Auto-Update: 2023-06-01T16:00:25.146096+00:00

This commit is contained in:
cad-safe-bot 2023-06-01 16:00:28 +00:00
parent 563a46e1e3
commit 46bc9d31ad
45 changed files with 1539 additions and 166 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-125104",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-01T13:15:10.087",
"lastModified": "2023-06-01T13:15:10.087",
"vulnStatus": "Received",
"lastModified": "2023-06-01T14:01:50.967",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-10109",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-01T13:15:10.180",
"lastModified": "2023-06-01T13:15:10.180",
"vulnStatus": "Received",
"lastModified": "2023-06-01T14:01:50.967",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-0010",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2023-05-22T08:15:08.920",
"lastModified": "2023-05-22T10:56:50.933",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T15:20:31.870",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "cybersecurity@ch.abb.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
},
{
"source": "cybersecurity@ch.abb.com",
"type": "Secondary",
@ -46,10 +76,101 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:abb:platform_engineering_tools:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndIncluding": "2.3.0",
"matchCriteriaId": "B0469275-C1B5-45EE-B4A9-DE1F500E04C6"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:qcs_800xa_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndIncluding": "5.1.0",
"matchCriteriaId": "F25CD2B4-140C-49C4-BEBD-9021CAD12FE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:qcs_800xa_firmware:5.1.0:sp2:*:*:*:*:*:*",
"matchCriteriaId": "32217B3E-F886-48A1-8987-A92DA4E54A9A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:qcs_800xa:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44BDFBF8-88D6-45D9-965F-85CFD002F316"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:qcs_ac450_firmware:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndIncluding": "6.1.0",
"matchCriteriaId": "24106F4D-2DF1-417E-9FF1-DD212E1F6F27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:abb:qcs_ac450_firmware:6.1.0:sp2:*:*:*:*:*:*",
"matchCriteriaId": "03FA9720-A525-4F4B-9486-C346C258B4DE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:abb:qcs_ac450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79CCB4FA-2651-4E96-925F-772E3EAFA593"
}
]
}
]
}
],
"references": [
{
"url": "https://search.abb.com/library/Download.aspx?DocumentID=3BUS221709&LanguageCode=en&DocumentPartId=&Action=Launch&_ga=2.108646530.1437951308.1684739395-1142547495.1678209228",
"source": "cybersecurity@ch.abb.com"
"source": "cybersecurity@ch.abb.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-21216",
"sourceIdentifier": "secure@intel.com",
"published": "2023-02-16T20:15:12.347",
"lastModified": "2023-02-28T19:42:51.300",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-01T14:15:09.700",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -1857,6 +1857,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230601-0005/",
"source": "secure@intel.com"
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2022-41221",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T21:15:10.870",
"lastModified": "2023-05-25T12:40:12.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T15:38:05.087",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The client in OpenText Archive Center Administration through 21.2 allows XXE attacks. Authenticated users of the OpenText Archive Center Administration client (Versions 16.2.3, 21.2, and older versions) could upload XML files to the application that it did not sufficiently validate. As a result, attackers could craft XML files that, when processed by the application, would cause a negative security impact such as data exfiltration or localized denial of service against the application instance and system of the user running it."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:archive_center_administration:*:*:*:*:*:*:*:*",
"versionEndIncluding": "21.2",
"matchCriteriaId": "271DB328-D55B-49EE-896D-79802236AD51"
}
]
}
]
}
],
"references": [
{
"url": "https://labs.withsecure.com/advisories/opentext-archive-center-administration-client-xxe-vulnerability",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,35 +2,105 @@
"id": "CVE-2022-42225",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T20:15:09.763",
