Auto-Update: 2023-05-05T21:55:24.917263+00:00

This commit is contained in:
René Helmke 2023-05-05 23:55:28 +02:00
parent 01b6955622
commit 572d23d780
42 changed files with 1302 additions and 161 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-23166",
"sourceIdentifier": "security@odoo.com",
"published": "2023-04-25T19:15:09.140",
"lastModified": "2023-05-03T14:38:22.883",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T21:15:09.073",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -101,6 +101,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5399",
"source": "security@odoo.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-23176",
"sourceIdentifier": "security@odoo.com",
"published": "2023-04-25T19:15:09.220",
"lastModified": "2023-05-03T14:28:25.537",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T21:15:09.163",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -102,6 +102,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5399",
"source": "security@odoo.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-23178",
"sourceIdentifier": "security@odoo.com",
"published": "2023-04-25T19:15:09.283",
"lastModified": "2023-05-03T14:25:43.207",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T21:15:09.250",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -101,6 +101,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5399",
"source": "security@odoo.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-23186",
"sourceIdentifier": "security@odoo.com",
"published": "2023-04-25T19:15:09.340",
"lastModified": "2023-05-02T20:21:22.287",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T21:15:09.327",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -101,6 +101,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5399",
"source": "security@odoo.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-23203",
"sourceIdentifier": "security@odoo.com",
"published": "2023-04-25T19:15:09.403",
"lastModified": "2023-05-02T20:06:15.217",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T21:15:09.403",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -107,6 +107,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5399",
"source": "security@odoo.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-26263",
"sourceIdentifier": "security@odoo.com",
"published": "2023-04-25T19:15:09.470",
"lastModified": "2023-05-02T19:53:14.293",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T21:15:09.480",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -109,6 +109,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5399",
"source": "security@odoo.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-26947",
"sourceIdentifier": "security@odoo.com",
"published": "2023-04-25T19:15:09.530",
"lastModified": "2023-05-02T19:53:00.077",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T21:15:09.553",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -101,6 +101,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5399",
"source": "security@odoo.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44476",
"sourceIdentifier": "security@odoo.com",
"published": "2023-04-25T19:15:09.783",
"lastModified": "2023-05-03T13:51:44.640",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T21:15:09.640",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -101,6 +101,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5399",
"source": "security@odoo.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-44775",
"sourceIdentifier": "security@odoo.com",
"published": "2023-04-25T19:15:09.903",
"lastModified": "2023-05-02T20:26:24.113",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T21:15:09.700",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -101,6 +101,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5399",
"source": "security@odoo.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-45071",
"sourceIdentifier": "security@odoo.com",
"published": "2023-04-25T19:15:09.963",
"lastModified": "2023-05-02T20:26:15.753",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T21:15:09.773",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -101,6 +101,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5399",
"source": "security@odoo.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-45111",
"sourceIdentifier": "security@odoo.com",
"published": "2023-04-25T19:15:10.020",
"lastModified": "2023-05-03T13:47:27.200",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T21:15:09.837",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -101,6 +101,10 @@
