From 738a78f2f1aaa89a6b03340a58e5f8e41cf86bf3 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 31 May 2023 14:00:31 +0000 Subject: [PATCH] Auto-Update: 2023-05-31T14:00:27.749582+00:00 --- CVE-2012/CVE-2012-100xx/CVE-2012-10015.json | 4 +- CVE-2014/CVE-2014-1251xx/CVE-2014-125103.json | 4 +- CVE-2015/CVE-2015-101xx/CVE-2015-10107.json | 4 +- CVE-2018/CVE-2018-30xx/CVE-2018-3067.json | 11 +-- CVE-2018/CVE-2018-30xx/CVE-2018-3073.json | 11 +-- CVE-2018/CVE-2018-30xx/CVE-2018-3074.json | 11 +-- CVE-2018/CVE-2018-30xx/CVE-2018-3075.json | 11 +-- CVE-2018/CVE-2018-30xx/CVE-2018-3078.json | 13 +-- CVE-2018/CVE-2018-30xx/CVE-2018-3079.json | 13 +-- CVE-2018/CVE-2018-30xx/CVE-2018-3080.json | 13 +-- CVE-2018/CVE-2018-30xx/CVE-2018-3082.json | 13 +-- CVE-2018/CVE-2018-30xx/CVE-2018-3084.json | 11 +-- CVE-2018/CVE-2018-31xx/CVE-2018-3137.json | 11 +-- CVE-2018/CVE-2018-31xx/CVE-2018-3145.json | 11 +-- CVE-2018/CVE-2018-31xx/CVE-2018-3170.json | 79 ++++++++++++++-- CVE-2018/CVE-2018-31xx/CVE-2018-3182.json | 72 +++++++++++++-- CVE-2018/CVE-2018-31xx/CVE-2018-3186.json | 72 +++++++++++++-- CVE-2018/CVE-2018-31xx/CVE-2018-3195.json | 72 +++++++++++++-- CVE-2018/CVE-2018-32xx/CVE-2018-3203.json | 11 +-- CVE-2018/CVE-2018-32xx/CVE-2018-3212.json | 11 +-- CVE-2018/CVE-2018-32xx/CVE-2018-3279.json | 11 +-- CVE-2018/CVE-2018-32xx/CVE-2018-3280.json | 11 +-- CVE-2018/CVE-2018-32xx/CVE-2018-3285.json | 11 +-- CVE-2018/CVE-2018-32xx/CVE-2018-3286.json | 11 +-- CVE-2019/CVE-2019-24xx/CVE-2019-2494.json | 28 ++++-- CVE-2019/CVE-2019-24xx/CVE-2019-2495.json | 28 ++++-- CVE-2019/CVE-2019-25xx/CVE-2019-2502.json | 89 +++++++++++++++++-- CVE-2019/CVE-2019-25xx/CVE-2019-2513.json | 11 +-- CVE-2019/CVE-2019-25xx/CVE-2019-2535.json | 5 +- CVE-2019/CVE-2019-27xx/CVE-2019-2743.json | 23 +++-- CVE-2019/CVE-2019-27xx/CVE-2019-2746.json | 23 +++-- CVE-2019/CVE-2019-27xx/CVE-2019-2747.json | 23 +++-- CVE-2019/CVE-2019-28xx/CVE-2019-2822.json | 23 +++-- CVE-2021/CVE-2021-312xx/CVE-2021-31233.json | 4 +- CVE-2022/CVE-2022-390xx/CVE-2022-39071.json | 4 +- CVE-2022/CVE-2022-390xx/CVE-2022-39074.json | 4 +- CVE-2022/CVE-2022-390xx/CVE-2022-39075.json | 4 +- CVE-2022/CVE-2022-475xx/CVE-2022-47525.json | 4 +- CVE-2022/CVE-2022-475xx/CVE-2022-47526.json | 4 +- CVE-2023/CVE-2023-07xx/CVE-2023-0779.json | 4 +- CVE-2023/CVE-2023-16xx/CVE-2023-1661.json | 4 +- CVE-2023/CVE-2023-235xx/CVE-2023-23562.json | 4 +- CVE-2023/CVE-2023-23xx/CVE-2023-2304.json | 4 +- CVE-2023/CVE-2023-24xx/CVE-2023-2434.json | 8 +- CVE-2023/CVE-2023-24xx/CVE-2023-2435.json | 4 +- CVE-2023/CVE-2023-24xx/CVE-2023-2436.json | 4 +- CVE-2023/CVE-2023-255xx/CVE-2023-25539.json | 8 +- CVE-2023/CVE-2023-25xx/CVE-2023-2545.json | 4 +- CVE-2023/CVE-2023-25xx/CVE-2023-2547.json | 8 +- CVE-2023/CVE-2023-25xx/CVE-2023-2549.json | 8 +- CVE-2023/CVE-2023-261xx/CVE-2023-26131.json | 4 +- CVE-2023/CVE-2023-26xx/CVE-2023-2612.json | 4 +- CVE-2023/CVE-2023-27xx/CVE-2023-2749.json | 8 +- CVE-2023/CVE-2023-283xx/CVE-2023-28344.json | 4 +- CVE-2023/CVE-2023-283xx/CVE-2023-28345.json | 4 +- CVE-2023/CVE-2023-283xx/CVE-2023-28346.json | 4 +- CVE-2023/CVE-2023-283xx/CVE-2023-28347.json | 4 +- CVE-2023/CVE-2023-283xx/CVE-2023-28348.json | 4 +- CVE-2023/CVE-2023-283xx/CVE-2023-28349.json | 4 +- CVE-2023/CVE-2023-283xx/CVE-2023-28350.json | 4 +- CVE-2023/CVE-2023-283xx/CVE-2023-28351.json | 4 +- CVE-2023/CVE-2023-283xx/CVE-2023-28352.json | 4 +- CVE-2023/CVE-2023-283xx/CVE-2023-28353.json | 4 +- CVE-2023/CVE-2023-28xx/CVE-2023-2836.json | 8 +- CVE-2023/CVE-2023-28xx/CVE-2023-2854.json | 14 +-- CVE-2023/CVE-2023-28xx/CVE-2023-2855.json | 14 +-- CVE-2023/CVE-2023-28xx/CVE-2023-2857.json | 14 +-- CVE-2023/CVE-2023-28xx/CVE-2023-2858.json | 14 +-- CVE-2023/CVE-2023-297xx/CVE-2023-29726.json | 4 +- CVE-2023/CVE-2023-297xx/CVE-2023-29727.json | 4 +- CVE-2023/CVE-2023-297xx/CVE-2023-29728.json | 4 +- CVE-2023/CVE-2023-297xx/CVE-2023-29738.json | 4 +- CVE-2023/CVE-2023-297xx/CVE-2023-29739.json | 4 +- CVE-2023/CVE-2023-297xx/CVE-2023-29740.json | 4 +- CVE-2023/CVE-2023-297xx/CVE-2023-29741.json | 4 +- CVE-2023/CVE-2023-297xx/CVE-2023-29742.json | 4 +- CVE-2023/CVE-2023-297xx/CVE-2023-29743.json | 4 +- CVE-2023/CVE-2023-297xx/CVE-2023-29745.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2909.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2929.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2930.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2931.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2932.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2933.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2934.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2935.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2936.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2937.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2938.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2939.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2940.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2941.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2952.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2953.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2987.json | 8 +- CVE-2023/CVE-2023-29xx/CVE-2023-2998.json | 4 +- CVE-2023/CVE-2023-29xx/CVE-2023-2999.json | 4 +- CVE-2023/CVE-2023-301xx/CVE-2023-30197.json | 4 +- CVE-2023/CVE-2023-302xx/CVE-2023-30285.json | 28 ++++++ CVE-2023/CVE-2023-30xx/CVE-2023-3003.json | 4 +- CVE-2023/CVE-2023-30xx/CVE-2023-3004.json | 4 +- CVE-2023/CVE-2023-30xx/CVE-2023-3005.json | 4 +- CVE-2023/CVE-2023-30xx/CVE-2023-3007.json | 88 ++++++++++++++++++ CVE-2023/CVE-2023-30xx/CVE-2023-3008.json | 88 ++++++++++++++++++ CVE-2023/CVE-2023-30xx/CVE-2023-3009.json | 59 ++++++++++++ CVE-2023/CVE-2023-310xx/CVE-2023-31098.json | 66 ++++++++++++-- CVE-2023/CVE-2023-317xx/CVE-2023-31779.json | 69 ++++++++++++-- CVE-2023/CVE-2023-323xx/CVE-2023-32342.json | 4 +- CVE-2023/CVE-2023-331xx/CVE-2023-33179.json | 4 +- CVE-2023/CVE-2023-331xx/CVE-2023-33180.json | 4 +- CVE-2023/CVE-2023-331xx/CVE-2023-33181.json | 4 +- CVE-2023/CVE-2023-334xx/CVE-2023-33485.json | 20 +++++ CVE-2023/CVE-2023-334xx/CVE-2023-33486.json | 20 +++++ CVE-2023/CVE-2023-334xx/CVE-2023-33487.json | 20 +++++ CVE-2023/CVE-2023-335xx/CVE-2023-33507.json | 20 +++++ CVE-2023/CVE-2023-335xx/CVE-2023-33508.json | 20 +++++ CVE-2023/CVE-2023-335xx/CVE-2023-33509.json | 20 +++++ CVE-2023/CVE-2023-337xx/CVE-2023-33734.json | 4 +- CVE-2023/CVE-2023-337xx/CVE-2023-33736.json | 20 +++++ CVE-2023/CVE-2023-337xx/CVE-2023-33740.json | 4 +- CVE-2023/CVE-2023-337xx/CVE-2023-33741.json | 4 +- CVE-2023/CVE-2023-337xx/CVE-2023-33750.json | 63 ++++++++++++- CVE-2023/CVE-2023-337xx/CVE-2023-33751.json | 63 ++++++++++++- CVE-2023/CVE-2023-339xx/CVE-2023-33961.json | 4 +- CVE-2023/CVE-2023-339xx/CVE-2023-33962.json | 4 +- CVE-2023/CVE-2023-341xx/CVE-2023-34151.json | 4 +- CVE-2023/CVE-2023-341xx/CVE-2023-34152.json | 4 +- CVE-2023/CVE-2023-341xx/CVE-2023-34153.json | 4 +- README.md | 47 ++++++++-- 129 files changed, 1471 insertions(+), 383 deletions(-) create mode 100644 CVE-2023/CVE-2023-302xx/CVE-2023-30285.json create mode 100644 CVE-2023/CVE-2023-30xx/CVE-2023-3007.json create mode 100644 CVE-2023/CVE-2023-30xx/CVE-2023-3008.json create mode 100644 CVE-2023/CVE-2023-30xx/CVE-2023-3009.json create mode 100644 CVE-2023/CVE-2023-334xx/CVE-2023-33485.json create mode 100644 CVE-2023/CVE-2023-334xx/CVE-2023-33486.json create mode 100644 CVE-2023/CVE-2023-334xx/CVE-2023-33487.json create mode 100644 CVE-2023/CVE-2023-335xx/CVE-2023-33507.json create mode 100644 CVE-2023/CVE-2023-335xx/CVE-2023-33508.json create mode 100644 CVE-2023/CVE-2023-335xx/CVE-2023-33509.json create mode 100644 CVE-2023/CVE-2023-337xx/CVE-2023-33736.json diff --git a/CVE-2012/CVE-2012-100xx/CVE-2012-10015.json b/CVE-2012/CVE-2012-100xx/CVE-2012-10015.json index 1fd088cbd97..880d849fcd8 100644 --- a/CVE-2012/CVE-2012-100xx/CVE-2012-10015.json +++ b/CVE-2012/CVE-2012-100xx/CVE-2012-10015.json @@ -2,8 +2,8 @@ "id": "CVE-2012-10015", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-31T00:15:09.417", - "lastModified": "2023-05-31T00:15:09.417", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2014/CVE-2014-1251xx/CVE-2014-125103.json b/CVE-2014/CVE-2014-1251xx/CVE-2014-125103.json index 7e7ccf847da..2c1de646974 100644 --- a/CVE-2014/CVE-2014-1251xx/CVE-2014-125103.json +++ b/CVE-2014/CVE-2014-1251xx/CVE-2014-125103.json @@ -2,8 +2,8 @@ "id": "CVE-2014-125103", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-31T03:15:09.077", - "lastModified": "2023-05-31T03:15:09.077", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2015/CVE-2015-101xx/CVE-2015-10107.json b/CVE-2015/CVE-2015-101xx/CVE-2015-10107.json index 14e3367c023..a34c96f3fa0 100644 --- a/CVE-2015/CVE-2015-101xx/CVE-2015-10107.json +++ b/CVE-2015/CVE-2015-101xx/CVE-2015-10107.json @@ -2,8 +2,8 @@ "id": "CVE-2015-10107", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-31T03:15:09.157", - "lastModified": "2023-05-31T03:15:09.157", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2018/CVE-2018-30xx/CVE-2018-3067.json b/CVE-2018/CVE-2018-30xx/CVE-2018-3067.json index 95fcd7bcaba..f109230c5c8 100644 --- a/CVE-2018/CVE-2018-30xx/CVE-2018-3067.json +++ b/CVE-2018/CVE-2018-30xx/CVE-2018-3067.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3067", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-07-18T13:29:08.053", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T12:31:24.783", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.11", - "matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" + "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030" } ] } diff --git a/CVE-2018/CVE-2018-30xx/CVE-2018-3073.json b/CVE-2018/CVE-2018-30xx/CVE-2018-3073.json index 76560971a2c..6baadf407c8 100644 --- a/CVE-2018/CVE-2018-30xx/CVE-2018-3073.json +++ b/CVE-2018/CVE-2018-30xx/CVE-2018-3073.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3073", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-07-18T13:29:08.303", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T12:31:27.497", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.11", - "matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" + "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030" } ] } diff --git a/CVE-2018/CVE-2018-30xx/CVE-2018-3074.json b/CVE-2018/CVE-2018-30xx/CVE-2018-3074.json index 5dd11fd3ace..052fe7391a9 100644 --- a/CVE-2018/CVE-2018-30xx/CVE-2018-3074.json +++ b/CVE-2018/CVE-2018-30xx/CVE-2018-3074.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3074", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-07-18T13:29:08.350", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T12:31:30.227", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.11", - "matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" + "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030" } ] } diff --git a/CVE-2018/CVE-2018-30xx/CVE-2018-3075.json b/CVE-2018/CVE-2018-30xx/CVE-2018-3075.json index e916dba3a6a..edada313a3a 100644 --- a/CVE-2018/CVE-2018-30xx/CVE-2018-3075.json +++ b/CVE-2018/CVE-2018-30xx/CVE-2018-3075.