From 572d23d7803c053466ff2ee3e2cb5f48db77b41f Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ren=C3=A9=20Helmke?= Date: Fri, 5 May 2023 23:55:28 +0200 Subject: [PATCH] Auto-Update: 2023-05-05T21:55:24.917263+00:00 --- CVE-2021/CVE-2021-231xx/CVE-2021-23166.json | 8 +- CVE-2021/CVE-2021-231xx/CVE-2021-23176.json | 8 +- CVE-2021/CVE-2021-231xx/CVE-2021-23178.json | 8 +- CVE-2021/CVE-2021-231xx/CVE-2021-23186.json | 8 +- CVE-2021/CVE-2021-232xx/CVE-2021-23203.json | 8 +- CVE-2021/CVE-2021-262xx/CVE-2021-26263.json | 8 +- CVE-2021/CVE-2021-269xx/CVE-2021-26947.json | 8 +- CVE-2021/CVE-2021-444xx/CVE-2021-44476.json | 8 +- CVE-2021/CVE-2021-447xx/CVE-2021-44775.json | 8 +- CVE-2021/CVE-2021-450xx/CVE-2021-45071.json | 8 +- CVE-2021/CVE-2021-451xx/CVE-2021-45111.json | 8 +- CVE-2022/CVE-2022-31xx/CVE-2022-3116.json | 8 +- CVE-2022/CVE-2022-32xx/CVE-2022-3294.json | 8 +- CVE-2022/CVE-2022-430xx/CVE-2022-43042.json | 7 +- CVE-2022/CVE-2022-430xx/CVE-2022-43043.json | 8 +- CVE-2022/CVE-2022-430xx/CVE-2022-43044.json | 8 +- CVE-2022/CVE-2022-430xx/CVE-2022-43045.json | 8 +- CVE-2022/CVE-2022-432xx/CVE-2022-43254.json | 7 +- CVE-2022/CVE-2022-432xx/CVE-2022-43255.json | 7 +- CVE-2022/CVE-2022-452xx/CVE-2022-45204.json | 7 +- CVE-2022/CVE-2022-458xx/CVE-2022-45876.json | 101 ++++++++++++ CVE-2022/CVE-2022-484xx/CVE-2022-48423.json | 8 +- CVE-2022/CVE-2022-484xx/CVE-2022-48424.json | 8 +- CVE-2023/CVE-2023-10xx/CVE-2023-1078.json | 6 +- CVE-2023/CVE-2023-12xx/CVE-2023-1252.json | 8 +- CVE-2023/CVE-2023-208xx/CVE-2023-20860.json | 8 +- CVE-2023/CVE-2023-229xx/CVE-2023-22901.json | 76 ++++++++++ CVE-2023/CVE-2023-249xx/CVE-2023-24999.json | 8 +- CVE-2023/CVE-2023-252xx/CVE-2023-25292.json | 91 +++++++++++ CVE-2023/CVE-2023-25xx/CVE-2023-2550.json | 59 ++++++++ CVE-2023/CVE-2023-25xx/CVE-2023-2551.json | 59 ++++++++ CVE-2023/CVE-2023-25xx/CVE-2023-2552.json | 59 ++++++++ CVE-2023/CVE-2023-25xx/CVE-2023-2553.json | 59 ++++++++ CVE-2023/CVE-2023-25xx/CVE-2023-2554.json | 59 ++++++++ CVE-2023/CVE-2023-264xx/CVE-2023-26464.json | 6 +- CVE-2023/CVE-2023-266xx/CVE-2023-26604.json | 6 +- CVE-2023/CVE-2023-280xx/CVE-2023-28008.json | 160 ++++++++++++++++++++ CVE-2023/CVE-2023-280xx/CVE-2023-28009.json | 160 ++++++++++++++++++++ CVE-2023/CVE-2023-286xx/CVE-2023-28697.json | 94 ++++++++++++ CVE-2023/CVE-2023-295xx/CVE-2023-29596.json | 77 ++++++++++ CVE-2023/CVE-2023-308xx/CVE-2023-30846.json | 52 ++++++- README.md | 143 ++++++----------- 42 files changed, 1302 insertions(+), 161 deletions(-) create mode 100644 CVE-2022/CVE-2022-458xx/CVE-2022-45876.json create mode 100644 CVE-2023/CVE-2023-229xx/CVE-2023-22901.json create mode 100644 CVE-2023/CVE-2023-252xx/CVE-2023-25292.json create mode 100644 CVE-2023/CVE-2023-25xx/CVE-2023-2550.json create mode 100644 CVE-2023/CVE-2023-25xx/CVE-2023-2551.json create mode 100644 CVE-2023/CVE-2023-25xx/CVE-2023-2552.json create mode 100644 CVE-2023/CVE-2023-25xx/CVE-2023-2553.json create mode 100644 CVE-2023/CVE-2023-25xx/CVE-2023-2554.json create mode 100644 CVE-2023/CVE-2023-280xx/CVE-2023-28008.json create mode 100644 CVE-2023/CVE-2023-280xx/CVE-2023-28009.json create mode 100644 CVE-2023/CVE-2023-286xx/CVE-2023-28697.json create mode 100644 CVE-2023/CVE-2023-295xx/CVE-2023-29596.json diff --git a/CVE-2021/CVE-2021-231xx/CVE-2021-23166.json b/CVE-2021/CVE-2021-231xx/CVE-2021-23166.json index 0de1e1829be..179494849f6 100644 --- a/CVE-2021/CVE-2021-231xx/CVE-2021-23166.json +++ b/CVE-2021/CVE-2021-231xx/CVE-2021-23166.json @@ -2,8 +2,8 @@ "id": "CVE-2021-23166", "sourceIdentifier": "security@odoo.com", "published": "2023-04-25T19:15:09.140", - "lastModified": "2023-05-03T14:38:22.883", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T21:15:09.073", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5399", + "source": "security@odoo.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-231xx/CVE-2021-23176.json b/CVE-2021/CVE-2021-231xx/CVE-2021-23176.json index 49f7fd6a50c..df0c2c3625f 100644 --- a/CVE-2021/CVE-2021-231xx/CVE-2021-23176.json +++ b/CVE-2021/CVE-2021-231xx/CVE-2021-23176.json @@ -2,8 +2,8 @@ "id": "CVE-2021-23176", "sourceIdentifier": "security@odoo.com", "published": "2023-04-25T19:15:09.220", - "lastModified": "2023-05-03T14:28:25.537", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T21:15:09.163", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -102,6 +102,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5399", + "source": "security@odoo.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-231xx/CVE-2021-23178.json b/CVE-2021/CVE-2021-231xx/CVE-2021-23178.json index c2b05c99654..82fb9384e91 100644 --- a/CVE-2021/CVE-2021-231xx/CVE-2021-23178.json +++ b/CVE-2021/CVE-2021-231xx/CVE-2021-23178.json @@ -2,8 +2,8 @@ "id": "CVE-2021-23178", "sourceIdentifier": "security@odoo.com", "published": "2023-04-25T19:15:09.283", - "lastModified": "2023-05-03T14:25:43.207", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T21:15:09.250", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5399", + "source": "security@odoo.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-231xx/CVE-2021-23186.json b/CVE-2021/CVE-2021-231xx/CVE-2021-23186.json index 9a85087af6f..66973b2d667 100644 --- a/CVE-2021/CVE-2021-231xx/CVE-2021-23186.json +++ b/CVE-2021/CVE-2021-231xx/CVE-2021-23186.json @@ -2,8 +2,8 @@ "id": "CVE-2021-23186", "sourceIdentifier": "security@odoo.com", "published": "2023-04-25T19:15:09.340", - "lastModified": "2023-05-02T20:21:22.287", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T21:15:09.327", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5399", + "source": "security@odoo.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-232xx/CVE-2021-23203.json b/CVE-2021/CVE-2021-232xx/CVE-2021-23203.json index c4fd2f2afd3..c382c8c754b 100644 --- a/CVE-2021/CVE-2021-232xx/CVE-2021-23203.json +++ b/CVE-2021/CVE-2021-232xx/CVE-2021-23203.json @@ -2,8 +2,8 @@ "id": "CVE-2021-23203", "sourceIdentifier": "security@odoo.com", "published": "2023-04-25T19:15:09.403", - "lastModified": "2023-05-02T20:06:15.217", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T21:15:09.403", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -107,6 +107,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5399", + "source": "security@odoo.