diff --git a/CVE-2012/CVE-2012-58xx/CVE-2012-5873.json b/CVE-2012/CVE-2012-58xx/CVE-2012-5873.json new file mode 100644 index 00000000000..9bc245ed030 --- /dev/null +++ b/CVE-2012/CVE-2012-58xx/CVE-2012-5873.json @@ -0,0 +1,97 @@ +{ + "id": "CVE-2012-5873", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-04-26T00:15:08.913", + "lastModified": "2023-05-08T13:37:47.017", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "ARC (aka ARC2) through 2011-12-01 allows reflected XSS via the end_point.php query parameter in an output=htmltab action." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arc2_project:arc2:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2011-12-01", + "matchCriteriaId": "13F5C4DA-E912-4B4D-B969-C94D8E827292" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://www.ush.it/2012/11/22/arc-v2011-12-01-multiple-vulnerabilities/", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2015/CVE-2015-51xx/CVE-2015-5122.json b/CVE-2015/CVE-2015-51xx/CVE-2015-5122.json index ebf0b757ac9..fe7daaabc14 100644 --- a/CVE-2015/CVE-2015-51xx/CVE-2015-5122.json +++ b/CVE-2015/CVE-2015-51xx/CVE-2015-5122.json @@ -2,7 +2,7 @@ "id": "CVE-2015-5122", "sourceIdentifier": "psirt@adobe.com", "published": "2015-07-14T10:59:00.213", - "lastModified": "2021-09-08T17:19:26.350", + "lastModified": "2023-05-08T13:29:02.290", "vulnStatus": "Modified", "evaluatorComment": "CWE-416: Use After Free", "cisaExploitAdd": "2022-04-13", @@ -165,8 +165,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE" + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" }, { "vulnerable": false, diff --git a/CVE-2015/CVE-2015-86xx/CVE-2015-8652.json b/CVE-2015/CVE-2015-86xx/CVE-2015-8652.json index acccc7bec95..b5e3db32ad7 100644 --- a/CVE-2015/CVE-2015-86xx/CVE-2015-8652.json +++ b/CVE-2015/CVE-2015-86xx/CVE-2015-8652.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8652", "sourceIdentifier": "psirt@adobe.com", "published": "2016-03-04T23:59:00.127", - "lastModified": "2023-01-30T17:53:11.660", + "lastModified": "2023-05-08T13:29:02.290", "vulnStatus": "Analyzed", "descriptions": [ { @@ -184,8 +184,8 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE" + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" }, { "vulnerable": false, diff --git a/CVE-2015/CVE-2015-86xx/CVE-2015-8653.json b/CVE-2015/CVE-2015-86xx/CVE-2015-8653.json index 5ccee4af792..062310a8574 100644 --- a/CVE-2015/CVE-2015-86xx/CVE-2015-8653.json +++ b/CVE-2015/CVE-2015-86xx/CVE-2015-8653.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8653", "sourceIdentifier": "psirt@adobe.com", "published": "2016-03-04T23:59:01.797", - "lastModified": "2023-01-30T18:01:53.590", + "lastModified": "2023-05-08T13:29:02.290", "vulnStatus": "Analyzed", "descriptions": [ { @@ -184,8 +184,8 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE" + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" }, { "vulnerable": false, diff --git a/CVE-2015/CVE-2015-86xx/CVE-2015-8654.json b/CVE-2015/CVE-2015-86xx/CVE-2015-8654.json index 8bbb9a4a4f3..b83d8080a5f 100644 --- a/CVE-2015/CVE-2015-86xx/CVE-2015-8654.json +++ b/CVE-2015/CVE-2015-86xx/CVE-2015-8654.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8654", "sourceIdentifier": "psirt@adobe.com", "published": "2016-03-04T23:59:03.280", - "lastModified": "2023-01-30T17:42:30.153", + "lastModified": "2023-05-08T13:29:02.290", "vulnStatus": "Analyzed", "descriptions": [ { @@ -184,8 +184,8 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE" + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" }, { "vulnerable": false, diff --git a/CVE-2015/CVE-2015-86xx/CVE-2015-8655.json b/CVE-2015/CVE-2015-86xx/CVE-2015-8655.json index 3b203f9909e..46212db66bd 100644 --- a/CVE-2015/CVE-2015-86xx/CVE-2015-8655.json +++ b/CVE-2015/CVE-2015-86xx/CVE-2015-8655.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8655", "sourceIdentifier": "psirt@adobe.com", "published": "2016-03-04T23:59:04.390", - "lastModified": "2023-01-30T17:42:30.153", + "lastModified": "2023-05-08T13:29:02.290", "vulnStatus": "Analyzed", "descriptions": [ { @@ -184,8 +184,8 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE" + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" }, { "vulnerable": false, diff --git a/CVE-2015/CVE-2015-86xx/CVE-2015-8656.json b/CVE-2015/CVE-2015-86xx/CVE-2015-8656.json index 4f9f9c997bf..57f61532e34 100644 --- a/CVE-2015/CVE-2015-86xx/CVE-2015-8656.json +++ b/CVE-2015/CVE-2015-86xx/CVE-2015-8656.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8656", "sourceIdentifier": "psirt@adobe.com", "published": "2016-03-04T23:59:05.390", - "lastModified": "2023-01-30T17:32:01.140", + "lastModified": "2023-05-08T13:29:02.290", "vulnStatus": "Analyzed", "descriptions": [ { @@ -184,8 +184,8 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE" + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" }, { "vulnerable": false, diff --git a/CVE-2015/CVE-2015-86xx/CVE-2015-8657.json b/CVE-2015/CVE-2015-86xx/CVE-2015-8657.json index 2b64679c3be..37893027782 100644 --- a/CVE-2015/CVE-2015-86xx/CVE-2015-8657.json +++ b/CVE-2015/CVE-2015-86xx/CVE-2015-8657.