diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22970.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22970.json index 654892c2840..35fe84a428e 100644 --- a/CVE-2023/CVE-2023-229xx/CVE-2023-22970.json +++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22970.json @@ -2,27 +2,112 @@ "id": "CVE-2023-22970", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-26T18:15:13.357", - "lastModified": "2023-05-29T03:15:09.393", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T19:26:48.843", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Bottles before 51.0 mishandles YAML load, which allows remote code execution via a crafted file." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:usebottles:bottles:*:*:*:*:*:*:*:*", + "versionEndExcluding": "51.0", + "matchCriteriaId": "7933F6C9-CC9D-42CD-813F-CD24D8B899B8" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", + "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/bottlesdevs/Bottles/issues/2463", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N24KI3O3FWGKJSLATY35ZM3CHSABJ6WE/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZJZEE4RAAK7OPVQNE4BOWUVQDVSZU6NJ/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24599.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24599.json index f62c9b3d805..e547a3873ec 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24599.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24599.json @@ -2,23 +2,268 @@ "id": "CVE-2023-24599", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-29T03:15:09.543", - "lastModified": "2023-05-30T12:52:56.613", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T19:40:28.567", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "OX App Suite before backend 7.10.6-rev37 allows authenticated users to change the appointments of arbitrary users via conflicting ID numbers, aka \"ID confusion.\"" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.10.6", + "matchCriteriaId": "5BBF1862-B6FF-4F32-A3C1-59D28BA25F81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:-:*:*:*:*:*:*", + "matchCriteriaId": "3A4EAD2E-C3C3-4C79-8C42-375FFE638486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev01:*:*:*:*:*:*", + "matchCriteriaId": "39198733-D227-4935-9A60-1026040D262F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev02:*:*:*:*:*:*", + "matchCriteriaId": "3C86EE81-8CD4-4131-969A-BDA24B9B48E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev03:*:*:*:*:*:*", + "matchCriteriaId": "F9E9C869-7DA9-4EFA-B613-82BA127F6CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev04:*:*:*:*:*:*", + "matchCriteriaId": "F8FAA329-5893-412B-8349-4DA3023CC76E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev05:*:*:*:*:*:*", + "matchCriteriaId": "BB6A57A4-B18D-498D-9A8C-406797A6255C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev06:*:*:*:*:*:*", + "matchCriteriaId": "7F0977F0-90B4-48B4-BED6-C218B5CA5E03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev07:*:*:*:*:*:*", + "matchCriteriaId": "4D55DE67-8F93-48F3-BE54-D3A065479281" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev08:*:*:*:*:*:*", + "matchCriteriaId": "D27980B4-B71B-4DA8-B130-F0B5929F8E65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev09:*:*:*:*:*:*", + "matchCriteriaId": "DD1709BC-7DEB-4508-B3C3-B20F5FD001A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev10:*:*:*:*:*:*", + "matchCriteriaId": "08A6BDD5-259E-4DC3-A548-00CD0D459749" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev11:*:*:*:*:*:*", + "matchCriteriaId": "B8166FF4-77D8-4A12-92E5-615B3DA2E602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev12:*:*:*:*:*:*", + "matchCriteriaId": "999F057B-7918-461A-B60C-3BE72E92CDC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev13:*:*:*:*:*:*", + "matchCriteriaId": "88FD1550-3715-493E-B674-9ECF3DD7A813" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev14:*:*:*:*:*:*", + "matchCriteriaId": "F31A4949-397F-4D1B-8AEA-AC7B335722F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev15:*:*:*:*:*:*", + "matchCriteriaId": "D33A91D4-CE21-486D-9469-B09060B8C637" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev16:*:*:*:*:*:*", + "matchCriteriaId": "5E3E5CD2-7631-4DBE-AB4D-669E82BCCAD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev17:*:*:*:*:*:*", + "matchCriteriaId": "2BEE0AF0-3D22-4DE7-9E71-A4469D9CA2EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev18:*:*:*:*:*:*", + "matchCriteriaId": "AAFB199C-1D66-442D-AD7E-414DD339E1D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev19:*:*:*:*:*:*", + "matchCriteriaId": "26322561-2491-4DC7-B974-0B92B61A5BDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev20:*:*:*:*:*:*", + "matchCriteriaId": "A6BA6C2B-F2D5-4FF7-B316-C8E99C2B464B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev21:*:*:*:*:*:*", + "matchCriteriaId": "733E4A65-821B-4187-AA3A-1ACD3E882C07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev22:*:*:*:*:*:*", + "matchCriteriaId": "6B0A0043-33E8-4440-92AC-DDD70EA39535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev23:*:*:*:*:*:*", + "matchCriteriaId": "303205CC-8BDE-47EE-A675-9BA19983139A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev24:*:*:*:*:*:*", + "matchCriteriaId": "8C088014-47D6-4632-9FB5-2C7B1085B762" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev25:*:*:*:*:*:*", + "matchCriteriaId": "42CF6057-EB40-4208-9F1E-83213E97987C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev26:*:*:*:*:*:*", + "matchCriteriaId": "966BC23E-B8CE-4F98-B3A6-4B620E8808BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev27:*:*:*:*:*:*", + "matchCriteriaId": "7409CE19-ACC1-4AF4-8C8A-AE2CDBB63D3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev28:*:*:*:*:*:*", + "matchCriteriaId": "17D71CDE-3111-459B-8520-