diff --git a/CVE-2023/CVE-2023-255xx/CVE-2023-25568.json b/CVE-2023/CVE-2023-255xx/CVE-2023-25568.json index 58de76f624e..5d667096d06 100644 --- a/CVE-2023/CVE-2023-255xx/CVE-2023-25568.json +++ b/CVE-2023/CVE-2023-255xx/CVE-2023-25568.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25568", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-10T14:15:32.187", - "lastModified": "2023-05-10T14:38:19.080", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-19T01:53:27.043", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -36,8 +56,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -50,22 +80,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:protocol:boxo:0.4.0:*:*:*:*:go:*:*", + "matchCriteriaId": "E5D4F0B2-1C1A-4BBB-B133-EB87E61AD2B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:protocol:boxo:0.5.0:*:*:*:*:go:*:*", + "matchCriteriaId": "ECB93B03-A1E1-4A87-994C-2AC70D3FF5CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ipfs/boxo/commit/62cbac40b96f49e39cd7fedc77ee6b56adce4916", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ipfs/boxo/commit/9cb5cb54d40b57084d1221ba83b9e6bb3fcc3197", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ipfs/boxo/commit/baa748b682fabb21a4c1f7628a8af348d4645974", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ipfs/go-libipfs/security/advisories/GHSA-m974-xj4j-7qv5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Mitigation", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25776.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25776.json index 0af3455f505..78a09462642 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25776.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25776.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25776", "sourceIdentifier": "secure@intel.com", "published": "2023-05-10T14:15:32.490", - "lastModified": "2023-05-10T14:38:25.967", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-19T01:54:22.113", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -12,6 +12,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -34,10 +54,308 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:server_system_d50tnp1mhcrlc_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.90", + "matchCriteriaId": "63DC5770-6109-4181-A2F9-35146DFD1FDC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:server_system_d50tnp1mhcrlc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E07ECAC5-D17C-4602-9F2A-B7AE1DFF0818" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:server_system_d50tnp1mhcpac_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.90", + "matchCriteriaId": "2E7588C0-6232-4969-B94F-835D8DECE894" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:server_system_d50tnp1mhcpac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB006675-7691-40AB-9563-86CF841B84C8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:server_system_d50tnp2mhsvac_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.90", + "matchCriteriaId": "D969D7F5-58AD-4B54-9579-0EFC0C19EFDC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:server_system_d50tnp2mhsvac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A45DED88-F3FE-41C7-B97A-830EC2B1C757" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:server_system_d50tnp2mhstac_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.90", + "matchCriteriaId": "0E2D40D8-D1D4-443F-8E0C-A787CC01B794" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:server_system_d50tnp2mhstac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF40323A-00D7-4422-9E47-9B419BD761F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:server_system_d50tnp1mhcrac_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.90", + "matchCriteriaId": "DCDDE560-F58E-4620-90A7-6CAC4C00F9EB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:server_system_d50tnp1mhcrac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6474F3CF-2D17-4CCD-8A5A-7C4EB84B9EB1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:server_system_d50tnp2mfalac_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.90", + "matchCriteriaId": "30221D4C-6BA7-4EC6-89FA-67F3BC68C237" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:server_system_d50tnp2mfalac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4B9EAF1-8AF8-4A9F-A8C7-043F979C2C44" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:server_system_m50cyp1ur204_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.90", + "matchCriteriaId": "B4826826-A129-4A64-AF27-5168A2FF1ED4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:server_system_m50cyp1ur204:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A102CB0A-9D55-41C6-80E2-B596A0C94D03" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:server_system_m50cyp1ur212_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.90", + "matchCriteriaId": "73008132-69ED-46E7-8D6D-060DFDCC1A2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:server_system_m50cyp1ur212:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8A3D489-D50E-4768-92A9-61949544224C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:server_system_m50cyp2ur312_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.90", + "matchCriteriaId": "72061DFD-D850-4F75-A299-7E035E4E4416" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:server_system_m50cyp2ur312:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D91066F0-B4DA-450C-A0A3-F888959B2A10" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:server_system_m50cyp2ur208_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.90", + "matchCriteriaId": "1422D93E-6E61-45C3-BFCD-967AF06B5AAB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:server_system_m50cyp2ur208:-:*:*:*:*:*:*:*", + "matchCriteriaId": "33C4712C-CBFE-4CF3-996F-CB0922101093" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00839.