Auto-Update: 2023-05-21 23:55:27.607743+00:00

This commit is contained in:
cad-safe-bot 2023-05-21 23:55:31 +00:00
parent d7c699211e
commit 446e7def5e
41 changed files with 343 additions and 94 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-18640", "id": "CVE-2017-18640",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2019-12-12T03:15:10.850", "published": "2019-12-12T03:15:10.850",
"lastModified": "2023-02-28T15:12:33.777", "lastModified": "2023-05-21T22:15:09.760",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -614,6 +614,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202305-28",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "url": "https://www.oracle.com/security-alerts/cpuApr2021.html",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2020-36694",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-21T23:15:08.960",
"lastModified": "2023-05-21T23:15:08.960",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12."
}
],
"metrics": {},
"references": [
{
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10",
"source": "cve@mitre.org"
},
{
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12",
"source": "cve@mitre.org"
},
{
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c",
"source": "cve@mitre.org"
},
{
"url": "https://syzkaller.appspot.com/bug?id=0c4fd9c6aa04ec116d01e915d3b186f71a212cb2",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21898", "id": "CVE-2021-21898",
"sourceIdentifier": "talos-cna@cisco.com", "sourceIdentifier": "talos-cna@cisco.com",
"published": "2021-11-19T20:15:17.747", "published": "2021-11-19T20:15:17.747",
"lastModified": "2022-08-31T19:21:12.810", "lastModified": "2023-05-21T22:15:10.163",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -87,22 +87,22 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "nvd@nist.gov", "source": "talos-cna@cisco.com",
"type": "Primary", "type": "Primary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-787" "value": "CWE-119"
} }
] ]
}, },
{ {
"source": "talos-cna@cisco.com", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-119" "value": "CWE-787"
} }
] ]
} }
@ -193,6 +193,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202305-26",
"source": "talos-cna@cisco.com"
},
{ {
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1349", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1349",
"source": "talos-cna@cisco.com", "source": "talos-cna@cisco.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21899", "id": "CVE-2021-21899",
"sourceIdentifier": "talos-cna@cisco.com", "sourceIdentifier": "talos-cna@cisco.com",
"published": "2021-11-19T19:15:08.080", "published": "2021-11-19T19:15:08.080",
"lastModified": "2022-08-31T19:19:34.800", "lastModified": "2023-05-21T22:15:10.407",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -87,22 +87,22 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "nvd@nist.gov", "source": "talos-cna@cisco.com",
"type": "Primary", "type": "Primary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-787" "value": "CWE-119"
} }
] ]
}, },
{ {
"source": "talos-cna@cisco.com", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-119" "value": "CWE-787"
} }
] ]
} }
@ -193,6 +193,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202305-26",
"source": "talos-cna@cisco.com"
},
{ {
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1350", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1350",
"source": "talos-cna@cisco.com", "source": "talos-cna@cisco.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21900", "id": "CVE-2021-21900",
"sourceIdentifier": "talos-cna@cisco.com", "sourceIdentifier": "talos-cna@cisco.com",
"published": "2021-11-19T19:15:08.137", "published": "2021-11-19T19:15:08.137",
"lastModified": "2022-08-31T19:19:07.617", "lastModified": "2023-05-21T22:15:10.503",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -87,7 +87,7 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "nvd@nist.gov", "source": "talos-cna@cisco.com",
"type": "Primary", "type": "Primary",
"description": [ "description": [
{ {
@ -97,7 +97,7 @@
] ]
}, },
{ {
"source": "talos-cna@cisco.com", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"description": [ "description": [
{ {
@ -194,6 +194,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202305-26",
"source": "talos-cna@cisco.com"
},
{ {
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1351", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1351",
"source": "talos-cna@cisco.com", "source": "talos-cna@cisco.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-35368", "id": "CVE-2021-35368",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-11-05T18:15:09.317", "published": "2021-11-05T18:15:09.317",
