mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-08 19:47:09 +00:00
Auto-Update: 2023-05-30T23:55:24.255613+00:00
This commit is contained in:
parent
d791824d9c
commit
4f209f2aae
20
CVE-2022/CVE-2022-390xx/CVE-2022-39071.json
Normal file
20
CVE-2022/CVE-2022-390xx/CVE-2022-39071.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-39071",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2023-05-30T23:15:09.273",
|
||||
"lastModified": "2023-05-30T23:15:09.273",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could overwrite some system configuration files and user installers without user permission."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1030664",
|
||||
"source": "psirt@zte.com.cn"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-390xx/CVE-2022-39074.json
Normal file
20
CVE-2022/CVE-2022-390xx/CVE-2022-39074.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-39074",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2023-05-30T23:15:09.393",
|
||||
"lastModified": "2023-05-30T23:15:09.393",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could start a non-public interface of an application without user permission."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1030664",
|
||||
"source": "psirt@zte.com.cn"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2022/CVE-2022-390xx/CVE-2022-39075.json
Normal file
20
CVE-2022/CVE-2022-390xx/CVE-2022-39075.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-39075",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2023-05-30T23:15:09.447",
|
||||
"lastModified": "2023-05-30T23:15:09.447",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "There is an unauthorized access vulnerability in some ZTE mobile phones. If a malicious application is installed on the phone, it could delete some system files without user permission."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1030664",
|
||||
"source": "psirt@zte.com.cn"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47178",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-05-25T12:15:10.297",
|
||||
"lastModified": "2023-05-25T12:40:12.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-30T23:38:54.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:simplesharebuttons:simple_share_buttons_adder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "8.4.7",
|
||||
"matchCriteriaId": "9949C377-9F63-4F24-9534-3FF1528DD2BD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/simple-share-buttons-adder/wordpress-simple-share-buttons-adder-plugin-8-4-6-cross-site-request-forgery-csrf?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2023-0779",
|
||||
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
|
||||
"published": "2023-05-30T21:15:08.987",
|
||||
"lastModified": "2023-05-30T21:15:08.987",
|
||||
"lastModified": "2023-05-30T22:15:09.457",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device\u00e2\u20ac\u2122s memory layout, further exploitation is possible."
|
||||
"value": "At the most basic level, an invalid pointer can be input that crashes the device, but with more knowledge of the device\u2019s memory layout, further exploitation is possible."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,27 +2,343 @@
|
||||
"id": "CVE-2023-22654",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.173",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-30T22:22:43.403",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Client-side enforcement of server-side security issue exists in T&D Corporation and ESPEC MIC CORP. data logger products, which may lead to an arbitrary script execution on a logged-in user's web browser. Affected products and versions are as follows: T&D Corporation data logger products (TR-71W/72W all firmware versions, RTR-5W all firmware versions, WDR-7 all firmware versions, WDR-3 all firmware versions, and WS-2 all firmware versions), and ESPEC MIC CORP. data logger products (RT-12N/RS-12N all firmware versions, RT-22BN all firmware versions, and TEU-12N all firmware versions)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tandd:tr-71w_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FB2D322-A8DE-4C00-A944-EFF6D8DB9C29"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tandd:tr-71w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "65B51440-05AC-46CF-9B43-FFC52AD0861D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tandd:tr-72w_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C6C3086-E958-4925-875D-C80293792F62"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tandd:tr-72w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB7EE7FF-2917-4580-87D8-545A2DAFD170"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tandd:rtr-5w_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12697C4A-CD9D-4F6A-897E-01E309613AF8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tandd:rtr-5w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "398D0D36-F070-4BAF-A2C8-7B22A1119B20"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tandd:wdr-7_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E5BC7A4-40C4-4AC8-8444-04B2A7774943"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tandd:wdr-7:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C0912406-6AD1-49AF-8892-C9BA7CC30686"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tandd:wdr-3_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40397E13-18BE-4CC8-95C5-8B65147AE908"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tandd:wdr-3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B0454B9-B887-4CEA-B317-7B