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2667.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2667.json index 753fa5f3b3d..7246564230e 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2667.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2667.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2667", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-12T07:15:08.627", - "lastModified": "2023-05-12T14:22:01.923", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-19T01:56:31.277", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,14 +93,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lost_and_found_information_system_project:lost_and_found_information_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E7B84257-5F4C-48D4-8097-A6FA541667BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.228883", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.228883", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2668.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2668.json index 316a320ed1d..d8266890c4c 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2668.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2668.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2668", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-12T07:15:08.733", - "lastModified": "2023-05-12T14:22:01.923", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-19T01:56:23.603", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,14 +93,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lost_and_found_information_system_project:lost_and_found_information_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E7B84257-5F4C-48D4-8097-A6FA541667BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.228884", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.228884", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2669.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2669.json index a9449ff32fe..67f0b400214 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2669.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2669.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2669", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-12T08:15:09.063", - "lastModified": "2023-05-12T14:21:57.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-19T01:56:16.017", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -61,7 +83,7 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -69,16 +91,49 @@ "value": "CWE-89" } ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lost_and_found_information_system_project:lost_and_found_information_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E7B84257-5F4C-48D4-8097-A6FA541667BE" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.228885", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.228885", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2670.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2670.json index 5f1fb86995d..5edb30bda26 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2670.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2670.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2670", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-12T08:15:09.130", - "lastModified": "2023-05-12T14:21:57.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-19T01:56:35.927", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,14 +93,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lost_and_found_information_system_project:lost_and_found_information_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E7B84257-5F4C-48D4-8097-A6FA541667BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.228886", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.228886", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2671.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2671.json index 98e0f4f6c9b..75b928df4a0 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2671.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2671.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2671", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-12T09:15:10.447", - "lastModified": "2023-05-12T14:21:57.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-19T01:56:39.580", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,14 +93,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lost_and_found_information_system_project:lost_and_found_information_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E7B84257-5F4C-48D4-8097-A6FA541667BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.228887", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.228887", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2672.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2672.json index d7efa6f65d9..3250946114e 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2672.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2672.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2672", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-12T09:15:10.520", - "lastModified": "2023-05-12T14:21:57.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-19T01:55:50.923", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -11,6 +11,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "cna@vuldb.com", @@ -71,14 +93,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lost_and_found_information_system_project:lost_and_found_information_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E7B84257-5F4C-48D4-8097-A6FA541667BE" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.228888", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.228888", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32668.