diff --git a/CVE-2018/CVE-2018-05xx/CVE-2018-0598.json b/CVE-2018/CVE-2018-05xx/CVE-2018-0598.json index 5d2835de672..15fcf059f73 100644 --- a/CVE-2018/CVE-2018-05xx/CVE-2018-0598.json +++ b/CVE-2018/CVE-2018-05xx/CVE-2018-0598.json @@ -2,7 +2,7 @@ "id": "CVE-2018-0598", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2018-06-26T14:29:01.507", - "lastModified": "2018-08-17T17:21:41.777", + "lastModified": "2023-05-18T14:37:47.437", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -104,7 +104,7 @@ "url": "https://blogs.technet.microsoft.com/srd/2018/04/04/triaging-a-dll-planting-vulnerability/", "source": "vultures@jpcert.or.jp", "tags": [ - "Vendor Advisory" + "Broken Link" ] } ] diff --git a/CVE-2019/CVE-2019-147xx/CVE-2019-14788.json b/CVE-2019/CVE-2019-147xx/CVE-2019-14788.json index de82974803e..3905f2e9c42 100644 --- a/CVE-2019/CVE-2019-147xx/CVE-2019-14788.json +++ b/CVE-2019/CVE-2019-147xx/CVE-2019-14788.json @@ -2,7 +2,7 @@ "id": "CVE-2019-14788", "sourceIdentifier": "cve@mitre.org", "published": "2019-08-15T16:15:12.197", - "lastModified": "2023-02-24T19:33:48.540", + "lastModified": "2023-05-18T15:03:03.467", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:tribulant:newsletter:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:tribulant:newsletters:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "4.6.19", - "matchCriteriaId": "7E8EAC91-F8CA-4F0C-8DEA-D69EF37BB3AA" + "matchCriteriaId": "7280034C-EB80-4394-B918-74FDD271FE01" } ] } diff --git a/CVE-2019/CVE-2019-95xx/CVE-2019-9567.json b/CVE-2019/CVE-2019-95xx/CVE-2019-9567.json index 6897d2cf8a9..5420b68973e 100644 --- a/CVE-2019/CVE-2019-95xx/CVE-2019-9567.json +++ b/CVE-2019/CVE-2019-95xx/CVE-2019-9567.json @@ -2,7 +2,7 @@ "id": "CVE-2019-9567", "sourceIdentifier": "cve@mitre.org", "published": "2019-03-04T18:29:00.350", - "lastModified": "2019-03-07T20:29:10.610", + "lastModified": "2023-05-18T15:42:36.547", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wpmudev:forminator_contact_form\\,_poll_\\&_quiz_builder:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:incsub:forminator:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.6", - "matchCriteriaId": "A4906789-89FE-4621-B7BD-F31D0E73CF7C" + "matchCriteriaId": "6C24BBED-4BFB-44AA-B1DC-4E30374CEA45" } ] } diff --git a/CVE-2019/CVE-2019-95xx/CVE-2019-9568.json b/CVE-2019/CVE-2019-95xx/CVE-2019-9568.json index 8c938e40e6a..0318b38d7d3 100644 --- a/CVE-2019/CVE-2019-95xx/CVE-2019-9568.json +++ b/CVE-2019/CVE-2019-95xx/CVE-2019-9568.json @@ -2,7 +2,7 @@ "id": "CVE-2019-9568", "sourceIdentifier": "cve@mitre.org", "published": "2019-03-04T18:29:00.443", - "lastModified": "2019-03-07T20:31:12.643", + "lastModified": "2023-05-18T15:42:17.260", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -84,9 +84,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wpmudev:forminator_contact_form\\,_poll_\\&_quiz_builder:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:incsub:forminator:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.6", - "matchCriteriaId": "A4906789-89FE-4621-B7BD-F31D0E73CF7C" + "matchCriteriaId": "6C24BBED-4BFB-44AA-B1DC-4E30374CEA45" } ] } diff --git a/CVE-2020/CVE-2020-359xx/CVE-2020-35933.json b/CVE-2020/CVE-2020-359xx/CVE-2020-35933.json index 7a300e10411..b9499fa3bd3 100644 --- a/CVE-2020/CVE-2020-359xx/CVE-2020-35933.json +++ b/CVE-2020/CVE-2020-359xx/CVE-2020-35933.json @@ -2,7 +2,7 @@ "id": "CVE-2020-35933", "sourceIdentifier": "cve@mitre.org", "published": "2021-01-01T02:15:13.237", - "lastModified": "2021-01-11T21:45:13.743", + "lastModified": "2023-05-18T15:42:47.343", "vulnStatus": "Analyzed", "descriptions": [ { @@ -104,9 +104,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:tribulant:newsletter:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:thenewsletterplugin:newsletter:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "6.8.2", - "matchCriteriaId": "2D7279C7-C1D4-48CC-8EB5-24C7B9A299DC" + "matchCriteriaId": "4D40EFC9-F2A3-43FB-9D55-8E01F71B2C2C" } ] } diff --git a/CVE-2021/CVE-2021-241xx/CVE-2021-24142.json b/CVE-2021/CVE-2021-241xx/CVE-2021-24142.json index 91282e752b1..d71699bba1a 100644 --- a/CVE-2021/CVE-2021-241xx/CVE-2021-24142.json +++ b/CVE-2021/CVE-2021-241xx/CVE-2021-24142.json @@ -2,7 +2,7 @@ "id": "CVE-2021-24142", "sourceIdentifier": "contact@wpscan.com", "published": "2021-03-18T15:15:15.137", - "lastModified": "2021-03-22T19:44:38.653", + "lastModified": "2023-05-18T15:41:54.550", "vulnStatus": "Analyzed", "descriptions": [ { @@ -94,9 +94,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:premiumwpsuite:easy_redirect_manager:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:webfactoryltd:301_redirects:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.51", - "matchCriteriaId": "068B3F84-8D67-4EA6-B454-AA5D89CFBDBB" + "matchCriteriaId": "55AE97B0-8B05-4146-A74E-0A0A3011E112" } ] } diff --git a/CVE-2022/CVE-2022-211xx/CVE-2022-21162.json b/CVE-2022/CVE-2022-211xx/CVE-2022-21162.json index cab1b85d587..5e3c3aab4bb 100644 --- a/CVE-2022/CVE-2022-211xx/CVE-2022-21162.json +++ b/CVE-2022/CVE-2022-211xx/CVE-2022-21162.json @@ -2,8 +2,8 @@ "id": "CVE-2022-21162", "sourceIdentifier": "secure@intel.com", "published": "2023-05-10T14:15:10.603", - "lastModified": "2023-05-10T14:38:37.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-18T15:06:14.223", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:nuc_hdmi_firmware_update_tool:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.79.1.1", + "matchCriteriaId": "F131EC74-C874-4E54-999F-C8FB3AB82E93" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00833.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-212xx/CVE-2022-21239.json b/CVE-2022/CVE-2022-212xx/CVE-2022-21239.json index ee334861e44..20f025c9048 100644 --- a/CVE-2022/CVE-2022-212xx/CVE-2022-21239.json +++ b/CVE-2022/CVE-2022-212xx/CVE-2022-21239.json @@ -2,8 +2,8 @@ "id": "CVE-2022-21239", "sourceIdentifier": "secure@intel.com", "published": "2023-05-10T14:15:10.920", - "lastModified": "2023-05-10T14:38:37.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-18T15:02:20.717", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:quickassist_technology:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "1.9.0-0008", + "matchCriteriaId": "86BE13DF-9A7F-48BB-8783-669A13AF4345" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21804.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21804.json index c8f9a7c5e74..82b18ef7beb 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21804.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21804.json @@ -2,8 +2,8 @@ "id": "CVE-2022-21804", "sourceIdentifier": "secure@intel.com", "published": "2023-05-10T14:15:11.010", - "lastModified": "2023-05-10T14:38:37.273", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-18T15:01:51.387", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:quickassist_technology:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "1.9.0.-0008", + "matchCriteriaId": "6FAD6736-0D86-4588-921A-254366C4811D" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-457xx/CVE-2022-45770.json b/CVE-2022/CVE-2022-457xx/CVE-2022-45770.json index bf6e6123343..34e288c7b6f 100644 --- a/CVE-2022/CVE-2022-457xx/CVE-2022-45770.json +++ b/CVE-2022/CVE-2022-457xx/CVE-2022-45770.json @@ -2,12 +2,12 @@ "id": "CVE-2022-45770", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-26T22:15:25.653", - "lastModified": "2023-02-21T14:15:13.733", + "lastModified": "2023-05-18T14:15:09.467", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", - "value": "Improper input validation in driver adgnetworkwfpdrv.sys in Adguard For Windows x86 up to version 7.11 allows attacker to gain local privileges escalation." + "value": "Improper input validation in adgnetworkwfpdrv.sys in Adguard For Windows x86 through 7.11 allows local privilege escalation." } ], "metrics": { diff --git a/README.md b/README.md index a08ba61c2a3..11b8394ce70 