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8657", "sourceIdentifier": "psirt@adobe.com", "published": "2016-03-04T23:59:06.640", - "lastModified": "2023-01-30T17:32:07.363", + "lastModified": "2023-05-08T13:29:02.290", "vulnStatus": "Analyzed", "descriptions": [ { @@ -184,8 +184,8 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE" + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" }, { "vulnerable": false, diff --git a/CVE-2015/CVE-2015-86xx/CVE-2015-8658.json b/CVE-2015/CVE-2015-86xx/CVE-2015-8658.json index 27b28172e43..42b4fb38f00 100644 --- a/CVE-2015/CVE-2015-86xx/CVE-2015-8658.json +++ b/CVE-2015/CVE-2015-86xx/CVE-2015-8658.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8658", "sourceIdentifier": "psirt@adobe.com", "published": "2016-03-04T23:59:07.843", - "lastModified": "2023-01-30T17:32:13.390", + "lastModified": "2023-05-08T13:29:02.290", "vulnStatus": "Analyzed", "descriptions": [ { @@ -184,8 +184,8 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE" + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" }, { "vulnerable": false, diff --git a/CVE-2015/CVE-2015-88xx/CVE-2015-8820.json b/CVE-2015/CVE-2015-88xx/CVE-2015-8820.json index 444cdb0261c..9fd4ac7748b 100644 --- a/CVE-2015/CVE-2015-88xx/CVE-2015-8820.json +++ b/CVE-2015/CVE-2015-88xx/CVE-2015-8820.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8820", "sourceIdentifier": "psirt@adobe.com", "published": "2016-03-04T23:59:08.890", - "lastModified": "2023-01-30T17:32:26.020", + "lastModified": "2023-05-08T13:29:02.290", "vulnStatus": "Analyzed", "descriptions": [ { @@ -184,8 +184,8 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE" + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" }, { "vulnerable": false, diff --git a/CVE-2015/CVE-2015-88xx/CVE-2015-8821.json b/CVE-2015/CVE-2015-88xx/CVE-2015-8821.json index 3f54ad34be3..21b6453e50e 100644 --- a/CVE-2015/CVE-2015-88xx/CVE-2015-8821.json +++ b/CVE-2015/CVE-2015-88xx/CVE-2015-8821.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8821", "sourceIdentifier": "psirt@adobe.com", "published": "2016-03-04T23:59:09.813", - "lastModified": "2023-01-30T17:53:01.510", + "lastModified": "2023-05-08T13:29:02.290", "vulnStatus": "Analyzed", "descriptions": [ { @@ -184,8 +184,8 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE" + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" }, { "vulnerable": false, diff --git a/CVE-2015/CVE-2015-88xx/CVE-2015-8822.json b/CVE-2015/CVE-2015-88xx/CVE-2015-8822.json index 3163516801f..5566c390fdd 100644 --- a/CVE-2015/CVE-2015-88xx/CVE-2015-8822.json +++ b/CVE-2015/CVE-2015-88xx/CVE-2015-8822.json @@ -2,7 +2,7 @@ "id": "CVE-2015-8822", "sourceIdentifier": "psirt@adobe.com", "published": "2016-03-04T23:59:10.687", - "lastModified": "2023-01-30T17:32:30.563", + "lastModified": "2023-05-08T13:29:02.290", "vulnStatus": "Analyzed", "descriptions": [ { @@ -184,8 +184,8 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE" + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" }, { "vulnerable": false, diff --git a/CVE-2016/CVE-2016-09xx/CVE-2016-0959.json b/CVE-2016/CVE-2016-09xx/CVE-2016-0959.json index 76e97e93cbd..0c35c7b9100 100644 --- a/CVE-2016/CVE-2016-09xx/CVE-2016-0959.json +++ b/CVE-2016/CVE-2016-09xx/CVE-2016-0959.json @@ -2,7 +2,7 @@ "id": "CVE-2016-0959", "sourceIdentifier": "psirt@adobe.com", "published": "2017-06-27T20:29:00.807", - "lastModified": "2018-01-05T02:30:31.040", + "lastModified": "2023-05-08T13:29:02.290", "vulnStatus": "Modified", "descriptions": [ { @@ -240,8 +240,8 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_8.0:*:*:*:*:*:*:*:*", - "matchCriteriaId": "461CBD40-CB18-4868-BAB4-CCBD724B9E07" + "criteria": "cpe:2.3:o:microsoft:windows_8:*:*:*:*:*:*:*:*", + "matchCriteriaId": "7B960E10-B1BD-494E-9A52-3FCA90AD2D85" }, { "vulnerable": false, diff --git a/CVE-2020/CVE-2020-78xx/CVE-2020-7808.json b/CVE-2020/CVE-2020-78xx/CVE-2020-7808.json index 48ae300167c..0ec293ee6e2 100644 --- a/CVE-2020/CVE-2020-78xx/CVE-2020-7808.json +++ b/CVE-2020/CVE-2020-78xx/CVE-2020-7808.json @@ -2,7 +2,7 @@ "id": "CVE-2020-7808", "sourceIdentifier": "vuln@krcert.or.kr", "published": "2020-05-21T19:15:10.883", - "lastModified": "2020-05-22T13:10:47.297", + "lastModified": "2023-05-08T13:29:02.290", "vulnStatus": "Analyzed", "descriptions": [ { @@ -141,8 +141,8 @@ }, { "vulnerable": false, - "criteria": "cpe:2.3:o:microsoft:windows_8.0:-:*:*:*:*:*:*:*", - "matchCriteriaId": "F265782D-8CEC-4C97-83A3-86404A1C09BE" + "criteria": "cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0D229E41-A971-4284-9657-16D78414B93F" } ] } diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45812.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45812.json new file mode 100644 index 00000000000..421cd991a16 --- /dev/null +++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45812.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-45812", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-08T13:15:09.443", + "lastModified": "2023-05-08T13:26:36.163", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (subscriber+) Stored Cross-Site Scripting (XSS) vulnerability in Martin Lees Exxp plugin <=\u00a02.6.8 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/exxp-wp/wordpress-exxp-plugin-2-6-8-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45818.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45818.json index a58316fc790..4ffc3e4a585 100644 --- a/CVE-2022/CVE-2022-458xx/CVE-2022-45818.json +++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45818.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45818", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-04T13:15:13.580", - "lastModified": "2023-05-04T18:45:32.