Auto-Update: 2023-05-19 02:00:45.437942+00:00

This commit is contained in:
cad-safe-bot 2023-05-19 02:00:49 +00:00
parent bb959af68f
commit 5bffc28cb4
10 changed files with 783 additions and 75 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25568",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-05-10T14:15:32.187",
"lastModified": "2023-05-10T14:38:19.080",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-19T01:53:27.043",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -36,8 +56,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -50,22 +80,58 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:protocol:boxo:0.4.0:*:*:*:*:go:*:*",
"matchCriteriaId": "E5D4F0B2-1C1A-4BBB-B133-EB87E61AD2B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:protocol:boxo:0.5.0:*:*:*:*:go:*:*",
"matchCriteriaId": "ECB93B03-A1E1-4A87-994C-2AC70D3FF5CA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ipfs/boxo/commit/62cbac40b96f49e39cd7fedc77ee6b56adce4916",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/ipfs/boxo/commit/9cb5cb54d40b57084d1221ba83b9e6bb3fcc3197",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/ipfs/boxo/commit/baa748b682fabb21a4c1f7628a8af348d4645974",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/ipfs/go-libipfs/security/advisories/GHSA-m974-xj4j-7qv5",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25776",
"sourceIdentifier": "secure@intel.com",
"published": "2023-05-10T14:15:32.490",
"lastModified": "2023-05-10T14:38:25.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-19T01:54:22.113",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
},
{
"source": "secure@intel.com",
"type": "Secondary",
@ -34,10 +54,308 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:server_system_d50tnp1mhcrlc_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.90",
"matchCriteriaId": "63DC5770-6109-4181-A2F9-35146DFD1FDC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:server_system_d50tnp1mhcrlc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E07ECAC5-D17C-4602-9F2A-B7AE1DFF0818"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:server_system_d50tnp1mhcpac_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.90",
"matchCriteriaId": "2E7588C0-6232-4969-B94F-835D8DECE894"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:server_system_d50tnp1mhcpac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB006675-7691-40AB-9563-86CF841B84C8"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:server_system_d50tnp2mhsvac_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.90",
"matchCriteriaId": "D969D7F5-58AD-4B54-9579-0EFC0C19EFDC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:server_system_d50tnp2mhsvac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A45DED88-F3FE-41C7-B97A-830EC2B1C757"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:server_system_d50tnp2mhstac_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.90",
"matchCriteriaId": "0E2D40D8-D1D4-443F-8E0C-A787CC01B794"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:server_system_d50tnp2mhstac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF40323A-00D7-4422-9E47-9B419BD761F9"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:server_system_d50tnp1mhcrac_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.90",
"matchCriteriaId": "DCDDE560-F58E-4620-90A7-6CAC4C00F9EB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:server_system_d50tnp1mhcrac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6474F3CF-2D17-4CCD-8A5A-7C4EB84B9EB1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:server_system_d50tnp2mfalac_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.90",
"matchCriteriaId": "30221D4C-6BA7-4EC6-89FA-67F3BC68C237"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:server_system_d50tnp2mfalac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4B9EAF1-8AF8-4A9F-A8C7-043F979C2C44"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:server_system_m50cyp1ur204_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.90",
"matchCriteriaId": "B4826826-A129-4A64-AF27-5168A2FF1ED4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:server_system_m50cyp1ur204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A102CB0A-9D55-41C6-80E2-B596A0C94D03"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:server_system_m50cyp1ur212_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.90",
"matchCriteriaId": "73008132-69ED-46E7-8D6D-060DFDCC1A2D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:server_system_m50cyp1ur212:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8A3D489-D50E-4768-92A9-61949544224C"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:server_system_m50cyp2ur312_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.90",
