mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2023-05-05T21:55:24.917263+00:00
This commit is contained in:
parent
01b6955622
commit
572d23d780
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-23166",
|
||||
"sourceIdentifier": "security@odoo.com",
|
||||
"published": "2023-04-25T19:15:09.140",
|
||||
"lastModified": "2023-05-03T14:38:22.883",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T21:15:09.073",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -101,6 +101,10 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5399",
|
||||
"source": "security@odoo.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-23176",
|
||||
"sourceIdentifier": "security@odoo.com",
|
||||
"published": "2023-04-25T19:15:09.220",
|
||||
"lastModified": "2023-05-03T14:28:25.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T21:15:09.163",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -102,6 +102,10 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5399",
|
||||
"source": "security@odoo.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-23178",
|
||||
"sourceIdentifier": "security@odoo.com",
|
||||
"published": "2023-04-25T19:15:09.283",
|
||||
"lastModified": "2023-05-03T14:25:43.207",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T21:15:09.250",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -101,6 +101,10 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5399",
|
||||
"source": "security@odoo.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-23186",
|
||||
"sourceIdentifier": "security@odoo.com",
|
||||
"published": "2023-04-25T19:15:09.340",
|
||||
"lastModified": "2023-05-02T20:21:22.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T21:15:09.327",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -101,6 +101,10 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5399",
|
||||
"source": "security@odoo.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-23203",
|
||||
"sourceIdentifier": "security@odoo.com",
|
||||
"published": "2023-04-25T19:15:09.403",
|
||||
"lastModified": "2023-05-02T20:06:15.217",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T21:15:09.403",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -107,6 +107,10 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5399",
|
||||
"source": "security@odoo.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-26263",
|
||||
"sourceIdentifier": "security@odoo.com",
|
||||
"published": "2023-04-25T19:15:09.470",
|
||||
"lastModified": "2023-05-02T19:53:14.293",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T21:15:09.480",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -109,6 +109,10 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5399",
|
||||
"source": "security@odoo.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-26947",
|
||||
"sourceIdentifier": "security@odoo.com",
|
||||
"published": "2023-04-25T19:15:09.530",
|
||||
"lastModified": "2023-05-02T19:53:00.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T21:15:09.553",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -101,6 +101,10 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5399",
|
||||
"source": "security@odoo.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-44476",
|
||||
"sourceIdentifier": "security@odoo.com",
|
||||
"published": "2023-04-25T19:15:09.783",
|
||||
"lastModified": "2023-05-03T13:51:44.640",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T21:15:09.640",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -101,6 +101,10 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5399",
|
||||
"source": "security@odoo.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-44775",
|
||||
"sourceIdentifier": "security@odoo.com",
|
||||
"published": "2023-04-25T19:15:09.903",
|
||||
"lastModified": "2023-05-02T20:26:24.113",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T21:15:09.700",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -101,6 +101,10 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5399",
|
||||
"source": "security@odoo.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-45071",
|
||||
"sourceIdentifier": "security@odoo.com",
|
||||
"published": "2023-04-25T19:15:09.963",
|
||||
"lastModified": "2023-05-02T20:26:15.753",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T21:15:09.773",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -101,6 +101,10 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5399",
|
||||
"source": "security@odoo.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-45111",
|
||||
"sourceIdentifier": "security@odoo.com",
|
||||
"published": "2023-04-25T19:15:10.020",
|
||||
"lastModified": "2023-05-03T13:47:27.200",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T21:15:09.837",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -101,6 +101,10 @@