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5399",
"source": "security@odoo.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-3116",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-03-27T22:15:11.987",
"lastModified": "2023-04-04T00:48:24.143",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T20:15:09.373",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -75,6 +75,10 @@
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20230505-0010/",
"source": "secalert@redhat.com"
},
{
"url": "https://www.kb.cert.org/vuls/id/730793",
"source": "secalert@redhat.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-3294",
"sourceIdentifier": "jordan@liggitt.net",
"published": "2023-03-01T19:15:25.570",
"lastModified": "2023-03-09T00:58:24.407",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T20:15:09.607",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -131,6 +131,10 @@
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230505-0007/",
"source": "jordan@liggitt.net"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-43042",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-10-19T14:15:10.227",
"lastModified": "2022-10-20T20:45:13.923",
"lastModified": "2023-05-05T20:04:36.790",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -59,8 +59,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*",
"matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B"
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.2.0",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-43043",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-10-19T14:15:10.273",
"lastModified": "2022-10-20T20:45:25.573",
"lastModified": "2023-05-05T20:04:23.743",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -59,8 +59,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*",
"matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B"
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.2.0",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C"
}
]
}
@ -73,6 +74,7 @@
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-43044",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-10-19T14:15:10.317",
"lastModified": "2022-10-20T20:45:35.100",
"lastModified": "2023-05-05T20:03:46.190",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -59,8 +59,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*",
"matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B"
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.2.0",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C"
}
]
}
@ -73,6 +74,7 @@
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-43045",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-10-19T14:15:10.357",
"lastModified": "2022-10-20T20:30:47.907",
"lastModified": "2023-05-05T20:04:05.043",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -59,8 +59,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*",
"matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B"
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.2.0",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C"
}
]
}
@ -73,6 +74,7 @@
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-43254",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-02T14:15:15.637",
"lastModified": "2022-11-04T02:02:42.150",
"lastModified": "2023-05-05T20:03:18.970",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -55,8 +55,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*",
"matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B"
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.2.0",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-43255",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-02T14:15:15.917",
"lastModified": "2022-11-04T02:04:49.390",
"lastModified": "2023-05-05T20:02:31.100",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -55,8 +55,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*",
"matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B"
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.2.0",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-45204",
"sourceIdentifier": "cve@mitre.org",
"published": "2022-11-29T04:15:11.253",
"lastModified": "2022-12-01T21:18:35.433",
"lastModified": "2023-05-05T20:00:30.043",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -55,8 +55,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev428-gcb8ae46c8-master:*:*:*:*:*:*:*",
"matchCriteriaId": "1B99DAA3-219F-4E47-B284-CAFC786A9F78"
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.2.0",
"matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C"
}
]
}

View File

@ -0,0 +1,101 @@
{