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3075", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-07-18T13:29:08.397", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:39:57.593", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.11", - "matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" + "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030" } ] } diff --git a/CVE-2018/CVE-2018-30xx/CVE-2018-3078.json b/CVE-2018/CVE-2018-30xx/CVE-2018-3078.json index 5248ef7f70e..ed1e4be11c5 100644 --- a/CVE-2018/CVE-2018-30xx/CVE-2018-3078.json +++ b/CVE-2018/CVE-2018-30xx/CVE-2018-3078.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3078", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-07-18T13:29:08.523", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:40:12.753", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.11", - "matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" + "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030" } ] } @@ -136,6 +137,7 @@ "url": "http://www.securityfocus.com/bid/104772", "source": "secalert_us@oracle.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -144,6 +146,7 @@ "url": "http://www.securitytracker.com/id/1041294", "source": "secalert_us@oracle.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2018/CVE-2018-30xx/CVE-2018-3079.json b/CVE-2018/CVE-2018-30xx/CVE-2018-3079.json index 0ff26c33377..3d04839c1fe 100644 --- a/CVE-2018/CVE-2018-30xx/CVE-2018-3079.json +++ b/CVE-2018/CVE-2018-30xx/CVE-2018-3079.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3079", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-07-18T13:29:08.587", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:40:39.297", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.11", - "matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" + "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030" } ] } @@ -136,6 +137,7 @@ "url": "http://www.securityfocus.com/bid/104772", "source": "secalert_us@oracle.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -144,6 +146,7 @@ "url": "http://www.securitytracker.com/id/1041294", "source": "secalert_us@oracle.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2018/CVE-2018-30xx/CVE-2018-3080.json b/CVE-2018/CVE-2018-30xx/CVE-2018-3080.json index 7b3704c0649..a0c05fcfc7d 100644 --- a/CVE-2018/CVE-2018-30xx/CVE-2018-3080.json +++ b/CVE-2018/CVE-2018-30xx/CVE-2018-3080.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3080", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-07-18T13:29:08.633", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:38:18.223", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.11", - "matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" + "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030" } ] } @@ -136,6 +137,7 @@ "url": "http://www.securityfocus.com/bid/104772", "source": "secalert_us@oracle.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -144,6 +146,7 @@ "url": "http://www.securitytracker.com/id/1041294", "source": "secalert_us@oracle.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2018/CVE-2018-30xx/CVE-2018-3082.json b/CVE-2018/CVE-2018-30xx/CVE-2018-3082.json index e7bb46b533a..c0fdb441e0d 100644 --- a/CVE-2018/CVE-2018-30xx/CVE-2018-3082.json +++ b/CVE-2018/CVE-2018-30xx/CVE-2018-3082.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3082", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-07-18T13:29:08.727", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:38:02.883", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.11", - "matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" + "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030" } ] } @@ -136,6 +137,7 @@ "url": "http://www.securityfocus.com/bid/104772", "source": "secalert_us@oracle.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] @@ -144,6 +146,7 @@ "url": "http://www.securitytracker.com/id/1041294", "source": "secalert_us@oracle.com", "tags": [ + "Broken Link", "Third Party Advisory", "VDB Entry" ] diff --git a/CVE-2018/CVE-2018-30xx/CVE-2018-3084.json b/CVE-2018/CVE-2018-30xx/CVE-2018-3084.json index 9623d70a54e..ea22fd0ebf9 100644 --- a/CVE-2018/CVE-2018-30xx/CVE-2018-3084.json +++ b/CVE-2018/CVE-2018-30xx/CVE-2018-3084.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3084", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-07-18T13:29:08.773", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:37:00.937", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.11", - "matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" + "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030" } ] } diff --git a/CVE-2018/CVE-2018-31xx/CVE-2018-3137.json b/CVE-2018/CVE-2018-31xx/CVE-2018-3137.json index 0ce7552242f..a3a40664353 100644 --- a/CVE-2018/CVE-2018-31xx/CVE-2018-3137.json +++ b/CVE-2018/CVE-2018-31xx/CVE-2018-3137.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3137", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-10-17T01:31:16.400", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:36:45.487", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -86,8 +86,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.12", - "matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" + "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1" } ] } diff --git a/CVE-2018/CVE-2018-31xx/CVE-2018-3145.json b/CVE-2018/CVE-2018-31xx/CVE-2018-3145.json index 8586418ecba..9b2b3ec1ec1 100644 --- a/CVE-2018/CVE-2018-31xx/CVE-2018-3145.json +++ b/CVE-2018/CVE-2018-31xx/CVE-2018-3145.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3145", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-10-17T01:31:17.120", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:36:40.643", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.12", - "matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" + "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1" } ] } diff --git a/CVE-2018/CVE-2018-31xx/CVE-2018-3170.json b/CVE-2018/CVE-2018-31xx/CVE-2018-3170.json index 4040fa9c8b1..1bca3647bf5 100644 --- a/CVE-2018/CVE-2018-31xx/CVE-2018-3170.json +++ b/CVE-2018/CVE-2018-31xx/CVE-2018-3170.json @@ -2,8 +2,8 @@ "id": "CVE-2018-3170", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-10-17T01:31:19.463", - "lastModified": "2019-10-03T00:03:26.223", - "vulnStatus": "Modified", + "lastModified": "2023-05-31T13:36:29.623", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -77,6 +77,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -85,8 +86,69 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.12", - "matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" + "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", + "versionStartIncluding": "9.4", + "matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3", + "matchCriteriaId": "53E6AC9E-CD46-4386-8975-E256E65469AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } @@ -120,7 +182,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20181018-0002/", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-31xx/CVE-2018-3182.json b/CVE-2018/CVE-2018-31xx/CVE-2018-3182.json index 5c8ba0c3995..9802e5798a0 100644 --- a/CVE-2018/CVE-2018-31xx/CVE-2018-3182.json +++ b/CVE-2018/CVE-2018-31xx/CVE-2018-3182.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3182", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-10-17T01:31:20.587", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:32:59.687", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -77,6 +77,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -85,8 +86,69 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.12", - "matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" + "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3", + "matchCriteriaId": "53E6AC9E-CD46-4386-8975-E256E65469AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", + "versionStartIncluding": "9.4", + "matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94" } ] } diff --git a/CVE-2018/CVE-2018-31xx/CVE-2018-3186.json b/CVE-2018/CVE-2018-31xx/CVE-2018-3186.json index 50361325a3a..0a2e6cf178d 100644 --- a/CVE-2018/CVE-2018-31xx/CVE-2018-3186.json +++ b/CVE-2018/CVE-2018-31xx/CVE-2018-3186.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3186", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-10-17T01:31:20.963", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:21:53.060", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -77,6 +77,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -85,8 +86,69 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.12", - "matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" + "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3", + "matchCriteriaId": "53E6AC9E-CD46-4386-8975-E256E65469AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", + "versionStartIncluding": "9.4", + "matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94" } ] } diff --git a/CVE-2018/CVE-2018-31xx/CVE-2018-3195.json b/CVE-2018/CVE-2018-31xx/CVE-2018-3195.json index 1a98cec19a9..5071dcdd98a 100644 --- a/CVE-2018/CVE-2018-31xx/CVE-2018-3195.json +++ b/CVE-2018/CVE-2018-31xx/CVE-2018-3195.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3195", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-10-17T01:31:21.807", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:22:09.633", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -77,6 +77,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -85,8 +86,69 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.12", - "matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" + "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3", + "matchCriteriaId": "53E6AC9E-CD46-4386-8975-E256E65469AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", + "versionStartIncluding": "9.4", + "matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94" } ] } diff --git a/CVE-2018/CVE-2018-32xx/CVE-2018-3203.json b/CVE-2018/CVE-2018-32xx/CVE-2018-3203.json index bf0f9e6d35d..2fcae430eac 100644 --- a/CVE-2018/CVE-2018-32xx/CVE-2018-3203.json +++ b/CVE-2018/CVE-2018-32xx/CVE-2018-3203.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3203", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-10-17T01:31:22.480", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:24:12.860", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.12", - "matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" + "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1" } ] } diff --git a/CVE-2018/CVE-2018-32xx/CVE-2018-3212.json b/CVE-2018/CVE-2018-32xx/CVE-2018-3212.json index b4efcaca5a3..f8f594003eb 100644 --- a/CVE-2018/CVE-2018-32xx/CVE-2018-3212.json +++ b/CVE-2018/CVE-2018-32xx/CVE-2018-3212.