A504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "DFCEE4E3-FD34-4A17-ACA8-15F617104185" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "690CB61E-C65F-4F3C-A82E-96F3DF4FA25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8B3DF61B-DCBB-4FB0-A0EF-1E5829941C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29373", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3047.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3047.json index 11121bc9131..903d480e800 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3047.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3047.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3047", "sourceIdentifier": "cve@usom.gov.tr", "published": "2023-06-13T12:15:09.477", - "lastModified": "2023-06-19T13:15:09.893", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:48:20.030", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -46,14 +46,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tmtmakine:lockcell_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0", + "matchCriteriaId": "0AEA1741-BFBD-413B-A270-0F1438F1E9DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tmtmakine:lockcell:-:*:*:*:*:*:*:*", + "matchCriteriaId": "188C6BB7-34D5-4529-A793-22651CD088DF" + } + ] + } + ] + } + ], "references": [ { "url": "https://fordefence.com/cve-2023-3047-tmt-lockcell-sql-injection/", - "source": "cve@usom.gov.tr" + "source": "cve@usom.gov.tr", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.usom.gov.tr/bildirim/tr-23-0345", - "source": "cve@usom.gov.tr" + "source": "cve@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3159.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3159.json index 3757d729986..859821a52dc 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3159.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3159.json @@ -2,16 +2,49 @@ "id": "CVE-2023-3159", "sourceIdentifier": "secalert@redhat.com", "published": "2023-06-12T21:15:22.937", - "lastModified": "2023-06-13T13:00:53.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:29:24.710", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A use after free issue was discovered in driver/firewire in outbound_phy_packet_callback in the Linux Kernel. In this flaw a local attacker with special privilege may cause a use after free problem when queue_event() fails." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -23,10 +56,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.18", + "matchCriteriaId": "FE93544F-B946-47CF-9697-FBF3484FCB92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:-:*:*:*:*:*:*", + "matchCriteriaId": "0384FA0A-DE99-48D7-84E3-46ED0C3B5E03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*", + "matchCriteriaId": "6AD94161-84BB-42E6-9882-4FC0C42E9FC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*", + "matchCriteriaId": "7AB06DDF-3C2B-416D-B448-E990D8FF67A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*", + "matchCriteriaId": "EAE6C6C5-4D21-4C04-897C-70CBBB3D7B91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*", + "matchCriteriaId": "DA5F085D-52F3-4EE2-8353-455D1A6FE073" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*", + "matchCriteriaId": "D6EE5B78-0D83-4715-893C-ABD69B49E7FC" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/torvalds/linux/commit/b7c81f80246fac44077166f3e07103affe6db8ff", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3198.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3198.json index d7b79923fb8..745c1214061 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3198.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3198.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3198", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-14T02:15:08.067", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:40:27.623", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -46,18 +66,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.6", + "matchCriteriaId": "D181286E-99D3-48F5-A6A6-CE69143FBA0A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/mstore-api/trunk/mstore-api.php#L264", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2925048%40mstore-api&new=2925048%40mstore-api&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c5f30190-4576-4c2b-b069-72501538733b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32008.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32008.json index c592e6ab117..7a7b705e1a7 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32008.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32008.