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.debian.org/security/2023/dsa-5399",
|
||||
"source": "security@odoo.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-3116",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-27T22:15:11.987",
|
||||
"lastModified": "2023-04-04T00:48:24.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T20:15:09.373",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -75,6 +75,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230505-0010/",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.kb.cert.org/vuls/id/730793",
|
||||
"source": "secalert@redhat.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-3294",
|
||||
"sourceIdentifier": "jordan@liggitt.net",
|
||||
"published": "2023-03-01T19:15:25.570",
|
||||
"lastModified": "2023-03-09T00:58:24.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T20:15:09.607",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -131,6 +131,10 @@
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230505-0007/",
|
||||
"source": "jordan@liggitt.net"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-43042",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-10-19T14:15:10.227",
|
||||
"lastModified": "2022-10-20T20:45:13.923",
|
||||
"lastModified": "2023-05-05T20:04:36.790",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,8 +59,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B"
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.2.0",
|
||||
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-43043",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-10-19T14:15:10.273",
|
||||
"lastModified": "2022-10-20T20:45:25.573",
|
||||
"lastModified": "2023-05-05T20:04:23.743",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,8 +59,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B"
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.2.0",
|
||||
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -73,6 +74,7 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-43044",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-10-19T14:15:10.317",
|
||||
"lastModified": "2022-10-20T20:45:35.100",
|
||||
"lastModified": "2023-05-05T20:03:46.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,8 +59,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B"
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.2.0",
|
||||
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -73,6 +74,7 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-43045",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-10-19T14:15:10.357",
|
||||
"lastModified": "2022-10-20T20:30:47.907",
|
||||
"lastModified": "2023-05-05T20:04:05.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,8 +59,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B"
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.2.0",
|
||||
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -73,6 +74,7 @@
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-43254",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-02T14:15:15.637",
|
||||
"lastModified": "2022-11-04T02:02:42.150",
|
||||
"lastModified": "2023-05-05T20:03:18.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B"
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.2.0",
|
||||
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-43255",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-02T14:15:15.917",
|
||||
"lastModified": "2022-11-04T02:04:49.390",
|
||||
"lastModified": "2023-05-05T20:02:31.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B"
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.2.0",
|
||||
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45204",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2022-11-29T04:15:11.253",
|
||||
"lastModified": "2022-12-01T21:18:35.433",
|
||||
"lastModified": "2023-05-05T20:00:30.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,8 +55,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev428-gcb8ae46c8-master:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B99DAA3-219F-4E47-B284-CAFC786A9F78"
|
||||
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.2.0",
|
||||
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
101
CVE-2022/CVE-2022-458xx/CVE-2022-45876.json
Normal file
101
CVE-2022/CVE-2022-458xx/CVE-2022-45876.json
Normal file
@ -0,0 +1,101 @@
|
||||
{
|
||||
"id": "CVE-2022-45876",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-04-26T22:15:08.737",
|
||||
"lastModified": "2023-05-05T20:13:57.563",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:visam:vbase:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.7.5",
|
||||