1DA5189181"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tandd:ws-2_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "436B3031-FBC8-4C6C-ACE4-53BE338B3C3D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tandd:ws-2:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CAD4929-3589-4C01-80C5-F858606393DF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:especmic:rt-12n_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA7BB238-75BB-4FEC-A826-A711480F7CFF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:especmic:rt-12n:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AC3B44E-7910-4256-AC96-B29057A9B47C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:especmic:rs-12n_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "59D454DB-43A4-435C-816B-9A828F9AF095"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:especmic:rs-12n:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB7688CB-65D9-45F3-805D-0FB42BA54226"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:especmic:rt-22bn_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC36D1E9-B9CD-4049-947B-2186A97AA644"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:especmic:rt-22bn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D0C6218-59B9-4A54-BC26-B80D09A57A58"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:especmic:teu-12n_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E779680A-5894-41B7-94B5-97B6BF70B9C6"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:especmic:teu-12n:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D90B4F02-7D4C-4703-BC92-67071665B464"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN14778242/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.tandd.com/news/detail.html?id=780",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,27 +2,343 @@
|
||||
"id": "CVE-2023-23545",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.230",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-30T22:21:23.440",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing authentication for critical function exists in T&D Corporation and ESPEC MIC CORP. data logger products, which may allow a remote unauthenticated attacker to alter the product settings without authentication. Affected products and versions are as follows: T&D Corporation data logger products (TR-71W/72W all firmware versions, RTR-5W all firmware versions, WDR-7 all firmware versions, WDR-3 all firmware versions, and WS-2 all firmware versions), and ESPEC MIC CORP. data logger products (RT-12N/RS-12N all firmware versions, RT-22BN all firmware versions, and TEU-12N all firmware versions)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tandd:tr-71w_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7FB2D322-A8DE-4C00-A944-EFF6D8DB9C29"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tandd:tr-71w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "65B51440-05AC-46CF-9B43-FFC52AD0861D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tandd:tr-72w_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C6C3086-E958-4925-875D-C80293792F62"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tandd:tr-72w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BB7EE7FF-2917-4580-87D8-545A2DAFD170"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tandd:rtr-5w_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "12697C4A-CD9D-4F6A-897E-01E309613AF8"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tandd:rtr-5w:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "398D0D36-F070-4BAF-A2C8-7B22A1119B20"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tandd:wdr-7_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7E5BC7A4-40C4-4AC8-8444-04B2A7774943"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tandd:wdr-7:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C0912406-6AD1-49AF-8892-C9BA7CC30686"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tandd:wdr-3_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "40397E13-18BE-4CC8-95C5-8B65147AE908"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tandd:wdr-3:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7B0454B9-B887-4CEA-B317-7B1DA5189181"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tandd:ws-2_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "436B3031-FBC8-4C6C-ACE4-53BE338B3C3D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tandd:ws-2:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2CAD4929-3589-4C01-80C5-F858606393DF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:especmic:rt-12n_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA7BB238-75BB-4FEC-A826-A711480F7CFF"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:especmic:rt-12n:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AC3B44E-7910-4256-AC96-B29057A9B47C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:especmic:rs-12n_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "59D454DB-43A4-435C-816B-9A828F9AF095"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:especmic:rs-12n:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB7688CB-65D9-45F3-805D-0FB42BA54226"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:especmic:rt-22bn_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CC36D1E9-B9CD-4049-947B-2186A97AA644"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:especmic:rt-22bn:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D0C6218-59B9-4A54-BC26-B80D09A57A58"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:especmic:teu-12n_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E779680A-5894-41B7-94B5-97B6BF70B9C6"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:especmic:teu-12n:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D90B4F02-7D4C-4703-BC92-67071665B464"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN14778242/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.monitoring.especmic.co.jp/post/VulnerabilityInRT-12N_RS-12N_RT-22BNandTEU-12N",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.tandd.com/news/detail.html?id=780",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,94 @@