F62E0D5D2972" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev29:*:*:*:*:*:*", + "matchCriteriaId": "6D808ED6-F819-4014-BD24-4537D52DDFB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev30:*:*:*:*:*:*", + "matchCriteriaId": "B3792A91-10E9-42D9-B852-37D369D8364E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev31:*:*:*:*:*:*", + "matchCriteriaId": "6F0BFEEF-8B19-4F71-B7F1-2CC94969616F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev32:*:*:*:*:*:*", + "matchCriteriaId": "52003F06-9351-49B6-A3C5-A2B6FC0B9F4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev33:*:*:*:*:*:*", + "matchCriteriaId": "C8786112-32AE-4BA5-8D66-D4E2429D3228" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev34:*:*:*:*:*:*", + "matchCriteriaId": "3A67F528-0248-4E24-A5AB-2995ED7D2600" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev35:*:*:*:*:*:*", + "matchCriteriaId": "AE090C73-E093-4BD9-BEFE-634179500A78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev36:*:*:*:*:*:*", + "matchCriteriaId": "0A7CF0F7-5DF5-4749-A777-0F9EDCD14EA6" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2023/May/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://open-xchange.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-246xx/CVE-2023-24600.json b/CVE-2023/CVE-2023-246xx/CVE-2023-24600.json index dd4b3e67807..8f251916693 100644 --- a/CVE-2023/CVE-2023-246xx/CVE-2023-24600.json +++ b/CVE-2023/CVE-2023-246xx/CVE-2023-24600.json @@ -2,23 +2,268 @@ "id": "CVE-2023-24600", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-29T03:15:09.603", - "lastModified": "2023-05-30T12:52:56.613", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T19:51:52.210", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "OX App Suite before backend 7.10.6-rev37 allows authenticated users to bypass access controls (for reading contacts) via a move to their own address book." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.10.6", + "matchCriteriaId": "5BBF1862-B6FF-4F32-A3C1-59D28BA25F81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:-:*:*:*:*:*:*", + "matchCriteriaId": "3A4EAD2E-C3C3-4C79-8C42-375FFE638486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev01:*:*:*:*:*:*", + "matchCriteriaId": "39198733-D227-4935-9A60-1026040D262F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev02:*:*:*:*:*:*", + "matchCriteriaId": "3C86EE81-8CD4-4131-969A-BDA24B9B48E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev03:*:*:*:*:*:*", + "matchCriteriaId": "F9E9C869-7DA9-4EFA-B613-82BA127F6CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev04:*:*:*:*:*:*", + "matchCriteriaId": "F8FAA329-5893-412B-8349-4DA3023CC76E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev05:*:*:*:*:*:*", + "matchCriteriaId": "BB6A57A4-B18D-498D-9A8C-406797A6255C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev06:*:*:*:*:*:*", + "matchCriteriaId": "7F0977F0-90B4-48B4-BED6-C218B5CA5E03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev07:*:*:*:*:*:*", + "matchCriteriaId": "4D55DE67-8F93-48F3-BE54-D3A065479281" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev08:*:*:*:*:*:*", + "matchCriteriaId": "D27980B4-B71B-4DA8-B130-F0B5929F8E65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev09:*:*:*:*:*:*", + "matchCriteriaId": "DD1709BC-7DEB-4508-B3C3-B20F5FD001A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev10:*:*:*:*:*:*", + "matchCriteriaId": "08A6BDD5-259E-4DC3-A548-00CD0D459749" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev11:*:*:*:*:*:*", + "matchCriteriaId": "B8166FF4-77D8-4A12-92E5-615B3DA2E602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev12:*:*:*:*:*:*", + "matchCriteriaId": "999F057B-7918-461A-B60C-3BE72E92CDC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev13:*:*:*:*:*:*", + "matchCriteriaId": "88FD1550-3715-493E-B674-9ECF3DD7A813" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev14:*:*:*:*:*:*", + "matchCriteriaId": "F31A4949-397F-4D1B-8AEA-AC7B335722F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev15:*:*:*:*:*:*", + "matchCriteriaId": "D33A91D4-CE21-486D-9469-B09060B8C637" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev16:*:*:*:*:*:*", + "matchCriteriaId": "5E3E5CD2-7631-4DBE-AB4D-669E82BCCAD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev17:*:*:*:*:*:*", + "matchCriteriaId": "2BEE0AF0-3D22-4DE7-9E71-A4469D9CA2EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev18:*:*:*:*:*:*", + "matchCriteriaId": "AAFB199C-1D66-442D-AD7E-414DD339E1D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev19:*:*:*:*:*:*", + "matchCriteriaId": "26322561-2491-4DC7-B974-0B92B61A5BDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev20:*:*:*:*:*:*", + "matchCriteriaId": "A6BA6C2B-F2D5-4FF7-B316-C8E99C2B464B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev21:*:*:*:*:*:*", + "matchCriteriaId": "733E4A65-821B-4187-AA3A-1ACD3E882C07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev22:*:*:*:*:*:*", + "matchCriteriaId": "6B0A0043-33E8-4440-92AC-DDD70EA39535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev23:*:*:*:*:*:*", + "matchCriteriaId": "303205CC-8BDE-47EE-A675-9BA19983139A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev24:*:*:*:*:*:*", + "matchCriteriaId": "8C088014-47D6-4632-9FB5-2C7B1085B762" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev25:*:*:*:*:*:*", + "matchCriteriaId": "42CF6057-EB40-4208-9F1E-83213E97987C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev26:*:*:*:*:*:*", + "matchCriteriaId": "966BC23E-B8CE-4F98-B3A6-4B620E8808BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev27:*:*:*:*:*:*", + "matchCriteriaId": "7409CE19-ACC1-4AF4-8C8A-AE2CDBB63D3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev28:*:*:*:*:*:*", + "matchCriteriaId": "17D71CDE-3111-459B