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3212", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-10-17T01:31:23.307", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:24:10.307", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.12", - "matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" + "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1" } ] } diff --git a/CVE-2018/CVE-2018-32xx/CVE-2018-3279.json b/CVE-2018/CVE-2018-32xx/CVE-2018-3279.json index b8ae46ab970..e67cb10aabd 100644 --- a/CVE-2018/CVE-2018-32xx/CVE-2018-3279.json +++ b/CVE-2018/CVE-2018-32xx/CVE-2018-3279.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3279", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-10-17T01:31:28.993", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:24:07.750", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -86,8 +86,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.12", - "matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" + "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1" } ] } diff --git a/CVE-2018/CVE-2018-32xx/CVE-2018-3280.json b/CVE-2018/CVE-2018-32xx/CVE-2018-3280.json index ec6893c9b06..c0b496fe7e3 100644 --- a/CVE-2018/CVE-2018-32xx/CVE-2018-3280.json +++ b/CVE-2018/CVE-2018-32xx/CVE-2018-3280.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3280", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-10-17T01:31:29.087", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:24:05.677", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -86,8 +86,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.12", - "matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" + "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1" } ] } diff --git a/CVE-2018/CVE-2018-32xx/CVE-2018-3285.json b/CVE-2018/CVE-2018-32xx/CVE-2018-3285.json index 84c1c8a3c38..0712feac0b5 100644 --- a/CVE-2018/CVE-2018-32xx/CVE-2018-3285.json +++ b/CVE-2018/CVE-2018-32xx/CVE-2018-3285.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3285", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-10-17T01:31:29.557", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:21:46.333", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -86,8 +86,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.12", - "matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" + "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1" } ] } diff --git a/CVE-2018/CVE-2018-32xx/CVE-2018-3286.json b/CVE-2018/CVE-2018-32xx/CVE-2018-3286.json index 527c6b9d757..4093b11cc0e 100644 --- a/CVE-2018/CVE-2018-32xx/CVE-2018-3286.json +++ b/CVE-2018/CVE-2018-32xx/CVE-2018-3286.json @@ -2,7 +2,7 @@ "id": "CVE-2018-3286", "sourceIdentifier": "secalert_us@oracle.com", "published": "2018-10-17T01:31:29.650", - "lastModified": "2019-10-03T00:03:26.223", + "lastModified": "2023-05-31T13:19:27.850", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -86,8 +86,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.12", - "matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" + "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1" } ] } diff --git a/CVE-2019/CVE-2019-24xx/CVE-2019-2494.json b/CVE-2019/CVE-2019-24xx/CVE-2019-2494.json index 00d9de0c4c9..45b977540d8 100644 --- a/CVE-2019/CVE-2019-24xx/CVE-2019-2494.json +++ b/CVE-2019/CVE-2019-24xx/CVE-2019-2494.json @@ -2,8 +2,8 @@ "id": "CVE-2019-2494", "sourceIdentifier": "secalert_us@oracle.com", "published": "2019-01-16T19:30:34.000", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Modified", + "lastModified": "2023-05-31T13:19:34.920", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.13", - "matchCriteriaId": "C54A1D84-9347-4806-888B-80F4C7B248CD" + "matchCriteriaId": "C743C44C-2E97-4E5E-8C76-FC0E666BA115" } ] } @@ -112,15 +113,24 @@ }, { "url": "https://access.redhat.com/errata/RHSA-2019:2484", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2019:2511", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20190118-0002/", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-24xx/CVE-2019-2495.json b/CVE-2019/CVE-2019-24xx/CVE-2019-2495.json index dc419b65c04..09584526b0e 100644 --- a/CVE-2019/CVE-2019-24xx/CVE-2019-2495.json +++ b/CVE-2019/CVE-2019-24xx/CVE-2019-2495.json @@ -2,8 +2,8 @@ "id": "CVE-2019-2495", "sourceIdentifier": "secalert_us@oracle.com", "published": "2019-01-16T19:30:34.017", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Modified", + "lastModified": "2023-05-31T13:19:47.317", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.13", - "matchCriteriaId": "C54A1D84-9347-4806-888B-80F4C7B248CD" + "matchCriteriaId": "C743C44C-2E97-4E5E-8C76-FC0E666BA115" } ] } @@ -112,15 +113,24 @@ }, { "url": "https://access.redhat.com/errata/RHSA-2019:2484", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2019:2511", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20190118-0002/", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-25xx/CVE-2019-2502.json b/CVE-2019/CVE-2019-25xx/CVE-2019-2502.json index 20cf2f01b58..9097ec8af07 100644 --- a/CVE-2019/CVE-2019-25xx/CVE-2019-2502.json +++ b/CVE-2019/CVE-2019-25xx/CVE-2019-2502.json @@ -2,8 +2,8 @@ "id": "CVE-2019-2502", "sourceIdentifier": "secalert_us@oracle.com", "published": "2019-01-16T19:30:34.577", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Modified", + "lastModified": "2023-05-31T13:20:03.287", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -77,6 +77,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -85,8 +86,69 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.13", - "matchCriteriaId": "C54A1D84-9347-4806-888B-80F4C7B248CD" + "matchCriteriaId": "C743C44C-2E97-4E5E-8C76-FC0E666BA115" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3", + "matchCriteriaId": "53E6AC9E-CD46-4386-8975-E256E65469AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*", + "versionStartIncluding": "9.4", + "matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94" } ] } @@ -112,15 +174,24 @@ }, { "url": "https://access.redhat.com/errata/RHSA-2019:2484", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2019:2511", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20190118-0002/", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-25xx/CVE-2019-2513.json b/CVE-2019/CVE-2019-25xx/CVE-2019-2513.json index bab456efad1..f078caceeda 100644 --- a/CVE-2019/CVE-2019-25xx/CVE-2019-2513.json +++ b/CVE-2019/CVE-2019-25xx/CVE-2019-2513.json @@ -2,7 +2,7 @@ "id": "CVE-2019-2513", "sourceIdentifier": "secalert_us@oracle.com", "published": "2019-01-16T19:30:35.047", - "lastModified": "2020-08-24T17:37:01.140", + "lastModified": "2023-05-31T13:20:17.260", "vulnStatus": "Analyzed", "descriptions": [ { @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndExcluding": "8.0.13", - "matchCriteriaId": "CF4C29BD-0792-4A51-A63B-A53EDA193AFC" + "matchCriteriaId": "759CBC31-3FC8-41A7-BB4D-76A973A4BE0D" } ] } diff --git a/CVE-2019/CVE-2019-25xx/CVE-2019-2535.json b/CVE-2019/CVE-2019-25xx/CVE-2019-2535.json index f86f951e9ce..7681ad61317 100644 --- a/CVE-2019/CVE-2019-25xx/CVE-2019-2535.json +++ b/CVE-2019/CVE-2019-25xx/CVE-2019-2535.json @@ -2,7 +2,7 @@ "id": "CVE-2019-2535", "sourceIdentifier": "secalert_us@oracle.com", "published": "2019-01-16T19:30:35.737", - "lastModified": "2023-01-31T17:42:19.717", + "lastModified": "2023-05-31T12:55:12.843", "vulnStatus": "Analyzed", "descriptions": [ { @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.13", - "matchCriteriaId": "C54A1D84-9347-4806-888B-80F4C7B248CD" + "matchCriteriaId": "C743C44C-2E97-4E5E-8C76-FC0E666BA115" } ] } diff --git a/CVE-2019/CVE-2019-27xx/CVE-2019-2743.json b/CVE-2019/CVE-2019-27xx/CVE-2019-2743.json index 6d7f0d2456b..271fa1d3527 100644 --- a/CVE-2019/CVE-2019-27xx/CVE-2019-2743.json +++ b/CVE-2019/CVE-2019-27xx/CVE-2019-2743.json @@ -2,8 +2,8 @@ "id": "CVE-2019-2743", "sourceIdentifier": "secalert_us@oracle.com", "published": "2019-07-23T23:15:38.537", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Modified", + "lastModified": "2023-05-31T12:55:31.907", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.12", - "matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" + "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1" } ] } @@ -104,11 +105,17 @@ }, { "url": "https://support.f5.com/csp/article/K03444640", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.f5.com/csp/article/K03444640?utm_source=f5support&utm_medium=RSS", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-27xx/CVE-2019-2746.json b/CVE-2019/CVE-2019-27xx/CVE-2019-2746.json index 90d9775289c..c5e19610b6a 100644 --- a/CVE-2019/CVE-2019-27xx/CVE-2019-2746.json +++ b/CVE-2019/CVE-2019-27xx/CVE-2019-2746.json @@ -2,8 +2,8 @@ "id": "CVE-2019-2746", "sourceIdentifier": "secalert_us@oracle.com", "published": "2019-07-23T23:15:38.757", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Modified", + "lastModified": "2023-05-31T12:55:40.497", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.12", - "matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" + "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1" } ] } @@ -104,11 +105,17 @@ }, { "url": "https://support.f5.com/csp/article/K03444640", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.f5.com/csp/article/K03444640?utm_source=f5support&utm_medium=RSS", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-27xx/CVE-2019-2747.json b/CVE-2019/CVE-2019-27xx/CVE-2019-2747.json index 0c9c2fe1451..4b138364369 100644 --- a/CVE-2019/CVE-2019-27xx/CVE-2019-2747.json +++ b/CVE-2019/CVE-2019-27xx/CVE-2019-2747.json @@ -2,8 +2,8 @@ "id": "CVE-2019-2747", "sourceIdentifier": "secalert_us@oracle.com", "published": "2019-07-23T23:15:38.820", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Modified", + "lastModified": "2023-05-31T12:55:49.017", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.12", - "matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" + "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1" } ] } @@ -104,11 +105,17 @@ }, { "url": "https://support.f5.com/csp/article/K03444640", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.f5.com/csp/article/K03444640?utm_source=f5support&utm_medium=RSS", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-28xx/CVE-2019-2822.json b/CVE-2019/CVE-2019-28xx/CVE-2019-2822.json index 2162169e0f1..cc078bac442 100644 --- a/CVE-2019/CVE-2019-28xx/CVE-2019-2822.json +++ b/CVE-2019/CVE-2019-28xx/CVE-2019-2822.json @@ -2,8 +2,8 @@ "id": "CVE-2019-2822", "sourceIdentifier": "secalert_us@oracle.com", "published": "2019-07-23T23:15:43.710", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Modified", + "lastModified": "2023-05-31T12:55:55.143", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", "versionEndIncluding": "8.0.16", - "matchCriteriaId": "B72AD7BD-9028-43DD-929C-4670655BBC70" + "matchCriteriaId": "7FB3C333-CFE6-452F-8E1D-1C1090460804" } ] } @@ -104,11 +105,17 @@ }, { "url": "https://support.f5.com/csp/article/K02585438", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.f5.com/csp/article/K02585438?utm_source=f5support&utm_medium=RSS", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-312xx/CVE-2021-31233.json b/CVE-2021/CVE-2021-312xx/CVE-2021-31233.json index 07e144fc409..008d94e5a28 100644 --- a/CVE-2021/CVE-2021-312xx/CVE-2021-31233.json +++ b/CVE-2021/CVE-2021-312xx/CVE-2021-31233.json @@ -2,8 +2,8 @@ "id": "CVE-2021-31233", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T01:15:42.983", - "lastModified": "2023-05-31T01:15:42.983", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39071.