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-262xx/CVE-2021-26263.json b/CVE-2021/CVE-2021-262xx/CVE-2021-26263.json index 1ecbf7aaa7f..ee79dc04867 100644 --- a/CVE-2021/CVE-2021-262xx/CVE-2021-26263.json +++ b/CVE-2021/CVE-2021-262xx/CVE-2021-26263.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26263", "sourceIdentifier": "security@odoo.com", "published": "2023-04-25T19:15:09.470", - "lastModified": "2023-05-02T19:53:14.293", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T21:15:09.480", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -109,6 +109,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5399", + "source": "security@odoo.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-269xx/CVE-2021-26947.json b/CVE-2021/CVE-2021-269xx/CVE-2021-26947.json index db77d8ff65e..efeb77cd936 100644 --- a/CVE-2021/CVE-2021-269xx/CVE-2021-26947.json +++ b/CVE-2021/CVE-2021-269xx/CVE-2021-26947.json @@ -2,8 +2,8 @@ "id": "CVE-2021-26947", "sourceIdentifier": "security@odoo.com", "published": "2023-04-25T19:15:09.530", - "lastModified": "2023-05-02T19:53:00.077", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T21:15:09.553", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5399", + "source": "security@odoo.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-444xx/CVE-2021-44476.json b/CVE-2021/CVE-2021-444xx/CVE-2021-44476.json index 9f678e65e5b..a08c443f7e9 100644 --- a/CVE-2021/CVE-2021-444xx/CVE-2021-44476.json +++ b/CVE-2021/CVE-2021-444xx/CVE-2021-44476.json @@ -2,8 +2,8 @@ "id": "CVE-2021-44476", "sourceIdentifier": "security@odoo.com", "published": "2023-04-25T19:15:09.783", - "lastModified": "2023-05-03T13:51:44.640", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T21:15:09.640", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5399", + "source": "security@odoo.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-447xx/CVE-2021-44775.json b/CVE-2021/CVE-2021-447xx/CVE-2021-44775.json index 64fc9b35878..a2df49a58a8 100644 --- a/CVE-2021/CVE-2021-447xx/CVE-2021-44775.json +++ b/CVE-2021/CVE-2021-447xx/CVE-2021-44775.json @@ -2,8 +2,8 @@ "id": "CVE-2021-44775", "sourceIdentifier": "security@odoo.com", "published": "2023-04-25T19:15:09.903", - "lastModified": "2023-05-02T20:26:24.113", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T21:15:09.700", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5399", + "source": "security@odoo.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-450xx/CVE-2021-45071.json b/CVE-2021/CVE-2021-450xx/CVE-2021-45071.json index 56e0100cd3a..df83ea852ff 100644 --- a/CVE-2021/CVE-2021-450xx/CVE-2021-45071.json +++ b/CVE-2021/CVE-2021-450xx/CVE-2021-45071.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45071", "sourceIdentifier": "security@odoo.com", "published": "2023-04-25T19:15:09.963", - "lastModified": "2023-05-02T20:26:15.753", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T21:15:09.773", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5399", + "source": "security@odoo.com" } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-451xx/CVE-2021-45111.json b/CVE-2021/CVE-2021-451xx/CVE-2021-45111.json index 619b33cc770..4edee9c3720 100644 --- a/CVE-2021/CVE-2021-451xx/CVE-2021-45111.json +++ b/CVE-2021/CVE-2021-451xx/CVE-2021-45111.json @@ -2,8 +2,8 @@ "id": "CVE-2021-45111", "sourceIdentifier": "security@odoo.com", "published": "2023-04-25T19:15:10.020", - "lastModified": "2023-05-03T13:47:27.200", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T21:15:09.837", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -101,6 +101,10 @@ "Patch", "Vendor Advisory" ] + }, + { + "url": "https://www.debian.org/security/2023/dsa-5399", + "source": "security@odoo.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-31xx/CVE-2022-3116.json b/CVE-2022/CVE-2022-31xx/CVE-2022-3116.json index 07cee498e2a..613e4fc91a8 100644 --- a/CVE-2022/CVE-2022-31xx/CVE-2022-3116.json +++ b/CVE-2022/CVE-2022-31xx/CVE-2022-3116.json @@ -2,8 +2,8 @@ "id": "CVE-2022-3116", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-27T22:15:11.987", - "lastModified": "2023-04-04T00:48:24.143", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T20:15:09.373", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -75,6 +75,10 @@ } ], "references": [ + { + "url": "https://security.netapp.com/advisory/ntap-20230505-0010/", + "source": "secalert@redhat.com" + }, { "url": "https://www.kb.cert.org/vuls/id/730793", "source": "secalert@redhat.com", diff --git a/CVE-2022/CVE-2022-32xx/CVE-2022-3294.json b/CVE-2022/CVE-2022-32xx/CVE-2022-3294.json index 25a4bf16c59..c176f55543f 100644 --- a/CVE-2022/CVE-2022-32xx/CVE-2022-3294.json +++ b/CVE-2022/CVE-2022-32xx/CVE-2022-3294.json @@ -2,8 +2,8 @@ "id": "CVE-2022-3294", "sourceIdentifier": "jordan@liggitt.net", "published": "2023-03-01T19:15:25.570", - "lastModified": "2023-03-09T00:58:24.407", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T20:15:09.607", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -131,6 +131,10 @@ "Mailing List", "Third Party Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230505-0007/", + "source": "jordan@liggitt.net" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-430xx/CVE-2022-43042.json b/CVE-2022/CVE-2022-430xx/CVE-2022-43042.json index 0d8bab914f4..ee9f0d1a15d 100644 --- a/CVE-2022/CVE-2022-430xx/CVE-2022-43042.json +++ b/CVE-2022/CVE-2022-430xx/CVE-2022-43042.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43042", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-19T14:15:10.227", - "lastModified": "2022-10-20T20:45:13.923", + "lastModified": "2023-05-05T20:04:36.790", "vulnStatus": "Analyzed", "descriptions": [ { @@ -59,8 +59,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*", - "matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B" + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C" } ] } diff --git a/CVE-2022/CVE-2022-430xx/CVE-2022-43043.json b/CVE-2022/CVE-2022-430xx/CVE-2022-43043.json index f8a64100369..5e943f4630d 100644 --- a/CVE-2022/CVE-2022-430xx/CVE-2022-43043.json +++ b/CVE-2022/CVE-2022-430xx/CVE-2022-43043.