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32008", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:10.867", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:27:01.550", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,155 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "992E86DA-C9EA-48FD-8CE5-F44864A81924" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "9FA87858-6343-4542-9EED-9B19C7CA0DA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "CB89DC1F-2A03-4235-B6FD-EF80FF8B3C1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "E5B21E84-205B-4407-90AF-4775E5D2E882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "C5F955D6-1553-4C59-9DD0-C875FB3D1199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "70A25108-6F9B-4D9A-8776-25F869CD95A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "A6C6E459-F691-4B83-94B5-62607ED91406" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "20834FD7-6DA0-44F2-9D03-42F8A0B0A504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "DFCEE4E3-FD34-4A17-ACA8-15F617104185" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "690CB61E-C65F-4F3C-A82E-96F3DF4FA25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8B3DF61B-DCBB-4FB0-A0EF-1E5829941C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32008", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32009.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32009.json index b872f4c209f..00cde6b744d 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32009.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32009.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32009", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:10.917", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:25:14.137", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,143 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "CB89DC1F-2A03-4235-B6FD-EF80FF8B3C1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "E5B21E84-205B-4407-90AF-4775E5D2E882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "C5F955D6-1553-4C59-9DD0-C875FB3D1199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "70A25108-6F9B-4D9A-8776-25F869CD95A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.3087", + "matchCriteriaId": "E8102C71-9DCE-469D-B4D5-26617C955DBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.3087", + "matchCriteriaId": "E0F3398C-7C4B-4297-85A3-3E8EB9A8A11A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.3087", + "matchCriteriaId": "2C9ADB92-B335-4FEB-A902-7E0B64437D8A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "690CB61E-C65F-4F3C-A82E-96F3DF4FA25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8B3DF61B-DCBB-4FB0-A0EF-1E5829941C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32009", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32010.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32010.json index c81742e1304..7c39e1dbde1 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32010.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32010.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32010", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:10.970", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:20:49.773", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32010", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32011.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32011.json index 363be861f71..dd8c24518d8 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32011.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32011.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32011", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:11.043", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:18:04.873", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,180 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "992E86DA-C9EA-48FD-8CE5-F44864A81924" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.19983", + "matchCriteriaId": "9FA87858-6343-4542-9EED-9B19C7CA0DA9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "CB89DC1F-2A03-4235-B6FD-EF80FF8B3C1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "E5B21E84-205B-4407-90AF-4775E5D2E882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "C5F955D6-1553-4C59-9DD0-C875FB3D1199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "70A25108-6F9B-4D9A-8776-25F869CD95A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "A6C6E459-F691-4B83-94B5-62607ED91406" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "20834FD7-6DA0-44F2-9D03-42F8A0B0A504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "DFCEE4E3-FD34-4A17-ACA8-15F617104185" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "690CB61E-C65F-4F3C-A82E-96F3DF4FA25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8B3DF61B-DCBB-4FB0-A0EF-1E5829941C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32011", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32013.