Auto-Update: 2023-05-18 16:00:40.901454+00:00

This commit is contained in:
cad-safe-bot 2023-05-18 16:00:44 +00:00
parent 2eaed1a99f
commit 58eb1fdd2f
11 changed files with 213 additions and 68 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-0598", "id": "CVE-2018-0598",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2018-06-26T14:29:01.507", "published": "2018-06-26T14:29:01.507",
"lastModified": "2018-08-17T17:21:41.777", "lastModified": "2023-05-18T14:37:47.437",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL", "attackVector": "LOCAL",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -104,7 +104,7 @@
"url": "https://blogs.technet.microsoft.com/srd/2018/04/04/triaging-a-dll-planting-vulnerability/", "url": "https://blogs.technet.microsoft.com/srd/2018/04/04/triaging-a-dll-planting-vulnerability/",
"source": "vultures@jpcert.or.jp", "source": "vultures@jpcert.or.jp",
"tags": [ "tags": [
"Vendor Advisory" "Broken Link"
] ]
} }
] ]

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-14788", "id": "CVE-2019-14788",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2019-08-15T16:15:12.197", "published": "2019-08-15T16:15:12.197",
"lastModified": "2023-02-24T19:33:48.540", "lastModified": "2023-05-18T15:03:03.467",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -84,9 +84,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:tribulant:newsletter:*:*:*:*:*:wordpress:*:*", "criteria": "cpe:2.3:a:tribulant:newsletters:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.6.19", "versionEndExcluding": "4.6.19",
"matchCriteriaId": "7E8EAC91-F8CA-4F0C-8DEA-D69EF37BB3AA" "matchCriteriaId": "7280034C-EB80-4394-B918-74FDD271FE01"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-9567", "id": "CVE-2019-9567",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2019-03-04T18:29:00.350", "published": "2019-03-04T18:29:00.350",
"lastModified": "2019-03-07T20:29:10.610", "lastModified": "2023-05-18T15:42:36.547",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -84,9 +84,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:wpmudev:forminator_contact_form\\,_poll_\\&_quiz_builder:*:*:*:*:*:wordpress:*:*", "criteria": "cpe:2.3:a:incsub:forminator:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.6", "versionEndExcluding": "1.6",
"matchCriteriaId": "A4906789-89FE-4621-B7BD-F31D0E73CF7C" "matchCriteriaId": "6C24BBED-4BFB-44AA-B1DC-4E30374CEA45"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-9568", "id": "CVE-2019-9568",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2019-03-04T18:29:00.443", "published": "2019-03-04T18:29:00.443",
"lastModified": "2019-03-07T20:31:12.643", "lastModified": "2023-05-18T15:42:17.260",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "LOW", "privilegesRequired": "LOW",
@ -84,9 +84,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:wpmudev:forminator_contact_form\\,_poll_\\&_quiz_builder:*:*:*:*:*:wordpress:*:*", "criteria": "cpe:2.3:a:incsub:forminator:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.6", "versionEndExcluding": "1.6",
"matchCriteriaId": "A4906789-89FE-4621-B7BD-F31D0E73CF7C" "matchCriteriaId": "6C24BBED-4BFB-44AA-B1DC-4E30374CEA45"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-35933", "id": "CVE-2020-35933",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2021-01-01T02:15:13.237", "published": "2021-01-01T02:15:13.237",
"lastModified": "2021-01-11T21:45:13.743", "lastModified": "2023-05-18T15:42:47.343",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -104,9 +104,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:tribulant:newsletter:*:*:*:*:*:wordpress:*:*", "criteria": "cpe:2.3:a:thenewsletterplugin:newsletter:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "6.8.2", "versionEndExcluding": "6.8.2",
"matchCriteriaId": "2D7279C7-C1D4-48CC-8EB5-24C7B9A299DC" "matchCriteriaId": "4D40EFC9-F2A3-43FB-9D55-8E01F71B2C2C"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-24142", "id": "CVE-2021-24142",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2021-03-18T15:15:15.137", "published": "2021-03-18T15:15:15.137",