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43043", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-19T14:15:10.273", - "lastModified": "2022-10-20T20:45:25.573", + "lastModified": "2023-05-05T20:04:23.743", "vulnStatus": "Analyzed", "descriptions": [ { @@ -59,8 +59,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*", - "matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B" + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C" } ] } @@ -73,6 +74,7 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Issue Tracking", "Third Party Advisory" ] } diff --git a/CVE-2022/CVE-2022-430xx/CVE-2022-43044.json b/CVE-2022/CVE-2022-430xx/CVE-2022-43044.json index 55141361567..e07128e62e9 100644 --- a/CVE-2022/CVE-2022-430xx/CVE-2022-43044.json +++ b/CVE-2022/CVE-2022-430xx/CVE-2022-43044.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43044", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-19T14:15:10.317", - "lastModified": "2022-10-20T20:45:35.100", + "lastModified": "2023-05-05T20:03:46.190", "vulnStatus": "Analyzed", "descriptions": [ { @@ -59,8 +59,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*", - "matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B" + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C" } ] } @@ -73,6 +74,7 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Issue Tracking", "Third Party Advisory" ] } diff --git a/CVE-2022/CVE-2022-430xx/CVE-2022-43045.json b/CVE-2022/CVE-2022-430xx/CVE-2022-43045.json index a0d621f5bb1..3c966b9daca 100644 --- a/CVE-2022/CVE-2022-430xx/CVE-2022-43045.json +++ b/CVE-2022/CVE-2022-430xx/CVE-2022-43045.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43045", "sourceIdentifier": "cve@mitre.org", "published": "2022-10-19T14:15:10.357", - "lastModified": "2022-10-20T20:30:47.907", + "lastModified": "2023-05-05T20:04:05.043", "vulnStatus": "Analyzed", "descriptions": [ { @@ -59,8 +59,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*", - "matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B" + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C" } ] } @@ -73,6 +74,7 @@ "source": "cve@mitre.org", "tags": [ "Exploit", + "Issue Tracking", "Third Party Advisory" ] } diff --git a/CVE-2022/CVE-2022-432xx/CVE-2022-43254.json b/CVE-2022/CVE-2022-432xx/CVE-2022-43254.json index 82422ae9b52..d1d12de609f 100644 --- a/CVE-2022/CVE-2022-432xx/CVE-2022-43254.json +++ b/CVE-2022/CVE-2022-432xx/CVE-2022-43254.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43254", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-02T14:15:15.637", - "lastModified": "2022-11-04T02:02:42.150", + "lastModified": "2023-05-05T20:03:18.970", "vulnStatus": "Analyzed", "descriptions": [ { @@ -55,8 +55,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*", - "matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B" + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C" } ] } diff --git a/CVE-2022/CVE-2022-432xx/CVE-2022-43255.json b/CVE-2022/CVE-2022-432xx/CVE-2022-43255.json index 4047f498354..f83bdaaf8c8 100644 --- a/CVE-2022/CVE-2022-432xx/CVE-2022-43255.json +++ b/CVE-2022/CVE-2022-432xx/CVE-2022-43255.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43255", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-02T14:15:15.917", - "lastModified": "2022-11-04T02:04:49.390", + "lastModified": "2023-05-05T20:02:31.100", "vulnStatus": "Analyzed", "descriptions": [ { @@ -55,8 +55,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev368-gfd054169b-master:*:*:*:*:*:*:*", - "matchCriteriaId": "067978CE-DD7C-450D-9EB3-45790EE43C5B" + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C" } ] } diff --git a/CVE-2022/CVE-2022-452xx/CVE-2022-45204.json b/CVE-2022/CVE-2022-452xx/CVE-2022-45204.json index 91bfca2d73d..04e572617e4 100644 --- a/CVE-2022/CVE-2022-452xx/CVE-2022-45204.json +++ b/CVE-2022/CVE-2022-452xx/CVE-2022-45204.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45204", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-29T04:15:11.253", - "lastModified": "2022-12-01T21:18:35.433", + "lastModified": "2023-05-05T20:00:30.043", "vulnStatus": "Analyzed", "descriptions": [ { @@ -55,8 +55,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:gpac:gpac:2.1-dev-rev428-gcb8ae46c8-master:*:*:*:*:*:*:*", - "matchCriteriaId": "1B99DAA3-219F-4E47-B284-CAFC786A9F78" + "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.2.0", + "matchCriteriaId": "B4D3D58A-C3C9-4441-A84A-FB91FD19985C" } ] } diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45876.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45876.json new file mode 100644 index 00000000000..7c4abca7f3a --- /dev/null +++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45876.json @@ -0,0 +1,101 @@ +{ + "id": "CVE-2022-45876", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2023-04-26T22:15:08.737", + "lastModified": "2023-05-05T20:13:57.563", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.\n\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + }, + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:visam:vbase:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.7.5", + "matchCriteriaId": "66698568-7086-4708-B7C9-69AAAA8104DC" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-080-05", + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://www.vbase.net/en/download.php", + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Product" + ] + }, + { + "url": "https://www.visam.com/kontakt.php", + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Product" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48423.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48423.json index 45bb1276278..a1b90c8dc50 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48423.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48423.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48423", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-19T03:15:11.087", - "lastModified": "2023-03-24T16:31:10.497", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T20:15:09.720", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -80,6 +80,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230505-0003/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-484xx/CVE-2022-48424.json b/CVE-2022/CVE-2022-484xx/CVE-2022-48424.json index 6cd17cf56ce..d533ae81108 100644 --- a/CVE-2022/CVE-2022-484xx/CVE-2022-48424.json +++ b/CVE-2022/CVE-2022-484xx/CVE-2022-48424.