"lastModified": "2023-06-01T03:15:20.420",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2023-06-01T14:15:41.747",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Jumpserver 2.10.0 <= version <= 2.26.0 contains multiple stored XSS vulnerabilities because of improper filtering of user input, which can execute any javascript under admin's permission."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fit2cloud:lina:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.10.0",
"versionEndIncluding": "2.26.0",
"matchCriteriaId": "EDFC77F0-849C-42DB-9B9A-8AE66B92C3DE"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/bybit-sec/eb750c1d906c89e97092b29015472738",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/jumpserver/lina/blob/v2.10.0/src/views/settings/SystemMessageSubscription/SelectDialog.vue#L43",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/jumpserver/lina/blob/v2.11.0/src/layout/components/NavHeader/SiteMessages.vue#L40",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/jumpserver/lina/blob/v2.26.0/src/views/tickets/components/Comments.vue#L16",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/jumpserver/lina/pull/2264",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43760",
"sourceIdentifier": "meissner@suse.de",
"published": "2023-06-01T13:15:10.373",
"lastModified": "2023-06-01T13:15:10.373",
"vulnStatus": "Received",
"lastModified": "2023-06-01T14:01:50.967",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46945",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-26T15:15:09.393",
"lastModified": "2023-05-26T15:56:52.630",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T14:02:24.270",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -34,14 +54,51 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nagvis:nagvis:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.9.34",
"matchCriteriaId": "6958F106-F947-4580-A8AF-D151A3E8CA12"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/NagVis/nagvis/commit/71aba7f46f79d846e1df037f165d206a2cd1d22a",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/NagVis/nagvis/compare/nagvis-1.9.33...nagvis-1.9.34",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch",
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47144",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-25T12:15:10.227",
"lastModified": "2023-05-25T12:40:12.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T15:23:58.143",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -36,7 +56,7 @@
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -44,12 +64,43 @@
"value": "CWE-352"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:frenify:mediamatic:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.8.1",
"matchCriteriaId": "1E444289-1288-492F-9957-A38D6807F8AE"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/mediamatic/wordpress-mediamatic-media-library-folders-plugin-2-8-1-cross-site-request-forgery-csrf?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4815",
"sourceIdentifier": "security.vulnerabilities@hitachivantara.com",
"published": "2023-05-24T22:15:09.000",
"lastModified": "2023-05-25T12:40:12.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T15:45:06.507",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
},
{
"source": "security.vulnerabilities@hitachivantara.com",
"type": "Secondary",
@ -46,10 +76,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachi:vantara_pentaho:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.3.0.0",
"versionEndIncluding": "8.3.0.25",
"matchCriteriaId": "F1B95DD6-1D15-4FEE-9C10-E4F7C172D58C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachi:vantara_pentaho_business_analytics_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "9.3.0.0",
"versionEndIncluding": "9.3.0.3",
"matchCriteriaId": "082F0C66-8917-45D4-96A9-8083F1C92F5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hitachi:vantara_pentaho_business_analytics_server:9.4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "430B3A1E-02B7-4500-B4BA-395A873DE824"
}
]
}
]
}
],
"references": [
{
"url": "https://support.pentaho.com/hc/en-us/articles/14455879270285-IMPORTANT-Resolved-Pentaho-BA-Server-Deserialization-of-Untrusted-Data-Versions-before-9-4-0-1-and-9-3-0-3-including-8-3-x-Impacted-CVE-2022-4815-",
"source": "security.vulnerabilities@hitachivantara.com"