-8520-F62E0D5D2972" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev29:*:*:*:*:*:*", + "matchCriteriaId": "6D808ED6-F819-4014-BD24-4537D52DDFB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev30:*:*:*:*:*:*", + "matchCriteriaId": "B3792A91-10E9-42D9-B852-37D369D8364E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev31:*:*:*:*:*:*", + "matchCriteriaId": "6F0BFEEF-8B19-4F71-B7F1-2CC94969616F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev32:*:*:*:*:*:*", + "matchCriteriaId": "52003F06-9351-49B6-A3C5-A2B6FC0B9F4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev33:*:*:*:*:*:*", + "matchCriteriaId": "C8786112-32AE-4BA5-8D66-D4E2429D3228" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev34:*:*:*:*:*:*", + "matchCriteriaId": "3A67F528-0248-4E24-A5AB-2995ED7D2600" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev35:*:*:*:*:*:*", + "matchCriteriaId": "AE090C73-E093-4BD9-BEFE-634179500A78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev36:*:*:*:*:*:*", + "matchCriteriaId": "0A7CF0F7-5DF5-4749-A777-0F9EDCD14EA6" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2023/May/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://open-xchange.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-246xx/CVE-2023-24601.json b/CVE-2023/CVE-2023-246xx/CVE-2023-24601.json index bdbe37cde47..cffaf940dda 100644 --- a/CVE-2023/CVE-2023-246xx/CVE-2023-24601.json +++ b/CVE-2023/CVE-2023-246xx/CVE-2023-24601.json @@ -2,23 +2,203 @@ "id": "CVE-2023-24601", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-29T03:15:09.663", - "lastModified": "2023-05-30T12:52:56.613", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T19:40:04.533", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "OX App Suite before frontend 7.10.6-rev24 allows XSS via a non-app deeplink such as the jslob API's registry sub-tree." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.10.6", + "matchCriteriaId": "5BBF1862-B6FF-4F32-A3C1-59D28BA25F81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:-:*:*:*:*:*:*", + "matchCriteriaId": "3A4EAD2E-C3C3-4C79-8C42-375FFE638486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev01:*:*:*:*:*:*", + "matchCriteriaId": "39198733-D227-4935-9A60-1026040D262F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev02:*:*:*:*:*:*", + "matchCriteriaId": "3C86EE81-8CD4-4131-969A-BDA24B9B48E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev03:*:*:*:*:*:*", + "matchCriteriaId": "F9E9C869-7DA9-4EFA-B613-82BA127F6CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev04:*:*:*:*:*:*", + "matchCriteriaId": "F8FAA329-5893-412B-8349-4DA3023CC76E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev05:*:*:*:*:*:*", + "matchCriteriaId": "BB6A57A4-B18D-498D-9A8C-406797A6255C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev06:*:*:*:*:*:*", + "matchCriteriaId": "7F0977F0-90B4-48B4-BED6-C218B5CA5E03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev07:*:*:*:*:*:*", + "matchCriteriaId": "4D55DE67-8F93-48F3-BE54-D3A065479281" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev08:*:*:*:*:*:*", + "matchCriteriaId": "D27980B4-B71B-4DA8-B130-F0B5929F8E65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev09:*:*:*:*:*:*", + "matchCriteriaId": "DD1709BC-7DEB-4508-B3C3-B20F5FD001A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev10:*:*:*:*:*:*", + "matchCriteriaId": "08A6BDD5-259E-4DC3-A548-00CD0D459749" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev11:*:*:*:*:*:*", + "matchCriteriaId": "B8166FF4-77D8-4A12-92E5-615B3DA2E602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev12:*:*:*:*:*:*", + "matchCriteriaId": "999F057B-7918-461A-B60C-3BE72E92CDC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev13:*:*:*:*:*:*", + "matchCriteriaId": "88FD1550-3715-493E-B674-9ECF3DD7A813" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev14:*:*:*:*:*:*", + "matchCriteriaId": "F31A4949-397F-4D1B-8AEA-AC7B335722F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev15:*:*:*:*:*:*", + "matchCriteriaId": "D33A91D4-CE21-486D-9469-B09060B8C637" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev16:*:*:*:*:*:*", + "matchCriteriaId": "5E3E5CD2-7631-4DBE-AB4D-669E82BCCAD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev17:*:*:*:*:*:*", + "matchCriteriaId": "2BEE0AF0-3D22-4DE7-9E71-A4469D9CA2EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev18:*:*:*:*:*:*", + "matchCriteriaId": "AAFB199C-1D66-442D-AD7E-414DD339E1D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev19:*:*:*:*:*:*", + "matchCriteriaId": "26322561-2491-4DC7-B974-0B92B61A5BDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev20:*:*:*:*:*:*", + "matchCriteriaId": "A6BA6C2B-F2D5-4FF7-B316-C8E99C2B464B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev21:*:*:*:*:*:*", + "matchCriteriaId": "733E4A65-821B-4187-AA3A-1ACD3E882C07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev22:*:*:*:*:*:*", + "matchCriteriaId": "6B0A0043-33E8-4440-92AC-DDD70EA39535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev23:*:*:*:*:*:*", + "matchCriteriaId": "303205CC-8BDE-47EE-A675-9BA19983139A" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2023/May/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://open-xchange.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-246xx/CVE-2023-24602.json b/CVE-2023/CVE-2023-246xx/CVE-2023-24602.json index bd63b4918bc..a4874b48450 100644 --- a/CVE-2023/CVE-2023-246xx/CVE-2023-24602.json +++ b/CVE-2023/CVE-2023-246xx/CVE-2023-24602.json @@ -2,23 +2,203 @@ "id": "CVE-2023-24602", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-29T03:15:09.717", - "lastModified": "2023-05-30T12:52:56.613", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T19:43:50.527", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "OX App Suite before frontend 7.10.6-rev24 allows XSS via data to the Tumblr portal widget, such as a post title." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.10.6", + "matchCriteriaId": "5BBF1862-B6FF-4F32-A3C1-59D28BA25F81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:-:*:*:*:*:*:*", + "matchCriteriaId": "3A4EAD2E-C3C3-4C79-8C42-375FFE638486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev01:*:*:*:*:*:*", + "matchCriteriaId": "39198733-D227-4935-9A60-1026040D262F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev02:*:*:*:*:*:*", + "matchCriteriaId": "3C86EE81-8CD4-4131-969A-BDA24B9B48E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev03:*:*:*:*:*:*", + "matchCriteriaId": "F9E9C869-7DA9-4EFA-B613-82BA127F6CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev04:*:*:*:*:*:*", + "matchCriteriaId": "F8FAA329-5893-412B-8349-4DA3023CC76E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev05:*:*:*:*:*:*", + "matchCriteriaId": "BB6A57A4-B18D-498D-9A8C-406797A6255C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev06:*:*:*:*:*:*", + "matchCriteriaId": "7F0977F0-90B4-48B4-BED6-C218B5CA5E03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev07:*:*:*:*:*:*", + "matchCriteriaId": "4D55DE67-8F93-48F3-BE54-D3A065479281" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev08:*:*:*:*:*:*", + "matchCriteriaId": "D27980B4-B71B-4DA8-B130-F0B5929F8E65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev09:*:*:*:*:*:*", + "matchCriteriaId": "DD1709BC-7DEB-4508-B3C3-B20F5FD001A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev10:*:*:*:*:*:*", + "matchCriteriaId": "08A6BDD5-259E-4DC3-A548-00CD0D459749" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev11:*:*:*:*:*:*", + "matchCriteriaId": "B8166FF4-77D8-4A12-92E5-615B3DA2E602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev12:*:*:*:*:*:*", + "matchCriteriaId": "999F057B-7918-461A-B60C-3BE72E92CDC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev13:*:*:*:*:*:*", + "matchCriteriaId": "88FD1550-3715-493E-B674-9ECF3DD7A813" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev14:*:*:*:*:*:*", + "matchCriteriaId": "F31A4949-397F-4D1B-8AEA-AC7B335722F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev15:*:*:*:*:*:*", + "matchCriteriaId": "D33A91D4-CE21-486D-9469-B09060B8C637" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev16:*:*:*:*:*:*", + "matchCriteriaId": "5E3E5CD2-7631-4DBE-AB4D-669E82BCCAD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev17:*:*:*:*:*:*", + "matchCriteriaId": "2BEE0AF0-3D22-4DE7-9E71-A4469D9CA2EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev18:*:*:*:*:*:*", + "matchCriteriaId": "AAFB199C-1D66-442D-AD7E-414DD339E1D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev19:*:*:*:*:*:*", + "matchCriteriaId": "26322561-2491-4DC7-B974-0B92B61A5BDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev20:*:*:*:*:*:*", + "matchCriteriaId": "A6BA6C2B-F2D5-4FF7-B316-C8E99C2B464B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev21:*:*:*:*:*:*", + "matchCriteriaId": "733E4A65-821B-4187-AA3A-1ACD3E882C07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev22:*:*:*:*:*:*", + "matchCriteriaId": "6B0A0043-33E8-4440-92AC-DDD70EA39535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open-xchange:ox_app_suite:7.10.6:rev23:*:*:*:*:*:*", + "matchCriteriaId": "303205CC-8BDE-47EE-A675-9BA19983139A" + } + ] + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2023/May/3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://open-xchange.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28382.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28382.json index d45e8fd8be9..fbe59619fa6 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28382.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28382.json @@ -2,23 +2,104 @@ "id": "CVE-2023-28382", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-26T09:15:38.593", - "lastModified": "2023-05-26T12:43:57.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T19:20:13.567", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in ESS REC Agent Server Edition series allows an authenticated attacker to view or alter an arbitrary file on the server. Affected products and versions are as follows: ESS REC Agent Server Edition for Linux V1.0.0 to V1.4.3, ESS REC Agent Server Edition for Solaris V1.1.0 to V1.4.0, ESS REC Agent Server Edition for HP-UX V1.1.0 to V1.4.0, and ESS REC Agent Server Edition for AIX V1.2.0 to V1.4.1" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:et-x:ess_rec:*:*:*:*:server:linux:*:*", + "versionStartIncluding": "1.0.0", + "versionEndIncluding": "1.4.3", + "matchCriteriaId": "C0FFF86F-71B6-4E7C-8EE7-AA7B33CD7F11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:et-x:ess_rec:*:*:*:*:server:hp-ux:*:*", + "versionStartIncluding": "1.1.0", + "versionEndIncluding": "1.4.0", + "matchCriteriaId": "D611D6B5-C896-46F5-89F5-7A1BBDFD176B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:et-x:ess_rec:*:*:*:*:server:solaris:*:*", + "versionStartIncluding": "1.1.0", + "versionEndIncluding": "1.4.0", + "matchCriteriaId": "7308CB3C-F553-4F09-9D22-6BAD620BB761" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:et-x:ess_rec:*:*:*:*:server:aix:*:*", + "versionStartIncluding": "1.2.0", + "versionEndIncluding": "1.4.1", + "matchCriteriaId": "0D81F231-5015-4267-B138-B4AC364CA76B" + } + ] + } + ] + } + ], "references": [ { "url": "https://customer.et-x.jp/app/answers/detail/a_id/2260", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Permissions Required" + ] }, { "url": "https://jvn.jp/en/jp/JVN19243534/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2804.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2804.json index 0bbeaa4eeca..e18e64be479 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2804.