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32013.json index 5976ef50aa8..d382ec3f3ea 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32013.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32013.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32013", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:11.163", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:00:55.950", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -34,10 +54,90 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.3087", + "matchCriteriaId": "E0F3398C-7C4B-4297-85A3-3E8EB9A8A11A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32013", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32019.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32019.json index 43db4ad3641..324e1e36a99 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32019.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32019.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32019", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:11.507", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:17:29.043", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,138 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-668" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "CB89DC1F-2A03-4235-B6FD-EF80FF8B3C1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.5989", + "matchCriteriaId": "E5B21E84-205B-4407-90AF-4775E5D2E882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "C5F955D6-1553-4C59-9DD0-C875FB3D1199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "F77DB019-5063-4534-9BF2-DF51CD20AB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.4499", + "matchCriteriaId": "70A25108-6F9B-4D9A-8776-25F869CD95A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "A6C6E459-F691-4B83-94B5-62607ED91406" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "20834FD7-6DA0-44F2-9D03-42F8A0B0A504" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "DFCEE4E3-FD34-4A17-ACA8-15F617104185" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "690CB61E-C65F-4F3C-A82E-96F3DF4FA25C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8AE28877-7C04-4EF6-9727-CFEDFAAEFB49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.3087", + "matchCriteriaId": "8B3DF61B-DCBB-4FB0-A0EF-1E5829941C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "3C51F6A7-2518-4DF2-93E7-4C19914F4063" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2057", + "matchCriteriaId": "FFAF133F-F2A1-4BCC-B901-5C0A775BEC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "886BF41E-670B-4B8B-ACDE-EB5C3C25EDC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.1848", + "matchCriteriaId": "0D900723-68F0-4973-BE03-41A261869D6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32019", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32020.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32020.json index 260a4539c17..a2ba7c5f924 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32020.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32020.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32020", "sourceIdentifier": "secure@microsoft.com", "published": "2023-06-14T00:15:11.563", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T21:02:38.020", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.4 + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", @@ -34,10 +54,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32020", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32274.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32274.json new file mode 100644 index 00000000000..61e85b81571 --- /dev/null +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32274.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-32274", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2023-06-20T20:15:09.413", + "lastModified": "2023-06-20T20:15:09.413", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\n\n\n\n\nEnphase Installer Toolkit versions 3.27.0 has hard coded credentials embedded in binary code in the Android application. An attacker can exploit this and gain access to sensitive information.\n\n\n\n\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-171-02", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3200.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3200.json index db30cdc2b98..2e9013c7c5e 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3200.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3200.