"matchCriteriaId": "66698568-7086-4708-B7C9-69AAAA8104DC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-05",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"US Government Resource"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.vbase.net/en/download.php",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.visam.com/kontakt.php",
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48423",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-19T03:15:11.087",
|
||||
"lastModified": "2023-03-24T16:31:10.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T20:15:09.720",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -80,6 +80,10 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230505-0003/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-48424",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-19T03:15:11.560",
|
||||
"lastModified": "2023-03-24T14:24:27.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T20:15:09.813",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -80,6 +80,10 @@
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230505-0002/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1078",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-27T21:15:10.520",
|
||||
"lastModified": "2023-05-03T14:15:19.747",
|
||||
"lastModified": "2023-05-05T20:15:09.880",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -89,6 +89,10 @@
|
||||
{
|
||||
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230505-0004/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1252",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-03-23T21:15:19.287",
|
||||
"lastModified": "2023-03-28T14:55:18.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T20:15:09.963",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -82,6 +82,10 @@
|
||||
"Mailing List",
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230505-0005/",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-20860",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2023-03-27T22:15:21.603",
|
||||
"lastModified": "2023-04-03T18:20:16.453",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T20:15:10.053",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -73,6 +73,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230505-0006/",
|
||||
"source": "security@vmware.com"
|
||||
},
|
||||
{
|
||||
"url": "https://spring.io/security/cve-2023-20860",
|
||||
"source": "security@vmware.com",
|
||||
|
76
CVE-2023/CVE-2023-229xx/CVE-2023-22901.json
Normal file
76
CVE-2023/CVE-2023-229xx/CVE-2023-22901.json
Normal file
@ -0,0 +1,76 @@
|
||||
{
|
||||
"id": "CVE-2023-22901",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2023-04-27T02:15:09.177",
|
||||
"lastModified": "2023-05-05T20:55:52.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ChangingTec MOTP system has a path traversal vulnerability. A remote attacker with administrator\u2019s privilege can exploit this vulnerability to access arbitrary system files."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:changingtec:mobile_one_time_password:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.11",
|
||||
"matchCriteriaId": "190C050E-7CCE-49EB-9D4F-3168743E0BF3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7022-2cbe0-1.html",
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-24999",
|
||||
"sourceIdentifier": "security@hashicorp.com",
|
||||
"published": "2023-03-11T00:15:09.410",
|
||||
"lastModified": "2023-03-16T17:03:07.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-05T20:15:10.137",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -135,6 +135,10 @@
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230505-0001/",
|
||||
"source": "security@hashicorp.com"
|
||||
}
|
||||
]
|
||||
}
|
91
CVE-2023/CVE-2023-252xx/CVE-2023-25292.json
Normal file
91
CVE-2023/CVE-2023-252xx/CVE-2023-25292.json
Normal file
@ -0,0 +1,91 @@
|
||||
{
|
||||
"id": "CVE-2023-25292",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-27T01:15:08.283",
|
||||
"lastModified": "2023-05-05T20:18:47.160",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Reflected Cross Site Scripting (XSS) in Intermesh BV Group-Office version 6.6.145, allows attackers to gain escalated privileges and gain sensitive information via the GO_LANGUAGE cookie."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:group-office:group_office:6.6.145:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0AF3C8D-6B49-4999-B2AA-5918CEC3ADC3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://group-office.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://intermesh.com",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/brainkok/CVE-2023-25292",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-25xx/CVE-2023-2550.json
Normal file
59
CVE-2023/CVE-2023-25xx/CVE-2023-2550.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-2550",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-05T20:15:10.557",