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39071.json index 4c20e8cc28d..161188432d9 100644 --- a/CVE-2022/CVE-2022-390xx/CVE-2022-39071.json +++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39071.json @@ -2,8 +2,8 @@ "id": "CVE-2022-39071", "sourceIdentifier": "psirt@zte.com.cn", "published": "2023-05-30T23:15:09.273", - "lastModified": "2023-05-30T23:15:09.273", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39074.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39074.json index 96ae7323c3f..597d60f2895 100644 --- a/CVE-2022/CVE-2022-390xx/CVE-2022-39074.json +++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39074.json @@ -2,8 +2,8 @@ "id": "CVE-2022-39074", "sourceIdentifier": "psirt@zte.com.cn", "published": "2023-05-30T23:15:09.393", - "lastModified": "2023-05-30T23:15:09.393", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-390xx/CVE-2022-39075.json b/CVE-2022/CVE-2022-390xx/CVE-2022-39075.json index 2d414064cf6..beb7183d3cc 100644 --- a/CVE-2022/CVE-2022-390xx/CVE-2022-39075.json +++ b/CVE-2022/CVE-2022-390xx/CVE-2022-39075.json @@ -2,8 +2,8 @@ "id": "CVE-2022-39075", "sourceIdentifier": "psirt@zte.com.cn", "published": "2023-05-30T23:15:09.447", - "lastModified": "2023-05-30T23:15:09.447", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-475xx/CVE-2022-47525.json b/CVE-2022/CVE-2022-475xx/CVE-2022-47525.json index 1db4e8dbfb0..f3a0713dd00 100644 --- a/CVE-2022/CVE-2022-475xx/CVE-2022-47525.json +++ b/CVE-2022/CVE-2022-475xx/CVE-2022-47525.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47525", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T00:15:09.600", - "lastModified": "2023-05-31T00:15:09.600", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-475xx/CVE-2022-47526.json b/CVE-2022/CVE-2022-475xx/CVE-2022-47526.json index 3a5f40f09d6..7a432df55b4 100644 --- a/CVE-2022/CVE-2022-475xx/CVE-2022-47526.json +++ b/CVE-2022/CVE-2022-475xx/CVE-2022-47526.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47526", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T00:15:09.647", - "lastModified": "2023-05-31T00:15:09.647", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0779.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0779.json index 5a3525ec6c1..27381659f62 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0779.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0779.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0779", "sourceIdentifier": "vulnerabilities@zephyrproject.org", "published": "2023-05-30T21:15:08.987", - "lastModified": "2023-05-30T22:15:09.457", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1661.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1661.json index bb5883d89d8..b114c4783a1 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1661.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1661.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1661", "sourceIdentifier": "security@wordfence.com", "published": "2023-05-31T04:15:09.893", - "lastModified": "2023-05-31T04:15:09.893", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23562.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23562.json index 1b947d0872a..a6b0378a185 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23562.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23562.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23562", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T01:15:43.057", - "lastModified": "2023-05-31T01:15:43.057", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-23xx/CVE-2023-2304.json b/CVE-2023/CVE-2023-23xx/CVE-2023-2304.json index e8058ed86fa..3950f305814 100644 --- a/CVE-2023/CVE-2023-23xx/CVE-2023-2304.json +++ b/CVE-2023/CVE-2023-23xx/CVE-2023-2304.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2304", "sourceIdentifier": "security@wordfence.com", "published": "2023-05-31T05:15:10.260", - "lastModified": "2023-05-31T05:15:10.260", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2434.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2434.json index 2391af01e97..d6bd3d3b837 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2434.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2434.json @@ -2,12 +2,16 @@ "id": "CVE-2023-2434", "sourceIdentifier": "security@wordfence.com", "published": "2023-05-31T04:15:10.070", - "lastModified": "2023-05-31T04:15:10.070", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Nested Pages plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'reset' function in versions up to, and including, 3.2.3. This makes it possible for authenticated attackers, with editor-level permissions and above, to reset plugin settings." + }, + { + "lang": "es", + "value": "El plugin Nested Pages para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a la falta de capacidad de comprobaci\u00f3n de la funci\u00f3n \"reset\" en las versiones hasta la 3.2.3 inclusive. Esto hace posible que atacantes autenticados, con permisos de nivel de editor y superiores, restablezcan la configuraci\u00f3n del plugin. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2435.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2435.json index e660ac2de08..2331a0ea007 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2435.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2435.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2435", "sourceIdentifier": "security@wordfence.com", "published": "2023-05-31T03:15:09.313", - "lastModified": "2023-05-31T03:15:09.313", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2436.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2436.json index 4efcc979f6d..8a2e9649ed6 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2436.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2436.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2436", "sourceIdentifier": "security@wordfence.com", "published": "2023-05-31T03:15:09.380", - "lastModified": "2023-05-31T03:15:09.380", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-255xx/CVE-2023-25539.json b/CVE-2023/CVE-2023-255xx/CVE-2023-25539.json index 34afe58b262..96a242f3c0a 100644 --- a/CVE-2023/CVE-2023-255xx/CVE-2023-25539.json +++ b/CVE-2023/CVE-2023-255xx/CVE-2023-25539.json @@ -2,12 +2,16 @@ "id": "CVE-2023-25539", "sourceIdentifier": "security_alert@emc.com", "published": "2023-05-31T05:15:09.537", - "lastModified": "2023-05-31T05:15:09.537", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "\nDell NetWorker 19.6.1.2, contains an OS command injection Vulnerability in the NetWorker client. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. This is a high severity vulnerability as the exploitation allows an attacker to take complete control of a system, so Dell recommends customers to upgrade at the earliest opportunity.\n\n" + }, + { + "lang": "es", + "value": "Dell NetWorker v19.6.1.2 contiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en el cliente NetWorker. Un atacante remoto no autenticado podr\u00eda explotar potencialmente esta vulnerabilidad, llevando a la ejecuci\u00f3n de comandos arbitrarios del sistema operativo en el sistema operativo subyacente de la aplicaci\u00f3n, con los privilegios de la aplicaci\u00f3n vulnerable. Se trata de una vulnerabilidad de alta gravedad, ya que su explotaci\u00f3n permite a un atacante hacerse con el control total de un sistema, por lo que Dell recomienda a los clientes que actualicen lo antes posible. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2545.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2545.json index 4822fe58331..e2e2d706c79 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2545.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2545.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2545", "sourceIdentifier": "security@wordfence.com", "published": "2023-05-31T03:15:09.443", - "lastModified": "2023-05-31T03:15:09.443", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2547.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2547.json index a97ca94fad0..30a545ee032 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2547.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2547.json @@ -2,12 +2,16 @@ "id": "CVE-2023-2547", "sourceIdentifier": "security@wordfence.com", "published": "2023-05-31T03:15:09.510", - "lastModified": "2023-05-31T03:15:09.510", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Feather Login Page plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteUser' function in versions starting from 1.0.7 up to, and including, 1.1.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete the temp user generated by the plugin." + }, + { + "lang": "es", + "value": "El plugin Feather Login Page para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una falta de capacidad de comprobaci\u00f3n en la funci\u00f3n \"deleteUser\" en las versiones a partir de la 1.0.7 hasta la 1.1.1 inclusive. Esto hace posible que atacantes autenticados con permisos de nivel de suscriptor y superiores, eliminen el usuario temporal generado por el plugin. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2549.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2549.json index 59994e40d71..fbc25b5ea82 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2549.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2549.json @@ -2,12 +2,16 @@ "id": "CVE-2023-2549", "sourceIdentifier": "security@wordfence.com", "published": "2023-05-31T03:15:09.577", - "lastModified": "2023-05-31T03:15:09.577", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Feather Login Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions starting from 1.0.7 up to, and including, 1.1.1. This is due to missing nonce validation in the 'createTempAccountLink' function. This makes it possible for unauthenticated attackers to create a new user with administrator role via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. An attacker can leverage CVE-2023-2545 to get the login link or request a password reset to the new user's email address." + }, + { + "lang": "es", + "value": "El plugin Feather Login Page para WordPress es vulnerable a Cross-Site Request Forgery en versiones desde la 1.0.7 hasta la 1.1.1 inclusive. Esto es debido a la falta de validaci\u00f3n nonce en la funci\u00f3n \"createTempAccountLink\". Esto hace posible que atacantes no autenticados puedan crear un nuevo usuario con rol de administrador a trav\u00e9s de una petici\u00f3n falsificada, pudiendo enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace. Un atacante puede aprovechar la vulnerabilidad \"CVE-2023-2545\" para obtener el enlace de inicio de sesi\u00f3n o solicitar un restablecimiento de contrase\u00f1a a la direcci\u00f3n de correo electr\u00f3nico del nuevo usuario. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26131.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26131.json index c27d21816de..56f5cd40404 100644 --- a/CVE-2023/CVE-2023-261xx/CVE-2023-26131.json +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26131.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26131", "sourceIdentifier": "report@snyk.io", "published": "2023-05-31T05:15:10.180", - "lastModified": "2023-05-31T05:15:10.180", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2612.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2612.json index bb64a761363..7e3764d0a39 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2612.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2612.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2612", "sourceIdentifier": "security@ubuntu.com", "published": "2023-05-31T00:15:10.257", - "lastModified": "2023-05-31T00:15:10.257", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2749.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2749.json index 9bdf6d97efd..0a02ec634a3 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2749.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2749.json @@ -2,12 +2,16 @@ "id": "CVE-2023-2749", "sourceIdentifier": "security@asustor.com", "published": "2023-05-31T09:15:10.490", - "lastModified": "2023-05-31T09:15:10.490", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "Download Center fails to properly validate the file path submitted by a user, An attacker can exploit this vulnerability to gain unauthorized access to sensitive files or directories without appropriate permission restrictions. Download Center on ADM 4.0 and above will be affected. Affected products and versions include: Download Center 1.1.5.r1280 and below. " + }, + { + "lang": "es", + "value": "Download Center no valida correctamente la ruta de archivo enviada por un usuario. Un atacante puede aprovechar esta vulnerabilidad para obtener acceso no autorizado a archivos o directorios confidenciales sin las restricciones de permisos adecuadas. Download Center se ve afectado en ADM 4.0 y en versiones superiores. Los productos y versiones afectados incluyen: Download Center v1.1.5.r1280 e inferiores. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28344.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28344.json index f1fc2c8ccdb..21df48e96da 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28344.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28344.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28344", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T00:15:09.697", - "lastModified": "2023-05-31T00:15:09.697", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28345.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28345.json index d748e98082c..bcebe3ca196 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28345.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28345.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28345", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T00:15:09.747", - "lastModified": "2023-05-31T00:15:09.747", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28346.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28346.json index 71d61ca990e..ef904a7d8f6 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28346.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28346.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28346", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T00:15:09.793", - "lastModified": "2023-05-31T00:15:09.793", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28347.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28347.json index bee508da659..19204803664 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28347.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28347.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28347", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T00:15:09.840", - "lastModified": "2023-05-31T00:15:09.840", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28348.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28348.json index a2609f6023a..b3386cbd2c7 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28348.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28348.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28348", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T00:15:09.887", - "lastModified": "2023-05-31T00:15:09.887", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28349.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28349.json index e6e0a908422..24c113fb7e0 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28349.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28349.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28349", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T00:15:09.933", - "lastModified": "2023-05-31T00:15:09.933", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28350.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28350.json index 2c2cb9ce1fc..bd044412802 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28350.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28350.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28350", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T00:15:09.980", - "lastModified": "2023-05-31T00:15:09.980", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28351.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28351.json index a8ac4971246..196f5e220c2 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28351.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28351.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28351", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T00:15:10.023", - "lastModified": "2023-05-31T00:15:10.023", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28352.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28352.json index 28daad0cdf0..d0a3903d4f0 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28352.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28352.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28352", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T00:15:10.063", - "lastModified": "2023-05-31T00:15:10.063", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28353.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28353.json index 9a123cf470f..200b66f2674 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28353.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28353.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28353", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T00:15:10.107", - "lastModified": "2023-05-31T00:15:10.107", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2836.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2836.json index ee2b94709fa..dd91ea70b44 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2836.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2836.json @@ -2,12 +2,16 @@ "id": "CVE-2023-2836", "sourceIdentifier": "security@wordfence.com", "published": "2023-05-31T04:15:10.200", - "lastModified": "2023-05-31T04:15:10.200", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The CRM Perks Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form settings in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." + }, + { + "lang": "es", + "value": "El plugin CRM Perks Forms para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la configuraci\u00f3n de formularios en versiones hasta la v1.1.1 inclusive debido a la insuficiente sanitizaci\u00f3n de entrada y escape de salida. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto s\u00f3lo afecta a las instalaciones mutisitio y a las instalaciones en las que se ha deshabilitado \"unfiltered _html\". " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2854.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2854.json index aec1c2b588b..67f06c15b16 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2854.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2854.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2854", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-26T21:15:17.643", - "lastModified": "2023-05-29T03:54:24.223", + "lastModified": "2023-05-31T13:46:36.100", "vulnStatus": "Analyzed", "descriptions": [ { @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "baseScore": 5.5, + "baseSeverity": "MEDIUM" }, "exploitabilityScore": 1.8, - "impactScore": 5.9 + "impactScore": 3.6 }, { "source": "cve@gitlab.com", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2855.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2855.json index ec90326ac92..77aa8793aca 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2855.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2855.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2855", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-26T21:15:17.757", - "lastModified": "2023-05-29T03:54:44.930", + "lastModified": "2023-05-31T13:46:47.347", "vulnStatus": "Analyzed", "descriptions": [ { @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "baseScore": 5.5, + "baseSeverity": "MEDIUM" }, "exploitabilityScore": 1.8, - "impactScore": 5.9 + "impactScore": 3.6 }, { "source": "cve@gitlab.com", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2857.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2857.json index 93795cd404a..8722c564ad1 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2857.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2857.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2857", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-26T21:15:18.273", - "lastModified": "2023-05-29T03:58:32.140", + "lastModified": "2023-05-31T13:47:35.877", "vulnStatus": "Analyzed", "descriptions": [ { @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "baseScore": 5.5, + "baseSeverity": "MEDIUM" }, "exploitabilityScore": 1.8, - "impactScore": 5.9 + "impactScore": 3.6 }, { "source": "cve@gitlab.com", diff --git a/CVE-2023/CVE-2023-28xx/CVE-2023-2858.json b/CVE-2023/CVE-2023-28xx/CVE-2023-2858.json index 11c3ef88716..ba5bfef7d99 100644 --- a/CVE-2023/CVE-2023-28xx/CVE-2023-2858.json +++ b/CVE-2023/CVE-2023-28xx/CVE-2023-2858.