"lastModified": "2023-02-16T19:25:32.830", "lastModified": "2023-05-21T22:15:10.607",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -199,6 +199,10 @@
"Exploit", "Exploit",
"Third Party Advisory" "Third Party Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-25",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41798", "id": "CVE-2021-41798",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-10-11T08:15:06.647", "published": "2021-10-11T08:15:06.647",
"lastModified": "2021-11-26T20:56:03.023", "lastModified": "2023-05-21T22:15:10.740",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -151,6 +151,10 @@
"Patch", "Patch",
"Third Party Advisory" "Third Party Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41799", "id": "CVE-2021-41799",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-10-11T08:15:06.767", "published": "2021-10-11T08:15:06.767",
"lastModified": "2021-11-26T20:55:54.990", "lastModified": "2023-05-21T22:15:10.857",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -157,6 +157,10 @@
"tags": [ "tags": [
"Permissions Required" "Permissions Required"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-41800", "id": "CVE-2021-41800",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-10-11T08:15:06.813", "published": "2021-10-11T08:15:06.813",
"lastModified": "2021-11-28T23:29:02.137", "lastModified": "2023-05-21T22:15:10.940",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -165,6 +165,10 @@
"tags": [ "tags": [
"Permissions Required" "Permissions Required"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44854", "id": "CVE-2021-44854",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-12-26T05:15:10.667", "published": "2022-12-26T05:15:10.667",
"lastModified": "2023-01-04T02:04:30.093", "lastModified": "2023-05-21T22:15:11.067",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -99,6 +99,10 @@
"Issue Tracking", "Issue Tracking",
"Vendor Advisory" "Vendor Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44855", "id": "CVE-2021-44855",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-12-26T05:15:10.740", "published": "2022-12-26T05:15:10.740",
"lastModified": "2023-01-04T02:04:51.773", "lastModified": "2023-05-21T22:15:11.207",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -100,6 +100,10 @@
"Issue Tracking", "Issue Tracking",
"Vendor Advisory" "Vendor Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44856", "id": "CVE-2021-44856",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-12-26T06:15:10.737", "published": "2022-12-26T06:15:10.737",
"lastModified": "2023-01-05T04:50:16.693", "lastModified": "2023-05-21T22:15:11.303",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -100,6 +100,10 @@
"Patch", "Patch",
"Vendor Advisory" "Vendor Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44857", "id": "CVE-2021-44857",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-12-17T04:15:39.137", "published": "2021-12-17T04:15:39.137",
"lastModified": "2022-07-12T17:42:04.277", "lastModified": "2023-05-21T22:15:11.393",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -115,6 +115,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.mediawiki.org/wiki/2021-12_security_release/FAQ", "url": "https://www.mediawiki.org/wiki/2021-12_security_release/FAQ",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44858", "id": "CVE-2021-44858",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-12-20T09:15:06.770", "published": "2021-12-20T09:15:06.770",
"lastModified": "2021-12-29T18:18:38.500", "lastModified": "2023-05-21T22:15:11.500",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -116,6 +116,10 @@
"Vendor Advisory" "Vendor Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.mediawiki.org/wiki/2021-12_security_release/FAQ", "url": "https://www.mediawiki.org/wiki/2021-12_security_release/FAQ",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-45038", "id": "CVE-2021-45038",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-12-17T04:15:39.197", "published": "2021-12-17T04:15:39.197",
"lastModified": "2021-12-21T17:49:06.707", "lastModified": "2023-05-21T22:15:11.587",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -115,6 +115,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.mediawiki.org/wiki/2021-12_security_release/FAQ", "url": "https://www.mediawiki.org/wiki/2021-12_security_release/FAQ",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-45341", "id": "CVE-2021-45341",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-01-25T12:15:07.693", "published": "2022-01-25T12:15:07.693",