"matchCriteriaId": "72061DFD-D850-4F75-A299-7E035E4E4416"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:server_system_m50cyp2ur312:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D91066F0-B4DA-450C-A0A3-F888959B2A10"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:intel:server_system_m50cyp2ur208_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.90",
"matchCriteriaId": "1422D93E-6E61-45C3-BFCD-967AF06B5AAB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:intel:server_system_m50cyp2ur208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33C4712C-CBFE-4CF3-996F-CB0922101093"
}
]
}
]
}
],
"references": [
{
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html",
"source": "secure@intel.com"
"source": "secure@intel.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2667",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T07:15:08.627",
"lastModified": "2023-05-12T14:22:01.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-19T01:56:31.277",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,14 +93,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lost_and_found_information_system_project:lost_and_found_information_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E7B84257-5F4C-48D4-8097-A6FA541667BE"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.228883",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.228883",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2668",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T07:15:08.733",
"lastModified": "2023-05-12T14:22:01.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-19T01:56:23.603",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,14 +93,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lost_and_found_information_system_project:lost_and_found_information_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E7B84257-5F4C-48D4-8097-A6FA541667BE"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.228884",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.228884",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2669",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T08:15:09.063",
"lastModified": "2023-05-12T14:21:57.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-19T01:56:16.017",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -61,7 +83,7 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -69,16 +91,49 @@
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lost_and_found_information_system_project:lost_and_found_information_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E7B84257-5F4C-48D4-8097-A6FA541667BE"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.228885",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.228885",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2670",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T08:15:09.130",
"lastModified": "2023-05-12T14:21:57.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-19T01:56:35.927",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,14 +93,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lost_and_found_information_system_project:lost_and_found_information_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E7B84257-5F4C-48D4-8097-A6FA541667BE"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.228886",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.228886",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2671",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T09:15:10.447",
"lastModified": "2023-05-12T14:21:57.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-19T01:56:39.580",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,14 +93,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lost_and_found_information_system_project:lost_and_found_information_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E7B84257-5F4C-48D4-8097-A6FA541667BE"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.228887",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.228887",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2672",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-12T09:15:10.520",
"lastModified": "2023-05-12T14:21:57.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-19T01:55:50.923",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,14 +93,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lost_and_found_information_system_project:lost_and_found_information_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E7B84257-5F4C-48D4-8097-A6FA541667BE"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.228888",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.228888",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,27 +2,91 @@
"id": "CVE-2023-32668",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-11T06:15:10.000",