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2858", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-26T21:15:18.633", - "lastModified": "2023-05-29T03:58:57.950", + "lastModified": "2023-05-31T13:47:28.550", "vulnStatus": "Analyzed", "descriptions": [ { @@ -17,20 +17,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "baseScore": 5.5, + "baseSeverity": "MEDIUM" }, "exploitabilityScore": 1.8, - "impactScore": 5.9 + "impactScore": 3.6 }, { "source": "cve@gitlab.com", diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29726.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29726.json index 973e5d82ec3..a8a05f403cf 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29726.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29726.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29726", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T23:15:09.513", - "lastModified": "2023-05-30T23:15:09.513", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29727.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29727.json index 8dea9f1b336..d47196f7bf6 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29727.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29727.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29727", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T23:15:09.563", - "lastModified": "2023-05-30T23:15:09.563", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29728.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29728.json index 2c568739db5..160a5f073b3 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29728.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29728.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29728", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T23:15:09.607", - "lastModified": "2023-05-30T23:15:09.607", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29738.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29738.json index 7d5310da67d..ed842d9267e 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29738.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29738.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29738", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T23:15:09.653", - "lastModified": "2023-05-30T23:15:09.653", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29739.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29739.json index 8358f3c0c3b..782625dbd7f 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29739.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29739.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29739", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T23:15:09.700", - "lastModified": "2023-05-30T23:15:09.700", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29740.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29740.json index 113766accbd..ddc0bfe606d 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29740.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29740.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29740", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T23:15:09.750", - "lastModified": "2023-05-30T23:15:09.750", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29741.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29741.json index fa7a6f75bfe..9f4314e0bc3 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29741.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29741.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29741", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T23:15:09.793", - "lastModified": "2023-05-30T23:15:09.793", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29742.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29742.json index 5742fc415cc..ab5aa609d16 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29742.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29742.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29742", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T00:15:10.153", - "lastModified": "2023-05-31T00:15:10.153", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29743.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29743.json index f37c934fc3e..3a0712be0dc 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29743.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29743.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29743", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T23:15:09.840", - "lastModified": "2023-05-30T23:15:09.840", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-297xx/CVE-2023-29745.json b/CVE-2023/CVE-2023-297xx/CVE-2023-29745.json index 51afc3d29a7..290c14b1758 100644 --- a/CVE-2023/CVE-2023-297xx/CVE-2023-29745.json +++ b/CVE-2023/CVE-2023-297xx/CVE-2023-29745.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29745", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T00:15:10.200", - "lastModified": "2023-05-31T00:15:10.200", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2909.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2909.json index ccfd7f486e6..2b6c6e94889 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2909.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2909.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2909", "sourceIdentifier": "security@asustor.com", "published": "2023-05-31T10:15:09.577", - "lastModified": "2023-05-31T10:15:09.577", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2929.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2929.json index 63ee6ec53ff..989c7ebe23b 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2929.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2929.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2929", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:09.997", - "lastModified": "2023-05-30T22:15:09.997", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2930.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2930.json index 4fd02442e7e..bd27bf1c540 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2930.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2930.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2930", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:10.067", - "lastModified": "2023-05-30T22:15:10.067", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2931.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2931.json index ba3769bdced..85dd55360f9 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2931.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2931.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2931", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:10.117", - "lastModified": "2023-05-30T22:15:10.117", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2932.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2932.json index c085c1293dd..c24dc293792 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2932.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2932.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2932", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:10.167", - "lastModified": "2023-05-30T22:15:10.167", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2933.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2933.json index 28899168ca0..316ce699c97 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2933.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2933.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2933", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:10.210", - "lastModified": "2023-05-30T22:15:10.210", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2934.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2934.json index 0b4c683c38f..3043457498a 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2934.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2934.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2934", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:10.257", - "lastModified": "2023-05-30T22:15:10.257", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2935.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2935.json index 9b9333eb73c..60bcb45ffe4 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2935.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2935.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2935", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:10.307", - "lastModified": "2023-05-30T22:15:10.307", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2936.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2936.json index 98f9ecd111b..818377d7810 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2936.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2936.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2936", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:10.350", - "lastModified": "2023-05-30T22:15:10.350", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2937.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2937.json index eb0ad6167b7..6dd702f98cd 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2937.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2937.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2937", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:10.393", - "lastModified": "2023-05-30T22:15:10.393", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2938.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2938.json index f8a043a2d3f..a4cea42683d 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2938.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2938.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2938", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:10.433", - "lastModified": "2023-05-30T22:15:10.433", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2939.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2939.json index 90eec9203ce..17d4f7bd78b 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2939.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2939.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2939", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:10.477", - "lastModified": "2023-05-30T22:15:10.477", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2940.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2940.json index b621723e408..a315c7b3e82 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2940.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2940.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2940", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:10.527", - "lastModified": "2023-05-30T22:15:10.527", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2941.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2941.json index 05b53317f20..2bd3495a4cf 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2941.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2941.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2941", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-05-30T22:15:10.570", - "lastModified": "2023-05-30T22:15:10.570", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2952.