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3200", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-14T02:15:08.137", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:40:07.300", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -46,18 +66,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.6", + "matchCriteriaId": "D181286E-99D3-48F5-A6A6-CE69143FBA0A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/mstore-api/trunk/mstore-api.php#L248", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2925048%40mstore-api&new=2925048%40mstore-api&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/78f3c503-e255-44d2-8432-48dc2c5f553d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3201.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3201.json index 8bc5874454a..f6b7d9b61da 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3201.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3201.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3201", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-14T02:15:08.197", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:39:44.083", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -46,18 +66,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.6", + "matchCriteriaId": "D181286E-99D3-48F5-A6A6-CE69143FBA0A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/mstore-api/trunk/mstore-api.php#L240", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2925048%40mstore-api&new=2925048%40mstore-api&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cb5cb1a5-30d2-434f-90f9-d37aecfbe158?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3203.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3203.json index 8ae32fa1856..68b018b4dae 100644 --- a/CVE-2023/CVE-2023-32xx/CVE-2023-3203.json +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3203.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3203", "sourceIdentifier": "security@wordfence.com", "published": "2023-06-14T02:15:08.257", - "lastModified": "2023-06-14T03:37:44.217", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-20T20:39:12.493", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -36,7 +56,7 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -44,20 +64,57 @@ "value": "CWE-352" } ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:inspireui:mstore_api:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.9.6", + "matchCriteriaId": "D181286E-99D3-48F5-A6A6-CE69143FBA0A" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/mstore-api/trunk/mstore-api.php#L222", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2925048%40mstore-api&new=2925048%40mstore-api&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1aed51a2-9fd4-43bb-b72d-ae8e51ee6e87?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-32xx/CVE-2023-3220.json b/CVE-2023/CVE-2023-32xx/CVE-2023-3220.json new file mode 100644 index 00000000000..2f2ed6a7632 --- /dev/null +++ b/CVE-2023/CVE-2023-32xx/CVE-2023-3220.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2023-3220", + "sourceIdentifier": "secalert@redhat.com", + "published": "2023-06-20T20:15:09.737", + "lastModified": "2023-06-20T20:15:09.737", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the Linux kernel through 6.1-rc8. dpu_crtc_atomic_check in drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c lacks check of the return value of kzalloc() and will cause the NULL Pointer Dereference." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93340e10b9c5fc86730d149636e0aa8b47bb5a34", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33869.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33869.json new file mode 100644 index 00000000000..e93d7bf86e4 --- /dev/null +++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33869.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-33869", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2023-06-20T20:15:09.493", + "lastModified": "2023-06-20T20:15:09.493", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "\nEnphase Envoy versions D7.0.88 is vulnerable to a command injection exploit that may allow an attacker to execute root commands.\n\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-171-01", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-345xx/CVE-2023-34563.json b/CVE-2023/CVE-2023-345xx/CVE-2023-34563.json new file mode 100644 index 00000000000..6feb3465060 --- /dev/null +++ b/CVE-2023/CVE-2023-345xx/CVE-2023-34563.json @@ -0,0 +1,24 @@ +{ + "id": "CVE-2023-34563", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-20T21:15:09.883", + "lastModified": "2023-06-20T21:15:09.883", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "netgear R6250 Firmware Version 1.0.4.48 is vulnerable to Buffer Overflow after authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/D2y6p/CVE/blob/main/Netgear/CVE-2023-34563/EN.