"source": "security.vulnerabilities@hitachivantara.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1829",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-04-12T12:15:07.080",
"lastModified": "2023-05-03T14:15:25.480",
"lastModified": "2023-06-01T14:15:10.277",
"vulnStatus": "Modified",
"descriptions": [
{
@ -117,6 +117,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"source": "cve-coordination@google.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230601-0001/",
"source": "cve-coordination@google.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1872",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-04-12T16:15:17.027",
"lastModified": "2023-05-03T01:15:12.613",
"lastModified": "2023-06-01T14:15:10.420",
"vulnStatus": "Modified",
"descriptions": [
{
@ -114,6 +114,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html",
"source": "cve-coordination@google.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230601-0002/",
"source": "cve-coordination@google.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1989",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-04-11T21:15:15.503",
"lastModified": "2023-05-03T14:15:27.110",
"lastModified": "2023-06-01T14:15:10.937",
"vulnStatus": "Modified",
"descriptions": [
{
@ -106,6 +106,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"source": "secalert@redhat.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230601-0004/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20873",
"sourceIdentifier": "security@vmware.com",
"published": "2023-04-20T21:15:08.717",
"lastModified": "2023-05-01T18:51:25.810",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-01T14:15:11.057",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -73,6 +73,10 @@
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20230601-0009/",
"source": "security@vmware.com"
},
{
"url": "https://spring.io/security/cve-2023-20873",
"source": "security@vmware.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22647",
"sourceIdentifier": "meissner@suse.de",
"published": "2023-06-01T13:15:10.467",
"lastModified": "2023-06-01T13:15:10.467",
"vulnStatus": "Received",
"lastModified": "2023-06-01T14:01:50.967",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22648",
"sourceIdentifier": "meissner@suse.de",
"published": "2023-06-01T13:15:10.553",
"lastModified": "2023-06-01T13:15:10.553",
"vulnStatus": "Received",
"lastModified": "2023-06-01T14:01:50.967",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2236",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2023-05-01T13:15:44.850",
"lastModified": "2023-05-06T03:13:29.040",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-01T14:15:11.867",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -142,6 +142,10 @@
"Exploit",
"Patch"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230601-0010/",
"source": "cve-coordination@google.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25029",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-26T14:15:10.463",
"lastModified": "2023-05-26T15:56:52.630",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T15:43:59.477",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp_social_bookmarking_light_project:wp_social_bookmarking_light:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "2.0.7",
"matchCriteriaId": "E6318FD6-154A-4C57-8F10-45B9CDDF5A25"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-social-bookmarking-light/wordpress-wp-social-bookmarking-light-plugin-2-0-7-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25034",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-26T15:15:10.310",
"lastModified": "2023-05-26T15:56:52.630",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T15:23:00.853",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp_clean_up_project:wp_clean_up:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.2.3",
"matchCriteriaId": "B519D66B-DE61-49F5-8C26-D6389F068CF3"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-clean-up/wordpress-wp-clean-up-plugin-1-2-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25038",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-26T13:15:11.830",
"lastModified": "2023-05-26T13:51:08.317",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T15:23:33.407",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:984.ru:for_the_visually_impaired:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "0.58",