|
||||
"id": "CVE-2023-25946",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.273",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-30T22:20:58.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authentication bypass vulnerability in Qrio Lock (Q-SL2) firmware version 2.0.9 and earlier allows a network-adjacent attacker to analyze the product's communication data and conduct an arbitrary operation under certain conditions."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:qrio:q-sl2_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "2.0.9",
|
||||
"matchCriteriaId": "4541F486-2484-46B6-88EB-638C7F285B5B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:qrio:q-sl2:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0265C43D-17BF-4D2A-9B9D-49E1A55A942D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN48687031/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://qrio.me/article/announce/2023/4140/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,82 @@
|
||||
"id": "CVE-2023-25953",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.317",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-30T22:18:54.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Code injection vulnerability in Drive Explorer for macOS versions 3.5.4 and earlier allows an attacker who can login to the client where the affected product is installed to inject arbitrary code while processing the product execution. Since a full disk access privilege is required to execute LINE WORKS Drive Explorer, the attacker may be able to read and/or write to arbitrary files without the access privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:worksmobile:drive_explorer:*:*:*:*:*:macos:*:*",
|
||||
"versionEndIncluding": "3.5.4",
|
||||
"matchCriteriaId": "A2834DF6-E06C-40EA-AE07-4579C5D2C591"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN01937209/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://line.worksmobile.com/jp/release-notes/20230216/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,81 @@
|
||||
"id": "CVE-2023-27384",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.437",
|
||||
"lastModified": "2023-05-23T13:04:34.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-30T22:18:42.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Operation restriction bypass vulnerability in MultiReport of Cybozu Garoon 5.15.0 allows a remote authenticated attacker to alter the data of MultiReport."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cybozu:garoon:5.15.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41CE2921-5B1C-4DDC-B543-9E39F81183F9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cs.cybozu.co.jp/2023/007698.html",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jvn.jp/en/jp/JVN41694426/",
|
||||
"source": "vultures@jpcert.or.jp"
|
||||
"source": "vultures@jpcert.or.jp",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-297xx/CVE-2023-29726.json
Normal file
28
CVE-2023/CVE-2023-297xx/CVE-2023-29726.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-29726",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.513",
|
||||
"lastModified": "2023-05-30T23:15:09.513",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Call Blocker application 6.6.3 for Android incorrectly opens a key component that an attacker can use to inject large amounts of dirty data into the application's database. When the application starts, it loads the data from the database into memory. Once the attacker injects too much data, the application triggers an OOM error and crashes, resulting in a persistent denial of service."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29726/CVE%20detail.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://play.google.com/store/apps/details?id=com.cuiet.blockCalls",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.call-blocker.info/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-297xx/CVE-2023-29727.json
Normal file
28
CVE-2023/CVE-2023-297xx/CVE-2023-29727.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-29727",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.563",
|
||||
"lastModified": "2023-05-30T23:15:09.563",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Call Blocker application 6.6.3 for Android allows unauthorized applications to use exposed components to delete data stored in its database that is related to user privacy settings and affects the implementation of the normal functionality of the application. An attacker can use this to cause an escalation of privilege attack."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29727/CVE%20detail.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://play.google.com/store/apps/details?id=com.cuiet.blockCalls",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.call-blocker.info/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-297xx/CVE-2023-29728.json
Normal file
28
CVE-2023/CVE-2023-297xx/CVE-2023-29728.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-29728",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.607",