"id": "CVE-2022-45876",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-04-26T22:15:08.737",
"lastModified": "2023-05-05T20:13:57.563",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:visam:vbase:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.7.5",
"matchCriteriaId": "66698568-7086-4708-B7C9-69AAAA8104DC"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-05",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.vbase.net/en/download.php",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
},
{
"url": "https://www.visam.com/kontakt.php",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48423",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-19T03:15:11.087",
"lastModified": "2023-03-24T16:31:10.497",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T20:15:09.720",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -80,6 +80,10 @@
"tags": [
"Patch"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230505-0003/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48424",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-19T03:15:11.560",
"lastModified": "2023-03-24T14:24:27.943",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T20:15:09.813",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -80,6 +80,10 @@
"tags": [
"Patch"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230505-0002/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1078",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-03-27T21:15:10.520",
"lastModified": "2023-05-03T14:15:19.747",
"lastModified": "2023-05-05T20:15:09.880",
"vulnStatus": "Modified",
"descriptions": [
{
@ -89,6 +89,10 @@
{
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html",
"source": "secalert@redhat.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230505-0004/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1252",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-03-23T21:15:19.287",
"lastModified": "2023-03-28T14:55:18.547",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T20:15:09.963",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -82,6 +82,10 @@
"Mailing List",
"Patch"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230505-0005/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20860",
"sourceIdentifier": "security@vmware.com",
"published": "2023-03-27T22:15:21.603",
"lastModified": "2023-04-03T18:20:16.453",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T20:15:10.053",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -73,6 +73,10 @@
}
],
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20230505-0006/",
"source": "security@vmware.com"
},
{
"url": "https://spring.io/security/cve-2023-20860",
"source": "security@vmware.com",

View File

@ -0,0 +1,76 @@
{
"id": "CVE-2023-22901",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2023-04-27T02:15:09.177",
"lastModified": "2023-05-05T20:55:52.987",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "ChangingTec MOTP system has a path traversal vulnerability. A remote attacker with administrator\u2019s privilege can exploit this vulnerability to access arbitrary system files."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:changingtec:mobile_one_time_password:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.11",
"matchCriteriaId": "190C050E-7CCE-49EB-9D4F-3168743E0BF3"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/tw/cp-132-7022-2cbe0-1.html",
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24999",
"sourceIdentifier": "security@hashicorp.com",
"published": "2023-03-11T00:15:09.410",
"lastModified": "2023-03-16T17:03:07.880",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-05T20:15:10.137",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -135,6 +135,10 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230505-0001/",
"source": "security@hashicorp.com"
}
]
}

View File

@ -0,0 +1,91 @@
{
"id": "CVE-2023-25292",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-27T01:15:08.283",
"lastModified": "2023-05-05T20:18:47.160",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Reflected Cross Site Scripting (XSS) in Intermesh BV Group-Office version 6.6.145, allows attackers to gain escalated privileges and gain sensitive information via the GO_LANGUAGE cookie."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:group-office:group_office:6.6.145:*:*:*:*:*:*:*",
"matchCriteriaId": "A0AF3C8D-6B49-4999-B2AA-5918CEC3ADC3"
}
]
}
]
}
],
"references": [
{
"url": "http://group-office.com",
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "http://intermesh.com",
