Auto-Update: 2023-05-21 23:55:27.607743+00:00

This commit is contained in:
cad-safe-bot 2023-05-21 23:55:31 +00:00
parent d7c699211e
commit 446e7def5e
41 changed files with 343 additions and 94 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-18640",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-12-12T03:15:10.850",
"lastModified": "2023-02-28T15:12:33.777",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:09.760",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -614,6 +614,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-28",
"source": "cve@mitre.org"
},
{
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"source": "cve@mitre.org",

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2020-36694",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-21T23:15:08.960",
"lastModified": "2023-05-21T23:15:08.960",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12."
}
],
"metrics": {},
"references": [
{
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10",
"source": "cve@mitre.org"
},
{
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12",
"source": "cve@mitre.org"
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c",
"source": "cve@mitre.org"
},
{
"url": "https://syzkaller.appspot.com/bug?id=0c4fd9c6aa04ec116d01e915d3b186f71a212cb2",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21898",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2021-11-19T20:15:17.747",
"lastModified": "2022-08-31T19:21:12.810",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:10.163",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -87,22 +87,22 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "talos-cna@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-119"
}
]
},
{
"source": "talos-cna@cisco.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-787"
}
]
}
@ -193,6 +193,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-26",
"source": "talos-cna@cisco.com"
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1349",
"source": "talos-cna@cisco.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21899",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2021-11-19T19:15:08.080",
"lastModified": "2022-08-31T19:19:34.800",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:10.407",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -87,22 +87,22 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "talos-cna@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-119"
}
]
},
{
"source": "talos-cna@cisco.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-787"
}
]
}
@ -193,6 +193,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-26",
"source": "talos-cna@cisco.com"
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1350",
"source": "talos-cna@cisco.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21900",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2021-11-19T19:15:08.137",
"lastModified": "2022-08-31T19:19:07.617",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:10.503",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -87,7 +87,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "talos-cna@cisco.com",
"type": "Primary",
"description": [
{
@ -97,7 +97,7 @@
]
},
{
"source": "talos-cna@cisco.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
@ -194,6 +194,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-26",
"source": "talos-cna@cisco.com"
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1351",
"source": "talos-cna@cisco.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-35368",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-11-05T18:15:09.317",
"lastModified": "2023-02-16T19:25:32.830",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:10.607",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -199,6 +199,10 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-25",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41798",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-10-11T08:15:06.647",
"lastModified": "2021-11-26T20:56:03.023",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:10.740",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -151,6 +151,10 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41799",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-10-11T08:15:06.767",
"lastModified": "2021-11-26T20:55:54.990",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:10.857",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -157,6 +157,10 @@
"tags": [
"Permissions Required"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41800",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-10-11T08:15:06.813",
"lastModified": "2021-11-28T23:29:02.137",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:10.940",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -165,6 +165,10 @@
"tags": [
"Permissions Required"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44854",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-26T05:15:10.667",
"lastModified": "2023-01-04T02:04:30.093",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:11.067",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -99,6 +99,10 @@
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44855",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-26T05:15:10.740",
"lastModified": "2023-01-04T02:04:51.773",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:11.207",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -100,6 +100,10 @@
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44856",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-26T06:15:10.737",
"lastModified": "2023-01-05T04:50:16.693",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:11.303",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -100,6 +100,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44857",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-17T04:15:39.137",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:11.393",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -115,6 +115,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
},
{
"url": "https://www.mediawiki.org/wiki/2021-12_security_release/FAQ",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44858",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-20T09:15:06.770",
"lastModified": "2021-12-29T18:18:38.500",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:11.500",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -116,6 +116,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
},
{
"url": "https://www.mediawiki.org/wiki/2021-12_security_release/FAQ",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-45038",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-12-17T04:15:39.197",
"lastModified": "2021-12-21T17:49:06.707",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:11.587",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -115,6 +115,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
},
{
"url": "https://www.mediawiki.org/wiki/2021-12_security_release/FAQ",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-45341",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-25T12:15:07.693",
"lastModified": "2022-11-03T20:41:21.383",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:11.663",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -174,6 +174,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-26",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2022/dsa-5077",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-45342",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-25T13:15:07.830",
"lastModified": "2022-11-07T18:43:26.717",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:11.757",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -179,6 +179,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-26",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2022/dsa-5077",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-45343",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-01-25T13:15:07.873",
"lastModified": "2022-11-07T18:53:27.517",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:11.830",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -159,6 +159,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-26",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2022/dsa-5077",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28202",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-03-30T06:15:06.980",