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.netgear.com/about/security/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-351xx/CVE-2023-35166.json b/CVE-2023/CVE-2023-351xx/CVE-2023-35166.json new file mode 100644 index 00000000000..1271ef8188f --- /dev/null +++ b/CVE-2023/CVE-2023-351xx/CVE-2023-35166.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-35166", + "sourceIdentifier": "security-advisories@github.com", + "published": "2023-06-20T20:15:09.563", + "lastModified": "2023-06-20T20:15:09.563", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. It's possible to execute any wiki content with the right of the TipsPanel author by creating a tip UI extension. This has been patched in XWiki 15.1-rc-1 and 14.10.5.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xwiki/xwiki-platform/commit/98208c5bb1e8cdf3ff1ac35d8b3d1cb3c28b3263#diff-4e3467d2ef3871a68b2f910e67cf84531751b32e0126321be83c0f1ed5d90b29L176-R178", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h7cw-44vp-jq7h", + "source": "security-advisories@github.com" + }, + { + "url": "https://jira.xwiki.org/browse/XWIKI-20281", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35866.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35866.json index 324008593a4..4187c38d7fc 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35866.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35866.json @@ -2,12 +2,12 @@ "id": "CVE-2023-35866", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-19T06:15:09.240", - "lastModified": "2023-06-20T07:12:55.493", + "lastModified": "2023-06-20T20:15:09.633", "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", - "value": "In KeePassXC through 2.7.5, a local attacker can make changes to the Database security settings, including master password and second-factor authentication, within an authenticated KeePassXC Database session, without the need to authenticate these changes by entering the password and/or second-factor authentication to confirm changes." + "value": "** DISPUTED ** In KeePassXC through 2.7.5, a local attacker can make changes to the Database security settings, including master password and second-factor authentication, within an authenticated KeePassXC Database session, without the need to authenticate these changes by entering the password and/or second-factor authentication to confirm changes. NOTE: the vendor's position is \"asking the user for their password prior to making any changes to the database settings adds no additional protection against a local attacker.\"" } ], "metrics": {}, @@ -16,9 +16,17 @@ "url": "https://github.com/keepassxreboot/keepassxc/issues/9339", "source": "cve@mitre.org" }, + { + "url": "https://github.com/keepassxreboot/keepassxc/issues/9339#issuecomment-1598219482", + "source": "cve@mitre.org" + }, { "url": "https://github.com/keepassxreboot/keepassxc/issues/9391", "source": "cve@mitre.org" + }, + { + "url": "https://keepassxc.org/docs/#faq-yubikey-2fa", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35885.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35885.json new file mode 100644 index 00000000000..965591789b7 --- /dev/null +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35885.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-35885", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-06-20T20:15:09.687", + "lastModified": "2023-06-20T20:15:09.687", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "CloudPanel 2 before 2.3.1 has insecure file-manager cookie authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.cloudpanel.io/docs/v2/changelog/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 8ee4b39b2bc..4cbe43a4d6b 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-20T20:00:29.261599+00:00 +2023-06-20T22:00:27.192145+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-20T19:59:54.767000+00:00 +2023-06-20T21:22:02.110000+00:00 ``` ### Last Data Feed Release @@ -29,44 +29,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -218165 +218171 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `6` +* [CVE-2023-32274](CVE-2023/CVE-2023-322xx/CVE-2023-32274.json) (`2023-06-20T20:15:09.413`) +* [CVE-2023-33869](CVE-2023/CVE-2023-338xx/CVE-2023-33869.json) (`2023-06-20T20:15:09.493`) +* [CVE-2023-35166](CVE-2023/CVE-2023-351xx/CVE-2023-35166.json) (`2023-06-20T20:15:09.563`) +* [CVE-2023-35885](CVE-2023/CVE-2023-358xx/CVE-2023-35885.json) (`2023-06-20T20:15:09.687`) +* [CVE-2023-3220](CVE-2023/CVE-2023-32xx/CVE-2023-3220.json) (`2023-06-20T20:15:09.737`) +* [CVE-2023-34563](CVE-2023/CVE-2023-345xx/CVE-2023-34563.json) (`2023-06-20T21:15:09.883`) ### CVEs modified in the last Commit -Recently modified