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Not Applicable"
]
},
{
"url": "https://github.com/brainkok/CVE-2023-25292",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2550",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-05T20:15:10.557",
"lastModified": "2023-05-05T20:15:10.557",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/thorsten/phpmyfaq/commit/20ac51594db11604a4518aacc28a51f67d4f11bf",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/840c8d91-c97e-4116-a9f8-4ab1a38d239b",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2551",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-05T20:15:10.627",
"lastModified": "2023-05-05T20:15:10.627",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "PHP Remote File Inclusion in GitHub repository unilogies/bumsys prior to 2.1.1."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-98"
}
]
}
],
"references": [
{
"url": "https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/5723613c-55c6-4f18-9ed3-61ad44f5de9c",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2552",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-05T20:15:10.713",
"lastModified": "2023-05-05T20:15:10.713",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) in GitHub repository unilogies/bumsys prior to 2.1.1."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/ab0b4655-f57a-4113-849b-2237eeb75b32",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2553",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-05T20:15:10.803",
"lastModified": "2023-05-05T20:15:10.803",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Cross-site Scripting (XSS) - Stored in GitHub repository unilogies/bumsys prior to 2.2.0."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.3,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/4e1f5b56-e846-40d8-a83c-533efd56aacf",
"source": "security@huntr.dev"
}
]
}

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-2554",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-05T20:15:10.877",
"lastModified": "2023-05-05T20:15:10.877",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "External Control of File Name or Path in GitHub repository unilogies/bumsys prior to 2.2.0."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "security@huntr.dev",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@huntr.dev",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-73"
}
]
}
],
"references": [
{
"url": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978",
"source": "security@huntr.dev"
},
{
"url": "https://huntr.dev/bounties/396785a0-7bb6-4db4-b4cb-607b0fd4ab4b",
"source": "security@huntr.dev"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26464",
"sourceIdentifier": "security@apache.org",
"published": "2023-03-10T14:15:10.453",
"lastModified": "2023-04-20T08:15:06.970",
"lastModified": "2023-05-05T20:15:10.253",
"vulnStatus": "Modified",
"descriptions": [
{
@ -82,6 +82,10 @@
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230505-0008/",
"source": "security@apache.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26604",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-03T16:15:10.607",
"lastModified": "2023-03-31T23:15:07.320",
"lastModified": "2023-05-05T20:15:10.477",
"vulnStatus": "Modified",
"descriptions": [
{
@ -91,6 +91,10 @@
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230505-0009/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,160 @@
{
"id": "CVE-2023-28008",
"sourceIdentifier": "psirt@hcl.com",
"published": "2023-04-26T20:15:10.000",
"lastModified": "2023-05-05T20:28:08.970",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "HCL Workload Automation 9.4, 9.5, and 10.1 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "psirt@hcl.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "CA6DCFCA-DADD-4C0A-83C0-EF04662D3336"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_3:*:*:*:*:*:*",
"matchCriteriaId": "920EC080-63D0-4280-8553-9D94E6109864"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_4:*:*:*:*:*:*",
"matchCriteriaId": "FF9AA9A1-7D68-469D-BD78-3A89660E4670"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_5:*:*:*:*:*:*",
"matchCriteriaId": "BEE9D4C8-988A-49DA-BA64-BE30FBF792B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_6:*:*:*:*:*:*",
"matchCriteriaId": "8B7A9E28-F984-4319-8FF9-9FC05956BF56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_7:*:*:*:*:*:*",
"matchCriteriaId": "7D6D1F27-AFB0-41D3-B7B3-2CBEA1BA2F51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A8C0B3D9-9382-4184-830A-6CBFD65A6607"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "A5537FD3-5D22-493F-93CD-03D363F7ECE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_2:*:*:*:*:*:*",