|
||||
"lastModified": "2023-05-30T23:15:09.607",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Call Blocker application 6.6.3 for Android allows attackers to tamper with feature-related data, resulting in a severe elevation of privilege attack."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29728/CVE%20detail.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://play.google.com/store/apps/details?id=com.cuiet.blockCalls",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.call-blocker.info/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-297xx/CVE-2023-29738.json
Normal file
32
CVE-2023/CVE-2023-297xx/CVE-2023-29738.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-29738",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.653",
|
||||
"lastModified": "2023-05-30T23:15:09.653",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue found in Wave Animated Keyboard Emoji v.1.70.7 for Android allows a local attacker to cause code execution and escalation of Privileges via the database files."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.wavekeyboard.com/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29738/CVE%20detail.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://play.google.com/store/apps/details?id=com.amdroidalarmclock.amdroid",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://play.google.com/store/apps/details?id=com.wave.keyboard",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-297xx/CVE-2023-29739.json
Normal file
28
CVE-2023/CVE-2023-297xx/CVE-2023-29739.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-29739",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.700",
|
||||
"lastModified": "2023-05-30T23:15:09.700",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue found in Alarm Clock for Heavy Sleepers v.5.3.2 for Android allows unauthorized apps to cause escalation of privilege attacks by manipulating the component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://amdroidapp.com/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29739/CVE%20detail.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://play.google.com/store/apps/details?id=com.amdroidalarmclock.amdroid",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-297xx/CVE-2023-29740.json
Normal file
32
CVE-2023/CVE-2023-297xx/CVE-2023-29740.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-29740",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.750",
|
||||
"lastModified": "2023-05-30T23:15:09.750",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue found in Alarm Clock for Heavy Sleepers v.5.3.2 for Android allows unauthorized apps to cause a denial of service attack by manipulating the database."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://amdroidapp.com/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29740/CVE%20detail.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://play.google.com/store/apps/details?id=com.amdroidalarmclock.amdroid",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://play.google.com/store/apps/details?id=com.icoolme.android.weather",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-297xx/CVE-2023-29741.json
Normal file
28
CVE-2023/CVE-2023-297xx/CVE-2023-29741.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-29741",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.793",
|
||||
"lastModified": "2023-05-30T23:15:09.793",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue found in BestWeather v.7.3.1 for Android allows unauthorized apps to cause an escalation of privileges attack by manipulating the database."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.zmtqsh.com/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29741/CVE%20detail.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://play.google.com/store/apps/details?id=com.icoolme.android.weather",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
28
CVE-2023/CVE-2023-297xx/CVE-2023-29743.json
Normal file
28
CVE-2023/CVE-2023-297xx/CVE-2023-29743.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-29743",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.840",
|
||||
"lastModified": "2023-05-30T23:15:09.840",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue found in BestWeather v.7.3.1 for Android allows unauthorized apps to cause a persistent denial of service attack by manipulating the database."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://www.zmtqsh.com/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LianKee/SO-CVEs/blob/main/CVEs/CVE-2023-29743/CVE%20detail.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://play.google.com/store/apps/details?id=com.icoolme.android.weather",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-29xx/CVE-2023-2929.json
Normal file
24
CVE-2023/CVE-2023-29xx/CVE-2023-2929.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-2929",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:09.997",
|
||||
"lastModified": "2023-05-30T22:15:09.997",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out of bounds write in Swiftshader in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1410191",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-29xx/CVE-2023-2930.json
Normal file
24
CVE-2023/CVE-2023-29xx/CVE-2023-2930.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-2930",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.067",
|
||||
"lastModified": "2023-05-30T22:15:10.067",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in Extensions in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1443401",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-29xx/CVE-2023-2931.json