"lastModified": "2021-03-22T19:44:38.653", "lastModified": "2023-05-18T15:41:54.550",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -94,9 +94,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:premiumwpsuite:easy_redirect_manager:*:*:*:*:*:wordpress:*:*", "criteria": "cpe:2.3:a:webfactoryltd:301_redirects:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.51", "versionEndExcluding": "2.51",
"matchCriteriaId": "068B3F84-8D67-4EA6-B454-AA5D89CFBDBB" "matchCriteriaId": "55AE97B0-8B05-4146-A74E-0A0A3011E112"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-21162", "id": "CVE-2022-21162",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:10.603", "published": "2023-05-10T14:15:10.603",
"lastModified": "2023-05-10T14:38:37.273", "lastModified": "2023-05-18T15:06:14.223",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -12,6 +12,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
},
{ {
"source": "secure@intel.com", "source": "secure@intel.com",
"type": "Secondary", "type": "Secondary",
@ -34,10 +54,44 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00833.html", "source": "nvd@nist.gov",
"source": "secure@intel.com" "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:nuc_hdmi_firmware_update_tool:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.79.1.1",
"matchCriteriaId": "F131EC74-C874-4E54-999F-C8FB3AB82E93"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00833.html",
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-21239", "id": "CVE-2022-21239",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:10.920", "published": "2023-05-10T14:15:10.920",
"lastModified": "2023-05-10T14:38:37.273", "lastModified": "2023-05-18T15:02:20.717",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -12,6 +12,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{ {
"source": "secure@intel.com", "source": "secure@intel.com",
"type": "Secondary", "type": "Secondary",
@ -34,10 +54,44 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html", "source": "nvd@nist.gov",
"source": "secure@intel.com" "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:quickassist_technology:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.9.0-0008",
"matchCriteriaId": "86BE13DF-9A7F-48BB-8783-669A13AF4345"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html",
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-21804", "id": "CVE-2022-21804",
"sourceIdentifier": "secure@intel.com", "sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:11.010", "published": "2023-05-10T14:15:11.010",
"lastModified": "2023-05-10T14:38:37.273", "lastModified": "2023-05-18T15:01:51.387",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -12,6 +12,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{ {
"source": "secure@intel.com", "source": "secure@intel.com",
"type": "Secondary", "type": "Secondary",
@ -34,10 +54,44 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html", "source": "nvd@nist.gov",
"source": "secure@intel.com" "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:quickassist_technology:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.9.0.-0008",
"matchCriteriaId": "6FAD6736-0D86-4588-921A-254366C4811D"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html",
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-45770", "id": "CVE-2022-45770",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-01-26T22:15:25.653", "published": "2023-01-26T22:15:25.653",
"lastModified": "2023-02-21T14:15:13.733", "lastModified": "2023-05-18T14:15:09.467",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Improper input validation in driver adgnetworkwfpdrv.sys in Adguard For Windows x86 up to version 7.11 allows attacker to gain local privileges escalation." "value": "Improper input validation in adgnetworkwfpdrv.sys in Adguard For Windows x86 through 7.11 allows local privilege escalation."