|
||||
"lastModified": "2023-05-05T20:15:10.557",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/thorsten/phpmyfaq/commit/20ac51594db11604a4518aacc28a51f67d4f11bf",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/840c8d91-c97e-4116-a9f8-4ab1a38d239b",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-25xx/CVE-2023-2551.json
Normal file
59
CVE-2023/CVE-2023-25xx/CVE-2023-2551.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-2551",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-05T20:15:10.627",
|
||||
"lastModified": "2023-05-05T20:15:10.627",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PHP Remote File Inclusion in GitHub repository unilogies/bumsys prior to 2.1.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-98"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/5723613c-55c6-4f18-9ed3-61ad44f5de9c",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-25xx/CVE-2023-2552.json
Normal file
59
CVE-2023/CVE-2023-25xx/CVE-2023-2552.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-2552",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-05T20:15:10.713",
|
||||
"lastModified": "2023-05-05T20:15:10.713",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-Site Request Forgery (CSRF) in GitHub repository unilogies/bumsys prior to 2.1.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/ab0b4655-f57a-4113-849b-2237eeb75b32",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-25xx/CVE-2023-2553.json
Normal file
59
CVE-2023/CVE-2023-25xx/CVE-2023-2553.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-2553",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-05T20:15:10.803",
|
||||
"lastModified": "2023-05-05T20:15:10.803",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository unilogies/bumsys prior to 2.2.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/4e1f5b56-e846-40d8-a83c-533efd56aacf",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
59
CVE-2023/CVE-2023-25xx/CVE-2023-2554.json
Normal file
59
CVE-2023/CVE-2023-25xx/CVE-2023-2554.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-2554",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-05T20:15:10.877",
|
||||
"lastModified": "2023-05-05T20:15:10.877",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "External Control of File Name or Path in GitHub repository unilogies/bumsys prior to 2.2.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-73"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978",
|
||||
"source": "security@huntr.dev"
|
||||
},
|
||||
{
|
||||
"url": "https://huntr.dev/bounties/396785a0-7bb6-4db4-b4cb-607b0fd4ab4b",
|
||||
"source": "security@huntr.dev"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26464",
|
||||
"sourceIdentifier": "security@apache.org",
|
||||
"published": "2023-03-10T14:15:10.453",
|
||||
"lastModified": "2023-04-20T08:15:06.970",
|
||||
"lastModified": "2023-05-05T20:15:10.253",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -82,6 +82,10 @@
|
||||
"tags": [
|
||||
"Mailing List"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230505-0008/",
|
||||
"source": "security@apache.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26604",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-03-03T16:15:10.607",
|
||||
"lastModified": "2023-03-31T23:15:07.320",
|
||||
"lastModified": "2023-05-05T20:15:10.477",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -91,6 +91,10 @@
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20230505-0009/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
160
CVE-2023/CVE-2023-280xx/CVE-2023-28008.json
Normal file
160
CVE-2023/CVE-2023-280xx/CVE-2023-28008.json
Normal file
@ -0,0 +1,160 @@
|
||||
{
|
||||
"id": "CVE-2023-28008",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2023-04-26T20:15:10.000",
|
||||
"lastModified": "2023-05-05T20:28:08.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HCL Workload Automation 9.4, 9.5, and 10.1 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA6DCFCA-DADD-4C0A-83C0-EF04662D3336"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "920EC080-63D0-4280-8553-9D94E6109864"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FF9AA9A1-7D68-469D-BD78-3A89660E4670"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BEE9D4C8-988A-49DA-BA64-BE30FBF792B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B7A9E28-F984-4319-8FF9-9FC05956BF56"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D6D1F27-AFB0-41D3-B7B3-2CBEA1BA2F51"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8C0B3D9-9382-4184-830A-6CBFD65A6607"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A5537FD3-5D22-493F-93CD-03D363F7ECE6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE0E395E-4C04-4D25-8A91-6A6570060C39"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D9EEC0B-7AA6-4CAB-BF48-70227724E3AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "00D7C273-9FCB-4AE3-BF02-51DC2B57A460"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "560A2BF4-AE58-4847-B2C0-47A9CC79D760"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F3BA39B-8216-47D7-873E-55DD1F681360"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:10.1.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8027DF38-47A2-49E7-AEEB-35BFA0759B74"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0104371",
