mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-07 19:16:29 +00:00
Auto-Update: 2023-06-13T14:00:27.147110+00:00
This commit is contained in:
parent
d9decfb934
commit
6c01d6bb32
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-25146",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-07T02:15:10.513",
|
||||
"lastModified": "2023-06-07T02:45:10.733",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-13T13:21:33.627",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -46,26 +76,59 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:delucks:delucks_seo:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.1.8",
|
||||
"matchCriteriaId": "6273D117-C388-49B7-9508-693F3DBDB3B9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.nintechnet.com/vulnerability-in-the-wordpress-delucks-seo-plugin-actively-exploited/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/2161211",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-delucks-seo-cross-site-scripting-2-1-7/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.pluginvulnerabilities.com/2019/09/21/hackers-may-already-be-targeting-this-persistent-xss-vulnerability-in-delucks-seo/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aaa2f738-4764-467c-9544-889ca8ba73d1?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-36702",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-07T02:15:11.257",
|
||||
"lastModified": "2023-06-07T02:45:04.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-13T13:19:38.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -46,14 +76,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:brainstormforce:spectra:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.14.7",
|
||||
"matchCriteriaId": "6E2A010A-8ADA-4EAD-9C5F-BE9854451479"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.nintechnet.com/wordpress-ultimate-addons-for-gutenberg-plugin-fixed-vulnerability/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4419a302-4305-44f8-a256-dd276b5cd751?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-36722",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-07T02:15:12.357",
|
||||
"lastModified": "2023-06-07T02:44:59.217",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-13T13:58:36.460",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -46,22 +76,52 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:visualcomposer:visual_composer_website_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "26.0",
|
||||
"matchCriteriaId": "84D261E5-0106-4409-AC89-A428F65CFB72"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.nintechnet.com/multiple-xss-vulnerabilities-fixed-in-wordpress-visual-composer-plugin/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/10229",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-visual-composer-website-builder-multiple-cross-site-scripting-vulnerabilities-26-0/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c476d9af-9060-4294-874a-86e550253d3b?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-36723",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-07T02:15:12.420",
|
||||
"lastModified": "2023-06-07T02:44:59.217",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-13T13:54:56.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -46,18 +76,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:cridio:listingpro:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.6.1",
|
||||
"matchCriteriaId": "91C54E84-DE75-4551-BD98-917317B5775D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.nintechnet.com/wordpress-listingpro-theme-fixed-a-critical-vulnerability/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://themeforest.net/item/listingpro-multipurpose-directory-theme/19386460",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b9b21f8e-8d66-4d3e-a383-bea20a3c4498?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-36724",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-07T02:15:12.487",
|
||||
"lastModified": "2023-06-07T02:44:59.217",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-13T13:57:46.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -46,18 +76,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wordable:wordable:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "3.1.1",
|
||||
"matchCriteriaId": "6929EBF7-1303-43E2-8C41-97EC4D9FD6AB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.nintechnet.com/wordpress-plugins-and-themes-vulnerabilities-roundup/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/2234193/wordable/trunk/wordable.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/be1ab218-37bd-407a-8cb9-66f761849c21?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-36726",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-07T02:15:12.617",
|
||||
"lastModified": "2023-06-07T02:44:59.217",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-13T13:56:47.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -46,18 +76,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:etoilewebdesign:ultimate_reviews:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.1.32",
|
||||
"matchCriteriaId": "CD9F61F2-B630-4257-999C-37161B159FB8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.nintechnet.com/wordpress-ultimate-reviews-plugin-fixed-insecure-deserialization-vulnerability/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/2409141",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/db30acd7-ce51-45d9-8ff0-6ceea8237a8c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-36727",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-07T02:15:12.673",
|
||||
"lastModified": "2023-06-07T02:44:59.217",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-13T13:38:02.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -35,6 +55,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
@ -46,18 +76,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xyzscripts:newsletter_manager:*:*:-:*:-:wordpress:*:*",
|
||||
"versionEndIncluding": "1.5.1",
|
||||