Normal file
24
CVE-2023/CVE-2023-29xx/CVE-2023-2931.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-2931",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.117",
|
||||
"lastModified": "2023-05-30T22:15:10.117",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1444238",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-29xx/CVE-2023-2932.json
Normal file
24
CVE-2023/CVE-2023-29xx/CVE-2023-2932.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-2932",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.167",
|
||||
"lastModified": "2023-05-30T22:15:10.167",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1444581",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-29xx/CVE-2023-2933.json
Normal file
24
CVE-2023/CVE-2023-29xx/CVE-2023-2933.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-2933",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.210",
|
||||
"lastModified": "2023-05-30T22:15:10.210",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Use after free in PDF in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1445426",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-29xx/CVE-2023-2934.json
Normal file
24
CVE-2023/CVE-2023-29xx/CVE-2023-2934.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-2934",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.257",
|
||||
"lastModified": "2023-05-30T22:15:10.257",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Out of bounds memory access in Mojo in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1429720",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-29xx/CVE-2023-2935.json
Normal file
24
CVE-2023/CVE-2023-29xx/CVE-2023-2935.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-2935",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.307",
|
||||
"lastModified": "2023-05-30T22:15:10.307",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1440695",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-29xx/CVE-2023-2936.json
Normal file
24
CVE-2023/CVE-2023-29xx/CVE-2023-2936.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-2936",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.350",
|
||||
"lastModified": "2023-05-30T22:15:10.350",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Type Confusion in V8 in Google Chrome prior to 114.0.5735.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1443452",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-29xx/CVE-2023-2937.json
Normal file
24
CVE-2023/CVE-2023-29xx/CVE-2023-2937.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-2937",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.393",
|
||||
"lastModified": "2023-05-30T22:15:10.393",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1413813",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-29xx/CVE-2023-2938.json
Normal file
24
CVE-2023/CVE-2023-29xx/CVE-2023-2938.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-2938",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.433",
|
||||
"lastModified": "2023-05-30T22:15:10.433",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Picture In Picture in Google Chrome prior to 114.0.5735.90 allowed a remote attacker who had compromised the renderer process to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1416350",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-29xx/CVE-2023-2939.json
Normal file
24
CVE-2023/CVE-2023-29xx/CVE-2023-2939.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-2939",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.477",
|
||||
"lastModified": "2023-05-30T22:15:10.477",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficient data validation in Installer in Google Chrome on Windows prior to 114.0.5735.90 allowed a local attacker to perform privilege escalation via crafted symbolic link. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1427431",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-29xx/CVE-2023-2940.json
Normal file
24
CVE-2023/CVE-2023-29xx/CVE-2023-2940.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-2940",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.527",
|
||||
"lastModified": "2023-05-30T22:15:10.527",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Downloads in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted HTML page. (Chromium security severity: Medium)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1426807",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
24
CVE-2023/CVE-2023-29xx/CVE-2023-2941.json
Normal file
24
CVE-2023/CVE-2023-29xx/CVE-2023-2941.json
Normal file
@ -0,0 +1,24 @@
|
||||
{
|
||||
"id": "CVE-2023-2941",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.570",
|
||||
"lastModified": "2023-05-30T22:15:10.570",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Inappropriate implementation in Extensions API in Google Chrome prior to 114.0.5735.90 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the UI via a crafted Chrome Extension. (Chromium security severity: Low)"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
},
|
||||
{
|
||||
"url": "https://crbug.com/1430269",
|
||||
"source": "chrome-cve-admin@google.com"
|
||||
}
|
||||
]
|
||||
}
|
51
CVE-2023/CVE-2023-29xx/CVE-2023-2952.json
Normal file
51
CVE-2023/CVE-2023-29xx/CVE-2023-2952.json
Normal file
@ -0,0 +1,51 @@
|
||||
{
|
||||
"id": "CVE-2023-2952",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-30T23:15:09.887",
|
||||