|
||||
"source": "psirt@hcl.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
160
CVE-2023/CVE-2023-280xx/CVE-2023-28009.json
Normal file
160
CVE-2023/CVE-2023-280xx/CVE-2023-28009.json
Normal file
@ -0,0 +1,160 @@
|
||||
{
|
||||
"id": "CVE-2023-28009",
|
||||
"sourceIdentifier": "psirt@hcl.com",
|
||||
"published": "2023-04-26T20:15:10.080",
|
||||
"lastModified": "2023-05-05T20:24:14.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HCL Workload Automation is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "psirt@hcl.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CA6DCFCA-DADD-4C0A-83C0-EF04662D3336"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "920EC080-63D0-4280-8553-9D94E6109864"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FF9AA9A1-7D68-469D-BD78-3A89660E4670"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BEE9D4C8-988A-49DA-BA64-BE30FBF792B7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B7A9E28-F984-4319-8FF9-9FC05956BF56"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_7:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D6D1F27-AFB0-41D3-B7B3-2CBEA1BA2F51"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A8C0B3D9-9382-4184-830A-6CBFD65A6607"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A5537FD3-5D22-493F-93CD-03D363F7ECE6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE0E395E-4C04-4D25-8A91-6A6570060C39"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6D9EEC0B-7AA6-4CAB-BF48-70227724E3AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "00D7C273-9FCB-4AE3-BF02-51DC2B57A460"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "560A2BF4-AE58-4847-B2C0-47A9CC79D760"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5F3BA39B-8216-47D7-873E-55DD1F681360"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hcltech:workload_automation:10.1.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8027DF38-47A2-49E7-AEEB-35BFA0759B74"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0104371",
|
||||
"source": "psirt@hcl.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
94
CVE-2023/CVE-2023-286xx/CVE-2023-28697.json
Normal file
94
CVE-2023/CVE-2023-286xx/CVE-2023-28697.json
Normal file
@ -0,0 +1,94 @@
|
||||
{
|
||||
"id": "CVE-2023-28697",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2023-04-27T02:15:09.313",
|
||||
"lastModified": "2023-05-05T20:47:35.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Moxa MiiNePort E1 has a vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to perform arbitrary system operation or disrupt service."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:moxa:miineport_e1_firmware:1.7.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D757A5B5-4CE5-4C69-912A-B0D5525450F2"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:moxa:miineport_e1:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08E72C6A-A107-4EB6-9692-C769DE9EEA17"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cdn-cms.azureedge.net/Moxa/media/PDIM/S100000223/MiiNePort%20E1%20Series_moxa-miineport-e1-series-firmware-v1.9.rom_Software%20Release%20History.pdf",
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-7021-eb43a-1.html",
|
||||
"source": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
77
CVE-2023/CVE-2023-295xx/CVE-2023-29596.json
Normal file
77
CVE-2023/CVE-2023-295xx/CVE-2023-29596.json
Normal file
@ -0,0 +1,77 @@
|
||||
{
|
||||
"id": "CVE-2023-29596",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-26T20:15:10.170",
|
||||
"lastModified": "2023-05-05T20:08:01.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability found in ByronKnoll Cmix v.19 allows an attacker to execute arbitrary code and cause a denial of service via the paq8 function."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cmix_project:cmix:19:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F402AF3A-5B5C-434B-A8F5-0AC76894C1D6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/byronknoll/cmix/issues/54",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30846",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-26T21:15:09.380",
|
||||