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2804.json @@ -2,16 +2,49 @@ "id": "CVE-2023-2804", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-25T22:15:09.443", - "lastModified": "2023-05-26T12:43:57.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T19:13:31.813", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A heap-based buffer overflow issue was discovered in libjpeg-turbo in h2v2_merged_upsample_internal() function of jdmrgext.c file. The vulnerability can only be exploited with 12-bit data precision for which the range of the sample data type exceeds the valid sample range, hence, an attacker could craft a 12-bit lossless JPEG image that contains out-of-range 12-bit samples. An application attempting to decompress such image using merged upsampling would lead to segmentation fault or buffer overflows, causing an application to crash." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -23,26 +56,64 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1.91", + "matchCriteriaId": "232A4BE1-12D3-4E93-B773-BBBE27CE8554" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2023-2804", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2208447", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/9f756bc67a84d4566bf74a0c2432aa55da404021", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/668#issuecomment-1492586118", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] }, { "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/675", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2900.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2900.json index c9fa5e0f882..167a78f299f 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2900.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2900.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2900", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-25T21:15:09.157", - "lastModified": "2023-05-26T12:43:57.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T19:18:21.187", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -61,8 +83,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -71,18 +103,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nfine_rapid_development_platform_project:nfine_rapid_development_platform:2023-05-11:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD18784-0081-41E7-9230-D3ACF8791141" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine-Rapid-development-platform-has-weak-password-vulnerability.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.229974", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.229974", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2901.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2901.json index 8a1cba19d82..8bc2913fb3b 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2901.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2901.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2901", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-25T22:15:09.517", - "lastModified": "2023-05-26T12:43:57.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T19:07:54.200", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -61,8 +83,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -71,18 +103,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nfine_rapid_development_platform_project:nfine_rapid_development_platform:2023-05-11:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD18784-0081-41E7-9230-D3ACF8791141" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine%20rapid%20development%20platform%20User-GetGridJson%20has%20unauthorized%20access%20vulnerability.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.229975", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.229975", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2902.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2902.json index 8a434741219..230c9d1bd86 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2902.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2902.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2902", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-25T22:15:09.600", - "lastModified": "2023-05-26T12:43:57.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T18:28:55.667", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -61,8 +83,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -71,18 +103,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nfine_rapid_development_platform_project:nfine_rapid_development_platform:2023-05-11:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD18784-0081-41E7-9230-D3ACF8791141" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/The%20NFine%20rapid%20development%20platform%20Organize-GetTreeGridJson%20has%20unauthorized%20access%20vulnerability.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.229976", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.229976", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2903.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2903.json index 74675f064a1..55139640965 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2903.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2903.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2903", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-25T23:15:09.293", - "lastModified": "2023-05-26T12:43:57.397", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T18:13:41.700", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,18 +93,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nfine:nfine_rapid_development_platform:2023-05-11:*:*:*:*:*:*:*", + "matchCriteriaId": "15888ACE-60D7-40EB-B894-CFA800629FEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/NFine%20rapid%20development%20platform%20Role-GetGridJson%20has%20unauthorized%20access%20vulnerability.