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48424", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-19T03:15:11.560", - "lastModified": "2023-03-24T14:24:27.943", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T20:15:09.813", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -80,6 +80,10 @@ "tags": [ "Patch" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230505-0002/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1078.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1078.json index d3af47d8621..259dbbb753f 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1078.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1078.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1078", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-27T21:15:10.520", - "lastModified": "2023-05-03T14:15:19.747", + "lastModified": "2023-05-05T20:15:09.880", "vulnStatus": "Modified", "descriptions": [ { @@ -89,6 +89,10 @@ { "url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html", "source": "secalert@redhat.com" + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230505-0004/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-12xx/CVE-2023-1252.json b/CVE-2023/CVE-2023-12xx/CVE-2023-1252.json index 786e8cfa8b7..8ec2fa1124d 100644 --- a/CVE-2023/CVE-2023-12xx/CVE-2023-1252.json +++ b/CVE-2023/CVE-2023-12xx/CVE-2023-1252.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1252", "sourceIdentifier": "secalert@redhat.com", "published": "2023-03-23T21:15:19.287", - "lastModified": "2023-03-28T14:55:18.547", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T20:15:09.963", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -82,6 +82,10 @@ "Mailing List", "Patch" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230505-0005/", + "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20860.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20860.json index 66e07fb4dce..ab9dd65d298 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20860.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20860.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20860", "sourceIdentifier": "security@vmware.com", "published": "2023-03-27T22:15:21.603", - "lastModified": "2023-04-03T18:20:16.453", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T20:15:10.053", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -73,6 +73,10 @@ } ], "references": [ + { + "url": "https://security.netapp.com/advisory/ntap-20230505-0006/", + "source": "security@vmware.com" + }, { "url": "https://spring.io/security/cve-2023-20860", "source": "security@vmware.com", diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22901.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22901.json new file mode 100644 index 00000000000..2b8bc10dfd1 --- /dev/null +++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22901.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2023-22901", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2023-04-27T02:15:09.177", + "lastModified": "2023-05-05T20:55:52.987", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "ChangingTec MOTP system has a path traversal vulnerability. A remote attacker with administrator\u2019s privilege can exploit this vulnerability to access arbitrary system files." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:changingtec:mobile_one_time_password:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.11", + "matchCriteriaId": "190C050E-7CCE-49EB-9D4F-3168743E0BF3" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/tw/cp-132-7022-2cbe0-1.html", + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24999.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24999.json index 1cce2117832..0bdab56dbd4 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24999.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24999.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24999", "sourceIdentifier": "security@hashicorp.com", "published": "2023-03-11T00:15:09.410", - "lastModified": "2023-03-16T17:03:07.880", - "vulnStatus": "Analyzed", + "lastModified": "2023-05-05T20:15:10.137", + "vulnStatus": "Modified", "descriptions": [ { "lang": "en", @@ -135,6 +135,10 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230505-0001/", + "source": "security@hashicorp.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25292.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25292.json new file mode 100644 index 00000000000..3ad7ef25a26 --- /dev/null +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25292.json @@ -0,0 +1,91 @@ +{ + "id": "CVE-2023-25292", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-04-27T01:15:08.283", + "lastModified": "2023-05-05T20:18:47.160", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "Reflected Cross Site Scripting (XSS) in Intermesh BV Group-Office version 6.6.145, allows attackers to gain escalated privileges and gain sensitive information via the GO_LANGUAGE cookie." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:group-office:group_office:6.6.145:*:*:*:*:*:*:*", + "matchCriteriaId": "A0AF3C8D-6B49-4999-B2AA-5918CEC3ADC3" + } + ] + } + ] + } + ], + "references": [ + { + "url": "http://group-office.com", + "source": "cve@mitre.org", + "tags": [ + "Product" + ] + }, + { + "url": "http://intermesh.com", + "source": "cve@mitre.org", + "tags": [ + "Broken Link", + "Not Applicable" + ] + }, + { + "url": "https://github.com/brainkok/CVE-2023-25292", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2550.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2550.json new file mode 100644 index 00000000000..bf52498f35f --- /dev/null +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2550.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-2550", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-05-05T20:15:10.557", + "lastModified": "2023-05-05T20:15:10.557", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-site Scripting (XSS) - Stored in GitHub repository thorsten/phpmyfaq prior to 3.1.13." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/thorsten/phpmyfaq/commit/20ac51594db11604a4518aacc28a51f67d4f11bf", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/840c8d91-c97e-4116-a9f8-4ab1a38d239b", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2551.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2551.json new file mode 100644 index 00000000000..283a651d9a5 --- /dev/null +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2551.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-2551", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-05-05T20:15:10.627", + "lastModified": "2023-05-05T20:15:10.627", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "PHP Remote File Inclusion in GitHub repository unilogies/bumsys prior to 2.1.1." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/5723613c-55c6-4f18-9ed3-61ad44f5de9c", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2552.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2552.json new file mode 100644 index 00000000000..691a26fa2a6 --- /dev/null +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2552.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-2552", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-05-05T20:15:10.713", + "lastModified": "2023-05-05T20:15:10.713", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) in GitHub repository unilogies/bumsys prior to 2.1.1." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/unilogies/bumsys/commit/86e29dd23df348ec6075f0c0de8e06b8d9fb0a9a", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/ab0b4655-f57a-4113-849b-2237eeb75b32", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2553.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2553.json new file mode 100644 index 00000000000..07ecf9c2995 --- /dev/null +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2553.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-2553", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-05-05T20:15:10.803", + "lastModified": "2023-05-05T20:15:10.803", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "Cross-site Scripting (XSS) - Stored in GitHub repository unilogies/bumsys prior to 2.2.0." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/4e1f5b56-e846-40d8-a83c-533efd56aacf", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2554.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2554.json new file mode 100644 index 00000000000..7b10b36e6e2 --- /dev/null +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2554.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-2554", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-05-05T20:15:10.877", + "lastModified": "2023-05-05T20:15:10.877", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "External Control of File Name or Path in GitHub repository unilogies/bumsys prior to 2.2.0." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/unilogies/bumsys/commit/1b426f58a513194206d0ea8ab58baf1461e54978", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/396785a0-7bb6-4db4-b4cb-607b0fd4ab4b", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-264xx/CVE-2023-26464.json b/CVE-2023/CVE-2023-264xx/CVE-2023-26464.json index 97750621052..69f01bf478c 100644 --- a/CVE-2023/CVE-2023-264xx/CVE-2023-26464.json +++ b/CVE-2023/CVE-2023-264xx/CVE-2023-26464.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26464", "sourceIdentifier": "security@apache.org", "published": "2023-03-10T14:15:10.453", - "lastModified": "2023-04-20T08:15:06.970", + "lastModified": "2023-05-05T20:15:10.253", "vulnStatus": "Modified", "descriptions": [ { @@ -82,6 +82,10 @@ "tags": [ "Mailing List" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230505-0008/", + "source": "security@apache.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-266xx/CVE-2023-26604.json b/CVE-2023/CVE-2023-266xx/CVE-2023-26604.json index 4f5e91659a9..dbf4ef73dc2 100644 --- a/CVE-2023/CVE-2023-266xx/CVE-2023-26604.json +++ b/CVE-2023/CVE-2023-266xx/CVE-2023-26604.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26604", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-03T16:15:10.607", - "lastModified": "2023-03-31T23:15:07.320", + "lastModified": "2023-05-05T20:15:10.477", "vulnStatus": "Modified", "descriptions": [ { @@ -91,6 +91,10 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://security.netapp.com/advisory/ntap-20230505-0009/", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-280xx/CVE-2023-28008.json b/CVE-2023/CVE-2023-280xx/CVE-2023-28008.json new file mode 100644 index 00000000000..198fdcebb80 --- /dev/null +++ b/CVE-2023/CVE-2023-280xx/CVE-2023-28008.json @@ -0,0 +1,160 @@ +{ + "id": "CVE-2023-28008", + "sourceIdentifier": "psirt@hcl.com", + "published": "2023-04-26T20:15:10.000", + "lastModified": "2023-05-05T20:28:08.970", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "HCL Workload Automation 9.4, 9.5, and 10.1 are vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + }, + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "CA6DCFCA-DADD-4C0A-83C0-EF04662D3336" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "920EC080-63D0-4280-8553-9D94E6109864" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "FF9AA9A1-7D68-469D-BD78-3A89660E4670" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "BEE9D4C8-988A-49DA-BA64-BE30FBF792B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "8B7A9E28-F984-4319-8FF9-9FC05956BF56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "7D6D1F27-AFB0-41D3-B7B3-2CBEA1BA2F51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A8C0B3D9-9382-4184-830A-6CBFD65A6607" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "A5537FD3-5D22-493F-93CD-03D363F7ECE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "DE0E395E-4C04-4D25-8A91-6A6570060C39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "6D9EEC0B-7AA6-4CAB-BF48-70227724E3AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "00D7C273-9FCB-4AE3-BF02-51DC2B57A460" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "560A2BF4-AE58-4847-B2C0-47A9CC79D760" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "5F3BA39B-8216-47D7-873E-55DD1F681360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:10.