"lastModified": "2023-04-26T21:15:09.380",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-05T20:36:25.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -46,14 +66,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:typed-rest-client:*:*:*:*:*:node.js:*:*",
|
||||
"versionEndExcluding": "1.8.0",
|
||||
"matchCriteriaId": "FA141551-3739-4DE0-9840-90B89AB8E1AB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/microsoft/typed-rest-client/commit/f9ff755631b982ee1303dfc3e3c823d0d31233e8",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/microsoft/typed-rest-client/security/advisories/GHSA-558p-m34m-vpmq",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
143
README.md
143
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-05-05T20:00:25.295977+00:00
|
||||
2023-05-05T21:55:24.917263+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-05-05T19:58:27.320000+00:00
|
||||
2023-05-05T21:15:09.837000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,111 +29,60 @@ Download and Changelog: [Click](releases/latest)
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
214165
|
||||
214170
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `4`
|
||||
Recently added CVEs: `5`
|
||||
|
||||
* [CVE-2020-4914](CVE-2020/CVE-2020-49xx/CVE-2020-4914.json) (`2023-05-05T19:15:15.027`)
|
||||
* [CVE-2022-43866](CVE-2022/CVE-2022-438xx/CVE-2022-43866.json) (`2023-05-05T19:15:15.157`)
|
||||
* [CVE-2023-2427](CVE-2023/CVE-2023-24xx/CVE-2023-2427.json) (`2023-05-05T19:15:15.687`)
|
||||
* [CVE-2023-2516](CVE-2023/CVE-2023-25xx/CVE-2023-2516.json) (`2023-05-05T19:15:15.763`)
|
||||
* [CVE-2023-2550](CVE-2023/CVE-2023-25xx/CVE-2023-2550.json) (`2023-05-05T20:15:10.557`)
|
||||
* [CVE-2023-2551](CVE-2023/CVE-2023-25xx/CVE-2023-2551.json) (`2023-05-05T20:15:10.627`)
|
||||
* [CVE-2023-2552](CVE-2023/CVE-2023-25xx/CVE-2023-2552.json) (`2023-05-05T20:15:10.713`)
|
||||
* [CVE-2023-2553](CVE-2023/CVE-2023-25xx/CVE-2023-2553.json) (`2023-05-05T20:15:10.803`)
|
||||
* [CVE-2023-2554](CVE-2023/CVE-2023-25xx/CVE-2023-2554.json) (`2023-05-05T20:15:10.877`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `88`
|
||||
Recently modified CVEs: `36`
|
||||
|
||||
* [CVE-2020-21643](CVE-2020/CVE-2020-216xx/CVE-2020-21643.json) (`2023-05-05T18:18:58.807`)
|
||||
* [CVE-2020-23647](CVE-2020/CVE-2020-236xx/CVE-2020-23647.json) (`2023-05-05T18:23:40.227`)
|
||||
* [CVE-2020-23930](CVE-2020/CVE-2020-239xx/CVE-2020-23930.json) (`2023-05-05T19:45:30.473`)
|
||||
* [CVE-2020-2978](CVE-2020/CVE-2020-29xx/CVE-2020-2978.json) (`2023-05-05T19:15:14.877`)
|
||||
* [CVE-2021-32269](CVE-2021/CVE-2021-322xx/CVE-2021-32269.json) (`2023-05-05T19:45:33.843`)
|
||||
* [CVE-2021-32270](CVE-2021/CVE-2021-322xx/CVE-2021-32270.json) (`2023-05-05T19:44:14.497`)
|
||||
* [CVE-2021-32271](CVE-2021/CVE-2021-322xx/CVE-2021-32271.json) (`2023-05-05T19:44:22.500`)
|
||||
* [CVE-2022-25091](CVE-2022/CVE-2022-250xx/CVE-2022-25091.json) (`2023-05-05T18:09:25.867`)
|
||||
* [CVE-2022-25276](CVE-2022/CVE-2022-252xx/CVE-2022-25276.json) (`2023-05-05T19:26:17.550`)
|
||||
* [CVE-2022-27146](CVE-2022/CVE-2022-271xx/CVE-2022-27146.json) (`2023-05-05T19:44:29.047`)
|
||||
* [CVE-2022-27147](CVE-2022/CVE-2022-271xx/CVE-2022-27147.json) (`2023-05-05T19:41:18.380`)
|
||||
* [CVE-2022-27148](CVE-2022/CVE-2022-271xx/CVE-2022-27148.json) (`2023-05-05T19:41:23.447`)
|
||||
* [CVE-2022-36190](CVE-2022/CVE-2022-361xx/CVE-2022-36190.json) (`2023-05-05T19:41:29.807`)
|
||||
* [CVE-2022-36191](CVE-2022/CVE-2022-361xx/CVE-2022-36191.json) (`2023-05-05T19:44:35.683`)
|
||||
* [CVE-2022-38530](CVE-2022/CVE-2022-385xx/CVE-2022-38530.json) (`2023-05-05T19:41:13.080`)
|
||||
* [CVE-2022-38583](CVE-2022/CVE-2022-385xx/CVE-2022-38583.json) (`2023-05-05T18:00:52.370`)
|
||||
* [CVE-2022-3957](CVE-2022/CVE-2022-39xx/CVE-2022-3957.json) (`2023-05-05T19:45:44.160`)
|
||||
* [CVE-2022-41397](CVE-2022/CVE-2022-413xx/CVE-2022-41397.json) (`2023-05-05T18:01:24.683`)
|
||||
* [CVE-2022-41398](CVE-2022/CVE-2022-413xx/CVE-2022-41398.json) (`2023-05-05T18:02:07.837`)
|
||||
* [CVE-2022-41399](CVE-2022/CVE-2022-413xx/CVE-2022-41399.json) (`2023-05-05T18:02:32.277`)
|
||||
* [CVE-2022-41400](CVE-2022/CVE-2022-414xx/CVE-2022-41400.json) (`2023-05-05T18:03:05.717`)
|
||||
* [CVE-2022-43039](CVE-2022/CVE-2022-430xx/CVE-2022-43039.json) (`2023-05-05T19:58:27.320`)
|
||||
* [CVE-2022-43040](CVE-2022/CVE-2022-430xx/CVE-2022-43040.json) (`2023-05-05T19:41:54.217`)
|
||||
* [CVE-2022-45343](CVE-2022/CVE-2022-453xx/CVE-2022-45343.json) (`2023-05-05T19:44:42.427`)
|
||||
* [CVE-2022-46489](CVE-2022/CVE-2022-464xx/CVE-2022-46489.json) (`2023-05-05T19:42:28.817`)
|
||||
* [CVE-2022-46490](CVE-2022/CVE-2022-464xx/CVE-2022-46490.json) (`2023-05-05T19:44:22.603`)
|
||||
* [CVE-2022-47086](CVE-2022/CVE-2022-470xx/CVE-2022-47086.json) (`2023-05-05T19:45:24.277`)
|