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:39:29.693", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:essentialplugin:hero_banner_ultimate:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.4", + "matchCriteriaId": "6E6990C7-1942-4FCE-9A66-7E4DEBA528A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/hero-banner-ultimate/wordpress-hero-banner-ultimate-plugin-1-3-4-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-467xx/CVE-2022-46799.json b/CVE-2022/CVE-2022-467xx/CVE-2022-46799.json new file mode 100644 index 00000000000..60655c8b7d5 --- /dev/null +++ b/CVE-2022/CVE-2022-467xx/CVE-2022-46799.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2022-46799", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-08T12:15:09.313", + "lastModified": "2023-05-08T12:50:24.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Easy Testimonial Slider and Form plugin <=\u00a01.0.15 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/easy-testimonial-rotator/wordpress-easy-testimonial-slider-and-form-plugin-1-0-15-cross-site-scripting-xss?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2248.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2248.json index 87e059f8344..3ba0145ea16 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2248.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2248.json @@ -2,116 +2,14 @@ "id": "CVE-2023-2248", "sourceIdentifier": "cve-coordination@google.com", "published": "2023-05-01T13:15:44.907", - "lastModified": "2023-05-06T03:13:18.127", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-08T12:15:10.367", + "vulnStatus": "Rejected", "descriptions": [ { "lang": "en", - "value": "A heap out-of-bounds read/write vulnerability in the Linux Kernel traffic control (QoS) subsystem can be exploited to achieve local privilege escalation.\n\nThe\u00a0qfq_change_class function does not properly limit the lmax variable which can lead to out-of-bounds read/write.\u00a0If the TCA_QFQ_LMAX value is not offered through nlattr, lmax is determined by the MTU value of the network device. The MTU of the loopback device can be set up to 2^31-1 and as a result, it is possible to have an lmax value that exceeds QFQ_MIN_LMAX.\n\nWe recommend upgrading past commit 3037933448f60f9acb705997eae62013ecb81e0d.\n\n" + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it was the duplicate of CVE-2023-31436." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 - }, - { - "source": "cve-coordination@google.com", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-787" - } - ] - }, - { - "source": "cve-coordination@google.com", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-787" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "3.7", - "versionEndExcluding": "6.3", - "matchCriteriaId": "232D1582-B5F3-4554-A12C-92E5604A13B3" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3037933448f60f9acb705997eae62013ecb81e0d", - "source": "cve-coordination@google.com", - "tags": [ - "Exploit", - "Mailing List", - "Patch" - ] - }, - { - "url": "https://kernel.dance/3037933448f60f9acb705997eae62013ecb81e0d", - "source": "cve-coordination@google.com", - "tags": [ - "Exploit", - "Patch" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-236xx/CVE-2023-23668.json b/CVE-2023/CVE-2023-236xx/CVE-2023-23668.json new file mode 100644 index 00000000000..c03ccce6810 --- /dev/null +++ b/CVE-2023/CVE-2023-236xx/CVE-2023-23668.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23668", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-08T12:15:09.440", + "lastModified": "2023-05-08T12:50:24.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in GiveWP plugin\u00a0<= 2.25.1 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/give/wordpress-givewp-plugin-2-25-1-contributor-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23723.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23723.json index 8de04083141..eab78b783a0 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23723.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23723.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23723", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-02T12:15:22.430", - "lastModified": "2023-05-02T12:56:12.940", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:40:17.417", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:winwar:wp_email_capture:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.10", + "matchCriteriaId": "C2F6EEB5-CA1D-49D2-A7CE-B90F766B63DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-email-capture/wordpress-wordpress-email-marketing-plugin-wp-email-capture-plugin-3-9-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23808.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23808.json index 619e7320ee3..1c51da3b125 100644 --- a/CVE-2023/CVE-2023-238xx/CVE-2023-23808.json +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23808.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23808", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-03T15:15:11.770", - "lastModified": "2023-05-03T15:23:46.587", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:45:40.917", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sponsors_carousel_project:sponsors_carousel:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.02", + "matchCriteriaId": "E4ADB11D-CBD0-47CB-8726-35FD25A58427" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/sponsors-carousel/wordpress-sponsors-carousel-plugin-4-02-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23809.