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "8027DF38-47A2-49E7-AEEB-35BFA0759B74" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0104371", + "source": "psirt@hcl.com", + "tags": [ + "Vendor Advisory" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-280xx/CVE-2023-28009.json b/CVE-2023/CVE-2023-280xx/CVE-2023-28009.json new file mode 100644 index 00000000000..db0f6adeec3 --- /dev/null +++ b/CVE-2023/CVE-2023-280xx/CVE-2023-28009.json @@ -0,0 +1,160 @@ +{ + "id": "CVE-2023-28009", + "sourceIdentifier": "psirt@hcl.com", + "published": "2023-04-26T20:15:10.080", + "lastModified": "2023-05-05T20:24:14.757", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "HCL Workload Automation is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources.\n" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + }, + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "CA6DCFCA-DADD-4C0A-83C0-EF04662D3336" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "920EC080-63D0-4280-8553-9D94E6109864" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "FF9AA9A1-7D68-469D-BD78-3A89660E4670" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "BEE9D4C8-988A-49DA-BA64-BE30FBF792B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "8B7A9E28-F984-4319-8FF9-9FC05956BF56" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.4.0:fix_pack_7:*:*:*:*:*:*", + "matchCriteriaId": "7D6D1F27-AFB0-41D3-B7B3-2CBEA1BA2F51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A8C0B3D9-9382-4184-830A-6CBFD65A6607" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_1:*:*:*:*:*:*", + "matchCriteriaId": "A5537FD3-5D22-493F-93CD-03D363F7ECE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_2:*:*:*:*:*:*", + "matchCriteriaId": "DE0E395E-4C04-4D25-8A91-6A6570060C39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_3:*:*:*:*:*:*", + "matchCriteriaId": "6D9EEC0B-7AA6-4CAB-BF48-70227724E3AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_4:*:*:*:*:*:*", + "matchCriteriaId": "00D7C273-9FCB-4AE3-BF02-51DC2B57A460" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_5:*:*:*:*:*:*", + "matchCriteriaId": "560A2BF4-AE58-4847-B2C0-47A9CC79D760" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:9.5.0:fix_pack_6:*:*:*:*:*:*", + "matchCriteriaId": "5F3BA39B-8216-47D7-873E-55DD1F681360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:workload_automation:10.1.0:-:*:*:*:*:*:*", + "matchCriteriaId": "8027DF38-47A2-49E7-AEEB-35BFA0759B74" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0104371", + "source": "psirt@hcl.com", + "tags": [ + "Vendor Advisory" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28697.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28697.json new file mode 100644 index 00000000000..32590220273 --- /dev/null +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28697.json @@ -0,0 +1,94 @@ +{ + "id": "CVE-2023-28697", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2023-04-27T02:15:09.313", + "lastModified": "2023-05-05T20:47:35.427", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "Moxa MiiNePort E1 has a vulnerability of insufficient access control. An unauthenticated remote user can exploit this vulnerability to perform arbitrary system operation or disrupt service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:moxa:miineport_e1_firmware:1.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D757A5B5-4CE5-4C69-912A-B0D5525450F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:moxa:miineport_e1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "08E72C6A-A107-4EB6-9692-C769DE9EEA17" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://cdn-cms.azureedge.net/Moxa/media/PDIM/S100000223/MiiNePort%20E1%20Series_moxa-miineport-e1-series-firmware-v1.9.rom_Software%20Release%20History.pdf", + "source": "twcert@cert.org.tw", + "tags": [ + "Release Notes" + ] + }, + { + "url": "https://www.twcert.org.tw/tw/cp-132-7021-eb43a-1.html", + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-295xx/CVE-2023-29596.json b/CVE-2023/CVE-2023-295xx/CVE-2023-29596.json new file mode 100644 index 00000000000..8b41379c7a4 --- /dev/null +++ b/CVE-2023/CVE-2023-295xx/CVE-2023-29596.json @@ -0,0 +1,77 @@ +{ + "id": "CVE-2023-29596", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-04-26T20:15:10.170", + "lastModified": "2023-05-05T20:08:01.820", + "vulnStatus": "Analyzed", + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability found in ByronKnoll Cmix v.19 allows an attacker to execute arbitrary code and cause a denial of service via the paq8 function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cmix_project:cmix:19:*:*:*:*:*:*:*", + "matchCriteriaId": "F402AF3A-5B5C-434B-A8F5-0AC76894C1D6" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://github.com/byronknoll/cmix/issues/54", + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-308xx/CVE-2023-30846.json b/CVE-2023/CVE-2023-308xx/CVE-2023-30846.json index 5f4bc47498b..97121de6d11 100644 --- a/CVE-2023/CVE-2023-308xx/CVE-2023-30846.json +++ b/CVE-2023/CVE-2023-308xx/CVE-2023-30846.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30846", "sourceIdentifier": "security-advisories@github.com", "published": "2023-04-26T21:15:09.380", - "lastModified": "2023-04-26T21:15:09.380", - "vulnStatus": "Received", + "lastModified": "2023-05-05T20:36:25.807", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -46,14 +66,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:typed-rest-client:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "1.8.0", + "matchCriteriaId": "FA141551-3739-4DE0-9840-90B89AB8E1AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/microsoft/typed-rest-client/commit/f9ff755631b982ee1303dfc3e3c823d0d31233e8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/microsoft/typed-rest-client/security/advisories/GHSA-558p-m34m-vpmq", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index cd1894632ec..bbd38896a11 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-05T20:00:25.295977+00:00 +2023-05-05T21:55:24.917263+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-05T19:58:27.320000+00:00 +2023-05-05T21:15:09.837000+00:00 ``` ### Last Data Feed Release @@ -29,111 +29,60 @@ Download and Changelog: [Click](releases/latest) ### Total Number of included CVEs ```plain -214165 +214170 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `5` -* [CVE-2020-4914](CVE-2020/CVE-2020-49xx/CVE-2020-4914.json) (`2023-05-05T19:15:15.027`) -* [CVE-2022-43866](CVE-2022/CVE-2022-438xx/CVE-2022-43866.json) (`2023-05-05T19:15:15.157`) -* [CVE-2023-2427](CVE-2023/CVE-2023-24xx/CVE-2023-2427.json) (`2023-05-05T19:15:15.687`) -* [CVE-2023-2516](CVE-2023/CVE-2023-25xx/CVE-2023-2516.json) (`2023-05-05T19:15:15.763`) +* [CVE-2023-2550](CVE-2023/CVE-2023-25xx/CVE-2023-2550.json) (`2023-05-05T20:15:10.557`) +* [CVE-2023-2551](CVE-2023/CVE-2023-25xx/CVE-2023-2551.json) (`2023-05-05T20:15:10.627`) +* [CVE-2023-2552](CVE-2023/CVE-2023-25xx/CVE-2023-2552.json) (`2023-05-05T20:15:10.713`) +* [CVE-2023-2553](CVE-2023/CVE-2023-25xx/CVE-2023-2553.json) (`2023-05-05T20:15:10.803`) +* [CVE-2023-2554](CVE-2023/CVE-2023-25xx/CVE-2023-2554.json) (`2023-05-05T20:15:10.877`) ### CVEs modified in the last Commit -Recently modified CVEs: `88` +Recently modified CVEs: `36` -* [CVE-2020-21643](CVE-2020/CVE-2020-216xx/CVE-2020-21643.json) (`2023-05-05T18:18:58.807`) -* [CVE-2020-23647](CVE-2020/CVE-2020-236xx/CVE-2020-23647.json) (`2023-05-05T18:23:40.227`) -* [CVE-2020-23930](CVE-2020/CVE-2020-239xx/CVE-2020-23930.json) (`2023-05-05T19:45:30.473`) -* [CVE-2020-2978](CVE-2020/CVE-2020-29xx/CVE-2020-2978.json) (`2023-05-05T19:15:14.877`) -* [CVE-2021-32269](CVE-2021/CVE-2021-322xx/CVE-2021-32269.json) (`2023-05-05T19:45:33.843`) -* [CVE-2021-32270](CVE-2021/CVE-2021-322xx/CVE-2021-32270.json) (`2023-05-05T19:44:14.497`) -* [CVE-2021-32271](CVE-2021/CVE-2021-322xx/CVE-2021-32271.json) (`2023-05-05T19:44:22.500`) -* [CVE-2022-25091](CVE-2022/CVE-2022-250xx/CVE-2022-25091.json) (`2023-05-05T18:09:25.867`) -* [CVE-2022-25276](CVE-2022/CVE-2022-252xx/CVE-2022-25276.json) (`2023-05-05T19:26:17.550`) -* [CVE-2022-27146](CVE-2022/CVE-2022-271xx/CVE-2022-27146.json) (`2023-05-05T19:44:29.047`) -* [CVE-2022-27147](CVE-2022/CVE-2022-271xx/CVE-2022-27147.json) (`2023-05-05T19:41:18.380`) -* [CVE-2022-27148](CVE-2022/CVE-2022-271xx/CVE-2022-27148.json) (`2023-05-05T19:41:23.447`) -* [CVE-2022-36190](CVE-2022/CVE-2022-361xx/CVE-2022-36190.json) (`2023-05-05T19:41:29.807`) -* [CVE-2022-36191](CVE-2022/CVE-2022-361xx/CVE-2022-36191.json) (`2023-05-05T19:44:35.683`) -* [CVE-2022-38530](CVE-2022/CVE-2022-385xx/CVE-2022-38530.json) (`2023-05-05T19:41:13.080`) -* [CVE-2022-38583](CVE-2022/CVE-2022-385xx/CVE-2022-38583.json) (`2023-05-05T18:00:52.370`) -* [CVE-2022-3957](CVE-2022/CVE-2022-39xx/CVE-2022-3957.json) (`2023-05-05T19:45:44.160`) -* [CVE-2022-41397](CVE-2022/CVE-2022-413xx/CVE-2022-41397.json) (`2023-05-05T18:01:24.683`) -* [CVE-2022-41398](CVE-2022/CVE-2022-413xx/CVE-2022-41398.json) (`2023-05-05T18:02:07.837`) -* [CVE-2022-41399](CVE-2022/CVE-2022-413xx/CVE-2022-41399.json) (`2023-05-05T18:02:32.277`) -* [CVE-2022-41400](CVE-2022/CVE-2022-414xx/CVE-2022-41400.json) (`2023-05-05T18:03:05.717`) -* [CVE-2022-43039](CVE-2022/CVE-2022-430xx/CVE-2022-43039.json) (`2023-05-05T19:58:27.320`) -* [CVE-2022-43040](CVE-2022/CVE-2022-430xx/CVE-2022-43040.json) (`2023-05-05T19:41:54.217`) -* [CVE-2022-45343](CVE-2022/CVE-2022-453xx/CVE-2022-45343.json) (`2023-05-05T19:44:42.427`) -* [CVE-2022-46489](CVE-2022/CVE-2022-464xx/CVE-2022-46489.json) (`2023-05-05T19:42:28.817`) -* [CVE-2022-46490](CVE-2022/CVE-2022-464xx/CVE-2022-46490.json) (`2023-05-05T19:44:22.603`) -* [CVE-2022-47086](CVE-2022/CVE-2022-470xx/CVE-2022-47086.json) (`2023-05-05T19:45:24.277`) -* [CVE-2022-47087](CVE-2022/CVE-2022-470xx/CVE-2022-47087.json) (`2023-05-05T19:47:14.690`) -* [CVE-2022-47088](CVE-2022/CVE-2022-470xx/CVE-2022-47088.json) (`2023-05-05T19:57:17.957`) -* [CVE-2022-47089](CVE-2022/CVE-2022-470xx/CVE-2022-47089.json) (`2023-05-05T19:54:20.850`) -* [CVE-2022-47091](CVE-2022/CVE-2022-470xx/CVE-2022-47091.json) (`2023-05-05T19:50:47.057`) -* [CVE-2022-47092](CVE-2022/CVE-2022-470xx/CVE-2022-47092.json) (`2023-05-05T19:40:22.817`) -* [CVE-2022-47093](CVE-2022/CVE-2022-470xx/CVE-2022-47093.json) (`2023-05-05T19:51:18.837`) -* [CVE-2022-47094](CVE-2022/CVE-2022-470xx/CVE-2022-47094.json) (`2023-05-05T19:40:26.283`) -* [CVE-2022-47095](CVE-2022/CVE-2022-470xx/CVE-2022-47095.json) (`2023-05-05T19:40:30.743`) -* [CVE-2022-47653](CVE-2022/CVE-2022-476xx/CVE-2022-47653.json) (`2023-05-05T19:40:35.637`) -* [CVE-2022-47654](CVE-2022/CVE-2022-476xx/CVE-2022-47654.json) (`2023-05-05T19:40:45.267`) -* [CVE-2022-47656](CVE-2022/CVE-2022-476xx/CVE-2022-47656.json) (`2023-05-05T19:37:58.330`) -* [CVE-2022-47657](CVE-2022/CVE-2022-476xx/CVE-2022-47657.json) (`2023-05-05T19:38:05.143`) -* [CVE-2022-47658](CVE-2022/CVE-2022-476xx/CVE-2022-47658.json) (`2023-05-05T19:38:12.117`) -* [CVE-2022-47659](CVE-2022/CVE-2022-476xx/CVE-2022-47659.json) (`2023-05-05T19:39:01.907`) -* [CVE-2022-47660](CVE-2022/CVE-2022-476xx/CVE-2022-47660.json) (`2023-05-05T19:39:08.303`) -* [CVE-2022-47661](CVE-2022/CVE-2022-476xx/CVE-2022-47661.json) (`2023-05-05T19:37:33.643`) -* [CVE-2022-47662](CVE-2022/CVE-2022-476xx/CVE-2022-47662.json) (`2023-05-05T19:49:30.243`) -* [CVE-2022-47663](CVE-2022/CVE-2022-476xx/CVE-2022-47663.json) (`2023-05-05T19:50:24.380`) -* [CVE-2022-47874](CVE-2022/CVE-2022-478xx/CVE-2022-47874.json) (`2023-05-05T19:15:15.223`) -* [CVE-2022-47875](CVE-2022/CVE-2022-478xx/CVE-2022-47875.json) (`2023-05-05T19:15:15.283`) -* [CVE-2022-47876](CVE-2022/CVE-2022-478xx/CVE-2022-47876.json) (`2023-05-05T19:15:15.337`) -* [CVE-2022-47877](CVE-2022/CVE-2022-478xx/CVE-2022-47877.json) (`2023-05-05T19:15:15.393`) -* [CVE-2022-47878](CVE-2022/CVE-2022-478xx/CVE-2022-47878.json) (`2023-05-05T19:15:15.447`) -* [CVE-2023-0760](CVE-2023/CVE-2023-07xx/CVE-2023-0760.json) (`2023-05-05T19:45:48.030`) -* [CVE-2023-2246](CVE-2023/CVE-2023-22xx/CVE-2023-2246.json) (`2023-05-05T19:15:15.603`) -* [CVE-2023-2370](CVE-2023/CVE-2023-23xx/CVE-2023-2370.json) (`2023-05-05T18:03:39.193`) -* [CVE-2023-2371](CVE-2023/CVE-2023-23xx/CVE-2023-2371.json) (`2023-05-05T18:05:31.693`) -* [CVE-2023-2372](CVE-2023/CVE-2023-23xx/CVE-2023-2372.json) (`2023-05-05T18:06:09.003`) -* [CVE-2023-2380](CVE-2023/CVE-2023-23xx/CVE-2023-2380.json) (`2023-05-05T18:16:55.040`) -* [CVE-2023-2381](CVE-2023/CVE-2023-23xx/CVE-2023-