mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2023-05-31T14:00:27.749582+00:00
This commit is contained in:
parent
66a62feba5
commit
738a78f2f1
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2012-10015",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-31T00:15:09.417",
|
||||
"lastModified": "2023-05-31T00:15:09.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2014-125103",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-31T03:15:09.077",
|
||||
"lastModified": "2023-05-31T03:15:09.077",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2015-10107",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-31T03:15:09.157",
|
||||
"lastModified": "2023-05-31T03:15:09.157",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3067",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-07-18T13:29:08.053",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T12:31:24.783",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.11",
|
||||
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA"
|
||||
"matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3073",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-07-18T13:29:08.303",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T12:31:27.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.11",
|
||||
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA"
|
||||
"matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3074",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-07-18T13:29:08.350",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T12:31:30.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.11",
|
||||
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA"
|
||||
"matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3075",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-07-18T13:29:08.397",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:39:57.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.11",
|
||||
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA"
|
||||
"matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3078",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-07-18T13:29:08.523",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:40:12.753",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.11",
|
||||
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA"
|
||||
"matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -136,6 +137,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/104772",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -144,6 +146,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1041294",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3079",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-07-18T13:29:08.587",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:40:39.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.11",
|
||||
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA"
|
||||
"matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -136,6 +137,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/104772",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -144,6 +146,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1041294",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3080",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-07-18T13:29:08.633",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:38:18.223",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.11",
|
||||
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA"
|
||||
"matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -136,6 +137,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/104772",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -144,6 +146,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1041294",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3082",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-07-18T13:29:08.727",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:38:02.883",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.11",
|
||||
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA"
|
||||
"matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -136,6 +137,7 @@
|
||||
"url": "http://www.securityfocus.com/bid/104772",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
@ -144,6 +146,7 @@
|
||||
"url": "http://www.securitytracker.com/id/1041294",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3084",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-07-18T13:29:08.773",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:37:00.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.11",
|
||||
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA"
|
||||
"matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3137",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-10-17T01:31:16.400",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:36:45.487",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -86,8 +86,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.12",
|
||||
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA"
|
||||
"matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3145",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-10-17T01:31:17.120",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:36:40.643",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.12",
|
||||
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA"
|
||||
"matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-3170",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-10-17T01:31:19.463",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-05-31T13:36:29.623",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -77,6 +77,7 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -85,8 +86,69 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.12",
|
||||
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA"
|
||||
"matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
|
||||
"versionStartIncluding": "9.4",
|
||||
"matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.3",
|
||||
"matchCriteriaId": "53E6AC9E-CD46-4386-8975-E256E65469AA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -120,7 +182,10 @@
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20181018-0002/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3182",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-10-17T01:31:20.587",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:32:59.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -77,6 +77,7 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -85,8 +86,69 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.12",
|
||||
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA"
|
||||
"matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.3",
|
||||
"matchCriteriaId": "53E6AC9E-CD46-4386-8975-E256E65469AA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
|
||||
"versionStartIncluding": "9.4",
|
||||
"matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3186",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-10-17T01:31:20.963",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:21:53.060",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -77,6 +77,7 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -85,8 +86,69 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.12",