"lastModified": "2022-10-28T19:01:45.723",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:11.903",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -163,6 +163,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2022/dsa-5246",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28205",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-03-30T07:15:07.390",
"lastModified": "2022-04-05T18:50:41.513",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:11.997",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -111,6 +111,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28206",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-03-30T07:15:07.447",
"lastModified": "2022-04-05T18:51:17.380",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:12.467",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -110,6 +110,10 @@
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28209",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-03-30T07:15:07.493",
"lastModified": "2022-04-05T21:15:46.400",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:12.540",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -110,6 +110,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31090",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-06-27T22:15:08.873",
"lastModified": "2022-10-24T16:45:06.540",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:12.610",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -152,6 +152,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "security-advisories@github.com"
},
{
"url": "https://www.debian.org/security/2022/dsa-5246",
"source": "security-advisories@github.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31091",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-06-27T22:15:08.933",
"lastModified": "2022-12-03T02:29:40.770",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:13.003",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -85,22 +85,22 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-200"
}
]
},
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "NVD-CWE-noinfo"
}
]
}
@ -162,6 +162,10 @@
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "security-advisories@github.com"
},
{
"url": "https://www.debian.org/security/2022/dsa-5246",
"source": "security-advisories@github.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34911",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-07-02T20:15:08.373",
"lastModified": "2022-10-27T14:04:13.867",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:13.097",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -168,6 +168,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2022/dsa-5246",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34912",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-07-02T20:15:08.417",
"lastModified": "2022-10-27T14:09:02.590",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:13.197",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -161,6 +161,10 @@
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
},
{
"url": "https://www.debian.org/security/2022/dsa-5246",
"source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-38749",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2022-09-05T10:15:09.673",
"lastModified": "2022-10-06T12:52:25.080",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:13.300",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -135,6 +135,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-28",
"source": "cve-coordination@google.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-38750",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2022-09-05T10:15:09.733",
"lastModified": "2022-10-06T12:51:48.897",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:13.420",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -140,6 +140,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-28",
"source": "cve-coordination@google.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-38751",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2022-09-05T10:15:09.793",
"lastModified": "2022-10-06T12:46:58.797",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:13.510",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -135,6 +135,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-28",
"source": "cve-coordination@google.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-38752",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2022-09-05T10:15:09.847",
"lastModified": "2022-09-27T18:16:05.457",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:13.583",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -112,6 +112,10 @@
"tags": [
"Permissions Required"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-28",
"source": "cve-coordination@google.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-39955",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2022-09-20T07:15:12.153",
"lastModified": "2023-02-16T19:20:36.153",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:13.737",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -186,6 +186,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-25",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-39956",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2022-09-20T07:15:12.293",
"lastModified": "2023-02-16T19:20:44.517",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:13.937",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -186,6 +186,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-25",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-39957",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2022-09-20T07:15:12.353",
"lastModified": "2023-02-16T19:20:32.660",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:14.133",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -186,6 +186,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-25",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-39958",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2022-09-20T07:15:12.417",
"lastModified": "2023-02-16T19:20:30.583",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:14.350",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -186,6 +186,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-25",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-40468",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-09-19T17:15:14.700",
"lastModified": "2022-10-12T00:15:10.167",
"lastModified": "2023-05-21T22:15:14.443",
"vulnStatus": "Modified",
"descriptions": [
{
@ -95,6 +95,10 @@
{
"url": "https://github.com/tinyproxy/tinyproxy/issues/457#issuecomment-1264176815",
"source": "cve@mitre.org"
},
{
"url": "https://security.gentoo.org/glsa/202305-27",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41765",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-26T06:15:11.007",
"lastModified": "2023-01-05T04:45:52.723",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:14.523",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -87,6 +87,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41767",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-12-26T06:15:11.057",
"lastModified": "2023-01-05T04:49:43.517",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:14.603",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -87,6 +87,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47927",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-12T06:15:08.167",
"lastModified": "2023-01-30T15:18:42.507",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-21T22:15:14.720",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -129,6 +129,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-33252",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-21T22:15:14.940",
"lastModified": "2023-05-21T22:15:14.940",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "iden3 snarkjs through 0.6.11 allows double spending because there is no validation that the publicSignals length is less than the field modulus."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/iden3/snarkjs/commits/master/src/groth16_verify.js",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/iden3/snarkjs/tags",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33254",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-21T22:15:15.067",
"lastModified": "2023-05-21T22:15:15.067",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is an LDAP bind credentials exposure on KACE Systems Deployment and Remote Site appliances 9.0.146. The captured credentials may provide a higher privilege level on the Active Directory domain. To exploit this, an authenticated attacker edits the user-authentication settings to specify an attacker-controlled LDAP server, clicks the Test Settings button, and captures the cleartext credentials."