2381.json) (`2023-05-05T18:16:29.463`) -* [CVE-2023-2382](CVE-2023/CVE-2023-23xx/CVE-2023-2382.json) (`2023-05-05T18:16:05.950`) -* [CVE-2023-2383](CVE-2023/CVE-2023-23xx/CVE-2023-2383.json) (`2023-05-05T18:17:13.490`) -* [CVE-2023-2384](CVE-2023/CVE-2023-23xx/CVE-2023-2384.json) (`2023-05-05T18:18:08.037`) -* [CVE-2023-2385](CVE-2023/CVE-2023-23xx/CVE-2023-2385.json) (`2023-05-05T18:18:32.757`) -* [CVE-2023-2386](CVE-2023/CVE-2023-23xx/CVE-2023-2386.json) (`2023-05-05T18:34:24.343`) -* [CVE-2023-2387](CVE-2023/CVE-2023-23xx/CVE-2023-2387.json) (`2023-05-05T18:34:43.560`) -* [CVE-2023-2388](CVE-2023/CVE-2023-23xx/CVE-2023-2388.json) (`2023-05-05T18:35:05.630`) -* [CVE-2023-2389](CVE-2023/CVE-2023-23xx/CVE-2023-2389.json) (`2023-05-05T18:35:44.867`) -* [CVE-2023-2390](CVE-2023/CVE-2023-23xx/CVE-2023-2390.json) (`2023-05-05T18:36:04.617`) -* [CVE-2023-2391](CVE-2023/CVE-2023-23xx/CVE-2023-2391.json) (`2023-05-05T18:36:22.327`) -* [CVE-2023-2392](CVE-2023/CVE-2023-23xx/CVE-2023-2392.json) (`2023-05-05T18:36:48.723`) -* [CVE-2023-2393](CVE-2023/CVE-2023-23xx/CVE-2023-2393.json) (`2023-05-05T18:27:26.553`) -* [CVE-2023-2394](CVE-2023/CVE-2023-23xx/CVE-2023-2394.json) (`2023-05-05T18:26:55.050`) -* [CVE-2023-2395](CVE-2023/CVE-2023-23xx/CVE-2023-2395.json) (`2023-05-05T18:31:07.607`) -* [CVE-2023-2396](CVE-2023/CVE-2023-23xx/CVE-2023-2396.json) (`2023-05-05T18:29:40.190`) -* [CVE-2023-2397](CVE-2023/CVE-2023-23xx/CVE-2023-2397.json) (`2023-05-05T18:34:00.993`) -* [CVE-2023-2408](CVE-2023/CVE-2023-24xx/CVE-2023-2408.json) (`2023-05-05T18:33:16.700`) -* [CVE-2023-2409](CVE-2023/CVE-2023-24xx/CVE-2023-2409.json) (`2023-05-05T18:32:54.917`) -* [CVE-2023-2410](CVE-2023/CVE-2023-24xx/CVE-2023-2410.json) (`2023-05-05T18:32:35.533`) -* [CVE-2023-2411](CVE-2023/CVE-2023-24xx/CVE-2023-2411.json) (`2023-05-05T18:32:04.407`) -* [CVE-2023-2412](CVE-2023/CVE-2023-24xx/CVE-2023-2412.json) (`2023-05-05T18:26:27.330`) -* [CVE-2023-2413](CVE-2023/CVE-2023-24xx/CVE-2023-2413.json) (`2023-05-05T18:25:53.750`) -* [CVE-2023-25437](CVE-2023/CVE-2023-254xx/CVE-2023-25437.json) (`2023-05-05T18:10:34.587`) -* [CVE-2023-27559](CVE-2023/CVE-2023-275xx/CVE-2023-27559.json) (`2023-05-05T19:40:43.037`) -* [CVE-2023-28613](CVE-2023/CVE-2023-286xx/CVE-2023-28613.json) (`2023-05-05T19:15:15.513`) -* [CVE-2023-29471](CVE-2023/CVE-2023-294xx/CVE-2023-29471.json) (`2023-05-05T18:11:57.897`) -* [CVE-2023-29489](CVE-2023/CVE-2023-294xx/CVE-2023-29489.json) (`2023-05-05T18:12:20.760`) -* [CVE-2023-29579](CVE-2023/CVE-2023-295xx/CVE-2023-29579.json) (`2023-05-05T18:04:17.810`) -* [CVE-2023-29582](CVE-2023/CVE-2023-295xx/CVE-2023-29582.json) (`2023-05-05T18:04:22.130`) -* [CVE-2023-29583](CVE-2023/CVE-2023-295xx/CVE-2023-29583.json) (`2023-05-05T18:04:31.307`) -* [CVE-2023-30123](CVE-2023/CVE-2023-301xx/CVE-2023-30123.json) (`2023-05-05T18:06:27.517`) +* [CVE-2021-23166](CVE-2021/CVE-2021-231xx/CVE-2021-23166.json) (`2023-05-05T21:15:09.073`) +* [CVE-2021-23176](CVE-2021/CVE-2021-231xx/CVE-2021-23176.json) (`2023-05-05T21:15:09.163`) +* [CVE-2021-23178](CVE-2021/CVE-2021-231xx/CVE-2021-23178.json) (`2023-05-05T21:15:09.250`) +* [CVE-2021-23186](CVE-2021/CVE-2021-231xx/CVE-2021-23186.json) (`2023-05-05T21:15:09.327`) +* [CVE-2021-23203](CVE-2021/CVE-2021-232xx/CVE-2021-23203.json) (`2023-05-05T21:15:09.403`) +* [CVE-2021-26263](CVE-2021/CVE-2021-262xx/CVE-2021-26263.json) (`2023-05-05T21:15:09.480`) +* [CVE-2021-26947](CVE-2021/CVE-2021-269xx/CVE-2021-26947.json) (`2023-05-05T21:15:09.553`) +* [CVE-2021-44476](CVE-2021/CVE-2021-444xx/CVE-2021-44476.json) (`2023-05-05T21:15:09.640`) +* [CVE-2021-44775](CVE-2021/CVE-2021-447xx/CVE-2021-44775.json) (`2023-05-05T21:15:09.700`) +* [CVE-2021-45071](CVE-2021/CVE-2021-450xx/CVE-2021-45071.json) (`2023-05-05T21:15:09.773`) +* [CVE-2021-45111](CVE-2021/CVE-2021-451xx/CVE-2021-45111.json) (`2023-05-05T21:15:09.837`) +* [CVE-2022-3116](CVE-2022/CVE-2022-31xx/CVE-2022-3116.json) (`2023-05-05T20:15:09.373`) +* [CVE-2022-3294](CVE-2022/CVE-2022-32xx/CVE-2022-3294.json) (`2023-05-05T20:15:09.607`) +* [CVE-2022-43042](CVE-2022/CVE-2022-430xx/CVE-2022-43042.json) (`2023-05-05T20:04:36.790`) +* [CVE-2022-43043](CVE-2022/CVE-2022-430xx/CVE-2022-43043.json) (`2023-05-05T20:04:23.743`) +* [CVE-2022-43044](CVE-2022/CVE-2022-430xx/CVE-2022-43044.json) (`2023-05-05T20:03:46.190`) +* [CVE-2022-43045](CVE-2022/CVE-2022-430xx/CVE-2022-43045.json) (`2023-05-05T20:04:05.043`) +* [CVE-2022-43254](CVE-2022/CVE-2022-432xx/CVE-2022-43254.json) (`2023-05-05T20:03:18.970`) +* [CVE-2022-43255](CVE-2022/CVE-2022-432xx/CVE-2022-43255.json) (`2023-05-05T20:02:31.100`) +* [CVE-2022-45204](CVE-2022/CVE-2022-452xx/CVE-2022-45204.json) (`2023-05-05T20:00:30.043`) +* [CVE-2022-45876](CVE-2022/CVE-2022-458xx/CVE-2022-45876.json) (`2023-05-05T20:13:57.563`) +* [CVE-2022-48423](CVE-2022/CVE-2022-484xx/CVE-2022-48423.json) (`2023-05-05T20:15:09.720`) +* [CVE-2022-48424](CVE-2022/CVE-2022-484xx/CVE-2022-48424.json) (`2023-05-05T20:15:09.813`) +* [CVE-2023-1078](CVE-2023/CVE-2023-10xx/CVE-2023-1078.json) (`2023-05-05T20:15:09.880`) +* [CVE-2023-1252](CVE-2023/CVE-2023-12xx/CVE-2023-1252.json) (`2023-05-05T20:15:09.963`) +* [CVE-2023-20860](CVE-2023/CVE-2023-208xx/CVE-2023-20860.json) (`2023-05-05T20:15:10.053`) +* [CVE-2023-22901](CVE-2023/CVE-2023-229xx/CVE-2023-22901.json) (`2023-05-05T20:55:52.987`) +* [CVE-2023-24999](CVE-2023/CVE-2023-249xx/CVE-2023-24999.json) (`2023-05-05T20:15:10.137`) +* [CVE-2023-25292](CVE-2023/CVE-2023-252xx/CVE-2023-25292.json) (`2023-05-05T20:18:47.160`) +* [CVE-2023-26464](CVE-2023/CVE-2023-264xx/CVE-2023-26464.json) (`2023-05-05T20:15:10.253`) +* [CVE-2023-26604](CVE-2023/CVE-2023-266xx/CVE-2023-26604.json) (`2023-05-05T20:15:10.477`) +* [CVE-2023-28008](CVE-2023/CVE-2023-280xx/CVE-2023-28008.json) (`2023-05-05T20:28:08.970`) +* [CVE-2023-28009](CVE-2023/CVE-2023-280xx/CVE-2023-28009.json) (`2023-05-05T20:24:14.757`) +* [CVE-2023-28697](CVE-2023/CVE-2023-286xx/CVE-2023-28697.json) (`2023-05-05T20:47:35.427`) +* [CVE-2023-29596](CVE-2023/CVE-2023-295xx/CVE-2023-29596.json) (`2023-05-05T20:08:01.820`) +* [CVE-2023-30846](CVE-2023/CVE-2023-308xx/CVE-2023-30846.json) (`2023-05-05T20:36:25.807`) ## Download and Usage