"matchCriteriaId": "D4EC2450-3FC8-4397-8975-F8D1CED71276"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://blog.nintechnet.com/insecure-deserialization-vulnerability-in-wordpress-newsletter-manager-plugin-unpatched/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/b82124b1-e5e1-4f1e-9513-90474fd3f066",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dcfd8c4d-d48b-468d-a7d5-1ec05b068f79?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-27539",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-06-12T19:15:09.600",
|
||||
"lastModified": "2023-06-12T19:15:09.600",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:01:10.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-27541",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-06-12T19:15:09.677",
|
||||
"lastModified": "2023-06-12T19:15:09.677",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:01:10.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-33877",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:14.420",
|
||||
"lastModified": "2023-06-13T09:15:14.420",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-39946",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:14.620",
|
||||
"lastModified": "2023-06-13T09:15:14.620",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-41327",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:14.960",
|
||||
"lastModified": "2023-06-13T09:15:14.960",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-42474",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:15.597",
|
||||
"lastModified": "2023-06-13T09:15:15.597",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-42478",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:15.653",
|
||||
"lastModified": "2023-06-13T09:15:15.653",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43777",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-06-12T20:15:10.310",
|
||||
"lastModified": "2023-06-12T20:15:10.310",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:01:10.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43778",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-06-12T20:15:10.360",
|
||||
"lastModified": "2023-06-12T20:15:10.360",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:01:10.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43949",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:16.027",
|
||||
"lastModified": "2023-06-13T09:15:16.027",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-43953",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:16.077",
|
||||
"lastModified": "2023-06-13T09:15:16.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,15 +2,38 @@
|
||||
"id": "CVE-2022-4946",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-06-05T14:15:09.577",
|
||||
"lastModified": "2023-06-05T14:22:20.397",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-13T13:53:51.837",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Frontend Post WordPress Plugin WordPress plugin through 2.8.4 does not validate an attribute of one of its shortcode, which could allow users with a role as low as contributor to add a malicious shortcode to a page/post, which will redirect users to an arbitrary domain."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "contact@wpscan.com",
|
||||
@ -23,10 +46,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:accesspressthemes:frontend_post_wordpress_plugin:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.8.4",
|
||||
"matchCriteriaId": "5496664B-C658-400D-9171-B28E361F5F26"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/6e222018-a3e0-4af0-846c-6f00b67dfbc0",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0142",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2023-06-13T07:15:46.203",
|
||||
"lastModified": "2023-06-13T07:15:46.203",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1897",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-06-12T20:15:11.417",
|
||||
"lastModified": "2023-06-12T20:15:11.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:01:10.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1898",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-06-12T20:15:11.527",
|
||||
"lastModified": "2023-06-12T20:15:11.527",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:01:10.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1899",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-06-12T20:15:11.610",
|
||||
"lastModified": "2023-06-12T20:15:11.610",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:01:10.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22633",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:16.127",
|
||||
"lastModified": "2023-06-13T09:15:16.127",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-22639",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:16.177",
|
||||
"lastModified": "2023-06-13T09:15:16.177",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2276",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-05-20T04:15:09.413",
|
||||
"lastModified": "2023-05-26T03:33:28.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-13T13:15:08.990",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -56,7 +56,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -66,7 +66,7 @@
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
@ -95,6 +95,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lana.codes/lanavdb/3a841453-d083-4f97-a7f1-b398c7304284/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wc-multivendor-membership/tags/2.10.7/controllers/wcfmvm-controller-memberships-registration.php#L124",
|
||||
"source": "security@wordfence.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2277",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-13T02:15:09.330",
|
||||
"lastModified": "2023-06-13T02:15:09.330",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2278",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-13T02:15:09.433",
|
||||
"lastModified": "2023-06-13T02:15:09.433",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2351",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-13T02:15:09.507",
|
||||
"lastModified": "2023-06-13T02:15:09.507",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25609",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:16.227",
|
||||
"lastModified": "2023-06-13T09:15:16.227",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25910",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-06-13T09:15:16.280",