"lastModified": "2023-05-11T13:36:25.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-19T01:53:41.537",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "LuaTeX before 1.17.0 enables the socket library by default."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:luatex_project:luatex:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.17.0",
"matchCriteriaId": "58757D4F-419C-4613-AEC1-4D6792932B4F"
}
]
}
]
}
],
"references": [
{
"url": "https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/blob/b266ef076c96b382cd23a4c93204e247bb98626a/source/texk/web2c/luatexdir/ChangeLog#L1-L3",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/tags/1.17.0",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "https://tug.org/pipermail/tex-live/2023-May/049188.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Mitigation"
]
}
]
}

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-18T23:55:26.760831+00:00
2023-05-19T02:00:45.437942+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-18T23:15:09.783000+00:00
2023-05-19T01:56:39.580000+00:00
```
### Last Data Feed Release
@ -23,7 +23,7 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2023-05-18T00:00:13.558935+00:00
2023-05-19T00:00:13.556684+00:00
```
### Total Number of included CVEs
@ -34,43 +34,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### CVEs added in the last Commit
Recently added CVEs: `12`
Recently added CVEs: `0`
* [CVE-2022-35798](CVE-2022/CVE-2022-357xx/CVE-2022-35798.json) (`2023-05-18T23:15:09.700`)
* [CVE-2023-1195](CVE-2023/CVE-2023-11xx/CVE-2023-1195.json) (`2023-05-18T22:15:09.373`)
* [CVE-2023-23556](CVE-2023/CVE-2023-235xx/CVE-2023-23556.json) (`2023-05-18T22:15:09.487`)
* [CVE-2023-23557](CVE-2023/CVE-2023-235xx/CVE-2023-23557.json) (`2023-05-18T22:15:09.540`)
* [CVE-2023-23759](CVE-2023/CVE-2023-237xx/CVE-2023-23759.json) (`2023-05-18T22:15:09.597`)
* [CVE-2023-24832](CVE-2023/CVE-2023-248xx/CVE-2023-24832.json) (`2023-05-18T22:15:09.650`)
* [CVE-2023-24833](CVE-2023/CVE-2023-248xx/CVE-2023-24833.json) (`2023-05-18T22:15:09.700`)
* [CVE-2023-25933](CVE-2023/CVE-2023-259xx/CVE-2023-25933.json) (`2023-05-18T22:15:09.750`)
* [CVE-2023-28081](CVE-2023/CVE-2023-280xx/CVE-2023-28081.json) (`2023-05-18T22:15:09.807`)
* [CVE-2023-28753](CVE-2023/CVE-2023-287xx/CVE-2023-28753.json) (`2023-05-18T22:15:09.860`)
* [CVE-2023-30470](CVE-2023/CVE-2023-304xx/CVE-2023-30470.json) (`2023-05-18T22:15:09.930`)
* [CVE-2023-32680](CVE-2023/CVE-2023-326xx/CVE-2023-32680.json) (`2023-05-18T23:15:09.783`)
### CVEs modified in the last Commit
Recently modified CVEs: `17`
Recently modified CVEs: `9`
* [CVE-2022-32766](CVE-2022/CVE-2022-327xx/CVE-2022-32766.json) (`2023-05-18T22:53:45.860`)
* [CVE-2022-32582](CVE-2022/CVE-2022-325xx/CVE-2022-32582.json) (`2023-05-18T22:54:04.417`)
* [CVE-2022-37409](CVE-2022/CVE-2022-374xx/CVE-2022-37409.json) (`2023-05-18T22:54:36.777`)
* [CVE-2022-38087](CVE-2022/CVE-2022-380xx/CVE-2022-38087.json) (`2023-05-18T22:54:50.870`)
* [CVE-2022-44619](CVE-2022/CVE-2022-446xx/CVE-2022-44619.json) (`2023-05-18T22:55:46.607`)
* [CVE-2022-45128](CVE-2022/CVE-2022-451xx/CVE-2022-45128.json) (`2023-05-18T22:58:41.883`)
* [CVE-2022-42465](CVE-2022/CVE-2022-424xx/CVE-2022-42465.json) (`2023-05-18T22:58:51.940`)
* [CVE-2022-41658](CVE-2022/CVE-2022-416xx/CVE-2022-41658.json) (`2023-05-18T22:59:06.100`)
* [CVE-2022-41784](CVE-2022/CVE-2022-417xx/CVE-2022-41784.json) (`2023-05-18T22:59:14.170`)
* [CVE-2023-28411](CVE-2023/CVE-2023-284xx/CVE-2023-28411.json) (`2023-05-18T22:55:00.777`)
* [CVE-2023-23910](CVE-2023/CVE-2023-239xx/CVE-2023-23910.json) (`2023-05-18T22:55:14.143`)
* [CVE-2023-23580](CVE-2023/CVE-2023-235xx/CVE-2023-23580.json) (`2023-05-18T22:55:31.917`)
* [CVE-2023-23569](CVE-2023/CVE-2023-235xx/CVE-2023-23569.json) (`2023-05-18T22:55:38.503`)
* [CVE-2023-23909](CVE-2023/CVE-2023-239xx/CVE-2023-23909.json) (`2023-05-18T22:55:55.627`)
* [CVE-2023-24475](CVE-2023/CVE-2023-244xx/CVE-2023-24475.json) (`2023-05-18T22:56:10.760`)
* [CVE-2023-25545](CVE-2023/CVE-2023-255xx/CVE-2023-25545.json) (`2023-05-18T22:56:21.193`)
* [CVE-2023-25175](CVE-2023/CVE-2023-251xx/CVE-2023-25175.json) (`2023-05-18T22:56:32.443`)
* [CVE-2023-25568](CVE-2023/CVE-2023-255xx/CVE-2023-25568.json) (`2023-05-19T01:53:27.043`)
* [CVE-2023-32668](CVE-2023/CVE-2023-326xx/CVE-2023-32668.json) (`2023-05-19T01:53:41.537`)
* [CVE-2023-25776](CVE-2023/CVE-2023-257xx/CVE-2023-25776.json) (`2023-05-19T01:54:22.113`)
* [CVE-2023-2672](CVE-2023/CVE-2023-26xx/CVE-2023-2672.json) (`2023-05-19T01:55:50.923`)
* [CVE-2023-2669](CVE-2023/CVE-2023-26xx/CVE-2023-2669.json) (`2023-05-19T01:56:16.017`)
* [CVE-2023-2668](CVE-2023/CVE-2023-26xx/CVE-2023-2668.json) (`2023-05-19T01:56:23.603`)
* [CVE-2023-2667](CVE-2023/CVE-2023-26xx/CVE-2023-2667.json) (`2023-05-19T01:56:31.277`)
* [CVE-2023-2670](CVE-2023/CVE-2023-26xx/CVE-2023-2670.json) (`2023-05-19T01:56:35.927`)
* [CVE-2023-2671](CVE-2023/CVE-2023-26xx/CVE-2023-2671.json) (`2023-05-19T01:56:39.580`)
## Download and Usage