"matchCriteriaId": "BFCE5DD0-8CDB-48B7-A077-E68A834E7F36"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/for-the-visually-impaired/wordpress-for-the-visually-impaired-plugin-0-58-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25058",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-26T15:15:11.393",
"lastModified": "2023-05-26T15:56:52.630",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T15:22:51.517",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brainstormforce:schema:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.6.6",
"matchCriteriaId": "B9129741-E978-4693-86C7-6EA6E5FDF9D2"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/all-in-one-schemaorg-rich-snippets/wordpress-schema-all-in-one-schema-rich-snippets-plugin-1-6-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25467",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-26T15:15:11.767",
"lastModified": "2023-05-26T15:56:52.630",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T15:22:40.270",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:resize_at_upload_plus_project:resize_at_upload_plus:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3",
"matchCriteriaId": "640175F2-984E-449A-B96F-C7958775F2EF"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/resize-at-upload-plus/wordpress-resize-at-upload-plus-plugin-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25470",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-26T14:15:10.643",
"lastModified": "2023-05-26T15:56:52.630",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T15:43:49.997",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rus-to-lat_project:rus-to-lat:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "0.3",
"matchCriteriaId": "283C436E-C0C8-4E47-AE03-36A67DF82CD8"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/rustolat/wordpress-rus-to-lat-plugin-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,23 +2,97 @@
"id": "CVE-2023-25599",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T21:15:11.380",
"lastModified": "2023-05-25T12:40:12.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T15:25:56.043",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the conferencing component of Mitel MiVoice Connect through 19.3 SP2 and 20.x, 21.x, and 22.x through 22.24.1500.0 could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack due to insufficient validation for the test_presenter.php page. A successful exploit could allow an attacker to execute arbitrary scripts."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:mivoice_connect:*:*:*:*:*:*:*:*",
"versionEndExcluding": "19.3",
"matchCriteriaId": "D793461C-AAEE-464A-970A-1CCCA53BD240"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:mivoice_connect:19.3:-:*:*:*:*:*:*",
"matchCriteriaId": "FAF7BBF2-8DEE-42FF-B9DE-35C0CE8676F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:mivoice_connect:19.3:sp1:*:*:*:*:*:*",
"matchCriteriaId": "6BEC037A-E50C-4BFF-89A6-83F32E46E4D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:mivoice_connect:19.3:sp2:*:*:*:*:*:*",
"matchCriteriaId": "8F9C132E-3ACD-481A-9413-47B8CC14FDB1"
}
]
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0003",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26043",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-02-27T21:15:12.103",
"lastModified": "2023-03-08T17:20:30.840",
"lastModified": "2023-06-01T14:03:36.337",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:osgeo:geonode:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:geosolutionsgroup:geonode:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.0.3",
"matchCriteriaId": "9602C761-F64B-46DA-BA09-AD61CD364987"
"matchCriteriaId": "FF65F806-F0DC-43AE-BA82-D15F8BB2F5B8"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27043",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-19T00:15:07.973",
"lastModified": "2023-05-12T16:15:09.677",
"lastModified": "2023-06-01T14:15:11.143",
"vulnStatus": "Modified",
"descriptions": [
{
@ -87,6 +87,10 @@
{
"url": "https://python-security.readthedocs.io/vuln/email-parseaddr-realname.html",
"source": "cve@mitre.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230601-0003/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28484",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-24T21:15:09.180",
