Auto-Update: 2023-05-18 16:00:40.901454+00:00

This commit is contained in:
cad-safe-bot 2023-05-18 16:00:44 +00:00
parent 2eaed1a99f
commit 58eb1fdd2f
11 changed files with 213 additions and 68 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-0598",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2018-06-26T14:29:01.507",
"lastModified": "2018-08-17T17:21:41.777",
"lastModified": "2023-05-18T14:37:47.437",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -104,7 +104,7 @@
"url": "https://blogs.technet.microsoft.com/srd/2018/04/04/triaging-a-dll-planting-vulnerability/",
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
"Broken Link"
]
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-14788",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-08-15T16:15:12.197",
"lastModified": "2023-02-24T19:33:48.540",
"lastModified": "2023-05-18T15:03:03.467",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tribulant:newsletter:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:tribulant:newsletters:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.6.19",
"matchCriteriaId": "7E8EAC91-F8CA-4F0C-8DEA-D69EF37BB3AA"
"matchCriteriaId": "7280034C-EB80-4394-B918-74FDD271FE01"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-9567",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-03-04T18:29:00.350",
"lastModified": "2019-03-07T20:29:10.610",
"lastModified": "2023-05-18T15:42:36.547",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmudev:forminator_contact_form\\,_poll_\\&_quiz_builder:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:incsub:forminator:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.6",
"matchCriteriaId": "A4906789-89FE-4621-B7BD-F31D0E73CF7C"
"matchCriteriaId": "6C24BBED-4BFB-44AA-B1DC-4E30374CEA45"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-9568",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-03-04T18:29:00.443",
"lastModified": "2019-03-07T20:31:12.643",
"lastModified": "2023-05-18T15:42:17.260",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -15,13 +15,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -84,9 +84,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmudev:forminator_contact_form\\,_poll_\\&_quiz_builder:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:incsub:forminator:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.6",
"matchCriteriaId": "A4906789-89FE-4621-B7BD-F31D0E73CF7C"
"matchCriteriaId": "6C24BBED-4BFB-44AA-B1DC-4E30374CEA45"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-35933",
"sourceIdentifier": "cve@mitre.org",
"published": "2021-01-01T02:15:13.237",
"lastModified": "2021-01-11T21:45:13.743",
"lastModified": "2023-05-18T15:42:47.343",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -104,9 +104,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tribulant:newsletter:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:thenewsletterplugin:newsletter:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "6.8.2",
"matchCriteriaId": "2D7279C7-C1D4-48CC-8EB5-24C7B9A299DC"
"matchCriteriaId": "4D40EFC9-F2A3-43FB-9D55-8E01F71B2C2C"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-24142",
"sourceIdentifier": "contact@wpscan.com",
"published": "2021-03-18T15:15:15.137",
"lastModified": "2021-03-22T19:44:38.653",
"lastModified": "2023-05-18T15:41:54.550",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -94,9 +94,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:premiumwpsuite:easy_redirect_manager:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:webfactoryltd:301_redirects:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.51",
"matchCriteriaId": "068B3F84-8D67-4EA6-B454-AA5D89CFBDBB"
"matchCriteriaId": "55AE97B0-8B05-4146-A74E-0A0A3011E112"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-21162",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:10.603",
"lastModified": "2023-05-10T14:38:37.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T15:06:14.223",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,44 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00833.html",
"source": "secure@intel.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:nuc_hdmi_firmware_update_tool:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.79.1.1",
"matchCriteriaId": "F131EC74-C874-4E54-999F-C8FB3AB82E93"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00833.html",
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-21239",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:10.920",
"lastModified": "2023-05-10T14:38:37.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T15:02:20.717",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,44 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html",
"source": "secure@intel.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:quickassist_technology:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.9.0-0008",
"matchCriteriaId": "86BE13DF-9A7F-48BB-8783-669A13AF4345"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html",
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-21804",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:11.010",
"lastModified": "2023-05-10T14:38:37.273",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-18T15:01:51.387",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,44 @@
}
]
},
"references": [
"weaknesses": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html",
"source": "secure@intel.com"
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:intel:quickassist_technology:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "1.9.0.-0008",
"matchCriteriaId": "6FAD6736-0D86-4588-921A-254366C4811D"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00809.html",
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-45770",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-01-26T22:15:25.653",
"lastModified": "2023-02-21T14:15:13.733",
"lastModified": "2023-05-18T14:15:09.467",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Improper input validation in driver adgnetworkwfpdrv.sys in Adguard For Windows x86 up to version 7.11 allows attacker to gain local privileges escalation."
"value": "Improper input validation in adgnetworkwfpdrv.sys in Adguard For Windows x86 through 7.11 allows local privilege escalation."