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23809.json index a37bf7c7126..02cc4fc42a8 100644 --- a/CVE-2023/CVE-2023-238xx/CVE-2023-23809.json +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23809.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23809", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-03T15:15:12.117", - "lastModified": "2023-05-03T15:23:46.587", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:45:31.337", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:finviz:stock_market_charts_from_finviz:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.1", + "matchCriteriaId": "07326BB8-DC17-4A0E-B4ED-1B16754364F4" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/stock-market-charts-from-finviz/wordpress-stock-market-charts-from-finviz-plugin-1-0-cross-site-scripting-xss-vulnerability", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23830.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23830.json index a6087ba90f0..518bb86af8e 100644 --- a/CVE-2023/CVE-2023-238xx/CVE-2023-23830.json +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23830.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23830", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-03T16:15:09.717", - "lastModified": "2023-05-03T19:07:24.620", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:41:15.720", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:profilepress:profilepress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.5.5", + "matchCriteriaId": "B2F5B21D-51F6-49A3-B52A-0B55EC4F87DB" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-user-avatar/wordpress-profilepress-plugin-4-5-4-cross-site-scripting-xss-vulnerability-2?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23875.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23875.json index ede3da131e3..587ac696250 100644 --- a/CVE-2023/CVE-2023-238xx/CVE-2023-23875.json +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23875.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23875", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-03T16:15:10.130", - "lastModified": "2023-05-03T19:07:24.620", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:30:47.220", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bing_site_verification_plugin_using_meta_tag_project:bing_site_verification_plugin_using_meta_tag:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0", + "matchCriteriaId": "004683FA-99C5-49B8-AB6E-B8C16D1CB016" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/bing-site-verification-using-meta-tag/wordpress-bing-site-verification-plugin-using-meta-tag-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-238xx/CVE-2023-23881.json b/CVE-2023/CVE-2023-238xx/CVE-2023-23881.json index 977779e68c2..b28838b4495 100644 --- a/CVE-2023/CVE-2023-238xx/CVE-2023-23881.json +++ b/CVE-2023/CVE-2023-238xx/CVE-2023-23881.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23881", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-03T16:15:10.237", - "lastModified": "2023-05-03T19:07:24.620", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:37:37.803", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -36,7 +56,7 @@ }, "weaknesses": [ { - "source": "audit@patchstack.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -44,12 +64,43 @@ "value": "CWE-79" } ] + }, + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:greentreelabs:circles_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.10", + "matchCriteriaId": "DDAC9074-445A-4DB2-B941-B65500769001" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/circles-gallery/wordpress-circles-gallery-plugin-1-0-10-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25021.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25021.json new file mode 100644 index 00000000000..02ef1644193 --- /dev/null +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25021.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25021", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-08T12:15:09.527", + "lastModified": "2023-05-08T12:50:24.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in FareHarbor FareHarbor for WordPress plugin <=\u00a03.6.6 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/fareharbor/wordpress-fareharbor-for-wordpress-plugin-3-6-6-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25052.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25052.json new file mode 100644 index 00000000000..bb45e5f4bbd --- /dev/null +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25052.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25052", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-08T13:15:09.537", + "lastModified": "2023-05-08T13:26:36.163", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Teplitsa Yandex.News Feed by Teplitsa plugin <=\u00a01.12.5 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/yandexnews-feed-by-teplitsa/wordpress-yandex-news-feed-by-teplitsa-plugin-1-12-5-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25452.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25452.json new file mode 100644 index 00000000000..f47eaabb908 --- /dev/null +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25452.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-25452", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-08T13:15:09.593", + "lastModified": "2023-05-08T13:26:36.163", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Michael Pretty (prettyboymp) CMS Press plugin <=\u00a00.2.3 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/cms-press/wordpress-cms-press-plugin-0-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25458.