"lastModified": "2023-05-30T23:15:09.887",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/wireshark/wireshark/-/issues/19100",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wireshark.org/security/wnpa-sec-2023-20.html",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
36
CVE-2023/CVE-2023-29xx/CVE-2023-2953.json
Normal file
36
CVE-2023/CVE-2023-29xx/CVE-2023-2953.json
Normal file
@ -0,0 +1,36 @@
|
||||
{
|
||||
"id": "CVE-2023-2953",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-05-30T22:15:10.613",
|
||||
"lastModified": "2023-05-30T22:15:10.613",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in openldap. This security flaw causes a null pointer dereference in ber_memalloc_x() function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-2953",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugs.openldap.org/show_bug.cgi?id=9904",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2023/CVE-2023-323xx/CVE-2023-32342.json
Normal file
43
CVE-2023/CVE-2023-323xx/CVE-2023-32342.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2023-32342",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2023-05-30T22:15:10.677",
|
||||
"lastModified": "2023-05-30T22:15:10.677",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "IBM GSKit could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 255828."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/255828",
|
||||
"source": "psirt@us.ibm.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-337xx/CVE-2023-33734.json
Normal file
20
CVE-2023/CVE-2023-337xx/CVE-2023-33734.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-33734",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T22:15:10.737",
|
||||
"lastModified": "2023-05-30T22:15:10.737",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "BlueCMS v1.6 was discovered to contain a SQL injection vulnerability via the keywords parameter at search.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Peanuts-s/BlueCms",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-337xx/CVE-2023-33740.json
Normal file
20
CVE-2023/CVE-2023-337xx/CVE-2023-33740.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-33740",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T22:15:10.777",
|
||||
"lastModified": "2023-05-30T22:15:10.777",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect access control in luowice v3.5.18 allows attackers to access cloud source code information via modification fo the Verify parameter in a warning message."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zzh-newlearner/record/blob/main/luowice_warning.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-337xx/CVE-2023-33741.json
Normal file
20
CVE-2023/CVE-2023-337xx/CVE-2023-33741.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-33741",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T22:15:10.820",
|
||||
"lastModified": "2023-05-30T22:15:10.820",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Macrovideo v380pro v1.4.97 shares the device id and password when sharing the device."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/zzh-newlearner/record/blob/main/macrovideo_share.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-339xx/CVE-2023-33961.json
Normal file
55
CVE-2023/CVE-2023-339xx/CVE-2023-33961.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-33961",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-05-30T22:15:10.863",
|
||||
"lastModified": "2023-05-30T22:15:10.863",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Leantime is a lean open source project management system. Starting in version 2.3.21, an authenticated user with commenting privileges can inject malicious Javascript into a comment. Once the malicious comment is loaded in the browser by a user, the malicious Javascript code executes. As of time of publication, a patch does not exist."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.9,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Leantime/leantime/security/advisories/GHSA-359m-fp6q-65r7",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
71
CVE-2023/CVE-2023-339xx/CVE-2023-33962.json
Normal file
71
CVE-2023/CVE-2023-339xx/CVE-2023-33962.json
Normal file
@ -0,0 +1,71 @@
|
||||
{
|
||||
"id": "CVE-2023-33962",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-05-30T22:15:10.933",
|
||||
"lastModified": "2023-05-30T22:15:10.933",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "JStachio is a type-safe Java Mustache templating engine. Prior to version 1.0.1, JStachio fails to escape single quotes `'` in HTML, allowing an attacker to inject malicious code. This vulnerability can be exploited by an attacker to execute arbitrary JavaScript code in the context of other users visiting pages that use this template engine. This can lead to various consequences, including session hijacking, defacement of web pages, theft of sensitive information, or even the propagation of malware.\n\nVersion 1.0.1 contains a patch for this issue. To mitigate this vulnerability, the template engine should properly escape special characters, including single quotes. Common practice is to escape `'` as `'`. As a workaround, users can avoid this issue by using only double quotes `\"` for HTML attributes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/jstachio/jstachio/commit/7b2f78377d1284df14c580be762a25af5f8dcd66",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jstachio/jstachio/issues/157",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jstachio/jstachio/pull/158",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jstachio/jstachio/releases/tag/v1.0.1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/jstachio/jstachio/security/advisories/GHSA-gwxv-jv83-6qjr",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