"lastModified": "2023-05-03T20:23:29.990",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-01T14:15:11.220",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -104,6 +104,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230601-0006/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28856",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-04-18T21:15:09.313",
"lastModified": "2023-04-28T01:05:38.303",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-01T14:15:11.300",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -56,13 +56,9 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-617"
@ -70,9 +66,13 @@
]
},
{
"source": "nvd@nist.gov",
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-617"
@ -206,6 +206,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230601-0007/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,23 +2,82 @@
"id": "CVE-2023-2817",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-05-26T17:15:17.600",
"lastModified": "2023-05-26T17:15:17.600",
"vulnStatus": "Received",
"lastModified": "2023-06-01T15:22:24.423",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A post-authentication stored cross-site scripting vulnerability exists in Craft CMS versions <= 4.4.11. HTML, including script tags can be injected into field names which, when the field is added to a category or section, will trigger when users visit the Categories or Entries pages respectively."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.4.11",
"matchCriteriaId": "36AAD9D5-67CA-49DD-960B-88322543BD8E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/craftcms/cms/commit/7655e1009ba6cdbfb230e6bb138b775b69fc7bcb",
"source": "vulnreport@tenable.com"
"source": "vulnreport@tenable.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.tenable.com/security/research/tra-2023-20,",
"source": "vulnreport@tenable.com"
"source": "vulnreport@tenable.com",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2856",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:17.913",
"lastModified": "2023-05-30T12:59:20.893",
"lastModified": "2023-06-01T14:03:24.730",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -17,8 +17,8 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
@ -26,10 +26,10 @@
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29469",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-24T21:15:09.230",
"lastModified": "2023-05-04T16:06:52.953",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-01T14:15:11.423",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -102,6 +102,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230601-0006/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30846",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-04-26T21:15:09.380",
"lastModified": "2023-05-05T20:36:25.807",
"vulnStatus": "Analyzed",
"lastModified": "2023-06-01T14:15:12.120",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -57,7 +57,7 @@
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -98,6 +98,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230601-0008/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2023-3035",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-01T14:15:12.317",
"lastModified": "2023-06-01T14:15:12.317",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Guangdong Pythagorean OA Office System up to 4.50.31 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component Schedule Handler. The manipulation of the argument description leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230467."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://gitee.com/gouguopen/office/issues/I74ZPU",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.230467",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.230467",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,23 +2,94 @@
"id": "CVE-2023-31594",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-25T01:15:41.833",
"lastModified": "2023-05-25T12:40:12.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T15:20:52.007",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "IC Realtime ICIP-P2012T 2.420 is vulnerable to Incorrect Access Control via an exposed HTTP channel using VLC network."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ic:realtime_icip-p2012t_firmware:2.420:*:*:*:*:*:*:*",