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25458.json index 6b8fae90815..a0fd42c45b3 100644 --- a/CVE-2023/CVE-2023-254xx/CVE-2023-25458.json +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25458.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25458", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-04T20:15:09.797", - "lastModified": "2023-05-05T13:33:53.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:38:48.890", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gmo:typesquare_webfonts_for_conoha:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.4", + "matchCriteriaId": "85386782-8FF3-4FDE-B1B6-4BFBB098DAA9" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ts-webfonts-for-conoha/wordpress-typesquare-webfonts-for-conoha-plugin-2-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25754.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25754.json new file mode 100644 index 00000000000..d88fa7ebd28 --- /dev/null +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25754.json @@ -0,0 +1,36 @@ +{ + "id": "CVE-2023-25754", + "sourceIdentifier": "security@apache.org", + "published": "2023-05-08T12:15:09.613", + "lastModified": "2023-05-08T12:50:24.320", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Privilege Context Switching Error vulnerability in Apache Software Foundation Apache Airflow.This issue affects Apache Airflow: before 2.6.0.\n\n" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-270" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/apache/airflow/pull/29506", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/3y83gr0qb8t49ppfk4fb2yk7md8ltq4v", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25961.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25961.json index 222b3257fc4..75fa682f90b 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25961.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25961.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25961", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-04T20:15:09.897", - "lastModified": "2023-05-05T13:33:53.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:30:06.533", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -36,7 +56,7 @@ }, "weaknesses": [ { - "source": "audit@patchstack.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -44,12 +64,43 @@ "value": "CWE-79" } ] + }, + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:catchthemes:darcie:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.6", + "matchCriteriaId": "304F0D5F-0015-497C-B223-BCE964EE97F6" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/darcie/wordpress-darcie-theme-1-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25967.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25967.json index 54d0299ee7e..422082416dd 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25967.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25967.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25967", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-03T16:15:10.480", - "lastModified": "2023-05-03T19:07:24.620", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:44:41.297", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:peepso:peepso:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.0.3.0", + "matchCriteriaId": "E2FCF17F-2813-4C83-A05B-827BAF5F2838" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/peepso-core/wordpress-community-by-peepso-social-network-membership-registration-user-profiles-plugin-6-0-2-0-cross-site-request-forgery-csrf?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25977.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25977.json index 4a9d3dd8e74..b1ae4a1f2c5 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25977.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25977.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25977", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-04T20:15:09.977", - "lastModified": "2023-05-05T13:33:53.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:29:20.623", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:9seeds:cpt_-_speakers:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1", + "matchCriteriaId": "A7A26631-1BA4-45FC-B313-EC5D9AE41F4A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/cpt-speakers/wordpress-cpt-speakers-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25982.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25982.json index dee23ceb0c8..d41ae4cbef5 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25982.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25982.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25982", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-04T20:15:10.060", - "lastModified": "2023-05-05T13:33:53.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:32:45.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:simple_youtube_responsive_project:simple_youtube_responsive:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.0", + "matchCriteriaId": "EC8E7C10-7DD8-4CE3-9303-220F178766E4" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/simple-youtube-responsive/wordpress-simple-youtube-responsive-plugin-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2534.