40
CVE-2023/CVE-2023-341xx/CVE-2023-34151.json
Normal file
40
CVE-2023/CVE-2023-341xx/CVE-2023-34151.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"id": "CVE-2023-34151",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-05-30T22:15:11.000",
|
||||
"lastModified": "2023-05-30T22:15:11.000",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in ImageMagick. This security flaw ouccers as an undefined behaviors of casting double to size_t in svg, mvg and other coders (recurring bugs of CVE-2022-32546)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-34151",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210657",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ImageMagick/ImageMagick/issues/6341",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
40
CVE-2023/CVE-2023-341xx/CVE-2023-34152.json
Normal file
40
CVE-2023/CVE-2023-341xx/CVE-2023-34152.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"id": "CVE-2023-34152",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-05-30T22:15:11.070",
|
||||
"lastModified": "2023-05-30T22:15:11.070",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in ImageMagick. This security flaw cause a remote code execution vulnerability in OpenBlob with --enable-pipes configured."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-34152",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210659",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ImageMagick/ImageMagick/issues/6339",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
40
CVE-2023/CVE-2023-341xx/CVE-2023-34153.json
Normal file
40
CVE-2023/CVE-2023-341xx/CVE-2023-34153.json
Normal file
@ -0,0 +1,40 @@
|
||||
{
|
||||
"id": "CVE-2023-34153",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-05-30T22:15:11.143",
|
||||
"lastModified": "2023-05-30T22:15:11.143",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in ImageMagick. This security flaw causes a shell command injection vulnerability via video:vsync or video:pixel-format options in VIDEO encoding/decoding."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2023-34153",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210660",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ImageMagick/ImageMagick/issues/6338",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
92
README.md
92
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-05-30T22:00:25.703045+00:00
|
||||
2023-05-30T23:55:24.255613+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-05-30T21:57:51.747000+00:00
|
||||
2023-05-30T23:38:54.593000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,69 +29,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
216412
|
||||
216447
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `28`
|
||||
Recently added CVEs: `35`
|
||||
|
||||
* [CVE-2022-36247](CVE-2022/CVE-2022-362xx/CVE-2022-36247.json) (`2023-05-30T20:15:09.780`)
|
||||
* [CVE-2022-36249](CVE-2022/CVE-2022-362xx/CVE-2022-36249.json) (`2023-05-30T20:15:09.823`)
|
||||
* [CVE-2022-36250](CVE-2022/CVE-2022-362xx/CVE-2022-36250.json) (`2023-05-30T20:15:09.880`)
|
||||
* [CVE-2022-47028](CVE-2022/CVE-2022-470xx/CVE-2022-47028.json) (`2023-05-30T20:15:09.947`)
|
||||
* [CVE-2022-47029](CVE-2022/CVE-2022-470xx/CVE-2022-47029.json) (`2023-05-30T20:15:09.993`)
|
||||
* [CVE-2022-36243](CVE-2022/CVE-2022-362xx/CVE-2022-36243.json) (`2023-05-30T20:15:09.587`)
|
||||
* [CVE-2022-36244](CVE-2022/CVE-2022-362xx/CVE-2022-36244.json) (`2023-05-30T20:15:09.660`)
|
||||
* [CVE-2023-23561](CVE-2023/CVE-2023-235xx/CVE-2023-23561.json) (`2023-05-30T20:15:10.130`)
|
||||
* [CVE-2023-23956](CVE-2023/CVE-2023-239xx/CVE-2023-23956.json) (`2023-05-30T20:15:10.173`)
|
||||
* [CVE-2023-29731](CVE-2023/CVE-2023-297xx/CVE-2023-29731.json) (`2023-05-30T20:15:10.227`)
|
||||
* [CVE-2023-29732](CVE-2023/CVE-2023-297xx/CVE-2023-29732.json) (`2023-05-30T20:15:10.273`)
|
||||
* [CVE-2023-29733](CVE-2023/CVE-2023-297xx/CVE-2023-29733.json) (`2023-05-30T20:15:10.327`)
|
||||
* [CVE-2023-29734](CVE-2023/CVE-2023-297xx/CVE-2023-29734.json) (`2023-05-30T20:15:10.373`)
|
||||
* [CVE-2023-29735](CVE-2023/CVE-2023-297xx/CVE-2023-29735.json) (`2023-05-30T20:15:10.420`)
|
||||
* [CVE-2023-31184](CVE-2023/CVE-2023-311xx/CVE-2023-31184.json) (`2023-05-30T20:15:10.470`)
|
||||
* [CVE-2023-31185](CVE-2023/CVE-2023-311xx/CVE-2023-31185.json) (`2023-05-30T20:15:10.533`)
|
||||
* [CVE-2023-31186](CVE-2023/CVE-2023-311xx/CVE-2023-31186.json) (`2023-05-30T20:15:10.610`)
|
||||
* [CVE-2023-31187](CVE-2023/CVE-2023-311xx/CVE-2023-31187.json) (`2023-05-30T20:15:10.687`)
|
||||
* [CVE-2023-32218](CVE-2023/CVE-2023-322xx/CVE-2023-32218.json) (`2023-05-30T20:15:10.767`)
|
||||
* [CVE-2023-33177](CVE-2023/CVE-2023-331xx/CVE-2023-33177.json) (`2023-05-30T20:15:10.837`)
|
||||
* [CVE-2023-33178](CVE-2023/CVE-2023-331xx/CVE-2023-33178.json) (`2023-05-30T20:15:10.907`)
|
||||
* [CVE-2023-0779](CVE-2023/CVE-2023-07xx/CVE-2023-0779.json) (`2023-05-30T21:15:08.987`)
|
||||
* [CVE-2023-33179](CVE-2023/CVE-2023-331xx/CVE-2023-33179.json) (`2023-05-30T21:15:09.077`)
|
||||
* [CVE-2023-33180](CVE-2023/CVE-2023-331xx/CVE-2023-33180.json) (`2023-05-30T21:15:09.147`)
|
||||
* [CVE-2023-33181](CVE-2023/CVE-2023-331xx/CVE-2023-33181.json) (`2023-05-30T21:15:09.207`)
|
||||
* [CVE-2023-2936](CVE-2023/CVE-2023-29xx/CVE-2023-2936.json) (`2023-05-30T22:15:10.350`)
|
||||
* [CVE-2023-2937](CVE-2023/CVE-2023-29xx/CVE-2023-2937.json) (`2023-05-30T22:15:10.393`)