|
||||
"lastModified": "2023-06-13T09:15:16.280",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2546",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-06T02:15:09.943",
|
||||
"lastModified": "2023-06-12T18:40:25.907",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-06-13T13:15:09.090",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -85,6 +85,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://lana.codes/lanavdb/0cfdc5fa-d219-46bb-b8cc-693ac28a9e92/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-user-switch/trunk/inc/functions.php?rev=2237142#L33",
|
||||
"source": "security@wordfence.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2563",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-13T02:15:09.620",
|
||||
"lastModified": "2023-06-13T02:15:09.620",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26204",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:16.417",
|
||||
"lastModified": "2023-06-13T09:15:16.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26207",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:16.467",
|
||||
"lastModified": "2023-06-13T09:15:16.467",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26210",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:16.510",
|
||||
"lastModified": "2023-06-13T09:15:16.510",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26294",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-06-12T22:15:09.780",
|
||||
"lastModified": "2023-06-12T22:15:09.780",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26295",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-06-12T22:15:09.847",
|
||||
"lastModified": "2023-06-12T22:15:09.847",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26296",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-06-12T22:15:09.897",
|
||||
"lastModified": "2023-06-12T22:15:09.897",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26297",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-06-12T22:15:09.947",
|
||||
"lastModified": "2023-06-12T22:15:09.947",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26298",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-06-12T22:15:09.987",
|
||||
"lastModified": "2023-06-12T22:15:09.987",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2673",
|
||||
"sourceIdentifier": "info@cert.vde.com",
|
||||
"published": "2023-06-13T07:15:46.460",
|
||||
"lastModified": "2023-06-13T07:15:46.460",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27465",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-06-13T09:15:16.557",
|
||||
"lastModified": "2023-06-13T09:15:16.557",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27716",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-12T21:15:22.543",
|
||||
"lastModified": "2023-06-12T21:15:22.543",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27990",
|
||||
"sourceIdentifier": "security@zyxel.com.tw",
|
||||
"published": "2023-04-24T18:15:09.440",
|
||||
"lastModified": "2023-06-07T18:20:46.193",
|
||||
"lastModified": "2023-06-13T13:18:32.220",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -285,7 +285,16 @@
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.50",
|
||||
"versionEndExcluding": "5.36",
|
||||
"matchCriteriaId": "07895A23-2B15-4631-A55A-798B35A63E2D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -421,7 +430,16 @@
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.16",
|
||||
"versionEndExcluding": "5.36",
|
||||
"matchCriteriaId": "224300FB-2462-4E88-A41E-E9E8EAE9CF48"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27991",
|
||||
"sourceIdentifier": "security@zyxel.com.tw",
|
||||
"published": "2023-04-24T18:15:09.497",
|
||||
"lastModified": "2023-06-07T18:20:46.193",
|
||||
"lastModified": "2023-06-13T13:18:19.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -285,7 +285,16 @@
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zyxel:usg_flex_50_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.50",
|
||||
"versionEndExcluding": "5.36",
|
||||
"matchCriteriaId": "07895A23-2B15-4631-A55A-798B35A63E2D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -421,7 +430,16 @@
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:zyxel:usg_20w-vpn_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.16",
|
||||
"versionEndExcluding": "5.36",
|
||||
"matchCriteriaId": "224300FB-2462-4E88-A41E-E9E8EAE9CF48"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-27997",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:16.613",
|
||||
"lastModified": "2023-06-13T09:15:16.613",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2729",
|
||||
"sourceIdentifier": "security@synology.com",
|
||||
"published": "2023-06-13T08:15:09.273",
|
||||
"lastModified": "2023-06-13T08:15:09.273",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28000",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:16.660",
|
||||
"lastModified": "2023-06-13T09:15:16.660",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28478",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-12T20:15:11.717",
|
||||
"lastModified": "2023-06-12T20:15:11.717",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:01:10.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28829",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-06-13T09:15:16.707",
|
||||
"lastModified": "2023-06-13T09:15:16.707",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2023/CVE-2023-28xx/CVE-2023-2807.json
Normal file
55
CVE-2023/CVE-2023-28xx/CVE-2023-2807.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-2807",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2023-06-13T12:15:09.380",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authentication Bypass by Spoofing vulnerability in the password reset process of Pandora FMS allows an unauthenticated attacker to initiate a password reset process for any user account without proper authentication. This issue affects PandoraFMS v771 and prior versions on all platforms."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-290"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://pandorafms.com/en/security/common-vulnerabilities-and-exposures/",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2827",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-06-13T03:15:09.223",