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2534.json index 4defdcf7907..296e2f0d6f4 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2534.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2534.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2534", "sourceIdentifier": "security@otrs.com", "published": "2023-05-08T08:15:43.673", - "lastModified": "2023-05-08T08:15:43.673", - "vulnStatus": "Received", + "lastModified": "2023-05-08T12:50:24.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2566.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2566.json index c46910cec34..c21ad2f32d9 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2566.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2566.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2566", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-08T05:15:09.860", - "lastModified": "2023-05-08T05:15:09.860", - "vulnStatus": "Received", + "lastModified": "2023-05-08T12:50:24.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2573.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2573.json new file mode 100644 index 00000000000..a39fcb29e1b --- /dev/null +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2573.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-2573", + "sourceIdentifier": "office@cyberdanube.com", + "published": "2023-05-08T13:15:09.710", + "lastModified": "2023-05-08T13:26:36.163", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the NTP server input field, which can be triggered by authenticated users via a crafted POST request.\n\n\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BEBL", + "source": "office@cyberdanube.com" + }, + { + "url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BECT", + "source": "office@cyberdanube.com" + }, + { + "url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BED3", + "source": "office@cyberdanube.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2574.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2574.json new file mode 100644 index 00000000000..272b7e21b8e --- /dev/null +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2574.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-2574", + "sourceIdentifier": "office@cyberdanube.com", + "published": "2023-05-08T13:15:09.790", + "lastModified": "2023-05-08T13:26:36.163", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by an command injection vulnerability in the device name input field, which can be triggered by authenticated users via a crafted POST request.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BEBL", + "source": "office@cyberdanube.com" + }, + { + "url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BECT", + "source": "office@cyberdanube.com" + }, + { + "url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BED3", + "source": "office@cyberdanube.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2575.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2575.json new file mode 100644 index 00000000000..3106cf93878 --- /dev/null +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2575.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2023-2575", + "sourceIdentifier": "office@cyberdanube.com", + "published": "2023-05-08T13:15:09.847", + "lastModified": "2023-05-08T13:26:36.163", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Advantech EKI-1524, EKI-1522, EKI-1521 devices through 1.21 are affected by a\u00a0Stack-based Buffer Overflow vulnerability, which can be triggered by authenticated\u00a0users via a crafted POST request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "office@cyberdanube.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BEBL", + "source": "office@cyberdanube.com" + }, + { + "url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BECT", + "source": "office@cyberdanube.com" + }, + { + "url": "https://www.advantech.com/en/support/details/firmware?id=1-1J9BED3", + "source": "office@cyberdanube.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-260xx/CVE-2023-26017.json b/CVE-2023/CVE-2023-260xx/CVE-2023-26017.json index e6da05a2065..3c20bd673bf 100644 --- a/CVE-2023/CVE-2023-260xx/CVE-2023-26017.json +++ b/CVE-2023/CVE-2023-260xx/CVE-2023-26017.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26017", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-03T16:15:10.747", - "lastModified": "2023-05-03T19:07:24.620", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:44:04.073", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:blueglass:jobs_for_wordpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.5.11", + "matchCriteriaId": "C64C971B-4E35-4B16-88FB-1FD0A4E32548" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/job-postings/wordpress-jobs-for-wordpress-plugin-2-5-10-2-cross-site-scripting-xss?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27999.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27999.json index 534a9927cca..58ea6a3940b 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27999.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27999.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27999", "sourceIdentifier": "psirt@fortinet.com", "published": "2023-05-03T22:15:19.200", - "lastModified": "2023-05-04T13:03:05.007", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:50:59.043", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "psirt@fortinet.com", "type": "Secondary", @@ -34,10 +54,49 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.0", + "versionEndExcluding": "7.1.2", + "matchCriteriaId": "30963483-E0D5-4B71-B649-79194ACC77BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "74B0A112-AA30-4D11-8F36-3DC8A2EBCA16" + } + ] + } + ] + } + ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-22-297", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28169.