|
||||
* [CVE-2023-2938](CVE-2023/CVE-2023-29xx/CVE-2023-2938.json) (`2023-05-30T22:15:10.433`)
|
||||
* [CVE-2023-2939](CVE-2023/CVE-2023-29xx/CVE-2023-2939.json) (`2023-05-30T22:15:10.477`)
|
||||
* [CVE-2023-2940](CVE-2023/CVE-2023-29xx/CVE-2023-2940.json) (`2023-05-30T22:15:10.527`)
|
||||
* [CVE-2023-2941](CVE-2023/CVE-2023-29xx/CVE-2023-2941.json) (`2023-05-30T22:15:10.570`)
|
||||
* [CVE-2023-2953](CVE-2023/CVE-2023-29xx/CVE-2023-2953.json) (`2023-05-30T22:15:10.613`)
|
||||
* [CVE-2023-32342](CVE-2023/CVE-2023-323xx/CVE-2023-32342.json) (`2023-05-30T22:15:10.677`)
|
||||
* [CVE-2023-33734](CVE-2023/CVE-2023-337xx/CVE-2023-33734.json) (`2023-05-30T22:15:10.737`)
|
||||
* [CVE-2023-33740](CVE-2023/CVE-2023-337xx/CVE-2023-33740.json) (`2023-05-30T22:15:10.777`)
|
||||
* [CVE-2023-33741](CVE-2023/CVE-2023-337xx/CVE-2023-33741.json) (`2023-05-30T22:15:10.820`)
|
||||
* [CVE-2023-33961](CVE-2023/CVE-2023-339xx/CVE-2023-33961.json) (`2023-05-30T22:15:10.863`)
|
||||
* [CVE-2023-33962](CVE-2023/CVE-2023-339xx/CVE-2023-33962.json) (`2023-05-30T22:15:10.933`)
|
||||
* [CVE-2023-34151](CVE-2023/CVE-2023-341xx/CVE-2023-34151.json) (`2023-05-30T22:15:11.000`)
|
||||
* [CVE-2023-34152](CVE-2023/CVE-2023-341xx/CVE-2023-34152.json) (`2023-05-30T22:15:11.070`)
|
||||
* [CVE-2023-34153](CVE-2023/CVE-2023-341xx/CVE-2023-34153.json) (`2023-05-30T22:15:11.143`)
|
||||
* [CVE-2023-29726](CVE-2023/CVE-2023-297xx/CVE-2023-29726.json) (`2023-05-30T23:15:09.513`)
|
||||
* [CVE-2023-29727](CVE-2023/CVE-2023-297xx/CVE-2023-29727.json) (`2023-05-30T23:15:09.563`)
|
||||
* [CVE-2023-29728](CVE-2023/CVE-2023-297xx/CVE-2023-29728.json) (`2023-05-30T23:15:09.607`)
|
||||
* [CVE-2023-29738](CVE-2023/CVE-2023-297xx/CVE-2023-29738.json) (`2023-05-30T23:15:09.653`)
|
||||
* [CVE-2023-29739](CVE-2023/CVE-2023-297xx/CVE-2023-29739.json) (`2023-05-30T23:15:09.700`)
|
||||
* [CVE-2023-29740](CVE-2023/CVE-2023-297xx/CVE-2023-29740.json) (`2023-05-30T23:15:09.750`)
|
||||
* [CVE-2023-29741](CVE-2023/CVE-2023-297xx/CVE-2023-29741.json) (`2023-05-30T23:15:09.793`)
|
||||
* [CVE-2023-29743](CVE-2023/CVE-2023-297xx/CVE-2023-29743.json) (`2023-05-30T23:15:09.840`)
|
||||
* [CVE-2023-2952](CVE-2023/CVE-2023-29xx/CVE-2023-2952.json) (`2023-05-30T23:15:09.887`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `27`
|
||||
Recently modified CVEs: `7`
|
||||
|
||||
* [CVE-2022-47159](CVE-2022/CVE-2022-471xx/CVE-2022-47159.json) (`2023-05-30T20:55:58.387`)
|
||||
* [CVE-2022-47161](CVE-2022/CVE-2022-471xx/CVE-2022-47161.json) (`2023-05-30T20:59:13.507`)
|
||||
* [CVE-2022-47165](CVE-2022/CVE-2022-471xx/CVE-2022-47165.json) (`2023-05-30T20:59:51.777`)
|
||||
* [CVE-2022-47177](CVE-2022/CVE-2022-471xx/CVE-2022-47177.json) (`2023-05-30T21:02:31.227`)
|
||||
* [CVE-2023-33252](CVE-2023/CVE-2023-332xx/CVE-2023-33252.json) (`2023-05-30T20:30:01.733`)
|
||||
* [CVE-2023-33251](CVE-2023/CVE-2023-332xx/CVE-2023-33251.json) (`2023-05-30T20:32:09.327`)
|
||||
* [CVE-2023-0859](CVE-2023/CVE-2023-08xx/CVE-2023-0859.json) (`2023-05-30T20:40:13.547`)
|
||||
* [CVE-2023-0858](CVE-2023/CVE-2023-08xx/CVE-2023-0858.json) (`2023-05-30T20:40:40.290`)
|
||||
* [CVE-2023-0857](CVE-2023/CVE-2023-08xx/CVE-2023-0857.json) (`2023-05-30T20:43:12.183`)
|
||||
* [CVE-2023-30484](CVE-2023/CVE-2023-304xx/CVE-2023-30484.json) (`2023-05-30T20:59:31.920`)
|
||||
* [CVE-2023-1711](CVE-2023/CVE-2023-17xx/CVE-2023-1711.json) (`2023-05-30T21:10:07.833`)
|
||||
* [CVE-2023-32696](CVE-2023/CVE-2023-326xx/CVE-2023-32696.json) (`2023-05-30T21:10:07.833`)
|
||||
* [CVE-2023-32699](CVE-2023/CVE-2023-326xx/CVE-2023-32699.json) (`2023-05-30T21:10:07.833`)
|
||||
* [CVE-2023-2597](CVE-2023/CVE-2023-25xx/CVE-2023-2597.json) (`2023-05-30T21:32:32.543`)
|
||||
* [CVE-2023-25537](CVE-2023/CVE-2023-255xx/CVE-2023-25537.json) (`2023-05-30T21:32:57.250`)
|
||||
* [CVE-2023-2734](CVE-2023/CVE-2023-27xx/CVE-2023-2734.json) (`2023-05-30T21:34:04.677`)
|
||||
* [CVE-2023-33285](CVE-2023/CVE-2023-332xx/CVE-2023-33285.json) (`2023-05-30T21:34:23.247`)
|
||||
* [CVE-2023-1508](CVE-2023/CVE-2023-15xx/CVE-2023-1508.json) (`2023-05-30T21:48:16.117`)
|
||||
* [CVE-2023-2703](CVE-2023/CVE-2023-27xx/CVE-2023-2703.json) (`2023-05-30T21:48:39.170`)
|
||||
* [CVE-2023-2702](CVE-2023/CVE-2023-27xx/CVE-2023-2702.json) (`2023-05-30T21:48:55.523`)
|
||||
* [CVE-2023-1837](CVE-2023/CVE-2023-18xx/CVE-2023-1837.json) (`2023-05-30T21:53:33.290`)
|
||||
* [CVE-2023-30440](CVE-2023/CVE-2023-304xx/CVE-2023-30440.json) (`2023-05-30T21:54:53.153`)
|
||||
* [CVE-2023-31669](CVE-2023/CVE-2023-316xx/CVE-2023-31669.json) (`2023-05-30T21:56:12.350`)
|
||||
* [CVE-2023-2845](CVE-2023/CVE-2023-28xx/CVE-2023-2845.json) (`2023-05-30T21:57:09.587`)
|
||||
* [CVE-2023-2844](CVE-2023/CVE-2023-28xx/CVE-2023-2844.json) (`2023-05-30T21:57:51.747`)
|
||||
* [CVE-2022-47178](CVE-2022/CVE-2022-471xx/CVE-2022-47178.json) (`2023-05-30T23:38:54.593`)
|
||||
* [CVE-2023-0779](CVE-2023/CVE-2023-07xx/CVE-2023-0779.json) (`2023-05-30T22:15:09.457`)
|
||||
* [CVE-2023-27384](CVE-2023/CVE-2023-273xx/CVE-2023-27384.json) (`2023-05-30T22:18:42.337`)
|
||||
* [CVE-2023-25953](CVE-2023/CVE-2023-259xx/CVE-2023-25953.json) (`2023-05-30T22:18:54.947`)
|
||||
* [CVE-2023-25946](CVE-2023/CVE-2023-259xx/CVE-2023-25946.json) (`2023-05-30T22:20:58.580`)
|
||||
* [CVE-2023-23545](CVE-2023/CVE-2023-235xx/CVE-2023-23545.json) (`2023-05-30T22:21:23.440`)
|
||||
* [CVE-2023-22654](CVE-2023/CVE-2023-226xx/CVE-2023-22654.json) (`2023-05-30T22:22:43.403`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user