}
],
"metrics": {

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-18T14:00:32.002606+00:00
2023-05-18T16:00:40.901454+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-18T13:27:34.690000+00:00
2023-05-18T15:42:47.343000+00:00
```
### Last Data Feed Release
@ -34,41 +34,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `0`
* [CVE-2023-2789](CVE-2023/CVE-2023-27xx/CVE-2023-2789.json) (`2023-05-18T13:15:09.507`)
* [CVE-2023-2790](CVE-2023/CVE-2023-27xx/CVE-2023-2790.json) (`2023-05-18T13:15:09.603`)
### CVEs modified in the last Commit
Recently modified CVEs: `86`
Recently modified CVEs: `10`
* [CVE-2023-20182](CVE-2023/CVE-2023-201xx/CVE-2023-20182.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-20183](CVE-2023/CVE-2023-201xx/CVE-2023-20183.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-20184](CVE-2023/CVE-2023-201xx/CVE-2023-20184.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-20189](CVE-2023/CVE-2023-201xx/CVE-2023-20189.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-27217](CVE-2023/CVE-2023-272xx/CVE-2023-27217.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-2757](CVE-2023/CVE-2023-27xx/CVE-2023-2757.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-33203](CVE-2023/CVE-2023-332xx/CVE-2023-33203.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-33204](CVE-2023/CVE-2023-332xx/CVE-2023-33204.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-28369](CVE-2023/CVE-2023-283xx/CVE-2023-28369.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-30487](CVE-2023/CVE-2023-304xx/CVE-2023-30487.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-30868](CVE-2023/CVE-2023-308xx/CVE-2023-30868.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-31233](CVE-2023/CVE-2023-312xx/CVE-2023-31233.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-32515](CVE-2023/CVE-2023-325xx/CVE-2023-32515.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-23667](CVE-2023/CVE-2023-236xx/CVE-2023-23667.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-23999](CVE-2023/CVE-2023-239xx/CVE-2023-23999.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-25698](CVE-2023/CVE-2023-256xx/CVE-2023-25698.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-27423](CVE-2023/CVE-2023-274xx/CVE-2023-27423.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-27430](CVE-2023/CVE-2023-274xx/CVE-2023-27430.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-2782](CVE-2023/CVE-2023-27xx/CVE-2023-2782.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-30780](CVE-2023/CVE-2023-307xx/CVE-2023-30780.json) (`2023-05-18T12:53:07.890`)
* [CVE-2023-30354](CVE-2023/CVE-2023-303xx/CVE-2023-30354.json) (`2023-05-18T12:55:54.787`)
* [CVE-2023-31531](CVE-2023/CVE-2023-315xx/CVE-2023-31531.json) (`2023-05-18T13:26:13.030`)
* [CVE-2023-31530](CVE-2023/CVE-2023-315xx/CVE-2023-31530.json) (`2023-05-18T13:26:52.670`)
* [CVE-2023-31529](CVE-2023/CVE-2023-315xx/CVE-2023-31529.json) (`2023-05-18T13:27:17.197`)
* [CVE-2023-31528](CVE-2023/CVE-2023-315xx/CVE-2023-31528.json) (`2023-05-18T13:27:34.690`)
* [CVE-2018-0598](CVE-2018/CVE-2018-05xx/CVE-2018-0598.json) (`2023-05-18T14:37:47.437`)
* [CVE-2019-14788](CVE-2019/CVE-2019-147xx/CVE-2019-14788.json) (`2023-05-18T15:03:03.467`)
* [CVE-2019-9568](CVE-2019/CVE-2019-95xx/CVE-2019-9568.json) (`2023-05-18T15:42:17.260`)
* [CVE-2019-9567](CVE-2019/CVE-2019-95xx/CVE-2019-9567.json) (`2023-05-18T15:42:36.547`)
* [CVE-2020-35933](CVE-2020/CVE-2020-359xx/CVE-2020-35933.json) (`2023-05-18T15:42:47.343`)
* [CVE-2021-24142](CVE-2021/CVE-2021-241xx/CVE-2021-24142.json) (`2023-05-18T15:41:54.550`)
* [CVE-2022-45770](CVE-2022/CVE-2022-457xx/CVE-2022-45770.json) (`2023-05-18T14:15:09.467`)
* [CVE-2022-21804](CVE-2022/CVE-2022-218xx/CVE-2022-21804.json) (`2023-05-18T15:01:51.387`)
* [CVE-2022-21239](CVE-2022/CVE-2022-212xx/CVE-2022-21239.json) (`2023-05-18T15:02:20.717`)
* [CVE-2022-21162](CVE-2022/CVE-2022-211xx/CVE-2022-21162.json) (`2023-05-18T15:06:14.223`)
## Download and Usage