} }
], ],
"metrics": { "metrics": {

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2023-05-18T14:00:32.002606+00:00 2023-05-18T16:00:40.901454+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2023-05-18T13:27:34.690000+00:00 2023-05-18T15:42:47.343000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -34,41 +34,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `2` Recently added CVEs: `0`
* [CVE-2023-2789](CVE-2023/CVE-2023-27xx/CVE-2023-2789.json) (`2023-05-18T13:15:09.507`)
* [CVE-2023-2790](CVE-2023/CVE-2023-27xx/CVE-2023-2790.json) (`2023-05-18T13:15:09.603`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `86` Recently modified CVEs: `10`
* [CVE-2023-20182](CVE-2023/CVE-2023-201xx/CVE-2023-20182.json) (`2023-05-18T12:53:07.890`) * [CVE-2018-0598](CVE-2018/CVE-2018-05xx/CVE-2018-0598.json) (`2023-05-18T14:37:47.437`)
* [CVE-2023-20183](CVE-2023/CVE-2023-201xx/CVE-2023-20183.json) (`2023-05-18T12:53:07.890`) * [CVE-2019-14788](CVE-2019/CVE-2019-147xx/CVE-2019-14788.json) (`2023-05-18T15:03:03.467`)
* [CVE-2023-20184](CVE-2023/CVE-2023-201xx/CVE-2023-20184.json) (`2023-05-18T12:53:07.890`) * [CVE-2019-9568](CVE-2019/CVE-2019-95xx/CVE-2019-9568.json) (`2023-05-18T15:42:17.260`)
* [CVE-2023-20189](CVE-2023/CVE-2023-201xx/CVE-2023-20189.json) (`2023-05-18T12:53:07.890`) * [CVE-2019-9567](CVE-2019/CVE-2019-95xx/CVE-2019-9567.json) (`2023-05-18T15:42:36.547`)
* [CVE-2023-27217](CVE-2023/CVE-2023-272xx/CVE-2023-27217.json) (`2023-05-18T12:53:07.890`) * [CVE-2020-35933](CVE-2020/CVE-2020-359xx/CVE-2020-35933.json) (`2023-05-18T15:42:47.343`)
* [CVE-2023-2757](CVE-2023/CVE-2023-27xx/CVE-2023-2757.json) (`2023-05-18T12:53:07.890`) * [CVE-2021-24142](CVE-2021/CVE-2021-241xx/CVE-2021-24142.json) (`2023-05-18T15:41:54.550`)
* [CVE-2023-33203](CVE-2023/CVE-2023-332xx/CVE-2023-33203.json) (`2023-05-18T12:53:07.890`) * [CVE-2022-45770](CVE-2022/CVE-2022-457xx/CVE-2022-45770.json) (`2023-05-18T14:15:09.467`)
* [CVE-2023-33204](CVE-2023/CVE-2023-332xx/CVE-2023-33204.json) (`2023-05-18T12:53:07.890`) * [CVE-2022-21804](CVE-2022/CVE-2022-218xx/CVE-2022-21804.json) (`2023-05-18T15:01:51.387`)
* [CVE-2023-28369](CVE-2023/CVE-2023-283xx/CVE-2023-28369.json) (`2023-05-18T12:53:07.890`) * [CVE-2022-21239](CVE-2022/CVE-2022-212xx/CVE-2022-21239.json) (`2023-05-18T15:02:20.717`)
* [CVE-2023-30487](CVE-2023/CVE-2023-304xx/CVE-2023-30487.json) (`2023-05-18T12:53:07.890`) * [CVE-2022-21162](CVE-2022/CVE-2022-211xx/CVE-2022-21162.json) (`2023-05-18T15:06:14.223`)
* [CVE-2023-30868](CVE-2023/CVE-2023-308xx/CVE-2023-30868.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-31233](CVE-2023/CVE-2023-312xx/CVE-2023-31233.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-32515](CVE-2023/CVE-2023-325xx/CVE-2023-32515.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-23667](CVE-2023/CVE-2023-236xx/CVE-2023-23667.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-23999](CVE-2023/CVE-2023-239xx/CVE-2023-23999.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-25698](CVE-2023/CVE-2023-256xx/CVE-2023-25698.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-27423](CVE-2023/CVE-2023-274xx/CVE-2023-27423.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-27430](CVE-2023/CVE-2023-274xx/CVE-2023-27430.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-2782](CVE-2023/CVE-2023-27xx/CVE-2023-2782.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-30780](CVE-2023/CVE-2023-307xx/CVE-2023-30780.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-30354](CVE-2023/CVE-2023-303xx/CVE-2023-30354.json) (`2023-05-18T12:55:54.787`)
* [CVE-2023-31531](CVE-2023/CVE-2023-315xx/CVE-2023-31531.json) (`2023-05-18T13:26:13.030`)
* [CVE-2023-31530](CVE-2023/CVE-2023-315xx/CVE-2023-31530.json) (`2023-05-18T13:26:52.670`)
* [CVE-2023-31529](CVE-2023/CVE-2023-315xx/CVE-2023-31529.json) (`2023-05-18T13:27:17.197`)
* [CVE-2023-31528](CVE-2023/CVE-2023-315xx/CVE-2023-31528.json) (`2023-05-18T13:27:34.690`)
## Download and Usage ## Download and Usage