|
||||
"lastModified": "2023-06-13T03:15:09.223",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2876",
|
||||
"sourceIdentifier": "cybersecurity@ch.abb.com",
|
||||
"published": "2023-06-13T04:15:10.307",
|
||||
"lastModified": "2023-06-13T04:15:10.307",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29129",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-06-13T09:15:16.767",
|
||||
"lastModified": "2023-06-13T09:15:16.767",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29160",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-06-13T10:15:10.123",
|
||||
"lastModified": "2023-06-13T10:15:10.123",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29167",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-06-13T10:15:10.167",
|
||||
"lastModified": "2023-06-13T10:15:10.167",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29175",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:17.027",
|
||||
"lastModified": "2023-06-13T09:15:17.027",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29178",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:17.077",
|
||||
"lastModified": "2023-06-13T09:15:17.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29498",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-06-13T10:15:10.210",
|
||||
"lastModified": "2023-06-13T10:15:10.210",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29501",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-06-13T10:15:10.250",
|
||||
"lastModified": "2023-06-13T10:15:10.250",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30757",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-06-13T09:15:17.323",
|
||||
"lastModified": "2023-06-13T09:15:17.323",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30762",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-06-13T10:15:10.293",
|
||||
"lastModified": "2023-06-13T10:15:10.293",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30764",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-06-13T10:15:10.330",
|
||||
"lastModified": "2023-06-13T10:15:10.330",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30766",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-06-13T10:15:10.370",
|
||||
"lastModified": "2023-06-13T10:15:10.370",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30897",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-06-13T09:15:17.703",
|
||||
"lastModified": "2023-06-13T09:15:17.703",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30901",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-06-13T09:15:17.763",
|
||||
"lastModified": "2023-06-13T09:15:17.763",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
55
CVE-2023/CVE-2023-30xx/CVE-2023-3047.json
Normal file
55
CVE-2023/CVE-2023-30xx/CVE-2023-3047.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-3047",
|
||||
"sourceIdentifier": "cve@usom.gov.tr",
|
||||
"published": "2023-06-13T12:15:09.477",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TMT Lockcell allows SQL Injection.This issue affects Lockcell: before 15.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-23-0345",
|
||||
"source": "cve@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-30xx/CVE-2023-3048.json
Normal file
55
CVE-2023/CVE-2023-30xx/CVE-2023-3048.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-3048",
|
||||
"sourceIdentifier": "cve@usom.gov.tr",
|
||||
"published": "2023-06-13T12:15:09.573",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authorization Bypass Through User-Controlled Key vulnerability in TMT Lockcell allows Authentication Abuse, Authentication Bypass.This issue affects Lockcell: before 15.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-23-0345",
|
||||
"source": "cve@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-30xx/CVE-2023-3049.json
Normal file
55
CVE-2023/CVE-2023-30xx/CVE-2023-3049.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-3049",
|
||||
"sourceIdentifier": "cve@usom.gov.tr",
|
||||
"published": "2023-06-13T12:15:09.667",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in TMT Lockcell allows Command Injection.This issue affects Lockcell: before 15.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-23-0345",
|
||||
"source": "cve@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-30xx/CVE-2023-3050.json
Normal file
55
CVE-2023/CVE-2023-30xx/CVE-2023-3050.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-3050",
|
||||
"sourceIdentifier": "cve@usom.gov.tr",
|
||||
"published": "2023-06-13T12:15:09.750",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Reliance on Cookies without Validation and Integrity Checking in a Security Decision vulnerability in TMT Lockcell allows Privilege Abuse, Authentication Bypass.This issue affects Lockcell: before 15.\n\n"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@usom.gov.tr",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-784"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.usom.gov.tr/bildirim/tr-23-0345",
|
||||
"source": "cve@usom.gov.tr"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31195",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-06-13T10:15:10.410",
|
||||
"lastModified": "2023-06-13T10:15:10.410",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31196",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-06-13T10:15:10.450",
|
||||
"lastModified": "2023-06-13T10:15:10.450",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31198",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-06-13T10:15:10.493",
|
||||
"lastModified": "2023-06-13T10:15:10.493",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-31238",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-06-13T09:15:18.093",
|
||||
"lastModified": "2023-06-13T09:15:18.093",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3100",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-06-05T08:15:09.667",
|
||||
"lastModified": "2023-06-05T13:02:53.787",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-13T13:46:01.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -11,6 +11,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