"matchCriteriaId": "DE0E395E-4C04-4D25-8A91-6A6570060C39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_3:*:*:*:*:*:*",
"matchCriteriaId": "6D9EEC0B-7AA6-4CAB-BF48-70227724E3AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_4:*:*:*:*:*:*",
"matchCriteriaId": "00D7C273-9FCB-4AE3-BF02-51DC2B57A460"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_5:*:*:*:*:*:*",
"matchCriteriaId": "560A2BF4-AE58-4847-B2C0-47A9CC79D760"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_6:*:*:*:*:*:*",
"matchCriteriaId": "5F3BA39B-8216-47D7-873E-55DD1F681360"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:10.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "8027DF38-47A2-49E7-AEEB-35BFA0759B74"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0104371",
"source": "psirt@hcl.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,160 @@
{
"id": "CVE-2023-28009",
"sourceIdentifier": "psirt@hcl.com",
"published": "2023-04-26T20:15:10.080",
"lastModified": "2023-05-05T20:24:14.757",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "HCL Workload Automation is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "psirt@hcl.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:-:*:*:*:*:*:*",
"matchCriteriaId": "CA6DCFCA-DADD-4C0A-83C0-EF04662D3336"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_3:*:*:*:*:*:*",
"matchCriteriaId": "920EC080-63D0-4280-8553-9D94E6109864"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_4:*:*:*:*:*:*",
"matchCriteriaId": "FF9AA9A1-7D68-469D-BD78-3A89660E4670"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_5:*:*:*:*:*:*",
"matchCriteriaId": "BEE9D4C8-988A-49DA-BA64-BE30FBF792B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_6:*:*:*:*:*:*",
"matchCriteriaId": "8B7A9E28-F984-4319-8FF9-9FC05956BF56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_7:*:*:*:*:*:*",
"matchCriteriaId": "7D6D1F27-AFB0-41D3-B7B3-2CBEA1BA2F51"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:-:*:*:*:*:*:*",
"matchCriteriaId": "A8C0B3D9-9382-4184-830A-6CBFD65A6607"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "A5537FD3-5D22-493F-93CD-03D363F7ECE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_2:*:*:*:*:*:*",
"matchCriteriaId": "DE0E395E-4C04-4D25-8A91-6A6570060C39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_3:*:*:*:*:*:*",
"matchCriteriaId": "6D9EEC0B-7AA6-4CAB-BF48-70227724E3AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_4:*:*:*:*:*:*",
"matchCriteriaId": "00D7C273-9FCB-4AE3-BF02-51DC2B57A460"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_5:*:*:*:*:*:*",
"matchCriteriaId": "560A2BF4-AE58-4847-B2C0-47A9CC79D760"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_6:*:*:*:*:*:*",
"matchCriteriaId": "5F3BA39B-8216-47D7-873E-55DD1F681360"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:workload_automation:10.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "8027DF38-47A2-49E7-AEEB-35BFA0759B74"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0104371",
"source": "psirt@hcl.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,94 @@
{
"id": "CVE-2023-28697",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2023-04-27T02:15:09.313",
"lastModified": "2023-05-05T20:47:35.427",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Moxa MiiNePort E1 has a vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to perform arbitrary system operation or disrupt service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:moxa:miineport_e1_firmware:1.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D757A5B5-4CE5-4C69-912A-B0D5525450F2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:moxa:miineport_e1:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08E72C6A-A107-4EB6-9692-C769DE9EEA17"
}
]
}
]
}
],
"references": [
{
"url": "https://cdn-cms.azureedge.net/Moxa/media/PDIM/S100000223/MiiNePort%20E1%20Series_moxa-miineport-e1-series-firmware-v1.9.rom_Software%20Release%20History.pdf",
"source": "twcert@cert.org.tw",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-7021-eb43a-1.html",
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,77 @@
{
"id": "CVE-2023-29596",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-26T20:15:10.170",
"lastModified": "2023-05-05T20:08:01.820",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Buffer Overflow vulnerability found in ByronKnoll Cmix v.19 allows an attacker to execute arbitrary code and cause a denial of service via the paq8 function."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cmix_project:cmix:19:*:*:*:*:*:*:*",