|
||||
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA"
|
||||
"matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.3",
|
||||
"matchCriteriaId": "53E6AC9E-CD46-4386-8975-E256E65469AA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
|
||||
"versionStartIncluding": "9.4",
|
||||
"matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3195",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-10-17T01:31:21.807",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:22:09.633",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -77,6 +77,7 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -85,8 +86,69 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.12",
|
||||
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA"
|
||||
"matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.3",
|
||||
"matchCriteriaId": "53E6AC9E-CD46-4386-8975-E256E65469AA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
|
||||
"versionStartIncluding": "9.4",
|
||||
"matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3203",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-10-17T01:31:22.480",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:24:12.860",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.12",
|
||||
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA"
|
||||
"matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3212",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-10-17T01:31:23.307",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:24:10.307",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.12",
|
||||
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA"
|
||||
"matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3279",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-10-17T01:31:28.993",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:24:07.750",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -86,8 +86,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.12",
|
||||
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA"
|
||||
"matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3280",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-10-17T01:31:29.087",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:24:05.677",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -86,8 +86,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.12",
|
||||
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA"
|
||||
"matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3285",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-10-17T01:31:29.557",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:21:46.333",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -86,8 +86,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.12",
|
||||
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA"
|
||||
"matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2018-3286",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2018-10-17T01:31:29.650",
|
||||
"lastModified": "2019-10-03T00:03:26.223",
|
||||
"lastModified": "2023-05-31T13:19:27.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -86,8 +86,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.12",
|
||||
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA"
|
||||
"matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-2494",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2019-01-16T19:30:34.000",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-05-31T13:19:34.920",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.13",
|
||||
"matchCriteriaId": "C54A1D84-9347-4806-888B-80F4C7B248CD"
|
||||
"matchCriteriaId": "C743C44C-2E97-4E5E-8C76-FC0E666BA115"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -112,15 +113,24 @@
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2484",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2511",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20190118-0002/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-2495",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2019-01-16T19:30:34.017",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-05-31T13:19:47.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.13",
|
||||
"matchCriteriaId": "C54A1D84-9347-4806-888B-80F4C7B248CD"
|
||||
"matchCriteriaId": "C743C44C-2E97-4E5E-8C76-FC0E666BA115"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -112,15 +113,24 @@
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2484",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2511",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20190118-0002/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-2502",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2019-01-16T19:30:34.577",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-05-31T13:20:03.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -77,6 +77,7 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -85,8 +86,69 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.13",
|
||||
"matchCriteriaId": "C54A1D84-9347-4806-888B-80F4C7B248CD"
|
||||
"matchCriteriaId": "C743C44C-2E97-4E5E-8C76-FC0E666BA115"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.3",
|
||||
"matchCriteriaId": "53E6AC9E-CD46-4386-8975-E256E65469AA"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
|
||||
"versionStartIncluding": "9.4",
|
||||
"matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -112,15 +174,24 @@
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2484",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2019:2511",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20190118-0002/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-2513",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2019-01-16T19:30:35.047",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"lastModified": "2023-05-31T13:20:17.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndExcluding": "8.0.13",
|
||||
"matchCriteriaId": "CF4C29BD-0792-4A51-A63B-A53EDA193AFC"
|
||||
"matchCriteriaId": "759CBC31-3FC8-41A7-BB4D-76A973A4BE0D"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2019-2535",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2019-01-16T19:30:35.737",
|
||||
"lastModified": "2023-01-31T17:42:19.717",
|
||||
"lastModified": "2023-05-31T12:55:12.843",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.13",
|
||||
"matchCriteriaId": "C54A1D84-9347-4806-888B-80F4C7B248CD"
|
||||
"matchCriteriaId": "C743C44C-2E97-4E5E-8C76-FC0E666BA115"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-2743",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2019-07-23T23:15:38.537",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-05-31T12:55:31.907",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.12",
|
||||
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA"
|
||||
"matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -104,11 +105,17 @@
|
||||
},
|
||||
{
|
||||