||||
* [CVE-2022-47087](CVE-2022/CVE-2022-470xx/CVE-2022-47087.json) (`2023-05-05T19:47:14.690`)
|
||||
* [CVE-2022-47088](CVE-2022/CVE-2022-470xx/CVE-2022-47088.json) (`2023-05-05T19:57:17.957`)
|
||||
* [CVE-2022-47089](CVE-2022/CVE-2022-470xx/CVE-2022-47089.json) (`2023-05-05T19:54:20.850`)
|
||||
* [CVE-2022-47091](CVE-2022/CVE-2022-470xx/CVE-2022-47091.json) (`2023-05-05T19:50:47.057`)
|
||||
* [CVE-2022-47092](CVE-2022/CVE-2022-470xx/CVE-2022-47092.json) (`2023-05-05T19:40:22.817`)
|
||||
* [CVE-2022-47093](CVE-2022/CVE-2022-470xx/CVE-2022-47093.json) (`2023-05-05T19:51:18.837`)
|
||||
* [CVE-2022-47094](CVE-2022/CVE-2022-470xx/CVE-2022-47094.json) (`2023-05-05T19:40:26.283`)
|
||||
* [CVE-2022-47095](CVE-2022/CVE-2022-470xx/CVE-2022-47095.json) (`2023-05-05T19:40:30.743`)
|
||||
* [CVE-2022-47653](CVE-2022/CVE-2022-476xx/CVE-2022-47653.json) (`2023-05-05T19:40:35.637`)
|
||||
* [CVE-2022-47654](CVE-2022/CVE-2022-476xx/CVE-2022-47654.json) (`2023-05-05T19:40:45.267`)
|
||||
* [CVE-2022-47656](CVE-2022/CVE-2022-476xx/CVE-2022-47656.json) (`2023-05-05T19:37:58.330`)
|
||||
* [CVE-2022-47657](CVE-2022/CVE-2022-476xx/CVE-2022-47657.json) (`2023-05-05T19:38:05.143`)
|
||||
* [CVE-2022-47658](CVE-2022/CVE-2022-476xx/CVE-2022-47658.json) (`2023-05-05T19:38:12.117`)
|
||||
* [CVE-2022-47659](CVE-2022/CVE-2022-476xx/CVE-2022-47659.json) (`2023-05-05T19:39:01.907`)
|
||||
* [CVE-2022-47660](CVE-2022/CVE-2022-476xx/CVE-2022-47660.json) (`2023-05-05T19:39:08.303`)
|
||||
* [CVE-2022-47661](CVE-2022/CVE-2022-476xx/CVE-2022-47661.json) (`2023-05-05T19:37:33.643`)
|
||||
* [CVE-2022-47662](CVE-2022/CVE-2022-476xx/CVE-2022-47662.json) (`2023-05-05T19:49:30.243`)
|
||||
* [CVE-2022-47663](CVE-2022/CVE-2022-476xx/CVE-2022-47663.json) (`2023-05-05T19:50:24.380`)
|
||||
* [CVE-2022-47874](CVE-2022/CVE-2022-478xx/CVE-2022-47874.json) (`2023-05-05T19:15:15.223`)
|
||||
* [CVE-2022-47875](CVE-2022/CVE-2022-478xx/CVE-2022-47875.json) (`2023-05-05T19:15:15.283`)
|
||||
* [CVE-2022-47876](CVE-2022/CVE-2022-478xx/CVE-2022-47876.json) (`2023-05-05T19:15:15.337`)
|
||||
* [CVE-2022-47877](CVE-2022/CVE-2022-478xx/CVE-2022-47877.json) (`2023-05-05T19:15:15.393`)
|
||||
* [CVE-2022-47878](CVE-2022/CVE-2022-478xx/CVE-2022-47878.json) (`2023-05-05T19:15:15.447`)
|
||||
* [CVE-2023-0760](CVE-2023/CVE-2023-07xx/CVE-2023-0760.json) (`2023-05-05T19:45:48.030`)
|
||||
* [CVE-2023-2246](CVE-2023/CVE-2023-22xx/CVE-2023-2246.json) (`2023-05-05T19:15:15.603`)
|
||||
* [CVE-2023-2370](CVE-2023/CVE-2023-23xx/CVE-2023-2370.json) (`2023-05-05T18:03:39.193`)
|
||||
* [CVE-2023-2371](CVE-2023/CVE-2023-23xx/CVE-2023-2371.json) (`2023-05-05T18:05:31.693`)
|
||||
* [CVE-2023-2372](CVE-2023/CVE-2023-23xx/CVE-2023-2372.json) (`2023-05-05T18:06:09.003`)
|
||||
* [CVE-2023-2380](CVE-2023/CVE-2023-23xx/CVE-2023-2380.json) (`2023-05-05T18:16:55.040`)
|
||||
* [CVE-2023-2381](CVE-2023/CVE-2023-23xx/CVE-2023-2381.json) (`2023-05-05T18:16:29.463`)
|
||||
* [CVE-2023-2382](CVE-2023/CVE-2023-23xx/CVE-2023-2382.json) (`2023-05-05T18:16:05.950`)
|
||||
* [CVE-2023-2383](CVE-2023/CVE-2023-23xx/CVE-2023-2383.json) (`2023-05-05T18:17:13.490`)
|
||||
* [CVE-2023-2384](CVE-2023/CVE-2023-23xx/CVE-2023-2384.json) (`2023-05-05T18:18:08.037`)
|
||||
* [CVE-2023-2385](CVE-2023/CVE-2023-23xx/CVE-2023-2385.json) (`2023-05-05T18:18:32.757`)
|
||||
* [CVE-2023-2386](CVE-2023/CVE-2023-23xx/CVE-2023-2386.json) (`2023-05-05T18:34:24.343`)
|
||||
* [CVE-2023-2387](CVE-2023/CVE-2023-23xx/CVE-2023-2387.json) (`2023-05-05T18:34:43.560`)
|
||||
* [CVE-2023-2388](CVE-2023/CVE-2023-23xx/CVE-2023-2388.json) (`2023-05-05T18:35:05.630`)
|
||||
* [CVE-2023-2389](CVE-2023/CVE-2023-23xx/CVE-2023-2389.json) (`2023-05-05T18:35:44.867`)
|
||||
* [CVE-2023-2390](CVE-2023/CVE-2023-23xx/CVE-2023-2390.json) (`2023-05-05T18:36:04.617`)
|
||||
* [CVE-2023-2391](CVE-2023/CVE-2023-23xx/CVE-2023-2391.json) (`2023-05-05T18:36:22.327`)
|
||||
* [CVE-2023-2392](CVE-2023/CVE-2023-23xx/CVE-2023-2392.json) (`2023-05-05T18:36:48.723`)
|
||||
* [CVE-2023-2393](CVE-2023/CVE-2023-23xx/CVE-2023-2393.json) (`2023-05-05T18:27:26.553`)
|
||||
* [CVE-2023-2394](CVE-2023/CVE-2023-23xx/CVE-2023-2394.json) (`2023-05-05T18:26:55.050`)
|
||||
* [CVE-2023-2395](CVE-2023/CVE-2023-23xx/CVE-2023-2395.json) (`2023-05-05T18:31:07.607`)
|
||||
* [CVE-2023-2396](CVE-2023/CVE-2023-23xx/CVE-2023-2396.json) (`2023-05-05T18:29:40.190`)
|
||||
* [CVE-2023-2397](CVE-2023/CVE-2023-23xx/CVE-2023-2397.json) (`2023-05-05T18:34:00.993`)
|
||||
* [CVE-2023-2408](CVE-2023/CVE-2023-24xx/CVE-2023-2408.json) (`2023-05-05T18:33:16.700`)
|
||||
* [CVE-2023-2409](CVE-2023/CVE-2023-24xx/CVE-2023-2409.json) (`2023-05-05T18:32:54.917`)
|
||||
* [CVE-2023-2410](CVE-2023/CVE-2023-24xx/CVE-2023-2410.json) (`2023-05-05T18:32:35.533`)
|
||||