@ -71,18 +93,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibos:ibos:4.5.5:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1F678D76-48AA-4940-833F-5567D196DB7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/shulao2020/cve/blob/main/IBOS%20sql.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.230690",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.230690",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3159",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-12T21:15:22.937",
|
||||
"lastModified": "2023-06-12T21:15:22.937",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3161",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-12T20:15:12.910",
|
||||
"lastModified": "2023-06-12T20:15:12.910",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32114",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-06-13T03:15:09.393",
|
||||
"lastModified": "2023-06-13T03:15:09.393",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32115",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-06-13T03:15:09.473",
|
||||
"lastModified": "2023-06-13T03:15:09.473",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32219",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2023-06-12T21:15:22.597",
|
||||
"lastModified": "2023-06-12T21:15:22.597",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32220",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2023-06-12T21:15:22.673",
|
||||
"lastModified": "2023-06-12T21:15:22.673",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32221",
|
||||
"sourceIdentifier": "cna@cyber.gov.il",
|
||||
"published": "2023-06-12T21:15:22.737",
|
||||
"lastModified": "2023-06-12T21:15:22.737",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32546",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-06-13T10:15:10.533",
|
||||
"lastModified": "2023-06-13T10:15:10.533",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32548",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-06-13T10:15:10.573",
|
||||
"lastModified": "2023-06-13T10:15:10.573",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32673",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-06-12T22:15:10.033",
|
||||
"lastModified": "2023-06-12T22:15:10.033",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-32674",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-06-12T22:15:10.077",
|
||||
"lastModified": "2023-06-12T22:15:10.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:53.777",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3218",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-06-13T11:15:08.930",
|
||||
"lastModified": "2023-06-13T11:15:08.930",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33121",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-06-13T09:15:18.323",
|
||||
"lastModified": "2023-06-13T09:15:18.323",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33122",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-06-13T09:15:18.380",
|
||||
"lastModified": "2023-06-13T09:15:18.380",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33123",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-06-13T09:15:18.437",
|
||||
"lastModified": "2023-06-13T09:15:18.437",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33124",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-06-13T09:15:18.500",
|
||||
"lastModified": "2023-06-13T09:15:18.500",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33305",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2023-06-13T09:15:18.563",
|
||||
"lastModified": "2023-06-13T09:15:18.563",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33625",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-12T20:15:12.610",
|
||||
"lastModified": "2023-06-12T20:15:12.610",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:01:10.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33626",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-12T20:15:12.667",
|
||||
"lastModified": "2023-06-12T20:15:12.667",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:01:10.377",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,27 +2,102 @@
|
||||
"id": "CVE-2023-33693",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-06-05T16:15:09.500",
|
||||
"lastModified": "2023-06-05T16:42:43.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-06-13T13:33:08.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow in EasyPlayerPro-Win v3.2.19.0106 to v3.6.19.0823 allows attackers to cause a Denial of Service (DoS) via a crafted XML file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:tsingsee:easyplayerpro:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.2.19.0106",
|
||||
"versionEndIncluding": "3.6.19.0823",
|
||||
"matchCriteriaId": "5293E177-9752-4426-815A-03AFB28D4712"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/tsingsee/EasyPlayerPro-Win/blob/master/Src/C%2B%2B/EasyPlayerPro/xmlConfig.h",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/tsingsee/EasyPlayerPro-Win/pull/24",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.youtube.com/watch?v=K27nGHa-hTE&ab_channel=ErnestAng",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33919",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-06-13T09:15:18.620",
|
||||
"lastModified": "2023-06-13T09:15:18.620",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:42.717",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33920",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-06-13T09:15:18.677",
|
||||
"lastModified": "2023-06-13T09:15:18.677",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33921",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2023-06-13T09:15:18.733",
|
||||
"lastModified": "2023-06-13T09:15:18.733",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:37.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-33984",
|
||||
"sourceIdentifier": "cna@sap.com",
|
||||
"published": "2023-06-13T03:15:09.567",
|
||||
"lastModified": "2023-06-13T03:15:09.567",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-06-13T13:00:47.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user