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.229977", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.229977", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31458.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31458.json index 15334a81443..5ef37c9a1d3 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31458.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31458.json @@ -2,23 +2,82 @@ "id": "CVE-2023-31458", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T21:15:11.520", - "lastModified": "2023-05-25T12:40:12.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T18:17:49.983", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A vulnerability in the Edge Gateway component of Mitel MiVoice Connect versions 19.3 SP2 (22.24.1500.0) and earlier could allow an unauthenticated attacker with internal network access to authenticate with administrative privileges, because initial installation does not enforce a password change. A successful exploit could allow an attacker to make arbitrary configuration changes and execute arbitrary commands." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mitel:mivoice_connect:*:*:*:*:*:*:*:*", + "versionEndIncluding": "22.24.1500.0", + "matchCriteriaId": "07B89289-EB6B-49EA-AC12-0C39A99467DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0005", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31759.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31759.json index 411dfbdd7a0..d886c22309f 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31759.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31759.json @@ -2,19 +2,86 @@ "id": "CVE-2023-31759", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T00:15:09.450", - "lastModified": "2023-05-24T12:59:09.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T18:56:41.127", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Weak Security in the 433MHz keyfob of Kerui W18 Alarm System v1.0 allows attackers to gain full access via a code replay attack." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-294" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:keruistore:kerui_w18_firmware:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "076C0304-089F-48FC-81D6-0C0723759B2C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:keruistore:kerui_w18:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8B4C2EA-6B97-4C02-B1D5-A899E1252BA3" + } + ] + } + ] + } + ], "references": [ { "url": "https://ashallen.net/wireless-alarm-system-vulnerability-disclosure", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31761.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31761.json index 90c880348f7..c6072046d93 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31761.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31761.json @@ -2,19 +2,86 @@ "id": "CVE-2023-31761", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T00:15:09.497", - "lastModified": "2023-05-24T12:59:09.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T19:09:10.693", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Weak security in the transmitter of Blitzwolf BW-IS22 Smart Home Security Alarm v1.0 allows attackers to gain full access to the system via a code replay attack." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-294" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:blitzwolf:bw-is22_firmware:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4FFDF0AD-519B-41BE-A460-95C0657C17FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:blitzwolf:bw-is22:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9174171A-E0EB-4D47-9BCF-054462C1F36E" + } + ] + } + ] + } + ], "references": [ { "url": "https://ashallen.net/wireless-alarm-system-vulnerability-disclosure", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31762.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31762.json index 835bbcc5f05..4e56c69e0e6 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31762.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31762.json @@ -2,19 +2,86 @@ "id": "CVE-2023-31762", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T00:15:09.543", - "lastModified": "2023-05-24T12:59:09.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T19:10:08.670", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Weak security in the transmitter of Digoo DG-HAMB Smart Home Security System v1.0 allows attackers to gain full access to the system via a code replay attack." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-294" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mydigoo:dg-hamb_firmware:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F238D5E0-48FE-4EB4-8A45-7451AEFB4CD7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mydigoo:dg-hamb:-:*:*:*:*:*:*:*", + "matchCriteriaId": "687C9C3E-BFE0-4CA0-8D47-477A3EE7626F" + } + ] + } + ] + } + ], "references": [ { "url": "https://ashallen.net/wireless-alarm-system-vulnerability-disclosure", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31763.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31763.json index 36c953ac4c7..056f3fc3284 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31763.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31763.json @@ -2,19 +2,86 @@ "id": "CVE-2023-31763", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-24T00:15:09.583", - "lastModified": "2023-05-24T12:59:09.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T19:10:04.900", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Weak security in the transmitter of AGShome Smart Alarm v1.0 allows attackers to gain full access to the system via a code replay attack." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-294" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:agshome_smart_alarm_project:agshome_smart_alarm_firmware:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D2F63E5F-1B73-43FA-B746-213B8BFAD043" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:agshome_smart_alarm_project:agshome_smart_alarm:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6AED037A-ECCE-4F0F-90B5-480B94BE593C" + } + ] + } + ] + } + ], "references": [ { "url": "https://ashallen.net/wireless-alarm-system-vulnerability-disclosure", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33216.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33216.json index 90f9d3b58b3..be881c7842c 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33216.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33216.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33216", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-28T17:15:09.020", - "lastModified": "2023-05-28T18:32:54.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T18:16:57.607", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gvectors:woodiscuz_-_woocommerce_comments:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.0", + "matchCriteriaId": "8CADF972-6E61-452C-B7FE-8CD8D7046F71" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/woodiscuz-woocommerce-comments/wordpress-woodiscuz-woocommerce-comments-plugin-2-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33309.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33309.json index 75f0b4e2065..7abbde4a618 100644 --- a/CVE-2023/CVE-2023-333xx/CVE-2023-33309.json +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33309.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33309", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-28T18:15:09.640", - "lastModified": "2023-05-28T18:32:54.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T19:36:01.710", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:awesomemotive:duplicator:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "4.5.11.1", + "matchCriteriaId": "84C57E46-EFE1-43F7-9811-52971454C5F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/duplicator-pro/wordpress-duplicator-pro-plugin-4-5-11-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33314.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33314.json index e20b8adfbac..744cc14bcf5 100644 --- a/CVE-2023/CVE-2023-333xx/CVE-2023-33314.json +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33314.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33314", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-28T18:15:09.710", - "lastModified": "2023-05-28T18:32:54.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T19:35:38.377", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluginus:bear_-_woocommerce_bulk_editor_and_products_manager_professional:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.3.2", + "matchCriteriaId": "98B9F40E-2997-4EEF-A06D-E46BE3C662B0" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/woo-bulk-editor/wordpress-bear-plugin-1-1-3-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-333xx/CVE-2023-33315.json b/CVE-2023/CVE-2023-333xx/CVE-2023-33315.json index d2a85a1f378..bd23b8b9c30 100644 --- a/CVE-2023/CVE-2023-333xx/CVE-2023-33315.json +++ b/CVE-2023/CVE-2023-333xx/CVE-2023-33315.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33315", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-28T18:15:09.783", - "lastModified": "2023-05-28T18:32:54.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-06-01T19:11:24.440", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -46,10 +66,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wandlesoftware:smart_app_banner:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.3", + "matchCriteriaId": "269D3CE1-32D4-4BA9-8A53-38E91F54AE07" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/smart-app-banner/wordpress-smart-app-banner-plugin-1-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34339.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34339.json new file mode 100644 index 00000000000..dc226565b21 --- /dev/null +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34339.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-34339", + "sourceIdentifier": "security@jetbrains.com", + "published": "2023-06-01T19:15:09.283", + "lastModified": "2023-06-01T19:15:09.283", + "vulnStatus": "Received", + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains Ktor before 2.3.1 headers containing authentication data could be added to the exception's message" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "security@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f70706b6c1f..a63ecee8136 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-06-01T18:00:28.796454+00:00 +2023-06-01T20:00:26.723203+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-06-01T17:58:20.773000+00:00 +2023-06-01T19:51:52.210000+00:00 ``` ### Last Data Feed Release @@ -29,65 +29,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -216644 +216645 ``` ### CVEs added in the last Commit -Recently added CVEs: `21` +Recently added CVEs: `1` -* [CVE-2023-28043](CVE-2023/CVE-2023-280xx/CVE-2023-28043.json) (`2023-06-01T16:15:09.497`) -* [CVE-2023-28066](CVE-2023/CVE-2023-280xx/CVE-2023-28066.json) (`2023-06-01T16:15:09.577`) -* [CVE-2023-32310](CVE-2023/CVE-2023-323xx/CVE-2023-32310.json) (`2023-06-01T16:15:09.643`) -* [CVE-2023-33963](CVE-2023/CVE-2023-339xx/CVE-2023-33963.json) (`2023-06-01T16:15:09.710`) -* [CVE-2023-32324](CVE-2023/CVE-2023-323xx/CVE-2023-32324.json) (`2023-06-01T17:15:09.873`) -* [CVE-2023-32690](CVE-2023/CVE-2023-326xx/CVE-2023-32690.json) (`2023-06-01T17:15:09.947`) -* [CVE-2023-32706](CVE-2023/CVE-2023-327xx/CVE-2023-32706.json) (`2023-06-01T17:15:10.027`) -* [CVE-2023-32707](CVE-2023/CVE-2023-327xx/CVE-2023-32707.json) (`2023-06-01T17:15:10.117`) -* [CVE-2023-32708](CVE-2023/CVE-2023-327xx/CVE-2023-32708.json) (`2023-06-01T17:15:10.173`) -* [CVE-2023-32709](CVE-2023/CVE-2023-327xx/CVE-2023-32709.json) (`2023-06-01T17:15:10.227`) -* [CVE-2023-32710](CVE-2023/CVE-2023-327xx/CVE-2023-32710.json) (`2023-06-01T17:15:10.283`) -* [CVE-2023-32711](CVE-2023/CVE-2023-327xx/CVE-2023-32711.json) (`2023-06-01T17:15:10.340`) -* [CVE-2023-32712](CVE-2023/CVE-2023-327xx/CVE-2023-32712.json) (`2023-06-01T17:15:10.397`) -* [CVE-2023-32713](CVE-2023/CVE-2023-327xx/CVE-2023-32713.json) (`2023-06-01T17:15:10.453`) -* [CVE-2023-32714](CVE-2023/CVE-2023-327xx/CVE-2023-32714.json) (`2023-06-01T17:15:10.513`) -* [CVE-2023-32715](CVE-2023/CVE-2023-327xx/CVE-2023-32715.json) (`2023-06-01T17:15:10.570`) -* [CVE-2023-32716](CVE-2023/CVE-2023-327xx/CVE-2023-32716.json) (`2023-06-01T17:15:10.630`) -* [CVE-2023-32717](CVE-2023/CVE-2023-327xx/CVE-2023-32717.json) (`2023-06-01T17:15:10.687`) -* [CVE-2023-33960](CVE-2023/CVE-2023-339xx/CVE-2023-33960.json) (`2023-06-01T17:15:10.803`) -* [CVE-2023-34091](CVE-2023/CVE-2023-340xx/CVE-2023-34091.json) (`2023-06-01T17:15:10.873`) -* [CVE-2023-34092](CVE-2023/CVE-2023-340xx/CVE-2023-34092.json) (`2023-06-01T17:15:10.947`) +* [CVE-2023-34339](CVE-2023/CVE-2023-343xx/CVE-2023-34339.json) (`2023-06-01T19:15:09.283`) ### CVEs modified in the last Commit -Recently modified CVEs: `35` +Recently modified CVEs: `20` -* [CVE-2023-22504](CVE-2023/CVE-2023-225xx/CVE-2023-22504.json) (`2023-06-01T16:41:22.320`) -* [CVE-2023-0459](CVE-2023/CVE-2023-04xx/CVE-2023-0459.json) (`2023-06-01T16:45:44.930`) -* [CVE-2023-33316](CVE-2023/CVE-2023-333xx/CVE-2023-33316.json) (`2023-06-01T16:53:47.073`) -* [CVE-2023-33948](CVE-2023/CVE-2023-339xx/CVE-2023-33948.json) (`2023-06-01T16:59:06.237`) -* [CVE-2023-33947](CVE-2023/CVE-2023-339xx/CVE-2023-33947.json) (`2023-06-01T17:02:26.453`) -* [CVE-2023-33946](CVE-2023/CVE-2023-339xx/CVE-2023-33946.json) (`2023-06-01T17:04:51.023`) -* [CVE-2023-0455](CVE-2023/CVE-2023-04xx/CVE-2023-0455.json) (`2023-06-01T17:15:09.687`) -* [CVE-2023-0527](CVE-2023/CVE-2023-05xx/CVE-2023-0527.json) (`2023-06-01T17:15:09.777`) -* [CVE-2023-33440](CVE-2023/CVE-2023-334xx/CVE-2023-33440.json) (`2023-06-01T17:15:10.743`) -* [CVE-2023-2798](CVE-2023/CVE-2023-27xx/CVE-2023-2798.json) (`2023-06-01T17:16:08.340`) -* [CVE-2023-2065](CVE-2023/CVE-2023-20xx/CVE-2023-2065.json) (`2023-06-01T17:17:53.737`) -* [CVE-2023-33248](CVE-2023/CVE-2023-332xx/CVE-2023-33248.json) (`2023-06-01T17:20:32.917`) -* [CVE-2023-32694](CVE-2023/CVE-2023-326xx/CVE-2023-32694.json) (`2023-06-01T17:21:00.157`) -* [CVE-2023-2851](CVE-2023/CVE-2023-28xx/CVE-2023-2851.json) (`2023-06-01T17:25:44.113`) -* [CVE-2023-0950](CVE-2023/CVE-2023-09xx/CVE-2023-0950.json) (`2023-06-01T17:29:08.973`) -* [CVE-2023-3035](CVE-2023/CVE-2023-30xx/CVE-2023-3035.json) (`2023-06-01T17:29:59.710`) -* [CVE-2023-33551](CVE-2023/CVE-2023-335xx/CVE-2023-33551.json) (`2023-06-01T17:29:59.710`) -* [CVE-2023-33552](CVE-2023/CVE-2023-335xx/CVE-2023-33552.json) (`2023-06-01T17:29:59.710`) -* [CVE-2023-33965](CVE-2023/CVE-2023-339xx/CVE-2023-33965.json) (`2023-06-01T17:29:59.710`) -* [CVE-2023-2255](CVE-2023/CVE-2023-22xx/CVE-2023-2255.json) (`2023-06-01T17:34:36.870`) -* [CVE-2023-33263](CVE-2023/CVE-2023-332xx/CVE-2023-33263.json) (`2023-06-01T17:43:37.417`) -* [CVE-2023-32349](CVE-2023/CVE-2023-323xx/CVE-2023-32349.json) (`2023-06-01T17:54:27.743`) -* [CVE-2023-32350](CVE-2023/CVE-2023-323xx/CVE-2023-32350.json) (`2023-06-01T17:55:09.873`) -* [CVE-2023-33279](CVE-2023/CVE-2023-332xx/CVE-2023-33279.json) (`2023-06-01T17:56:19.410`) -* [CVE-2023-32074](CVE-2023/CVE-2023-320xx/CVE-2023-32074.json) (`2023-06-01T17:58:20.773`) +* [CVE-2023-2903](CVE-2023/CVE-2023-29xx/CVE-2023-2903.json) (`2023-06-01T18:13:41.700`) +* [CVE-2023-33216](CVE-2023/CVE-2023-332xx/CVE-2023-33216.json) (`2023-06-01T18:16:57.607`) +* [CVE-2023-31458](CVE-2023/CVE-2023-314xx/CVE-2023-31458.json) (`2023-06-01T18:17:49.983`) +* [CVE-2023-2902](CVE-2023/CVE-2023-29xx/CVE-2023-2902.json) (`2023-06-01T18:28:55.667`) +* [CVE-2023-31759](CVE-2023/CVE-2023-317xx/CVE-2023-31759.json) (`2023-06-01T18:56:41.127`) +* [CVE-2023-2901](CVE-2023/CVE-2023-29xx/CVE-2023-2901.json) (`2023-06-01T19:07:54.200`) +* [CVE-2023-31761](CVE-2023/CVE-2023-317xx/CVE-2023-31761.json) (`2023-06-01T19:09:10.693`) +* [CVE-2023-31763](CVE-2023/CVE-2023-317xx/CVE-2023-31763.json) (`2023-06-01T19:10:04.900`) +* [CVE-2023-31762](CVE-2023/CVE-2023-317xx/CVE-2023-31762.json) (`2023-06-01T19:10:08.670`) +* [CVE-2023-33315](CVE-2023/CVE-2023-333xx/CVE-2023-33315.json) (`2023-06-01T19:11:24.440`) +* [CVE-2023-2804](CVE-2023/CVE-2023-28xx/CVE-2023-2804.json) (`2023-06-01T19:13:31.813`) +* [CVE-2023-2900](CVE-2023/CVE-2023-29xx/CVE-2023-2900.json) (`2023-06-01T19:18:21.187`) +* [CVE-2023-28382](CVE-2023/CVE-2023-283xx/CVE-2023-28382.json) (`2023-06-01T19:20:13.567`) +* [CVE-2023-22970](CVE-2023/CVE-2023-229xx/CVE-2023-22970.json) (`2023-06-01T19:26:48.843`) +* [CVE-2023-33314](CVE-2023/CVE-2023-333xx/CVE-2023-33314.json) (`2023-06-01T19:35:38.377`) +* [CVE-2023-33309](CVE-2023/CVE-2023-333xx/CVE-2023-33309.json) (`2023-06-01T19:36:01.710`) +* [CVE-2023-24601](CVE-2023/CVE-2023-246xx/CVE-2023-24601.json) (`2023-06-01T19:40:04.533`) +* [CVE-2023-24599](CVE-2023/CVE-2023-245xx/CVE-2023-24599.json) (`2023-06-01T19:40:28.567`) +* [CVE-2023-24602](CVE-2023/CVE-2023-246xx/CVE-2023-24602.json) (`2023-06-01T19:43:50.527`) +* [CVE-2023-24600](CVE-2023/CVE-2023-246xx/CVE-2023-24600.json) (`2023-06-01T19:51:52.210`) ## Download and Usage