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28169.json new file mode 100644 index 00000000000..0e67e2a9676 --- /dev/null +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28169.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-28169", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-08T13:15:09.650", + "lastModified": "2023-05-08T13:26:36.163", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in CoreFortress Easy Event calendar plugin <=\u00a01.0 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/easy-event-calendar/wordpress-easy-event-calendar-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json index 70d80936012..2182959e366 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28261.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28261", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-27T19:15:20.350", - "lastModified": "2023-04-28T12:58:13.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:58:25.660", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -13,8 +13,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N", @@ -34,10 +54,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:extended_stable:*:*:*", + "versionEndExcluding": "110.0.1587.78", + "matchCriteriaId": "BA4E37D9-C3B9-4C5B-8DDD-106A86F53C98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionEndExcluding": "111.0.1661.54", + "matchCriteriaId": "2CE1CC18-EB72-42F8-B77D-CC53F8D66146" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28261", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json b/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json index 28ffc2c4637..b309152f08e 100644 --- a/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json +++ b/CVE-2023/CVE-2023-282xx/CVE-2023-28286.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28286", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-27T19:15:20.467", - "lastModified": "2023-04-28T12:58:13.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:54:28.333", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:extended_stable:*:*:*", + "versionEndExcluding": "110.0.1587.78", + "matchCriteriaId": "BA4E37D9-C3B9-4C5B-8DDD-106A86F53C98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionEndExcluding": "111.0.1661.54", + "matchCriteriaId": "2CE1CC18-EB72-42F8-B77D-CC53F8D66146" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28286", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29247.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29247.json index 85e4d620693..b348bb24b84 100644 --- a/CVE-2023/CVE-2023-292xx/CVE-2023-29247.json +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29247.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29247", "sourceIdentifier": "security@apache.org", "published": "2023-05-08T10:15:09.163", - "lastModified": "2023-05-08T10:15:09.163", - "vulnStatus": "Received", + "lastModified": "2023-05-08T12:50:24.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json b/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json index 0b160bd3954..639314f903e 100644 --- a/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json +++ b/CVE-2023/CVE-2023-293xx/CVE-2023-29334.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29334", "sourceIdentifier": "secure@microsoft.com", "published": "2023-04-28T18:15:26.390", - "lastModified": "2023-04-28T18:25:52.200", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-08T13:40:30.013", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -34,10 +34,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*", + "versionEndExcluding": "112.0.1722.48", + "matchCriteriaId": "B3088A0C-1AB8-411A-B9E7-A756BD40E4C9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29334", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30018.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30018.json index 637642b2aaa..081498379cc 100644 --- a/CVE-2023/CVE-2023-300xx/CVE-2023-30018.json +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30018.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30018", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-08T04:15:09.247", - "lastModified": "2023-05-08T04:15:09.247", - "vulnStatus": "Received", + "lastModified": "2023-05-08T12:50:24.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31038.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31038.json index b0eaa92529f..f1e4c76289c 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31038.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31038.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31038", "sourceIdentifier": "security@apache.org", "published": "2023-05-08T09:15:09.280", - "lastModified": "2023-05-08T09:15:09.280", - "vulnStatus": "Received", + "lastModified": "2023-05-08T12:50:24.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31039.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31039.json index afc19ab8351..dc1169a00ff 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31039.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31039.