"lastModified": "2022-11-03T20:41:21.383", "lastModified": "2023-05-21T22:15:11.663",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -174,6 +174,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202305-26",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.debian.org/security/2022/dsa-5077", "url": "https://www.debian.org/security/2022/dsa-5077",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-45342", "id": "CVE-2021-45342",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-01-25T13:15:07.830", "published": "2022-01-25T13:15:07.830",
"lastModified": "2022-11-07T18:43:26.717", "lastModified": "2023-05-21T22:15:11.757",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -179,6 +179,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202305-26",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.debian.org/security/2022/dsa-5077", "url": "https://www.debian.org/security/2022/dsa-5077",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-45343", "id": "CVE-2021-45343",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-01-25T13:15:07.873", "published": "2022-01-25T13:15:07.873",
"lastModified": "2022-11-07T18:53:27.517", "lastModified": "2023-05-21T22:15:11.830",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -159,6 +159,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202305-26",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.debian.org/security/2022/dsa-5077", "url": "https://www.debian.org/security/2022/dsa-5077",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28202", "id": "CVE-2022-28202",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-03-30T06:15:06.980", "published": "2022-03-30T06:15:06.980",
"lastModified": "2022-10-28T19:01:45.723", "lastModified": "2023-05-21T22:15:11.903",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -163,6 +163,10 @@
"Vendor Advisory" "Vendor Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.debian.org/security/2022/dsa-5246", "url": "https://www.debian.org/security/2022/dsa-5246",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28205", "id": "CVE-2022-28205",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-03-30T07:15:07.390", "published": "2022-03-30T07:15:07.390",
"lastModified": "2022-04-05T18:50:41.513", "lastModified": "2023-05-21T22:15:11.997",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -111,6 +111,10 @@
"Patch", "Patch",
"Vendor Advisory" "Vendor Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28206", "id": "CVE-2022-28206",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-03-30T07:15:07.447", "published": "2022-03-30T07:15:07.447",
"lastModified": "2022-04-05T18:51:17.380", "lastModified": "2023-05-21T22:15:12.467",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -110,6 +110,10 @@
"Issue Tracking", "Issue Tracking",
"Vendor Advisory" "Vendor Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-28209", "id": "CVE-2022-28209",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-03-30T07:15:07.493", "published": "2022-03-30T07:15:07.493",
"lastModified": "2022-04-05T21:15:46.400", "lastModified": "2023-05-21T22:15:12.540",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -110,6 +110,10 @@
"Patch", "Patch",
"Vendor Advisory" "Vendor Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31090", "id": "CVE-2022-31090",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2022-06-27T22:15:08.873", "published": "2022-06-27T22:15:08.873",
"lastModified": "2022-10-24T16:45:06.540", "lastModified": "2023-05-21T22:15:12.610",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -152,6 +152,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "security-advisories@github.com"
},
{ {
"url": "https://www.debian.org/security/2022/dsa-5246", "url": "https://www.debian.org/security/2022/dsa-5246",
"source": "security-advisories@github.com", "source": "security-advisories@github.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-31091", "id": "CVE-2022-31091",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2022-06-27T22:15:08.933", "published": "2022-06-27T22:15:08.933",
"lastModified": "2022-12-03T02:29:40.770", "lastModified": "2023-05-21T22:15:13.003",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -85,22 +85,22 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "nvd@nist.gov", "source": "security-advisories@github.com",
"type": "Primary", "type": "Primary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "NVD-CWE-noinfo" "value": "CWE-200"
} }
] ]
}, },
{ {
"source": "security-advisories@github.com", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-200" "value": "NVD-CWE-noinfo"