"url": "https://support.f5.com/csp/article/K03444640",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.f5.com/csp/article/K03444640?utm_source=f5support&utm_medium=RSS",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-2746",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2019-07-23T23:15:38.757",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-05-31T12:55:40.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.12",
|
||||
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA"
|
||||
"matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -104,11 +105,17 @@
|
||||
},
|
||||
{
|
||||
"url": "https://support.f5.com/csp/article/K03444640",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.f5.com/csp/article/K03444640?utm_source=f5support&utm_medium=RSS",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-2747",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2019-07-23T23:15:38.820",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-05-31T12:55:49.017",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.12",
|
||||
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA"
|
||||
"matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -104,11 +105,17 @@
|
||||
},
|
||||
{
|
||||
"url": "https://support.f5.com/csp/article/K03444640",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.f5.com/csp/article/K03444640?utm_source=f5support&utm_medium=RSS",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-2822",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2019-07-23T23:15:43.710",
|
||||
"lastModified": "2020-08-24T17:37:01.140",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-05-31T12:55:55.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -15,13 +15,13 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
@ -85,8 +85,9 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.0.0",
|
||||
"versionEndIncluding": "8.0.16",
|
||||
"matchCriteriaId": "B72AD7BD-9028-43DD-929C-4670655BBC70"
|
||||
"matchCriteriaId": "7FB3C333-CFE6-452F-8E1D-1C1090460804"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -104,11 +105,17 @@
|
||||
},
|
||||
{
|
||||
"url": "https://support.f5.com/csp/article/K02585438",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.f5.com/csp/article/K02585438?utm_source=f5support&utm_medium=RSS",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-31233",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T01:15:42.983",
|
||||
"lastModified": "2023-05-31T01:15:42.983",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-39071",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2023-05-30T23:15:09.273",
|
||||
"lastModified": "2023-05-30T23:15:09.273",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-39074",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2023-05-30T23:15:09.393",
|
||||
"lastModified": "2023-05-30T23:15:09.393",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-39075",
|
||||
"sourceIdentifier": "psirt@zte.com.cn",
|
||||
"published": "2023-05-30T23:15:09.447",
|
||||
"lastModified": "2023-05-30T23:15:09.447",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47525",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T00:15:09.600",
|
||||
"lastModified": "2023-05-31T00:15:09.600",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47526",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T00:15:09.647",
|
||||
"lastModified": "2023-05-31T00:15:09.647",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0779",
|
||||
"sourceIdentifier": "vulnerabilities@zephyrproject.org",
|
||||
"published": "2023-05-30T21:15:08.987",
|
||||
"lastModified": "2023-05-30T22:15:09.457",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1661",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-05-31T04:15:09.893",
|
||||
"lastModified": "2023-05-31T04:15:09.893",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-23562",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T01:15:43.057",
|
||||
"lastModified": "2023-05-31T01:15:43.057",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2304",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-05-31T05:15:10.260",
|
||||
"lastModified": "2023-05-31T05:15:10.260",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-2434",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-05-31T04:15:10.070",
|
||||
"lastModified": "2023-05-31T04:15:10.070",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Nested Pages plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'reset' function in versions up to, and including, 3.2.3. This makes it possible for authenticated attackers, with editor-level permissions and above, to reset plugin settings."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El plugin Nested Pages para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a la falta de capacidad de comprobaci\u00f3n de la funci\u00f3n \"reset\" en las versiones hasta la 3.2.3 inclusive. Esto hace posible que atacantes autenticados, con permisos de nivel de editor y superiores, restablezcan la configuraci\u00f3n del plugin. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2435",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-05-31T03:15:09.313",
|
||||
"lastModified": "2023-05-31T03:15:09.313",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2436",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-05-31T03:15:09.380",
|
||||
"lastModified": "2023-05-31T03:15:09.380",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-25539",
|
||||
"sourceIdentifier": "security_alert@emc.com",
|
||||
"published": "2023-05-31T05:15:09.537",
|
||||
"lastModified": "2023-05-31T05:15:09.537",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "\nDell NetWorker 19.6.1.2, contains an OS command injection Vulnerability in the NetWorker client. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. This is a high severity vulnerability as the exploitation allows an attacker to take complete control of a system, so Dell recommends customers to upgrade at the earliest opportunity.\n\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Dell NetWorker v19.6.1.2 contiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en el cliente NetWorker. Un atacante remoto no autenticado podr\u00eda explotar potencialmente esta vulnerabilidad, llevando a la ejecuci\u00f3n de comandos arbitrarios del sistema operativo en el sistema operativo subyacente de la aplicaci\u00f3n, con los privilegios de la aplicaci\u00f3n vulnerable. Se trata de una vulnerabilidad de alta gravedad, ya que su explotaci\u00f3n permite a un atacante hacerse con el control total de un sistema, por lo que Dell recomienda a los clientes que actualicen lo antes posible. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2545",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-05-31T03:15:09.443",
|
||||
"lastModified": "2023-05-31T03:15:09.443",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-2547",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-05-31T03:15:09.510",
|
||||