"matchCriteriaId": "AB3940BF-0D6E-4158-90D7-7B82E41AAD71"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:ic:realtime_icip-p2012t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "69096040-1A39-4E99-8284-667BC4B76066"
}
]
}
]
}
],
"references": [
{
"url": "http://ic.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Yozarseef95/CVE-2023-31594",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2023-31923",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-22T15:15:09.597",
"lastModified": "2023-05-22T16:15:51.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T14:34:23.723",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Suprema BioStar 2 before 2022 Q4, v2.9.1 has Insecure Permissions. A vulnerability in the web application allows an authenticated attacker with \"User Operator\" privileges to create a highly privileged user account. The vulnerability is caused by missing server-side validation, which can be exploited to gain full administrator privileges on the system."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:supremainc:biostar_2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.9.1",
"matchCriteriaId": "EB816219-172E-445F-9175-938D9B8A4602"
}
]
}
]
}
],
"references": [
{
"url": "https://nobugescapes.com/blog/creating-a-new-user-with-admin-privilege/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32348",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-05-22T16:15:10.340",
"lastModified": "2023-05-22T16:15:51.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T14:26:59.373",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -46,10 +66,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:teltonika:remote_management_system:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.10.0",
"matchCriteriaId": "FBC0B044-049C-4538-A1C6-56B61073AADE"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-131-08",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33197",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-26T20:15:48.600",
"lastModified": "2023-05-28T02:28:04.970",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T14:02:03.497",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -35,6 +55,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,18 +76,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.4.6",
"matchCriteriaId": "4A1C64B2-295C-4743-9563-EA638F83267C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/craftcms/cms/commit/8c2ad0bd313015b8ee42326af2848ee748f1d766",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/craftcms/cms/releases/tag/4.4.6",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/craftcms/cms/security/advisories/GHSA-6qjx-787v-6pxr",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33544",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-01T13:15:10.637",
"lastModified": "2023-06-01T13:15:10.637",
"vulnStatus": "Received",
"lastModified": "2023-06-01T14:01:50.967",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33546",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-01T13:15:10.743",
"lastModified": "2023-06-01T13:15:10.743",
"vulnStatus": "Received",
"lastModified": "2023-06-01T14:01:50.967",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33551",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-01T15:15:09.050",
"lastModified": "2023-06-01T15:15:09.050",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Heap Buffer Overflow in the erofsfsck_dirent_iter function in fsck/main.c in erofs-utils v1.6 allows remote attackers to execute arbitrary code via a crafted erofs filesystem image."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/lometsj/blog_repo/issues/2",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,20 @@
{
"id": "CVE-2023-33552",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-01T15:15:09.163",
"lastModified": "2023-06-01T15:15:09.163",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Heap Buffer Overflow in the erofs_read_one_data function at data.c in erofs-utils v1.6 allows remote attackers to execute arbitrary code via a crafted erofs filesystem image."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/lometsj/blog_repo/issues/1",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-33965",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-06-01T15:15:09.213",