"matchCriteriaId": "F402AF3A-5B5C-434B-A8F5-0AC76894C1D6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/byronknoll/cmix/issues/54",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30846",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-04-26T21:15:09.380",
"lastModified": "2023-04-26T21:15:09.380",
"vulnStatus": "Received",
"lastModified": "2023-05-05T20:36:25.807",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -46,14 +66,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:microsoft:typed-rest-client:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "1.8.0",
"matchCriteriaId": "FA141551-3739-4DE0-9840-90B89AB8E1AB"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/microsoft/typed-rest-client/commit/f9ff755631b982ee1303dfc3e3c823d0d31233e8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/microsoft/typed-rest-client/security/advisories/GHSA-558p-m34m-vpmq",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

143
README.md
View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-05T20:00:25.295977+00:00
2023-05-05T21:55:24.917263+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-05T19:58:27.320000+00:00
2023-05-05T21:15:09.837000+00:00
```
### Last Data Feed Release
@ -29,111 +29,60 @@ Download and Changelog: [Click](releases/latest)
### Total Number of included CVEs
```plain
214165
214170
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `5`
* [CVE-2020-4914](CVE-2020/CVE-2020-49xx/CVE-2020-4914.json) (`2023-05-05T19:15:15.027`)
* [CVE-2022-43866](CVE-2022/CVE-2022-438xx/CVE-2022-43866.json) (`2023-05-05T19:15:15.157`)
* [CVE-2023-2427](CVE-2023/CVE-2023-24xx/CVE-2023-2427.json) (`2023-05-05T19:15:15.687`)
* [CVE-2023-2516](CVE-2023/CVE-2023-25xx/CVE-2023-2516.json) (`2023-05-05T19:15:15.763`)
* [CVE-2023-2550](CVE-2023/CVE-2023-25xx/CVE-2023-2550.json) (`2023-05-05T20:15:10.557`)
* [CVE-2023-2551](CVE-2023/CVE-2023-25xx/CVE-2023-2551.json) (`2023-05-05T20:15:10.627`)
* [CVE-2023-2552](CVE-2023/CVE-2023-25xx/CVE-2023-2552.json) (`2023-05-05T20:15:10.713`)
* [CVE-2023-2553](CVE-2023/CVE-2023-25xx/CVE-2023-2553.json) (`2023-05-05T20:15:10.803`)
* [CVE-2023-2554](CVE-2023/CVE-2023-25xx/CVE-2023-2554.json) (`2023-05-05T20:15:10.877`)
### CVEs modified in the last Commit
Recently modified CVEs: `88`
Recently modified CVEs: `36`
* [CVE-2020-21643](CVE-2020/CVE-2020-216xx/CVE-2020-21643.json) (`2023-05-05T18:18:58.807`)
* [CVE-2020-23647](CVE-2020/CVE-2020-236xx/CVE-2020-23647.json) (`2023-05-05T18:23:40.227`)
* [CVE-2020-23930](CVE-2020/CVE-2020-239xx/CVE-2020-23930.json) (`2023-05-05T19:45:30.473`)
* [CVE-2020-2978](CVE-2020/CVE-2020-29xx/CVE-2020-2978.json) (`2023-05-05T19:15:14.877`)
* [CVE-2021-32269](CVE-2021/CVE-2021-322xx/CVE-2021-32269.json) (`2023-05-05T19:45:33.843`)
* [CVE-2021-32270](CVE-2021/CVE-2021-322xx/CVE-2021-32270.json) (`2023-05-05T19:44:14.497`)
* [CVE-2021-32271](CVE-2021/CVE-2021-322xx/CVE-2021-32271.json) (`2023-05-05T19:44:22.500`)
* [CVE-2022-25091](CVE-2022/CVE-2022-250xx/CVE-2022-25091.json) (`2023-05-05T18:09:25.867`)
* [CVE-2022-25276](CVE-2022/CVE-2022-252xx/CVE-2022-25276.json) (`2023-05-05T19:26:17.550`)
* [CVE-2022-27146](CVE-2022/CVE-2022-271xx/CVE-2022-27146.json) (`2023-05-05T19:44:29.047`)
* [CVE-2022-27147](CVE-2022/CVE-2022-271xx/CVE-2022-27147.json) (`2023-05-05T19:41:18.380`)
* [CVE-2022-27148](CVE-2022/CVE-2022-271xx/CVE-2022-27148.json) (`2023-05-05T19:41:23.447`)
* [CVE-2022-36190](CVE-2022/CVE-2022-361xx/CVE-2022-36190.json) (`2023-05-05T19:41:29.807`)
* [CVE-2022-36191](CVE-2022/CVE-2022-361xx/CVE-2022-36191.json) (`2023-05-05T19:44:35.683`)
* [CVE-2022-38530](CVE-2022/CVE-2022-385xx/CVE-2022-38530.json) (`2023-05-05T19:41:13.080`)
* [CVE-2022-38583](CVE-2022/CVE-2022-385xx/CVE-2022-38583.json) (`2023-05-05T18:00:52.370`)
* [CVE-2022-3957](CVE-2022/CVE-2022-39xx/CVE-2022-3957.json) (`2023-05-05T19:45:44.160`)
* [CVE-2022-41397](CVE-2022/CVE-2022-413xx/CVE-2022-41397.json) (`2023-05-05T18:01:24.683`)
* [CVE-2022-41398](CVE-2022/CVE-2022-413xx/CVE-2022-41398.json) (`2023-05-05T18:02:07.837`)
* [CVE-2022-41399](CVE-2022/CVE-2022-413xx/CVE-2022-41399.json) (`2023-05-05T18:02:32.277`)
* [CVE-2022-41400](CVE-2022/CVE-2022-414xx/CVE-2022-41400.json) (`2023-05-05T18:03:05.717`)
* [CVE-2022-43039](CVE-2022/CVE-2022-430xx/CVE-2022-43039.json) (`2023-05-05T19:58:27.320`)
* [CVE-2022-43040](CVE-2022/CVE-2022-430xx/CVE-2022-43040.json) (`2023-05-05T19:41:54.217`)
* [CVE-2022-45343](CVE-2022/CVE-2022-453xx/CVE-2022-45343.json) (`2023-05-05T19:44:42.427`)