"lastModified": "2023-05-31T03:15:09.510",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Feather Login Page plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteUser' function in versions starting from 1.0.7 up to, and including, 1.1.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete the temp user generated by the plugin."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El plugin Feather Login Page para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una falta de capacidad de comprobaci\u00f3n en la funci\u00f3n \"deleteUser\" en las versiones a partir de la 1.0.7 hasta la 1.1.1 inclusive. Esto hace posible que atacantes autenticados con permisos de nivel de suscriptor y superiores, eliminen el usuario temporal generado por el plugin. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-2549",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-05-31T03:15:09.577",
|
||||
"lastModified": "2023-05-31T03:15:09.577",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Feather Login Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions starting from 1.0.7 up to, and including, 1.1.1. This is due to missing nonce validation in the 'createTempAccountLink' function. This makes it possible for unauthenticated attackers to create a new user with administrator role via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. An attacker can leverage CVE-2023-2545 to get the login link or request a password reset to the new user's email address."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El plugin Feather Login Page para WordPress es vulnerable a Cross-Site Request Forgery en versiones desde la 1.0.7 hasta la 1.1.1 inclusive. Esto es debido a la falta de validaci\u00f3n nonce en la funci\u00f3n \"createTempAccountLink\". Esto hace posible que atacantes no autenticados puedan crear un nuevo usuario con rol de administrador a trav\u00e9s de una petici\u00f3n falsificada, pudiendo enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace. Un atacante puede aprovechar la vulnerabilidad \"CVE-2023-2545\" para obtener el enlace de inicio de sesi\u00f3n o solicitar un restablecimiento de contrase\u00f1a a la direcci\u00f3n de correo electr\u00f3nico del nuevo usuario. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-26131",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2023-05-31T05:15:10.180",
|
||||
"lastModified": "2023-05-31T05:15:10.180",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2612",
|
||||
"sourceIdentifier": "security@ubuntu.com",
|
||||
"published": "2023-05-31T00:15:10.257",
|
||||
"lastModified": "2023-05-31T00:15:10.257",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-2749",
|
||||
"sourceIdentifier": "security@asustor.com",
|
||||
"published": "2023-05-31T09:15:10.490",
|
||||
"lastModified": "2023-05-31T09:15:10.490",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Download Center fails to properly validate the file path submitted by a user, An attacker can exploit this vulnerability to gain unauthorized access to sensitive files or directories without appropriate permission restrictions. Download Center on ADM 4.0 and above will be affected. Affected products and versions include: Download Center 1.1.5.r1280 and below. "
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Download Center no valida correctamente la ruta de archivo enviada por un usuario. Un atacante puede aprovechar esta vulnerabilidad para obtener acceso no autorizado a archivos o directorios confidenciales sin las restricciones de permisos adecuadas. Download Center se ve afectado en ADM 4.0 y en versiones superiores. Los productos y versiones afectados incluyen: Download Center v1.1.5.r1280 e inferiores. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28344",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T00:15:09.697",
|
||||
"lastModified": "2023-05-31T00:15:09.697",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28345",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T00:15:09.747",
|
||||
"lastModified": "2023-05-31T00:15:09.747",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28346",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T00:15:09.793",
|
||||
"lastModified": "2023-05-31T00:15:09.793",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28347",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T00:15:09.840",
|
||||
"lastModified": "2023-05-31T00:15:09.840",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28348",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T00:15:09.887",
|
||||
"lastModified": "2023-05-31T00:15:09.887",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28349",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T00:15:09.933",
|
||||
"lastModified": "2023-05-31T00:15:09.933",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28350",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T00:15:09.980",
|
||||
"lastModified": "2023-05-31T00:15:09.980",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28351",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T00:15:10.023",
|
||||
"lastModified": "2023-05-31T00:15:10.023",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28352",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T00:15:10.063",
|
||||
"lastModified": "2023-05-31T00:15:10.063",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28353",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T00:15:10.107",
|
||||
"lastModified": "2023-05-31T00:15:10.107",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-2836",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-05-31T04:15:10.200",
|
||||
"lastModified": "2023-05-31T04:15:10.200",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The CRM Perks Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form settings in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El plugin CRM Perks Forms para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la configuraci\u00f3n de formularios en versiones hasta la v1.1.1 inclusive debido a la insuficiente sanitizaci\u00f3n de entrada y escape de salida. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto s\u00f3lo afecta a las instalaciones mutisitio y a las instalaciones en las que se ha deshabilitado \"unfiltered _html\". "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2854",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-26T21:15:17.643",
|
||||
"lastModified": "2023-05-29T03:54:24.223",
|
||||
"lastModified": "2023-05-31T13:46:36.100",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,20 +17,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2855",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-26T21:15:17.757",
|
||||
"lastModified": "2023-05-29T03:54:44.930",
|
||||
"lastModified": "2023-05-31T13:46:47.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,20 +17,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2857",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-26T21:15:18.273",
|
||||
"lastModified": "2023-05-29T03:58:32.140",
|
||||
"lastModified": "2023-05-31T13:47:35.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,20 +17,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2858",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-26T21:15:18.633",
|
||||
"lastModified": "2023-05-29T03:58:57.950",
|
||||
"lastModified": "2023-05-31T13:47:28.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,20 +17,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29726",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.513",