} }
] ]
} }
@ -162,6 +162,10 @@
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "security-advisories@github.com"
},
{ {
"url": "https://www.debian.org/security/2022/dsa-5246", "url": "https://www.debian.org/security/2022/dsa-5246",
"source": "security-advisories@github.com", "source": "security-advisories@github.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34911", "id": "CVE-2022-34911",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-07-02T20:15:08.373", "published": "2022-07-02T20:15:08.373",
"lastModified": "2022-10-27T14:04:13.867", "lastModified": "2023-05-21T22:15:13.097",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -168,6 +168,10 @@
"Vendor Advisory" "Vendor Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.debian.org/security/2022/dsa-5246", "url": "https://www.debian.org/security/2022/dsa-5246",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34912", "id": "CVE-2022-34912",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-07-02T20:15:08.417", "published": "2022-07-02T20:15:08.417",
"lastModified": "2022-10-27T14:09:02.590", "lastModified": "2023-05-21T22:15:13.197",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -161,6 +161,10 @@
"Vendor Advisory" "Vendor Advisory"
] ]
}, },
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
},
{ {
"url": "https://www.debian.org/security/2022/dsa-5246", "url": "https://www.debian.org/security/2022/dsa-5246",
"source": "cve@mitre.org", "source": "cve@mitre.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-38749", "id": "CVE-2022-38749",
"sourceIdentifier": "cve-coordination@google.com", "sourceIdentifier": "cve-coordination@google.com",
"published": "2022-09-05T10:15:09.673", "published": "2022-09-05T10:15:09.673",
"lastModified": "2022-10-06T12:52:25.080", "lastModified": "2023-05-21T22:15:13.300",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -135,6 +135,10 @@
"Mailing List", "Mailing List",
"Third Party Advisory" "Third Party Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-28",
"source": "cve-coordination@google.com"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-38750", "id": "CVE-2022-38750",
"sourceIdentifier": "cve-coordination@google.com", "sourceIdentifier": "cve-coordination@google.com",
"published": "2022-09-05T10:15:09.733", "published": "2022-09-05T10:15:09.733",
"lastModified": "2022-10-06T12:51:48.897", "lastModified": "2023-05-21T22:15:13.420",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -140,6 +140,10 @@
"Mailing List", "Mailing List",
"Third Party Advisory" "Third Party Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-28",
"source": "cve-coordination@google.com"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-38751", "id": "CVE-2022-38751",
"sourceIdentifier": "cve-coordination@google.com", "sourceIdentifier": "cve-coordination@google.com",
"published": "2022-09-05T10:15:09.793", "published": "2022-09-05T10:15:09.793",
"lastModified": "2022-10-06T12:46:58.797", "lastModified": "2023-05-21T22:15:13.510",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -135,6 +135,10 @@
"Mailing List", "Mailing List",
"Third Party Advisory" "Third Party Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-28",
"source": "cve-coordination@google.com"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-38752", "id": "CVE-2022-38752",
"sourceIdentifier": "cve-coordination@google.com", "sourceIdentifier": "cve-coordination@google.com",
"published": "2022-09-05T10:15:09.847", "published": "2022-09-05T10:15:09.847",
"lastModified": "2022-09-27T18:16:05.457", "lastModified": "2023-05-21T22:15:13.583",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -112,6 +112,10 @@
"tags": [ "tags": [
"Permissions Required" "Permissions Required"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-28",
"source": "cve-coordination@google.com"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-39955", "id": "CVE-2022-39955",
"sourceIdentifier": "vulnerability@ncsc.ch", "sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2022-09-20T07:15:12.153", "published": "2022-09-20T07:15:12.153",
"lastModified": "2023-02-16T19:20:36.153", "lastModified": "2023-05-21T22:15:13.737",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -186,6 +186,10 @@
"Mailing List", "Mailing List",
"Third Party Advisory" "Third Party Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-25",
"source": "vulnerability@ncsc.ch"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-39956", "id": "CVE-2022-39956",
"sourceIdentifier": "vulnerability@ncsc.ch", "sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2022-09-20T07:15:12.293", "published": "2022-09-20T07:15:12.293",