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31039", "sourceIdentifier": "security@apache.org", "published": "2023-05-08T09:15:09.637", - "lastModified": "2023-05-08T09:15:09.637", - "vulnStatus": "Received", + "lastModified": "2023-05-08T12:50:24.320", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 9ae48bf067e..f4f14d38826 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-08T12:00:23.949742+00:00 +2023-05-08T14:00:23.757161+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-08T10:15:09.230000+00:00 +2023-05-08T13:58:25.660000+00:00 ``` ### Last Data Feed Release @@ -29,21 +29,68 @@ Download and Changelog: [Click](releases/latest) ### Total Number of included CVEs ```plain -214196 +214207 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `11` -* [CVE-2023-29247](CVE-2023/CVE-2023-292xx/CVE-2023-29247.json) (`2023-05-08T10:15:09.163`) +* [CVE-2022-45812](CVE-2022/CVE-2022-458xx/CVE-2022-45812.json) (`2023-05-08T13:15:09.443`) +* [CVE-2022-46799](CVE-2022/CVE-2022-467xx/CVE-2022-46799.json) (`2023-05-08T12:15:09.313`) +* [CVE-2023-23668](CVE-2023/CVE-2023-236xx/CVE-2023-23668.json) (`2023-05-08T12:15:09.440`) +* [CVE-2023-25021](CVE-2023/CVE-2023-250xx/CVE-2023-25021.json) (`2023-05-08T12:15:09.527`) +* [CVE-2023-25052](CVE-2023/CVE-2023-250xx/CVE-2023-25052.json) (`2023-05-08T13:15:09.537`) +* [CVE-2023-25452](CVE-2023/CVE-2023-254xx/CVE-2023-25452.json) (`2023-05-08T13:15:09.593`) +* [CVE-2023-2573](CVE-2023/CVE-2023-25xx/CVE-2023-2573.json) (`2023-05-08T13:15:09.710`) +* [CVE-2023-2574](CVE-2023/CVE-2023-25xx/CVE-2023-2574.json) (`2023-05-08T13:15:09.790`) +* [CVE-2023-2575](CVE-2023/CVE-2023-25xx/CVE-2023-2575.json) (`2023-05-08T13:15:09.847`) +* [CVE-2023-25754](CVE-2023/CVE-2023-257xx/CVE-2023-25754.json) (`2023-05-08T12:15:09.613`) +* [CVE-2023-28169](CVE-2023/CVE-2023-281xx/CVE-2023-28169.json) (`2023-05-08T13:15:09.650`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `38` -* [CVE-2023-2251](CVE-2023/CVE-2023-22xx/CVE-2023-2251.json) (`2023-05-08T10:15:09.230`) +* [CVE-2012-5873](CVE-2012/CVE-2012-58xx/CVE-2012-5873.json) (`2023-05-08T13:37:47.017`) +* [CVE-2015-5122](CVE-2015/CVE-2015-51xx/CVE-2015-5122.json) (`2023-05-08T13:29:02.290`) +* [CVE-2015-8652](CVE-2015/CVE-2015-86xx/CVE-2015-8652.json) (`2023-05-08T13:29:02.290`) +* [CVE-2015-8653](CVE-2015/CVE-2015-86xx/CVE-2015-8653.json) (`2023-05-08T13:29:02.290`) +* [CVE-2015-8654](CVE-2015/CVE-2015-86xx/CVE-2015-8654.json) (`2023-05-08T13:29:02.290`) +* [CVE-2015-8655](CVE-2015/CVE-2015-86xx/CVE-2015-8655.json) (`2023-05-08T13:29:02.290`) +* [CVE-2015-8656](CVE-2015/CVE-2015-86xx/CVE-2015-8656.json) (`2023-05-08T13:29:02.290`) +* [CVE-2015-8657](CVE-2015/CVE-2015-86xx/CVE-2015-8657.json) (`2023-05-08T13:29:02.290`) +* [CVE-2015-8658](CVE-2015/CVE-2015-86xx/CVE-2015-8658.json) (`2023-05-08T13:29:02.290`) +* [CVE-2015-8820](CVE-2015/CVE-2015-88xx/CVE-2015-8820.json) (`2023-05-08T13:29:02.290`) +* [CVE-2015-8821](CVE-2015/CVE-2015-88xx/CVE-2015-8821.json) (`2023-05-08T13:29:02.290`) +* [CVE-2015-8822](CVE-2015/CVE-2015-88xx/CVE-2015-8822.json) (`2023-05-08T13:29:02.290`) +* [CVE-2016-0959](CVE-2016/CVE-2016-09xx/CVE-2016-0959.json) (`2023-05-08T13:29:02.290`) +* [CVE-2020-7808](CVE-2020/CVE-2020-78xx/CVE-2020-7808.json) (`2023-05-08T13:29:02.290`) +* [CVE-2022-45818](CVE-2022/CVE-2022-458xx/CVE-2022-45818.json) (`2023-05-08T13:39:29.693`) +* [CVE-2023-2248](CVE-2023/CVE-2023-22xx/CVE-2023-2248.json) (`2023-05-08T12:15:10.367`) +* [CVE-2023-23723](CVE-2023/CVE-2023-237xx/CVE-2023-23723.json) (`2023-05-08T13:40:17.417`) +* [CVE-2023-23808](CVE-2023/CVE-2023-238xx/CVE-2023-23808.json) (`2023-05-08T13:45:40.917`) +* [CVE-2023-23809](CVE-2023/CVE-2023-238xx/CVE-2023-23809.json) (`2023-05-08T13:45:31.337`) +* [CVE-2023-23830](CVE-2023/CVE-2023-238xx/CVE-2023-23830.json) (`2023-05-08T13:41:15.720`) +* [CVE-2023-23875](CVE-2023/CVE-2023-238xx/CVE-2023-23875.json) (`2023-05-08T13:30:47.220`) +* [CVE-2023-23881](CVE-2023/CVE-2023-238xx/CVE-2023-23881.json) (`2023-05-08T13:37:37.803`) +* [CVE-2023-2534](CVE-2023/CVE-2023-25xx/CVE-2023-2534.json) (`2023-05-08T12:50:24.320`) +* [CVE-2023-25458](CVE-2023/CVE-2023-254xx/CVE-2023-25458.json) (`2023-05-08T13:38:48.890`) +* [CVE-2023-2566](CVE-2023/CVE-2023-25xx/CVE-2023-2566.json) (`2023-05-08T12:50:24.320`) +* [CVE-2023-25961](CVE-2023/CVE-2023-259xx/CVE-2023-25961.json) (`2023-05-08T13:30:06.533`) +* [CVE-2023-25967](CVE-2023/CVE-2023-259xx/CVE-2023-25967.json) (`2023-05-08T13:44:41.297`) +* [CVE-2023-25977](CVE-2023/CVE-2023-259xx/CVE-2023-25977.json) (`2023-05-08T13:29:20.623`) +* [CVE-2023-25982](CVE-2023/CVE-2023-259xx/CVE-2023-25982.json) (`2023-05-08T13:32:45.317`) +* [CVE-2023-26017](CVE-2023/CVE-2023-260xx/CVE-2023-26017.json) (`2023-05-08T13:44:04.073`) +* [CVE-2023-27999](CVE-2023/CVE-2023-279xx/CVE-2023-27999.json) (`2023-05-08T13:50:59.043`) +* [CVE-2023-28261](CVE-2023/CVE-2023-282xx/CVE-2023-28261.json) (`2023-05-08T13:58:25.660`) +* [CVE-2023-28286](CVE-2023/CVE-2023-282xx/CVE-2023-28286.json) (`2023-05-08T13:54:28.333`) +* [CVE-2023-29247](CVE-2023/CVE-2023-292xx/CVE-2023-29247.json) (`2023-05-08T12:50:24.320`) +* [CVE-2023-29334](CVE-2023/CVE-2023-293xx/CVE-2023-29334.json) (`2023-05-08T13:40:30.013`) +* [CVE-2023-30018](CVE-2023/CVE-2023-300xx/CVE-2023-30018.json) (`2023-05-08T12:50:24.320`) +* [CVE-2023-31038](CVE-2023/CVE-2023-310xx/CVE-2023-31038.json) (`2023-05-08T12:50:24.320`) +* [CVE-2023-31039](CVE-2023/CVE-2023-310xx/CVE-2023-31039.json) (`2023-05-08T12:50:24.320`) ## Download and Usage