CVEs: `26` +Recently modified CVEs: `33` -* [CVE-2022-31693](CVE-2022/CVE-2022-316xx/CVE-2022-31693.json) (`2023-06-20T18:13:24.757`) -* [CVE-2023-32312](CVE-2023/CVE-2023-323xx/CVE-2023-32312.json) (`2023-06-20T18:08:10.447`) -* [CVE-2023-35032](CVE-2023/CVE-2023-350xx/CVE-2023-35032.json) (`2023-06-20T18:26:48.497`) -* [CVE-2023-35035](CVE-2023/CVE-2023-350xx/CVE-2023-35035.json) (`2023-06-20T18:36:19.147`) -* [CVE-2023-35031](CVE-2023/CVE-2023-350xx/CVE-2023-35031.json) (`2023-06-20T19:15:25.187`) -* [CVE-2023-35033](CVE-2023/CVE-2023-350xx/CVE-2023-35033.json) (`2023-06-20T19:21:44.307`) -* [CVE-2023-2563](CVE-2023/CVE-2023-25xx/CVE-2023-2563.json) (`2023-06-20T19:24:24.880`) -* [CVE-2023-33985](CVE-2023/CVE-2023-339xx/CVE-2023-33985.json) (`2023-06-20T19:27:12.497`) -* [CVE-2023-27997](CVE-2023/CVE-2023-279xx/CVE-2023-27997.json) (`2023-06-20T19:33:19.433`) -* [CVE-2023-33984](CVE-2023/CVE-2023-339xx/CVE-2023-33984.json) (`2023-06-20T19:37:16.977`) -* [CVE-2023-29178](CVE-2023/CVE-2023-291xx/CVE-2023-29178.json) (`2023-06-20T19:37:44.500`) -* [CVE-2023-26538](CVE-2023/CVE-2023-265xx/CVE-2023-26538.json) (`2023-06-20T19:43:39.983`) -* [CVE-2023-26298](CVE-2023/CVE-2023-262xx/CVE-2023-26298.json) (`2023-06-20T19:44:49.347`) -* [CVE-2023-26297](CVE-2023/CVE-2023-262xx/CVE-2023-26297.json) (`2023-06-20T19:48:19.363`) -* [CVE-2023-26296](CVE-2023/CVE-2023-262xx/CVE-2023-26296.json) (`2023-06-20T19:48:53.800`) -* [CVE-2023-26295](CVE-2023/CVE-2023-262xx/CVE-2023-26295.json) (`2023-06-20T19:49:05.647`) -* [CVE-2023-24510](CVE-2023/CVE-2023-245xx/CVE-2023-24510.json) (`2023-06-20T19:49:20.500`) -* [CVE-2023-29369](CVE-2023/CVE-2023-293xx/CVE-2023-29369.json) (`2023-06-20T19:51:03.950`) -* [CVE-2023-29368](CVE-2023/CVE-2023-293xx/CVE-2023-29368.json) (`2023-06-20T19:51:49.153`) -* [CVE-2023-29367](CVE-2023/CVE-2023-293xx/CVE-2023-29367.json) (`2023-06-20T19:54:19.593`) -* [CVE-2023-29366](CVE-2023/CVE-2023-293xx/CVE-2023-29366.json) (`2023-06-20T19:56:11.997`) -* [CVE-2023-29365](CVE-2023/CVE-2023-293xx/CVE-2023-29365.json) (`2023-06-20T19:56:28.040`) -* [CVE-2023-29364](CVE-2023/CVE-2023-293xx/CVE-2023-29364.json) (`2023-06-20T19:59:15.930`) -* [CVE-2023-29363](CVE-2023/CVE-2023-293xx/CVE-2023-29363.json) (`2023-06-20T19:59:44.103`) -* [CVE-2023-25910](CVE-2023/CVE-2023-259xx/CVE-2023-25910.json) (`2023-06-20T19:59:54.767`) +* [CVE-2023-32010](CVE-2023/CVE-2023-320xx/CVE-2023-32010.json) (`2023-06-20T20:20:49.773`) +* [CVE-2023-32009](CVE-2023/CVE-2023-320xx/CVE-2023-32009.json) (`2023-06-20T20:25:14.137`) +* [CVE-2023-32008](CVE-2023/CVE-2023-320xx/CVE-2023-32008.json) (`2023-06-20T20:27:01.550`) +* [CVE-2023-29373](CVE-2023/CVE-2023-293xx/CVE-2023-29373.json) (`2023-06-20T20:27:52.463`) +* [CVE-2023-29371](CVE-2023/CVE-2023-293xx/CVE-2023-29371.json) (`2023-06-20T20:28:47.430`) +* [CVE-2023-3159](CVE-2023/CVE-2023-31xx/CVE-2023-3159.json) (`2023-06-20T20:29:24.710`) +* [CVE-2023-29370](CVE-2023/CVE-2023-293xx/CVE-2023-29370.json) (`2023-06-20T20:30:08.680`) +* [CVE-2023-29372](CVE-2023/CVE-2023-293xx/CVE-2023-29372.json) (`2023-06-20T20:34:25.470`) +* [CVE-2023-29358](CVE-2023/CVE-2023-293xx/CVE-2023-29358.json) (`2023-06-20T20:34:44.957`) +* [CVE-2023-29357](CVE-2023/CVE-2023-293xx/CVE-2023-29357.json) (`2023-06-20T20:35:11.730`) +* [CVE-2023-3203](CVE-2023/CVE-2023-32xx/CVE-2023-3203.json) (`2023-06-20T20:39:12.493`) +* [CVE-2023-3201](CVE-2023/CVE-2023-32xx/CVE-2023-3201.json) (`2023-06-20T20:39:44.083`) +* [CVE-2023-3200](CVE-2023/CVE-2023-32xx/CVE-2023-3200.json) (`2023-06-20T20:40:07.300`) +* [CVE-2023-3198](CVE-2023/CVE-2023-31xx/CVE-2023-3198.json) (`2023-06-20T20:40:27.623`) +* [CVE-2023-29355](CVE-2023/CVE-2023-293xx/CVE-2023-29355.json) (`2023-06-20T20:48:16.660`) +* [CVE-2023-3047](CVE-2023/CVE-2023-30xx/CVE-2023-3047.json) (`2023-06-20T20:48:20.030`) +* [CVE-2023-29353](CVE-2023/CVE-2023-293xx/CVE-2023-29353.json) (`2023-06-20T20:48:59.790`) +* [CVE-2023-28620](CVE-2023/CVE-2023-286xx/CVE-2023-28620.json) (`2023-06-20T20:54:26.943`) +* [CVE-2023-32020](CVE-2023/CVE-2023-320xx/CVE-2023-32020.json) (`2023-06-20T21:02:38.020`) +* [CVE-2023-29352](CVE-2023/CVE-2023-293xx/CVE-2023-29352.json) (`2023-06-20T21:05:34.610`) +* [CVE-2023-29351](CVE-2023/CVE-2023-293xx/CVE-2023-29351.json) (`2023-06-20T21:13:19.193`) +* [CVE-2023-29346](CVE-2023/CVE-2023-293xx/CVE-2023-29346.json) (`2023-06-20T21:19:38.503`) +* [CVE-2023-24938](CVE-2023/CVE-2023-249xx/CVE-2023-24938.json) (`2023-06-20T21:21:33.567`) +* [CVE-2023-21569](CVE-2023/CVE-2023-215xx/CVE-2023-21569.json) (`2023-06-20T21:21:52.057`) +* [CVE-2023-21565](CVE-2023/CVE-2023-215xx/CVE-2023-21565.json) (`2023-06-20T21:22:02.110`) ## Download and Usage