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32668.json index 6b4557b8273..1492076395b 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32668.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32668.json @@ -2,27 +2,91 @@ "id": "CVE-2023-32668", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T06:15:10.000", - "lastModified": "2023-05-11T13:36:25.773", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-19T01:53:41.537", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "LuaTeX before 1.17.0 enables the socket library by default." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:luatex_project:luatex:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.17.0", + "matchCriteriaId": "58757D4F-419C-4613-AEC1-4D6792932B4F" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/blob/b266ef076c96b382cd23a4c93204e247bb98626a/source/texk/web2c/luatexdir/ChangeLog#L1-L3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://gitlab.lisn.upsaclay.fr/texlive/luatex/-/tags/1.17.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://tug.org/pipermail/tex-live/2023-May/049188.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Mailing List", + "Mitigation" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index fbd476b7f2d..2aa19212c75 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-18T23:55:26.760831+00:00 +2023-05-19T02:00:45.437942+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-18T23:15:09.783000+00:00 +2023-05-19T01:56:39.580000+00:00 ``` ### Last Data Feed Release @@ -23,7 +23,7 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2023-05-18T00:00:13.558935+00:00 +2023-05-19T00:00:13.556684+00:00 ``` ### Total Number of included CVEs @@ -34,43 +34,23 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `0` -* [CVE-2022-35798](CVE-2022/CVE-2022-357xx/CVE-2022-35798.json) (`2023-05-18T23:15:09.700`) -* [CVE-2023-1195](CVE-2023/CVE-2023-11xx/CVE-2023-1195.json) (`2023-05-18T22:15:09.373`) -* [CVE-2023-23556](CVE-2023/CVE-2023-235xx/CVE-2023-23556.json) (`2023-05-18T22:15:09.487`) -* [CVE-2023-23557](CVE-2023/CVE-2023-235xx/CVE-2023-23557.json) (`2023-05-18T22:15:09.540`) -* [CVE-2023-23759](CVE-2023/CVE-2023-237xx/CVE-2023-23759.json) (`2023-05-18T22:15:09.597`) -* [CVE-2023-24832](CVE-2023/CVE-2023-248xx/CVE-2023-24832.json) (`2023-05-18T22:15:09.650`) -* [CVE-2023-24833](CVE-2023/CVE-2023-248xx/CVE-2023-24833.json) (`2023-05-18T22:15:09.700`) -* [CVE-2023-25933](CVE-2023/CVE-2023-259xx/CVE-2023-25933.json) (`2023-05-18T22:15:09.750`) -* [CVE-2023-28081](CVE-2023/CVE-2023-280xx/CVE-2023-28081.json) (`2023-05-18T22:15:09.807`) -* [CVE-2023-28753](CVE-2023/CVE-2023-287xx/CVE-2023-28753.json) (`2023-05-18T22:15:09.860`) -* [CVE-2023-30470](CVE-2023/CVE-2023-304xx/CVE-2023-30470.json) (`2023-05-18T22:15:09.930`) -* [CVE-2023-32680](CVE-2023/CVE-2023-326xx/CVE-2023-32680.json) (`2023-05-18T23:15:09.783`) ### CVEs modified in the last Commit -Recently modified CVEs: `17` +Recently modified CVEs: `9` -* [CVE-2022-32766](CVE-2022/CVE-2022-327xx/CVE-2022-32766.json) (`2023-05-18T22:53:45.860`) -* [CVE-2022-32582](CVE-2022/CVE-2022-325xx/CVE-2022-32582.json) (`2023-05-18T22:54:04.417`) -* [CVE-2022-37409](CVE-2022/CVE-2022-374xx/CVE-2022-37409.json) (`2023-05-18T22:54:36.777`) -* [CVE-2022-38087](CVE-2022/CVE-2022-380xx/CVE-2022-38087.json) (`2023-05-18T22:54:50.870`) -* [CVE-2022-44619](CVE-2022/CVE-2022-446xx/CVE-2022-44619.json) (`2023-05-18T22:55:46.607`) -* [CVE-2022-45128](CVE-2022/CVE-2022-451xx/CVE-2022-45128.json) (`2023-05-18T22:58:41.883`) -* [CVE-2022-42465](CVE-2022/CVE-2022-424xx/CVE-2022-42465.json) (`2023-05-18T22:58:51.940`) -* [CVE-2022-41658](CVE-2022/CVE-2022-416xx/CVE-2022-41658.json) (`2023-05-18T22:59:06.100`) -* [CVE-2022-41784](CVE-2022/CVE-2022-417xx/CVE-2022-41784.json) (`2023-05-18T22:59:14.170`) -* [CVE-2023-28411](CVE-2023/CVE-2023-284xx/CVE-2023-28411.json) (`2023-05-18T22:55:00.777`) -* [CVE-2023-23910](CVE-2023/CVE-2023-239xx/CVE-2023-23910.json) (`2023-05-18T22:55:14.143`) -* [CVE-2023-23580](CVE-2023/CVE-2023-235xx/CVE-2023-23580.json) (`2023-05-18T22:55:31.917`) -* [CVE-2023-23569](CVE-2023/CVE-2023-235xx/CVE-2023-23569.json) (`2023-05-18T22:55:38.503`) -* [CVE-2023-23909](CVE-2023/CVE-2023-239xx/CVE-2023-23909.json) (`2023-05-18T22:55:55.627`) -* [CVE-2023-24475](CVE-2023/CVE-2023-244xx/CVE-2023-24475.json) (`2023-05-18T22:56:10.760`) -* [CVE-2023-25545](CVE-2023/CVE-2023-255xx/CVE-2023-25545.json) (`2023-05-18T22:56:21.193`) -* [CVE-2023-25175](CVE-2023/CVE-2023-251xx/CVE-2023-25175.json) (`2023-05-18T22:56:32.443`) +* [CVE-2023-25568](CVE-2023/CVE-2023-255xx/CVE-2023-25568.json) (`2023-05-19T01:53:27.043`) +* [CVE-2023-32668](CVE-2023/CVE-2023-326xx/CVE-2023-32668.json) (`2023-05-19T01:53:41.537`) +* [CVE-2023-25776](CVE-2023/CVE-2023-257xx/CVE-2023-25776.json) (`2023-05-19T01:54:22.113`) +* [CVE-2023-2672](CVE-2023/CVE-2023-26xx/CVE-2023-2672.json) (`2023-05-19T01:55:50.923`) +* [CVE-2023-2669](CVE-2023/CVE-2023-26xx/CVE-2023-2669.json) (`2023-05-19T01:56:16.017`) +* [CVE-2023-2668](CVE-2023/CVE-2023-26xx/CVE-2023-2668.json) (`2023-05-19T01:56:23.603`) +* [CVE-2023-2667](CVE-2023/CVE-2023-26xx/CVE-2023-2667.json) (`2023-05-19T01:56:31.277`) +* [CVE-2023-2670](CVE-2023/CVE-2023-26xx/CVE-2023-2670.json) (`2023-05-19T01:56:35.927`) +* [CVE-2023-2671](CVE-2023/CVE-2023-26xx/CVE-2023-2671.json) (`2023-05-19T01:56:39.580`) ## Download and Usage