}
],
"metrics": {},
"references": [
{
"url": "https://www.stevencampbell.info/KACE-LDAP-Bind-Credential-Exposure/",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-21T22:00:27.056165+00:00
2023-05-21T23:55:27.607743+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-21T21:15:08.790000+00:00
2023-05-21T23:15:08.960000+00:00
```
### Last Data Feed Release
@ -29,22 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
215701
215704
```
### CVEs added in the last Commit
Recently added CVEs: `3`
* [CVE-2021-46888](CVE-2021/CVE-2021-468xx/CVE-2021-46888.json) (`2023-05-21T20:15:09.240`)
* [CVE-2023-33250](CVE-2023/CVE-2023-332xx/CVE-2023-33250.json) (`2023-05-21T21:15:08.737`)
* [CVE-2023-33251](CVE-2023/CVE-2023-332xx/CVE-2023-33251.json) (`2023-05-21T21:15:08.790`)
* [CVE-2020-36694](CVE-2020/CVE-2020-366xx/CVE-2020-36694.json) (`2023-05-21T23:15:08.960`)
* [CVE-2023-33252](CVE-2023/CVE-2023-332xx/CVE-2023-33252.json) (`2023-05-21T22:15:14.940`)
* [CVE-2023-33254](CVE-2023/CVE-2023-332xx/CVE-2023-33254.json) (`2023-05-21T22:15:15.067`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `37`
* [CVE-2021-44858](CVE-2021/CVE-2021-448xx/CVE-2021-44858.json) (`2023-05-21T22:15:11.500`)
* [CVE-2021-45038](CVE-2021/CVE-2021-450xx/CVE-2021-45038.json) (`2023-05-21T22:15:11.587`)
* [CVE-2021-45341](CVE-2021/CVE-2021-453xx/CVE-2021-45341.json) (`2023-05-21T22:15:11.663`)
* [CVE-2021-45342](CVE-2021/CVE-2021-453xx/CVE-2021-45342.json) (`2023-05-21T22:15:11.757`)
* [CVE-2021-45343](CVE-2021/CVE-2021-453xx/CVE-2021-45343.json) (`2023-05-21T22:15:11.830`)
* [CVE-2022-28202](CVE-2022/CVE-2022-282xx/CVE-2022-28202.json) (`2023-05-21T22:15:11.903`)
* [CVE-2022-28205](CVE-2022/CVE-2022-282xx/CVE-2022-28205.json) (`2023-05-21T22:15:11.997`)
* [CVE-2022-28206](CVE-2022/CVE-2022-282xx/CVE-2022-28206.json) (`2023-05-21T22:15:12.467`)
* [CVE-2022-28209](CVE-2022/CVE-2022-282xx/CVE-2022-28209.json) (`2023-05-21T22:15:12.540`)
* [CVE-2022-31090](CVE-2022/CVE-2022-310xx/CVE-2022-31090.json) (`2023-05-21T22:15:12.610`)
* [CVE-2022-31091](CVE-2022/CVE-2022-310xx/CVE-2022-31091.json) (`2023-05-21T22:15:13.003`)
* [CVE-2022-34911](CVE-2022/CVE-2022-349xx/CVE-2022-34911.json) (`2023-05-21T22:15:13.097`)
* [CVE-2022-34912](CVE-2022/CVE-2022-349xx/CVE-2022-34912.json) (`2023-05-21T22:15:13.197`)
* [CVE-2022-38749](CVE-2022/CVE-2022-387xx/CVE-2022-38749.json) (`2023-05-21T22:15:13.300`)
* [CVE-2022-38750](CVE-2022/CVE-2022-387xx/CVE-2022-38750.json) (`2023-05-21T22:15:13.420`)
* [CVE-2022-38751](CVE-2022/CVE-2022-387xx/CVE-2022-38751.json) (`2023-05-21T22:15:13.510`)
* [CVE-2022-38752](CVE-2022/CVE-2022-387xx/CVE-2022-38752.json) (`2023-05-21T22:15:13.583`)
* [CVE-2022-39955](CVE-2022/CVE-2022-399xx/CVE-2022-39955.json) (`2023-05-21T22:15:13.737`)
* [CVE-2022-39956](CVE-2022/CVE-2022-399xx/CVE-2022-39956.json) (`2023-05-21T22:15:13.937`)
* [CVE-2022-39957](CVE-2022/CVE-2022-399xx/CVE-2022-39957.json) (`2023-05-21T22:15:14.133`)
* [CVE-2022-39958](CVE-2022/CVE-2022-399xx/CVE-2022-39958.json) (`2023-05-21T22:15:14.350`)
* [CVE-2022-40468](CVE-2022/CVE-2022-404xx/CVE-2022-40468.json) (`2023-05-21T22:15:14.443`)
* [CVE-2022-41765](CVE-2022/CVE-2022-417xx/CVE-2022-41765.json) (`2023-05-21T22:15:14.523`)
* [CVE-2022-41767](CVE-2022/CVE-2022-417xx/CVE-2022-41767.json) (`2023-05-21T22:15:14.603`)
* [CVE-2022-47927](CVE-2022/CVE-2022-479xx/CVE-2022-47927.json) (`2023-05-21T22:15:14.720`)
## Download and Usage