* [CVE-2022-46489](CVE-2022/CVE-2022-464xx/CVE-2022-46489.json) (`2023-05-05T19:42:28.817`)
* [CVE-2022-46490](CVE-2022/CVE-2022-464xx/CVE-2022-46490.json) (`2023-05-05T19:44:22.603`)
* [CVE-2022-47086](CVE-2022/CVE-2022-470xx/CVE-2022-47086.json) (`2023-05-05T19:45:24.277`)
* [CVE-2022-47087](CVE-2022/CVE-2022-470xx/CVE-2022-47087.json) (`2023-05-05T19:47:14.690`)
* [CVE-2022-47088](CVE-2022/CVE-2022-470xx/CVE-2022-47088.json) (`2023-05-05T19:57:17.957`)
* [CVE-2022-47089](CVE-2022/CVE-2022-470xx/CVE-2022-47089.json) (`2023-05-05T19:54:20.850`)
* [CVE-2022-47091](CVE-2022/CVE-2022-470xx/CVE-2022-47091.json) (`2023-05-05T19:50:47.057`)
* [CVE-2022-47092](CVE-2022/CVE-2022-470xx/CVE-2022-47092.json) (`2023-05-05T19:40:22.817`)
* [CVE-2022-47093](CVE-2022/CVE-2022-470xx/CVE-2022-47093.json) (`2023-05-05T19:51:18.837`)
* [CVE-2022-47094](CVE-2022/CVE-2022-470xx/CVE-2022-47094.json) (`2023-05-05T19:40:26.283`)
* [CVE-2022-47095](CVE-2022/CVE-2022-470xx/CVE-2022-47095.json) (`2023-05-05T19:40:30.743`)
* [CVE-2022-47653](CVE-2022/CVE-2022-476xx/CVE-2022-47653.json) (`2023-05-05T19:40:35.637`)
* [CVE-2022-47654](CVE-2022/CVE-2022-476xx/CVE-2022-47654.json) (`2023-05-05T19:40:45.267`)
* [CVE-2022-47656](CVE-2022/CVE-2022-476xx/CVE-2022-47656.json) (`2023-05-05T19:37:58.330`)
* [CVE-2022-47657](CVE-2022/CVE-2022-476xx/CVE-2022-47657.json) (`2023-05-05T19:38:05.143`)
* [CVE-2022-47658](CVE-2022/CVE-2022-476xx/CVE-2022-47658.json) (`2023-05-05T19:38:12.117`)
* [CVE-2022-47659](CVE-2022/CVE-2022-476xx/CVE-2022-47659.json) (`2023-05-05T19:39:01.907`)
* [CVE-2022-47660](CVE-2022/CVE-2022-476xx/CVE-2022-47660.json) (`2023-05-05T19:39:08.303`)
* [CVE-2022-47661](CVE-2022/CVE-2022-476xx/CVE-2022-47661.json) (`2023-05-05T19:37:33.643`)
* [CVE-2022-47662](CVE-2022/CVE-2022-476xx/CVE-2022-47662.json) (`2023-05-05T19:49:30.243`)
* [CVE-2022-47663](CVE-2022/CVE-2022-476xx/CVE-2022-47663.json) (`2023-05-05T19:50:24.380`)
* [CVE-2022-47874](CVE-2022/CVE-2022-478xx/CVE-2022-47874.json) (`2023-05-05T19:15:15.223`)
* [CVE-2022-47875](CVE-2022/CVE-2022-478xx/CVE-2022-47875.json) (`2023-05-05T19:15:15.283`)
* [CVE-2022-47876](CVE-2022/CVE-2022-478xx/CVE-2022-47876.json) (`2023-05-05T19:15:15.337`)
* [CVE-2022-47877](CVE-2022/CVE-2022-478xx/CVE-2022-47877.json) (`2023-05-05T19:15:15.393`)
* [CVE-2022-47878](CVE-2022/CVE-2022-478xx/CVE-2022-47878.json) (`2023-05-05T19:15:15.447`)
* [CVE-2023-0760](CVE-2023/CVE-2023-07xx/CVE-2023-0760.json) (`2023-05-05T19:45:48.030`)
* [CVE-2023-2246](CVE-2023/CVE-2023-22xx/CVE-2023-2246.json) (`2023-05-05T19:15:15.603`)
* [CVE-2023-2370](CVE-2023/CVE-2023-23xx/CVE-2023-2370.json) (`2023-05-05T18:03:39.193`)
* [CVE-2023-2371](CVE-2023/CVE-2023-23xx/CVE-2023-2371.json) (`2023-05-05T18:05:31.693`)
* [CVE-2023-2372](CVE-2023/CVE-2023-23xx/CVE-2023-2372.json) (`2023-05-05T18:06:09.003`)
* [CVE-2023-2380](CVE-2023/CVE-2023-23xx/CVE-2023-2380.json) (`2023-05-05T18:16:55.040`)
* [CVE-2023-2381](CVE-2023/CVE-2023-23xx/CVE-2023-2381.json) (`2023-05-05T18:16:29.463`)
* [CVE-2023-2382](CVE-2023/CVE-2023-23xx/CVE-2023-2382.json) (`2023-05-05T18:16:05.950`)
* [CVE-2023-2383](CVE-2023/CVE-2023-23xx/CVE-2023-2383.json) (`2023-05-05T18:17:13.490`)
* [CVE-2023-2384](CVE-2023/CVE-2023-23xx/CVE-2023-2384.json) (`2023-05-05T18:18:08.037`)
* [CVE-2023-2385](CVE-2023/CVE-2023-23xx/CVE-2023-2385.json) (`2023-05-05T18:18:32.757`)
* [CVE-2023-2386](CVE-2023/CVE-2023-23xx/CVE-2023-2386.json) (`2023-05-05T18:34:24.343`)
* [CVE-2023-2387](CVE-2023/CVE-2023-23xx/CVE-2023-2387.json) (`2023-05-05T18:34:43.560`)
* [CVE-2023-2388](CVE-2023/CVE-2023-23xx/CVE-2023-2388.json) (`2023-05-05T18:35:05.630`)
* [CVE-2023-2389](CVE-2023/CVE-2023-23xx/CVE-2023-2389.json) (`2023-05-05T18:35:44.867`)
* [CVE-2023-2390](CVE-2023/CVE-2023-23xx/CVE-2023-2390.json) (`2023-05-05T18:36:04.617`)
* [CVE-2023-2391](CVE-2023/CVE-2023-23xx/CVE-2023-2391.json) (`2023-05-05T18:36:22.327`)
* [CVE-2023-2392](CVE-2023/CVE-2023-23xx/CVE-2023-2392.json) (`2023-05-05T18:36:48.723`)
* [CVE-2023-2393](CVE-2023/CVE-2023-23xx/CVE-2023-2393.json) (`2023-05-05T18:27:26.553`)
* [CVE-2023-2394](CVE-2023/CVE-2023-23xx/CVE-2023-2394.json) (`2023-05-05T18:26:55.050`)
* [CVE-2023-2395](CVE-2023/CVE-2023-23xx/CVE-2023-2395.json) (`2023-05-05T18:31:07.607`)
* [CVE-2023-2396](CVE-2023/CVE-2023-23xx/CVE-2023-2396.json) (`2023-05-05T18:29:40.190`)
* [CVE-2023-2397](CVE-2023/CVE-2023-23xx/CVE-2023-2397.json) (`2023-05-05T18:34:00.993`)
* [CVE-2023-2408](CVE-2023/CVE-2023-24xx/CVE-2023-2408.json) (`2023-05-05T18:33:16.700`)