"lastModified": "2023-02-16T19:20:44.517", "lastModified": "2023-05-21T22:15:13.937",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -186,6 +186,10 @@
"Mailing List", "Mailing List",
"Third Party Advisory" "Third Party Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-25",
"source": "vulnerability@ncsc.ch"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-39957", "id": "CVE-2022-39957",
"sourceIdentifier": "vulnerability@ncsc.ch", "sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2022-09-20T07:15:12.353", "published": "2022-09-20T07:15:12.353",
"lastModified": "2023-02-16T19:20:32.660", "lastModified": "2023-05-21T22:15:14.133",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -186,6 +186,10 @@
"Mailing List", "Mailing List",
"Third Party Advisory" "Third Party Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-25",
"source": "vulnerability@ncsc.ch"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-39958", "id": "CVE-2022-39958",
"sourceIdentifier": "vulnerability@ncsc.ch", "sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2022-09-20T07:15:12.417", "published": "2022-09-20T07:15:12.417",
"lastModified": "2023-02-16T19:20:30.583", "lastModified": "2023-05-21T22:15:14.350",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -186,6 +186,10 @@
"Mailing List", "Mailing List",
"Third Party Advisory" "Third Party Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-25",
"source": "vulnerability@ncsc.ch"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-40468", "id": "CVE-2022-40468",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-09-19T17:15:14.700", "published": "2022-09-19T17:15:14.700",
"lastModified": "2022-10-12T00:15:10.167", "lastModified": "2023-05-21T22:15:14.443",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
@ -95,6 +95,10 @@
{ {
"url": "https://github.com/tinyproxy/tinyproxy/issues/457#issuecomment-1264176815", "url": "https://github.com/tinyproxy/tinyproxy/issues/457#issuecomment-1264176815",
"source": "cve@mitre.org" "source": "cve@mitre.org"
},
{
"url": "https://security.gentoo.org/glsa/202305-27",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41765", "id": "CVE-2022-41765",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-12-26T06:15:11.007", "published": "2022-12-26T06:15:11.007",
"lastModified": "2023-01-05T04:45:52.723", "lastModified": "2023-05-21T22:15:14.523",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -87,6 +87,10 @@
"Patch", "Patch",
"Vendor Advisory" "Vendor Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41767", "id": "CVE-2022-41767",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2022-12-26T06:15:11.057", "published": "2022-12-26T06:15:11.057",
"lastModified": "2023-01-05T04:49:43.517", "lastModified": "2023-05-21T22:15:14.603",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -87,6 +87,10 @@
"Patch", "Patch",
"Vendor Advisory" "Vendor Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47927", "id": "CVE-2022-47927",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-01-12T06:15:08.167", "published": "2023-01-12T06:15:08.167",
"lastModified": "2023-01-30T15:18:42.507", "lastModified": "2023-05-21T22:15:14.720",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -129,6 +129,10 @@
"Patch", "Patch",
"Vendor Advisory" "Vendor Advisory"
] ]
},
{
"url": "https://security.gentoo.org/glsa/202305-24",
"source": "cve@mitre.org"
} }
] ]
} }

View File

@ -0,0 +1,24 @@
{
"id": "CVE-2023-33252",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-21T22:15:14.940",
"lastModified": "2023-05-21T22:15:14.940",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "iden3 snarkjs through 0.6.11 allows double spending because there is no validation that the publicSignals length is less than the field modulus."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/iden3/snarkjs/commits/master/src/groth16_verify.js",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/iden3/snarkjs/tags",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33254",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-21T22:15:15.067",
"lastModified": "2023-05-21T22:15:15.067",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "There is an LDAP bind credentials exposure on KACE Systems Deployment and Remote Site appliances 9.0.146. The captured credentials may provide a higher privilege level on the Active Directory domain. To exploit this, an authenticated attacker edits the user-authentication settings to specify an attacker-controlled LDAP server, clicks the Test Settings button, and captures the cleartext credentials."