|
||||
"lastModified": "2023-05-30T23:15:09.513",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29727",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.563",
|
||||
"lastModified": "2023-05-30T23:15:09.563",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29728",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.607",
|
||||
"lastModified": "2023-05-30T23:15:09.607",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29738",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.653",
|
||||
"lastModified": "2023-05-30T23:15:09.653",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29739",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.700",
|
||||
"lastModified": "2023-05-30T23:15:09.700",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29740",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.750",
|
||||
"lastModified": "2023-05-30T23:15:09.750",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29741",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.793",
|
||||
"lastModified": "2023-05-30T23:15:09.793",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29742",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T00:15:10.153",
|
||||
"lastModified": "2023-05-31T00:15:10.153",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29743",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-30T23:15:09.840",
|
||||
"lastModified": "2023-05-30T23:15:09.840",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29745",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T00:15:10.200",
|
||||
"lastModified": "2023-05-31T00:15:10.200",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2909",
|
||||
"sourceIdentifier": "security@asustor.com",
|
||||
"published": "2023-05-31T10:15:09.577",
|
||||
"lastModified": "2023-05-31T10:15:09.577",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2929",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:09.997",
|
||||
"lastModified": "2023-05-30T22:15:09.997",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2930",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.067",
|
||||
"lastModified": "2023-05-30T22:15:10.067",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2931",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.117",
|
||||
"lastModified": "2023-05-30T22:15:10.117",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2932",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.167",
|
||||
"lastModified": "2023-05-30T22:15:10.167",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2933",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.210",
|
||||
"lastModified": "2023-05-30T22:15:10.210",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2934",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.257",
|
||||
"lastModified": "2023-05-30T22:15:10.257",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2935",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.307",
|
||||
"lastModified": "2023-05-30T22:15:10.307",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2936",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.350",
|
||||
"lastModified": "2023-05-30T22:15:10.350",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2937",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.393",
|
||||
"lastModified": "2023-05-30T22:15:10.393",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2938",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.433",
|
||||
"lastModified": "2023-05-30T22:15:10.433",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2939",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.477",
|
||||
"lastModified": "2023-05-30T22:15:10.477",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2940",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.527",
|
||||
"lastModified": "2023-05-30T22:15:10.527",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2941",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2023-05-30T22:15:10.570",
|
||||
"lastModified": "2023-05-30T22:15:10.570",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2952",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-30T23:15:09.887",
|
||||
"lastModified": "2023-05-30T23:15:09.887",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2953",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-05-30T22:15:10.613",
|
||||
"lastModified": "2023-05-30T22:15:10.613",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,12 +2,16 @@
|
||||
"id": "CVE-2023-2987",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-05-31T03:15:09.643",
|
||||
"lastModified": "2023-05-31T03:15:09.643",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Wordapp plugin for WordPress is vulnerable to authorization bypass due to an use of insufficiently unique cryptographic signature on the 'wa_pdx_op_config_set' function in versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to the plugin to change the 'validation_token' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El plugin Wordapp para WordPress es vulnerable a una omisi\u00f3n de autorizaci\u00f3n debido al uso de una firma criptogr\u00e1fica insuficientemente \u00fanica en la funci\u00f3n \"wa_pdx_op_config_set\" en versiones hasta la 1.5.0 inclusive. Esto hace posible que atacantes no autenticados al plugin cambien el \"validation_token\" en la configuraci\u00f3n del plugin, proporcionando acceso a las funcionalidades de control remoto del plugin, como la creaci\u00f3n de una URL de acceso de administrador, que puede ser utilizada para la esclada de privilegios. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2998",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-31T01:15:43.103",
|
||||
"lastModified": "2023-05-31T01:15:43.103",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2999",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2023-05-31T01:15:43.163",
|
||||
"lastModified": "2023-05-31T01:15:43.163",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30197",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T01:15:43.223",
|
||||
"lastModified": "2023-05-31T01:15:43.223",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
28
CVE-2023/CVE-2023-302xx/CVE-2023-30285.json
Normal file
28
CVE-2023/CVE-2023-302xx/CVE-2023-30285.json
Normal file
@ -0,0 +1,28 @@
|
||||
{
|
||||
"id": "CVE-2023-30285",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T12:15:09.410",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Deviniti Issue Sync Synchronization v3.5.2 for Jira allows attackers to obtain the login credentials of a user via a crafted request sent to /rest/synchronizer/1.0/technicalUser."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://deviniti.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://issue.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/D23K4N/CVE/blob/main/CVE-2023-30285.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-3003",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-31T09:15:10.600",
|
||||
"lastModified": "2023-05-31T09:15:10.600",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-05-31T13:02:26.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user