* [CVE-2023-2411](CVE-2023/CVE-2023-24xx/CVE-2023-2411.json) (`2023-05-05T18:32:04.407`)
|
||||
* [CVE-2023-2412](CVE-2023/CVE-2023-24xx/CVE-2023-2412.json) (`2023-05-05T18:26:27.330`)
|
||||
* [CVE-2023-2413](CVE-2023/CVE-2023-24xx/CVE-2023-2413.json) (`2023-05-05T18:25:53.750`)
|
||||
* [CVE-2023-25437](CVE-2023/CVE-2023-254xx/CVE-2023-25437.json) (`2023-05-05T18:10:34.587`)
|
||||
* [CVE-2023-27559](CVE-2023/CVE-2023-275xx/CVE-2023-27559.json) (`2023-05-05T19:40:43.037`)
|
||||
* [CVE-2023-28613](CVE-2023/CVE-2023-286xx/CVE-2023-28613.json) (`2023-05-05T19:15:15.513`)
|
||||
* [CVE-2023-29471](CVE-2023/CVE-2023-294xx/CVE-2023-29471.json) (`2023-05-05T18:11:57.897`)
|
||||
* [CVE-2023-29489](CVE-2023/CVE-2023-294xx/CVE-2023-29489.json) (`2023-05-05T18:12:20.760`)
|
||||
* [CVE-2023-29579](CVE-2023/CVE-2023-295xx/CVE-2023-29579.json) (`2023-05-05T18:04:17.810`)
|
||||
* [CVE-2023-29582](CVE-2023/CVE-2023-295xx/CVE-2023-29582.json) (`2023-05-05T18:04:22.130`)
|
||||
* [CVE-2023-29583](CVE-2023/CVE-2023-295xx/CVE-2023-29583.json) (`2023-05-05T18:04:31.307`)
|
||||
* [CVE-2023-30123](CVE-2023/CVE-2023-301xx/CVE-2023-30123.json) (`2023-05-05T18:06:27.517`)
|
||||
* [CVE-2021-23166](CVE-2021/CVE-2021-231xx/CVE-2021-23166.json) (`2023-05-05T21:15:09.073`)
|
||||
* [CVE-2021-23176](CVE-2021/CVE-2021-231xx/CVE-2021-23176.json) (`2023-05-05T21:15:09.163`)
|
||||
* [CVE-2021-23178](CVE-2021/CVE-2021-231xx/CVE-2021-23178.json) (`2023-05-05T21:15:09.250`)
|
||||
* [CVE-2021-23186](CVE-2021/CVE-2021-231xx/CVE-2021-23186.json) (`2023-05-05T21:15:09.327`)
|
||||
* [CVE-2021-23203](CVE-2021/CVE-2021-232xx/CVE-2021-23203.json) (`2023-05-05T21:15:09.403`)
|
||||
* [CVE-2021-26263](CVE-2021/CVE-2021-262xx/CVE-2021-26263.json) (`2023-05-05T21:15:09.480`)
|
||||
* [CVE-2021-26947](CVE-2021/CVE-2021-269xx/CVE-2021-26947.json) (`2023-05-05T21:15:09.553`)
|
||||
* [CVE-2021-44476](CVE-2021/CVE-2021-444xx/CVE-2021-44476.json) (`2023-05-05T21:15:09.640`)
|
||||
* [CVE-2021-44775](CVE-2021/CVE-2021-447xx/CVE-2021-44775.json) (`2023-05-05T21:15:09.700`)
|
||||
* [CVE-2021-45071](CVE-2021/CVE-2021-450xx/CVE-2021-45071.json) (`2023-05-05T21:15:09.773`)
|
||||
* [CVE-2021-45111](CVE-2021/CVE-2021-451xx/CVE-2021-45111.json) (`2023-05-05T21:15:09.837`)
|
||||
* [CVE-2022-3116](CVE-2022/CVE-2022-31xx/CVE-2022-3116.json) (`2023-05-05T20:15:09.373`)
|
||||
* [CVE-2022-3294](CVE-2022/CVE-2022-32xx/CVE-2022-3294.json) (`2023-05-05T20:15:09.607`)
|
||||
* [CVE-2022-43042](CVE-2022/CVE-2022-430xx/CVE-2022-43042.json) (`2023-05-05T20:04:36.790`)
|
||||
* [CVE-2022-43043](CVE-2022/CVE-2022-430xx/CVE-2022-43043.json) (`2023-05-05T20:04:23.743`)
|
||||
* [CVE-2022-43044](CVE-2022/CVE-2022-430xx/CVE-2022-43044.json) (`2023-05-05T20:03:46.190`)
|
||||
* [CVE-2022-43045](CVE-2022/CVE-2022-430xx/CVE-2022-43045.json) (`2023-05-05T20:04:05.043`)
|
||||
* [CVE-2022-43254](CVE-2022/CVE-2022-432xx/CVE-2022-43254.json) (`2023-05-05T20:03:18.970`)
|
||||
* [CVE-2022-43255](CVE-2022/CVE-2022-432xx/CVE-2022-43255.json) (`2023-05-05T20:02:31.100`)
|
||||
* [CVE-2022-45204](CVE-2022/CVE-2022-452xx/CVE-2022-45204.json) (`2023-05-05T20:00:30.043`)
|
||||
* [CVE-2022-45876](CVE-2022/CVE-2022-458xx/CVE-2022-45876.json) (`2023-05-05T20:13:57.563`)
|
||||
* [CVE-2022-48423](CVE-2022/CVE-2022-484xx/CVE-2022-48423.json) (`2023-05-05T20:15:09.720`)
|
||||
* [CVE-2022-48424](CVE-2022/CVE-2022-484xx/CVE-2022-48424.json) (`2023-05-05T20:15:09.813`)
|
||||
* [CVE-2023-1078](CVE-2023/CVE-2023-10xx/CVE-2023-1078.json) (`2023-05-05T20:15:09.880`)
|
||||
* [CVE-2023-1252](CVE-2023/CVE-2023-12xx/CVE-2023-1252.json) (`2023-05-05T20:15:09.963`)
|
||||
* [CVE-2023-20860](CVE-2023/CVE-2023-208xx/CVE-2023-20860.json) (`2023-05-05T20:15:10.053`)
|
||||
* [CVE-2023-22901](CVE-2023/CVE-2023-229xx/CVE-2023-22901.json) (`2023-05-05T20:55:52.987`)
|
||||
* [CVE-2023-24999](CVE-2023/CVE-2023-249xx/CVE-2023-24999.json) (`2023-05-05T20:15:10.137`)
|
||||
* [CVE-2023-25292](CVE-2023/CVE-2023-252xx/CVE-2023-25292.json) (`2023-05-05T20:18:47.160`)
|
||||
* [CVE-2023-26464](CVE-2023/CVE-2023-264xx/CVE-2023-26464.json) (`2023-05-05T20:15:10.253`)
|
||||
* [CVE-2023-26604](CVE-2023/CVE-2023-266xx/CVE-2023-26604.json) (`2023-05-05T20:15:10.477`)
|
||||
* [CVE-2023-28008](CVE-2023/CVE-2023-280xx/CVE-2023-28008.json) (`2023-05-05T20:28:08.970`)
|
||||
* [CVE-2023-28009](CVE-2023/CVE-2023-280xx/CVE-2023-28009.json) (`2023-05-05T20:24:14.757`)
|
||||
* [CVE-2023-28697](CVE-2023/CVE-2023-286xx/CVE-2023-28697.json) (`2023-05-05T20:47:35.427`)
|
||||
* [CVE-2023-29596](CVE-2023/CVE-2023-295xx/CVE-2023-29596.json) (`2023-05-05T20:08:01.820`)
|
||||
* [CVE-2023-30846](CVE-2023/CVE-2023-308xx/CVE-2023-30846.json) (`2023-05-05T20:36:25.807`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user