}
],
"metrics": {},
"references": [
{
"url": "https://www.stevencampbell.info/KACE-LDAP-Bind-Credential-Exposure/",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-05-21T22:00:27.056165+00:00 2023-05-21T23:55:27.607743+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-05-21T21:15:08.790000+00:00 2023-05-21T23:15:08.960000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -29,22 +29,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
215701 215704
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `3` Recently added CVEs: `3`
* [CVE-2021-46888](CVE-2021/CVE-2021-468xx/CVE-2021-46888.json) (`2023-05-21T20:15:09.240`) * [CVE-2020-36694](CVE-2020/CVE-2020-366xx/CVE-2020-36694.json) (`2023-05-21T23:15:08.960`)
* [CVE-2023-33250](CVE-2023/CVE-2023-332xx/CVE-2023-33250.json) (`2023-05-21T21:15:08.737`) * [CVE-2023-33252](CVE-2023/CVE-2023-332xx/CVE-2023-33252.json) (`2023-05-21T22:15:14.940`)
* [CVE-2023-33251](CVE-2023/CVE-2023-332xx/CVE-2023-33251.json) (`2023-05-21T21:15:08.790`) * [CVE-2023-33254](CVE-2023/CVE-2023-332xx/CVE-2023-33254.json) (`2023-05-21T22:15:15.067`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `0` Recently modified CVEs: `37`
* [CVE-2021-44858](CVE-2021/CVE-2021-448xx/CVE-2021-44858.json) (`2023-05-21T22:15:11.500`)
* [CVE-2021-45038](CVE-2021/CVE-2021-450xx/CVE-2021-45038.json) (`2023-05-21T22:15:11.587`)
* [CVE-2021-45341](CVE-2021/CVE-2021-453xx/CVE-2021-45341.json) (`2023-05-21T22:15:11.663`)
* [CVE-2021-45342](CVE-2021/CVE-2021-453xx/CVE-2021-45342.json) (`2023-05-21T22:15:11.757`)
* [CVE-2021-45343](CVE-2021/CVE-2021-453xx/CVE-2021-45343.json) (`2023-05-21T22:15:11.830`)
* [CVE-2022-28202](CVE-2022/CVE-2022-282xx/CVE-2022-28202.json) (`2023-05-21T22:15:11.903`)
* [CVE-2022-28205](CVE-2022/CVE-2022-282xx/CVE-2022-28205.json) (`2023-05-21T22:15:11.997`)
* [CVE-2022-28206](CVE-2022/CVE-2022-282xx/CVE-2022-28206.json) (`2023-05-21T22:15:12.467`)
* [CVE-2022-28209](CVE-2022/CVE-2022-282xx/CVE-2022-28209.json) (`2023-05-21T22:15:12.540`)
* [CVE-2022-31090](CVE-2022/CVE-2022-310xx/CVE-2022-31090.json) (`2023-05-21T22:15:12.610`)
* [CVE-2022-31091](CVE-2022/CVE-2022-310xx/CVE-2022-31091.json) (`2023-05-21T22:15:13.003`)
* [CVE-2022-34911](CVE-2022/CVE-2022-349xx/CVE-2022-34911.json) (`2023-05-21T22:15:13.097`)
* [CVE-2022-34912](CVE-2022/CVE-2022-349xx/CVE-2022-34912.json) (`2023-05-21T22:15:13.197`)
* [CVE-2022-38749](CVE-2022/CVE-2022-387xx/CVE-2022-38749.json) (`2023-05-21T22:15:13.300`)
* [CVE-2022-38750](CVE-2022/CVE-2022-387xx/CVE-2022-38750.json) (`2023-05-21T22:15:13.420`)
* [CVE-2022-38751](CVE-2022/CVE-2022-387xx/CVE-2022-38751.json) (`2023-05-21T22:15:13.510`)
* [CVE-2022-38752](CVE-2022/CVE-2022-387xx/CVE-2022-38752.json) (`2023-05-21T22:15:13.583`)
* [CVE-2022-39955](CVE-2022/CVE-2022-399xx/CVE-2022-39955.json) (`2023-05-21T22:15:13.737`)
* [CVE-2022-39956](CVE-2022/CVE-2022-399xx/CVE-2022-39956.json) (`2023-05-21T22:15:13.937`)
* [CVE-2022-39957](CVE-2022/CVE-2022-399xx/CVE-2022-39957.json) (`2023-05-21T22:15:14.133`)
* [CVE-2022-39958](CVE-2022/CVE-2022-399xx/CVE-2022-39958.json) (`2023-05-21T22:15:14.350`)
* [CVE-2022-40468](CVE-2022/CVE-2022-404xx/CVE-2022-40468.json) (`2023-05-21T22:15:14.443`)
* [CVE-2022-41765](CVE-2022/CVE-2022-417xx/CVE-2022-41765.json) (`2023-05-21T22:15:14.523`)
* [CVE-2022-41767](CVE-2022/CVE-2022-417xx/CVE-2022-41767.json) (`2023-05-21T22:15:14.603`)
* [CVE-2022-47927](CVE-2022/CVE-2022-479xx/CVE-2022-47927.json) (`2023-05-21T22:15:14.720`)
## Download and Usage ## Download and Usage