"lastModified": "2023-06-01T15:15:09.213",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Brook is a cross-platform programmable network tool. The `tproxy` server is vulnerable to a drive-by command injection. An attacker may fool a victim into visiting a malicious web page which will trigger requests to the local `tproxy` service leading to remote code execution. A patch is available in version 20230606."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/txthinking/brook/commit/314d7070c37babf6c38a0fe1eada872bb74bf03e",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/txthinking/brook/security/advisories/GHSA-vfrj-fv6p-3cpf",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,23 +2,84 @@
"id": "CVE-2023-33982",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T18:15:10.927",
"lastModified": "2023-05-25T12:40:12.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T15:55:22.407",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Bramble Handshake Protocol (BHP) in Briar before 1.5.3 is not forward secure: eavesdroppers can decrypt network traffic between two accounts if they later compromise both accounts. NOTE: the eavesdropping is typically impractical because BHP runs over an encrypted session that uses the Tor hidden service protocol."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-326"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:briarproject:briar:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.5.3",
"matchCriteriaId": "9BD4F09C-F62B-47B9-AB43-C15FEBC839DA"
}
]
}
]
}
],
"references": [
{
"url": "https://briarproject.org/news/2023-three-security-issues-found-and-fixed/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_YuanmingSong.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,77 @@
"id": "CVE-2023-33983",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T18:15:10.983",
"lastModified": "2023-05-25T12:40:12.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-01T14:10:43.507",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The Introduction Client in Briar through 1.5.3 does not implement out-of-band verification for the public keys of introducees. An introducer can launch man-in-the-middle attacks against later private communication between two introduced parties."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:briarproject:briar:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.5.3",
"matchCriteriaId": "1F0A8EFB-C2F6-4A89-8836-1919C9C09EE4"
}
]
}
]
}
],
"references": [
{
"url": "https://ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/appliedcrypto/education/theses/report_YuanmingSong.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-06-01T14:00:26.861890+00:00
2023-06-01T16:00:25.146096+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-06-01T13:55:13.937000+00:00
2023-06-01T15:55:22.407000+00:00
```
### Last Data Feed Release
@ -29,53 +29,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
216619
216623
```
### CVEs added in the last Commit
Recently added CVEs: `9`
Recently added CVEs: `4`
* [CVE-2014-125104](CVE-2014/CVE-2014-1251xx/CVE-2014-125104.json) (`2023-06-01T13:15:10.087`)
* [CVE-2015-10109](CVE-2015/CVE-2015-101xx/CVE-2015-10109.json) (`2023-06-01T13:15:10.180`)
* [CVE-2022-43760](CVE-2022/CVE-2022-437xx/CVE-2022-43760.json) (`2023-06-01T13:15:10.373`)
* [CVE-2023-22652](CVE-2023/CVE-2023-226xx/CVE-2023-22652.json) (`2023-06-01T12:15:09.557`)
* [CVE-2023-32181](CVE-2023/CVE-2023-321xx/CVE-2023-32181.json) (`2023-06-01T12:15:09.727`)
* [CVE-2023-22647](CVE-2023/CVE-2023-226xx/CVE-2023-22647.json) (`2023-06-01T13:15:10.467`)
* [CVE-2023-22648](CVE-2023/CVE-2023-226xx/CVE-2023-22648.json) (`2023-06-01T13:15:10.553`)
* [CVE-2023-33544](CVE-2023/CVE-2023-335xx/CVE-2023-33544.json) (`2023-06-01T13:15:10.637`)
* [CVE-2023-33546](CVE-2023/CVE-2023-335xx/CVE-2023-33546.json) (`2023-06-01T13:15:10.743`)
* [CVE-2023-3035](CVE-2023/CVE-2023-30xx/CVE-2023-3035.json) (`2023-06-01T14:15:12.317`)
* [CVE-2023-33551](CVE-2023/CVE-2023-335xx/CVE-2023-33551.json) (`2023-06-01T15:15:09.050`)
* [CVE-2023-33552](CVE-2023/CVE-2023-335xx/CVE-2023-33552.json) (`2023-06-01T15:15:09.163`)
* [CVE-2023-33965](CVE-2023/CVE-2023-339xx/CVE-2023-33965.json) (`2023-06-01T15:15:09.213`)
### CVEs modified in the last Commit
Recently modified CVEs: `45`
Recently modified CVEs: `40`
* [CVE-2023-29154](CVE-2023/CVE-2023-291xx/CVE-2023-29154.json) (`2023-06-01T13:00:30.717`)
* [CVE-2023-29159](CVE-2023/CVE-2023-291xx/CVE-2023-29159.json) (`2023-06-01T13:00:30.717`)