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-18T14:00:32.002606+00:00 +2023-05-18T16:00:40.901454+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-18T13:27:34.690000+00:00 +2023-05-18T15:42:47.343000+00:00 ``` ### Last Data Feed Release @@ -34,41 +34,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `0` -* [CVE-2023-2789](CVE-2023/CVE-2023-27xx/CVE-2023-2789.json) (`2023-05-18T13:15:09.507`) -* [CVE-2023-2790](CVE-2023/CVE-2023-27xx/CVE-2023-2790.json) (`2023-05-18T13:15:09.603`) ### CVEs modified in the last Commit -Recently modified CVEs: `86` +Recently modified CVEs: `10` -* [CVE-2023-20182](CVE-2023/CVE-2023-201xx/CVE-2023-20182.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-20183](CVE-2023/CVE-2023-201xx/CVE-2023-20183.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-20184](CVE-2023/CVE-2023-201xx/CVE-2023-20184.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-20189](CVE-2023/CVE-2023-201xx/CVE-2023-20189.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-27217](CVE-2023/CVE-2023-272xx/CVE-2023-27217.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-2757](CVE-2023/CVE-2023-27xx/CVE-2023-2757.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-33203](CVE-2023/CVE-2023-332xx/CVE-2023-33203.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-33204](CVE-2023/CVE-2023-332xx/CVE-2023-33204.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-28369](CVE-2023/CVE-2023-283xx/CVE-2023-28369.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-30487](CVE-2023/CVE-2023-304xx/CVE-2023-30487.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-30868](CVE-2023/CVE-2023-308xx/CVE-2023-30868.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-31233](CVE-2023/CVE-2023-312xx/CVE-2023-31233.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-32515](CVE-2023/CVE-2023-325xx/CVE-2023-32515.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-23667](CVE-2023/CVE-2023-236xx/CVE-2023-23667.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-23999](CVE-2023/CVE-2023-239xx/CVE-2023-23999.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-25698](CVE-2023/CVE-2023-256xx/CVE-2023-25698.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-27423](CVE-2023/CVE-2023-274xx/CVE-2023-27423.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-27430](CVE-2023/CVE-2023-274xx/CVE-2023-27430.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-2782](CVE-2023/CVE-2023-27xx/CVE-2023-2782.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-30780](CVE-2023/CVE-2023-307xx/CVE-2023-30780.json) (`2023-05-18T12:53:07.890`) -* [CVE-2023-30354](CVE-2023/CVE-2023-303xx/CVE-2023-30354.json) (`2023-05-18T12:55:54.787`) -* [CVE-2023-31531](CVE-2023/CVE-2023-315xx/CVE-2023-31531.json) (`2023-05-18T13:26:13.030`) -* [CVE-2023-31530](CVE-2023/CVE-2023-315xx/CVE-2023-31530.json) (`2023-05-18T13:26:52.670`) -* [CVE-2023-31529](CVE-2023/CVE-2023-315xx/CVE-2023-31529.json) (`2023-05-18T13:27:17.197`) -* [CVE-2023-31528](CVE-2023/CVE-2023-315xx/CVE-2023-31528.json) (`2023-05-18T13:27:34.690`) +* [CVE-2018-0598](CVE-2018/CVE-2018-05xx/CVE-2018-0598.json) (`2023-05-18T14:37:47.437`) +* [CVE-2019-14788](CVE-2019/CVE-2019-147xx/CVE-2019-14788.json) (`2023-05-18T15:03:03.467`) +* [CVE-2019-9568](CVE-2019/CVE-2019-95xx/CVE-2019-9568.json) (`2023-05-18T15:42:17.260`) +* [CVE-2019-9567](CVE-2019/CVE-2019-95xx/CVE-2019-9567.json) (`2023-05-18T15:42:36.547`) +* [CVE-2020-35933](CVE-2020/CVE-2020-359xx/CVE-2020-35933.json) (`2023-05-18T15:42:47.343`) +* [CVE-2021-24142](CVE-2021/CVE-2021-241xx/CVE-2021-24142.json) (`2023-05-18T15:41:54.550`) +* [CVE-2022-45770](CVE-2022/CVE-2022-457xx/CVE-2022-45770.json) (`2023-05-18T14:15:09.467`) +* [CVE-2022-21804](CVE-2022/CVE-2022-218xx/CVE-2022-21804.json) (`2023-05-18T15:01:51.387`) +* [CVE-2022-21239](CVE-2022/CVE-2022-212xx/CVE-2022-21239.json) (`2023-05-18T15:02:20.717`) +* [CVE-2022-21162](CVE-2022/CVE-2022-211xx/CVE-2022-21162.json) (`2023-05-18T15:06:14.223`) ## Download and Usage