* [CVE-2023-2409](CVE-2023/CVE-2023-24xx/CVE-2023-2409.json) (`2023-05-05T18:32:54.917`)
* [CVE-2023-2410](CVE-2023/CVE-2023-24xx/CVE-2023-2410.json) (`2023-05-05T18:32:35.533`)
* [CVE-2023-2411](CVE-2023/CVE-2023-24xx/CVE-2023-2411.json) (`2023-05-05T18:32:04.407`)
* [CVE-2023-2412](CVE-2023/CVE-2023-24xx/CVE-2023-2412.json) (`2023-05-05T18:26:27.330`)
* [CVE-2023-2413](CVE-2023/CVE-2023-24xx/CVE-2023-2413.json) (`2023-05-05T18:25:53.750`)
* [CVE-2023-25437](CVE-2023/CVE-2023-254xx/CVE-2023-25437.json) (`2023-05-05T18:10:34.587`)
* [CVE-2023-27559](CVE-2023/CVE-2023-275xx/CVE-2023-27559.json) (`2023-05-05T19:40:43.037`)
* [CVE-2023-28613](CVE-2023/CVE-2023-286xx/CVE-2023-28613.json) (`2023-05-05T19:15:15.513`)
* [CVE-2023-29471](CVE-2023/CVE-2023-294xx/CVE-2023-29471.json) (`2023-05-05T18:11:57.897`)
* [CVE-2023-29489](CVE-2023/CVE-2023-294xx/CVE-2023-29489.json) (`2023-05-05T18:12:20.760`)
* [CVE-2023-29579](CVE-2023/CVE-2023-295xx/CVE-2023-29579.json) (`2023-05-05T18:04:17.810`)
* [CVE-2023-29582](CVE-2023/CVE-2023-295xx/CVE-2023-29582.json) (`2023-05-05T18:04:22.130`)
* [CVE-2023-29583](CVE-2023/CVE-2023-295xx/CVE-2023-29583.json) (`2023-05-05T18:04:31.307`)
* [CVE-2023-30123](CVE-2023/CVE-2023-301xx/CVE-2023-30123.json) (`2023-05-05T18:06:27.517`)
* [CVE-2021-23166](CVE-2021/CVE-2021-231xx/CVE-2021-23166.json) (`2023-05-05T21:15:09.073`)
* [CVE-2021-23176](CVE-2021/CVE-2021-231xx/CVE-2021-23176.json) (`2023-05-05T21:15:09.163`)
* [CVE-2021-23178](CVE-2021/CVE-2021-231xx/CVE-2021-23178.json) (`2023-05-05T21:15:09.250`)
* [CVE-2021-23186](CVE-2021/CVE-2021-231xx/CVE-2021-23186.json) (`2023-05-05T21:15:09.327`)
* [CVE-2021-23203](CVE-2021/CVE-2021-232xx/CVE-2021-23203.json) (`2023-05-05T21:15:09.403`)
* [CVE-2021-26263](CVE-2021/CVE-2021-262xx/CVE-2021-26263.json) (`2023-05-05T21:15:09.480`)
* [CVE-2021-26947](CVE-2021/CVE-2021-269xx/CVE-2021-26947.json) (`2023-05-05T21:15:09.553`)
* [CVE-2021-44476](CVE-2021/CVE-2021-444xx/CVE-2021-44476.json) (`2023-05-05T21:15:09.640`)
* [CVE-2021-44775](CVE-2021/CVE-2021-447xx/CVE-2021-44775.json) (`2023-05-05T21:15:09.700`)
* [CVE-2021-45071](CVE-2021/CVE-2021-450xx/CVE-2021-45071.json) (`2023-05-05T21:15:09.773`)
* [CVE-2021-45111](CVE-2021/CVE-2021-451xx/CVE-2021-45111.json) (`2023-05-05T21:15:09.837`)
* [CVE-2022-3116](CVE-2022/CVE-2022-31xx/CVE-2022-3116.json) (`2023-05-05T20:15:09.373`)
* [CVE-2022-3294](CVE-2022/CVE-2022-32xx/CVE-2022-3294.json) (`2023-05-05T20:15:09.607`)
* [CVE-2022-43042](CVE-2022/CVE-2022-430xx/CVE-2022-43042.json) (`2023-05-05T20:04:36.790`)
* [CVE-2022-43043](CVE-2022/CVE-2022-430xx/CVE-2022-43043.json) (`2023-05-05T20:04:23.743`)
* [CVE-2022-43044](CVE-2022/CVE-2022-430xx/CVE-2022-43044.json) (`2023-05-05T20:03:46.190`)
* [CVE-2022-43045](CVE-2022/CVE-2022-430xx/CVE-2022-43045.json) (`2023-05-05T20:04:05.043`)
* [CVE-2022-43254](CVE-2022/CVE-2022-432xx/CVE-2022-43254.json) (`2023-05-05T20:03:18.970`)
* [CVE-2022-43255](CVE-2022/CVE-2022-432xx/CVE-2022-43255.json) (`2023-05-05T20:02:31.100`)
* [CVE-2022-45204](CVE-2022/CVE-2022-452xx/CVE-2022-45204.json) (`2023-05-05T20:00:30.043`)
* [CVE-2022-45876](CVE-2022/CVE-2022-458xx/CVE-2022-45876.json) (`2023-05-05T20:13:57.563`)
* [CVE-2022-48423](CVE-2022/CVE-2022-484xx/CVE-2022-48423.json) (`2023-05-05T20:15:09.720`)
* [CVE-2022-48424](CVE-2022/CVE-2022-484xx/CVE-2022-48424.json) (`2023-05-05T20:15:09.813`)
* [CVE-2023-1078](CVE-2023/CVE-2023-10xx/CVE-2023-1078.json) (`2023-05-05T20:15:09.880`)
* [CVE-2023-1252](CVE-2023/CVE-2023-12xx/CVE-2023-1252.json) (`2023-05-05T20:15:09.963`)
* [CVE-2023-20860](CVE-2023/CVE-2023-208xx/CVE-2023-20860.json) (`2023-05-05T20:15:10.053`)
* [CVE-2023-22901](CVE-2023/CVE-2023-229xx/CVE-2023-22901.json) (`2023-05-05T20:55:52.987`)
* [CVE-2023-24999](CVE-2023/CVE-2023-249xx/CVE-2023-24999.json) (`2023-05-05T20:15:10.137`)
* [CVE-2023-25292](CVE-2023/CVE-2023-252xx/CVE-2023-25292.json) (`2023-05-05T20:18:47.160`)
* [CVE-2023-26464](CVE-2023/CVE-2023-264xx/CVE-2023-26464.json) (`2023-05-05T20:15:10.253`)
* [CVE-2023-26604](CVE-2023/CVE-2023-266xx/CVE-2023-26604.json) (`2023-05-05T20:15:10.477`)
* [CVE-2023-28008](CVE-2023/CVE-2023-280xx/CVE-2023-28008.json) (`2023-05-05T20:28:08.970`)
* [CVE-2023-28009](CVE-2023/CVE-2023-280xx/CVE-2023-28009.json) (`2023-05-05T20:24:14.757`)
* [CVE-2023-28697](CVE-2023/CVE-2023-286xx/CVE-2023-28697.json) (`2023-05-05T20:47:35.427`)
* [CVE-2023-29596](CVE-2023/CVE-2023-295xx/CVE-2023-29596.json) (`2023-05-05T20:08:01.820`)
* [CVE-2023-30846](CVE-2023/CVE-2023-308xx/CVE-2023-30846.json) (`2023-05-05T20:36:25.807`)
## Download and Usage