* [CVE-2023-30758](CVE-2023/CVE-2023-307xx/CVE-2023-30758.json) (`2023-06-01T13:00:30.717`)
* [CVE-2023-29748](CVE-2023/CVE-2023-297xx/CVE-2023-29748.json) (`2023-06-01T13:00:30.717`)
* [CVE-2023-33461](CVE-2023/CVE-2023-334xx/CVE-2023-33461.json) (`2023-06-01T13:00:30.717`)
* [CVE-2023-33716](CVE-2023/CVE-2023-337xx/CVE-2023-33716.json) (`2023-06-01T13:00:30.717`)
* [CVE-2023-33719](CVE-2023/CVE-2023-337xx/CVE-2023-33719.json) (`2023-06-01T13:00:30.717`)
* [CVE-2023-34312](CVE-2023/CVE-2023-343xx/CVE-2023-34312.json) (`2023-06-01T13:00:30.717`)
* [CVE-2023-33778](CVE-2023/CVE-2023-337xx/CVE-2023-33778.json) (`2023-06-01T13:00:30.717`)
* [CVE-2023-24584](CVE-2023/CVE-2023-245xx/CVE-2023-24584.json) (`2023-06-01T13:00:30.717`)
* [CVE-2023-3028](CVE-2023/CVE-2023-30xx/CVE-2023-3028.json) (`2023-06-01T13:00:30.717`)
* [CVE-2023-3029](CVE-2023/CVE-2023-30xx/CVE-2023-3029.json) (`2023-06-01T13:00:30.717`)
* [CVE-2023-28399](CVE-2023/CVE-2023-283xx/CVE-2023-28399.json) (`2023-06-01T13:00:35.567`)
* [CVE-2023-28651](CVE-2023/CVE-2023-286xx/CVE-2023-28651.json) (`2023-06-01T13:00:35.567`)
* [CVE-2023-28657](CVE-2023/CVE-2023-286xx/CVE-2023-28657.json) (`2023-06-01T13:00:35.567`)
* [CVE-2023-28713](CVE-2023/CVE-2023-287xx/CVE-2023-28713.json) (`2023-06-01T13:00:35.567`)
* [CVE-2023-28370](CVE-2023/CVE-2023-283xx/CVE-2023-28370.json) (`2023-06-01T13:04:56.703`)
* [CVE-2023-2888](CVE-2023/CVE-2023-28xx/CVE-2023-2888.json) (`2023-06-01T13:05:21.207`)
* [CVE-2023-32067](CVE-2023/CVE-2023-320xx/CVE-2023-32067.json) (`2023-06-01T13:09:33.777`)
* [CVE-2023-2858](CVE-2023/CVE-2023-28xx/CVE-2023-2858.json) (`2023-06-01T13:28:35.580`)
* [CVE-2023-2854](CVE-2023/CVE-2023-28xx/CVE-2023-2854.json) (`2023-06-01T13:29:37.067`)
* [CVE-2023-2855](CVE-2023/CVE-2023-28xx/CVE-2023-2855.json) (`2023-06-01T13:29:47.293`)
* [CVE-2023-2857](CVE-2023/CVE-2023-28xx/CVE-2023-2857.json) (`2023-06-01T13:29:58.397`)
* [CVE-2023-30615](CVE-2023/CVE-2023-306xx/CVE-2023-30615.json) (`2023-06-01T13:40:29.447`)
* [CVE-2023-33980](CVE-2023/CVE-2023-339xx/CVE-2023-33980.json) (`2023-06-01T13:55:13.937`)
* [CVE-2023-2856](CVE-2023/CVE-2023-28xx/CVE-2023-2856.json) (`2023-06-01T14:03:24.730`)
* [CVE-2023-26043](CVE-2023/CVE-2023-260xx/CVE-2023-26043.json) (`2023-06-01T14:03:36.337`)
* [CVE-2023-33983](CVE-2023/CVE-2023-339xx/CVE-2023-33983.json) (`2023-06-01T14:10:43.507`)
* [CVE-2023-1829](CVE-2023/CVE-2023-18xx/CVE-2023-1829.json) (`2023-06-01T14:15:10.277`)
* [CVE-2023-1872](CVE-2023/CVE-2023-18xx/CVE-2023-1872.json) (`2023-06-01T14:15:10.420`)
* [CVE-2023-1989](CVE-2023/CVE-2023-19xx/CVE-2023-1989.json) (`2023-06-01T14:15:10.937`)
* [CVE-2023-20873](CVE-2023/CVE-2023-208xx/CVE-2023-20873.json) (`2023-06-01T14:15:11.057`)
* [CVE-2023-27043](CVE-2023/CVE-2023-270xx/CVE-2023-27043.json) (`2023-06-01T14:15:11.143`)
* [CVE-2023-28484](CVE-2023/CVE-2023-284xx/CVE-2023-28484.json) (`2023-06-01T14:15:11.220`)
* [CVE-2023-28856](CVE-2023/CVE-2023-288xx/CVE-2023-28856.json) (`2023-06-01T14:15:11.300`)
* [CVE-2023-29469](CVE-2023/CVE-2023-294xx/CVE-2023-29469.json) (`2023-06-01T14:15:11.423`)
* [CVE-2023-2236](CVE-2023/CVE-2023-22xx/CVE-2023-2236.json) (`2023-06-01T14:15:11.867`)
* [CVE-2023-30846](CVE-2023/CVE-2023-308xx/CVE-2023-30846.json) (`2023-06-01T14:15:12.120`)
* [CVE-2023-32348](CVE-2023/CVE-2023-323xx/CVE-2023-32348.json) (`2023-06-01T14:26:59.373`)
* [CVE-2023-31923](CVE-2023/CVE-2023-319xx/CVE-2023-31923.json) (`2023-06-01T14:34:23.723`)
* [CVE-2023-31594](CVE-2023/CVE-2023-315xx/CVE-2023-31594.json) (`2023-06-01T15:20:52.007`)
* [CVE-2023-2817](CVE-2023/CVE-2023-28xx/CVE-2023-2817.json) (`2023-06-01T15:22:24.423`)
* [CVE-2023-25467](CVE-2023/CVE-2023-254xx/CVE-2023-25467.json) (`2023-06-01T15:22:40.270`)
* [CVE-2023-25058](CVE-2023/CVE-2023-250xx/CVE-2023-25058.json) (`2023-06-01T15:22:51.517`)
* [CVE-2023-25034](CVE-2023/CVE-2023-250xx/CVE-2023-25034.json) (`2023-06-01T15:23:00.853`)
* [CVE-2023-25038](CVE-2023/CVE-2023-250xx/CVE-2023-25038.json) (`2023-06-01T15:23:33.407`)
* [CVE-2023-25599](CVE-2023/CVE-2023-255xx/CVE-2023-25599.json) (`2023-06-01T15:25:56.043`)
* [CVE-2023-25470](CVE-2023/CVE-2023-254xx/CVE-2023-25470.json) (`2023-06-01T15:43:49.997`)
* [CVE-2023-25029](CVE-2023/CVE-2023-250xx/CVE-2023-25029.json) (`2023-06-01T15:43:59.477`)
* [CVE-2023-33982](CVE-2023/CVE-2023-339xx/CVE-2023-33982.json) (`2023-06-01T15:55:22.407`)
## Download and Usage