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2952.json index 11e4ce922ee..5f84141f64f 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2952.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2952.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2952", "sourceIdentifier": "cve@gitlab.com", "published": "2023-05-30T23:15:09.887", - "lastModified": "2023-05-30T23:15:09.887", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2953.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2953.json index 5a4fa3401bd..9e886c67ab1 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2953.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2953.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2953", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-30T22:15:10.613", - "lastModified": "2023-05-30T22:15:10.613", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2987.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2987.json index 9d6a3c121e6..850488324f1 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2987.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2987.json @@ -2,12 +2,16 @@ "id": "CVE-2023-2987", "sourceIdentifier": "security@wordfence.com", "published": "2023-05-31T03:15:09.643", - "lastModified": "2023-05-31T03:15:09.643", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", "value": "The Wordapp plugin for WordPress is vulnerable to authorization bypass due to an use of insufficiently unique cryptographic signature on the 'wa_pdx_op_config_set' function in versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to the plugin to change the 'validation_token' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation." + }, + { + "lang": "es", + "value": "El plugin Wordapp para WordPress es vulnerable a una omisi\u00f3n de autorizaci\u00f3n debido al uso de una firma criptogr\u00e1fica insuficientemente \u00fanica en la funci\u00f3n \"wa_pdx_op_config_set\" en versiones hasta la 1.5.0 inclusive. Esto hace posible que atacantes no autenticados al plugin cambien el \"validation_token\" en la configuraci\u00f3n del plugin, proporcionando acceso a las funcionalidades de control remoto del plugin, como la creaci\u00f3n de una URL de acceso de administrador, que puede ser utilizada para la esclada de privilegios. " } ], "metrics": { diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2998.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2998.json index 82782010d86..02851b8a4bf 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2998.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2998.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2998", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-31T01:15:43.103", - "lastModified": "2023-05-31T01:15:43.103", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2999.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2999.json index 9e68d3e3dde..e8dadc8b7a6 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2999.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2999.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2999", "sourceIdentifier": "security@huntr.dev", "published": "2023-05-31T01:15:43.163", - "lastModified": "2023-05-31T01:15:43.163", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30197.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30197.json index 5937f1e104a..9791e2646ab 100644 --- a/CVE-2023/CVE-2023-301xx/CVE-2023-30197.json +++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30197.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30197", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-31T01:15:43.223", - "lastModified": "2023-05-31T01:15:43.223", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-302xx/CVE-2023-30285.json b/CVE-2023/CVE-2023-302xx/CVE-2023-30285.json new file mode 100644 index 00000000000..c64ff7ad546 --- /dev/null +++ b/CVE-2023/CVE-2023-302xx/CVE-2023-30285.json @@ -0,0 +1,28 @@ +{ + "id": "CVE-2023-30285", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-31T12:15:09.410", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "An issue in Deviniti Issue Sync Synchronization v3.5.2 for Jira allows attackers to obtain the login credentials of a user via a crafted request sent to /rest/synchronizer/1.0/technicalUser." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://deviniti.com", + "source": "cve@mitre.org" + }, + { + "url": "http://issue.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/D23K4N/CVE/blob/main/CVE-2023-30285.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3003.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3003.json index 97c7615cbbe..3dcd40bd9b9 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3003.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3003.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3003", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-31T09:15:10.600", - "lastModified": "2023-05-31T09:15:10.600", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3004.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3004.json index 16558d3194c..1ff9b550c08 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3004.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3004.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3004", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-31T09:15:10.677", - "lastModified": "2023-05-31T09:15:10.677", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3005.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3005.json index 0514de9a621..044c76219d4 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3005.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3005.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3005", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-31T09:15:10.743", - "lastModified": "2023-05-31T09:15:10.743", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3007.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3007.json new file mode 100644 index 00000000000..4d9388831bd --- /dev/null +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3007.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-3007", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-05-31T12:15:09.550", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in ningzichun Student Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file resetPassword.php of the component Password Reset Handler. The manipulation of the argument sid leads to weak password recovery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-230354 is the identifier assigned to this vulnerability." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.4 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 4.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/student-management-system/password_reset.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.230354", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.230354", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3008.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3008.json new file mode 100644 index 00000000000..fa731484cf3 --- /dev/null +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3008.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-3008", + "sourceIdentifier": "cna@vuldb.com", + "published": "2023-05-31T12:15:09.640", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in ningzichun Student Management System 1.0. This affects an unknown part of the file login.php. The manipulation of the argument user/pass leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-230355." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/student-management-system/sql_inject.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.230355", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.230355", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3009.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3009.json new file mode 100644 index 00000000000..a8c0f49fc40 --- /dev/null +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3009.json @@ -0,0 +1,59 @@ +{ + "id": "CVE-2023-3009", + "sourceIdentifier": "security@huntr.dev", + "published": "2023-05-31T13:15:10.367", + "lastModified": "2023-05-31T13:34:42.827", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Cross-site Scripting (XSS) - Stored in GitHub repository nilsteampassnet/teampass prior to 3.0.9." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security@huntr.dev", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@huntr.dev", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/nilsteampassnet/teampass/commit/6ba8cf1f4b89d62a08d122d533ccf4cb4e26a4ee", + "source": "security@huntr.dev" + }, + { + "url": "https://huntr.dev/bounties/2929faca-5822-4636-8f04-ca5e0001361f", + "source": "security@huntr.dev" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31098.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31098.json index 6b4582c5bc8..e487e2e09d3 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31098.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31098.json @@ -2,18 +2,41 @@ "id": "CVE-2023-31098", "sourceIdentifier": "security@apache.org", "published": "2023-05-22T16:15:10.150", - "lastModified": "2023-05-22T16:15:51.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T13:55:07.513", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Weak Password Requirements vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.1.0 through 1.6.0.\u00a0\n\nWhen users change their password to a simple password (with any character or\nsymbol), attackers can easily guess the user's password and access the account.\n\nUsers are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7805 https://github.com/apache/inlong/pull/7805 to solve it.\n\n\n" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { - "source": "security@apache.org", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -21,12 +44,45 @@ "value": "CWE-521" } ] + }, + { + "source": "security@apache.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-521" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.1.0", + "versionEndIncluding": "1.6.0", + "matchCriteriaId": "EECE4FCB-6C96-4EB4-B9CD-44A78D33313C" + } + ] + } + ] } ], "references": [ { "url": "https://lists.apache.org/thread/1fvloc3no1gbffzrcsx9ltsg08wr2d1w", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31779.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31779.json index 1cd4f6a4fa6..7eea579d04f 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31779.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31779.json @@ -2,23 +2,82 @@ "id": "CVE-2023-31779", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-22T13:15:09.913", - "lastModified": "2023-05-22T13:21:34.157", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T13:38:31.893", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Wekan v6.84 and earlier is vulnerable to Cross Site Scripting (XSS). An attacker with user privilege on kanban board can insert JavaScript code in in \"Reaction to comment\" feature." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wekan_project:wekan:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.84", + "matchCriteriaId": "F6B847F3-637F-4F2D-A8D0-A02D2447C642" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wekan/wekan/blob/master/CHANGELOG.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/wekan/wekan/commit/47ac33d6c234359c31d9b5eae49ed3e793907279", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32342.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32342.json index b534ebaa84a..94cf967d1f8 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32342.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32342.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32342", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-05-30T22:15:10.677", - "lastModified": "2023-05-30T22:15:10.677", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33179.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33179.json index 13f3be322b9..602b06847d1 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33179.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33179.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33179", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-30T21:15:09.077", - "lastModified": "2023-05-30T21:15:09.077", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33180.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33180.json index e6dc7ad422d..5104107bfe1 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33180.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33180.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33180", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-30T21:15:09.147", - "lastModified": "2023-05-30T21:15:09.147", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-331xx/CVE-2023-33181.json b/CVE-2023/CVE-2023-331xx/CVE-2023-33181.json index 502f70951ad..f6421062f2c 100644 --- a/CVE-2023/CVE-2023-331xx/CVE-2023-33181.json +++ b/CVE-2023/CVE-2023-331xx/CVE-2023-33181.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33181", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-30T21:15:09.207", - "lastModified": "2023-05-30T21:15:09.207", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-334xx/CVE-2023-33485.json b/CVE-2023/CVE-2023-334xx/CVE-2023-33485.json new file mode 100644 index 00000000000..e4384fb09d9 --- /dev/null +++ b/CVE-2023/CVE-2023-334xx/CVE-2023-33485.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33485", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-31T13:15:09.637", + "lastModified": "2023-05-31T13:34:42.827", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contains a post-authentication buffer overflow via parameter sPort/ePort in the addEffect function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/5", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-334xx/CVE-2023-33486.json b/CVE-2023/CVE-2023-334xx/CVE-2023-33486.json new file mode 100644 index 00000000000..36bf88e6620 --- /dev/null +++ b/CVE-2023/CVE-2023-334xx/CVE-2023-33486.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33486", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-31T13:15:09.697", + "lastModified": "2023-05-31T13:34:42.827", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setOpModeCfg. This vulnerability allows an attacker to execute arbitrary commands through the \"hostName\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-334xx/CVE-2023-33487.json b/CVE-2023/CVE-2023-334xx/CVE-2023-33487.json new file mode 100644 index 00000000000..79a2b540a76 --- /dev/null +++ b/CVE-2023/CVE-2023-334xx/CVE-2023-33487.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33487", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-31T13:15:09.753", + "lastModified": "2023-05-31T13:34:42.827", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contains a command insertion vulnerability in setDiagnosisCfg.This vulnerability allows an attacker to execute arbitrary commands through the \"ip\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Kazamayc/vuln/tree/main/TOTOLINK/X5000R/4", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33507.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33507.json new file mode 100644 index 00000000000..791ed5694c2 --- /dev/null +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33507.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33507", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-31T13:15:09.880", + "lastModified": "2023-05-31T13:34:42.827", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "KramerAV VIA GO\u00b2 < 4.0.1.1326 is vulnerable to Unauthenticated arbitrary file read." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://zxsecurity.co.nz/research/advisories/kramer-via-go-2-rce-and-other-vulns/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33508.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33508.json new file mode 100644 index 00000000000..43fe5931f2f --- /dev/null +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33508.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33508", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-31T13:15:09.960", + "lastModified": "2023-05-31T13:34:42.827", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "KramerAV VIA GO\u00b2 < 4.0.1.1326 is vulnerable to unauthenticated file upload resulting in Remote Code Execution (RCE)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://zxsecurity.co.nz/research/advisories/kramer-via-go-2-rce-and-other-vulns/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33509.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33509.json new file mode 100644 index 00000000000..ccc63f87e0b --- /dev/null +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33509.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33509", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-31T13:15:10.220", + "lastModified": "2023-05-31T13:34:42.827", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "KramerAV VIA GO\u00b2 < 4.0.1.1326 is vulnerable to SQL Injection." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://zxsecurity.co.nz/research/advisories/kramer-via-go-2-rce-and-other-vulns/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33734.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33734.json index 9d7cc6e09cf..c0dc6e3b537 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33734.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33734.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33734", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T22:15:10.737", - "lastModified": "2023-05-30T22:15:10.737", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33736.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33736.json new file mode 100644 index 00000000000..e8f539c620e --- /dev/null +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33736.json @@ -0,0 +1,20 @@ +{ + "id": "CVE-2023-33736", + "sourceIdentifier": "cve@mitre.org", + "published": "2023-05-31T13:15:10.270", + "lastModified": "2023-05-31T13:34:42.827", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "A stored cross-site scripting (XSS) vulnerability in Dcat-Admin v2.1.3-beta allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the URL parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/jqhph/dcat-admin/issues/2027", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33740.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33740.json index d5099ad870c..78ff4e4f4ba 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33740.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33740.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33740", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T22:15:10.777", - "lastModified": "2023-05-30T22:15:10.777", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33741.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33741.json index 2d5056f22a0..8579e63d0be 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33741.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33741.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33741", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-30T22:15:10.820", - "lastModified": "2023-05-30T22:15:10.820", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33750.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33750.json index 1faf9a6cfa1..3dc4e88efe0 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33750.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33750.json @@ -2,19 +2,74 @@ "id": "CVE-2023-33750", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-25T17:15:12.110", - "lastModified": "2023-05-26T12:44:04.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T13:59:37.380", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in mipjz v5.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description parameter at /index.php?s=/article/ApiAdminArticle/itemAdd." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mipjz_project:mipjz:5.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "E4AEA22F-BAAD-4FC2-B025-B0E93FD5F818" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/sansanyun/mipjz/issues/15", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-337xx/CVE-2023-33751.json b/CVE-2023/CVE-2023-337xx/CVE-2023-33751.json index 56b40e811c0..7a497e91bb3 100644 --- a/CVE-2023/CVE-2023-337xx/CVE-2023-33751.json +++ b/CVE-2023/CVE-2023-337xx/CVE-2023-33751.json @@ -2,19 +2,74 @@ "id": "CVE-2023-33751", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-25T17:15:12.263", - "lastModified": "2023-05-26T12:44:04.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2023-05-31T13:58:58.493", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "A stored cross-site scripting (XSS) vulnerability in mipjz v5.0.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the name parameter at /app/tag/controller/ApiAdminTagCategory.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mipjz_project:mipjz:5.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "E4AEA22F-BAAD-4FC2-B025-B0E93FD5F818" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/sansanyun/mipjz/issues/14", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-339xx/CVE-2023-33961.json b/CVE-2023/CVE-2023-339xx/CVE-2023-33961.json index ec3b694d141..3d9cbe8c164 100644 --- a/CVE-2023/CVE-2023-339xx/CVE-2023-33961.json +++ b/CVE-2023/CVE-2023-339xx/CVE-2023-33961.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33961", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-30T22:15:10.863", - "lastModified": "2023-05-30T22:15:10.863", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-339xx/CVE-2023-33962.json b/CVE-2023/CVE-2023-339xx/CVE-2023-33962.json index 8620b894455..ff6e44d722d 100644 --- a/CVE-2023/CVE-2023-339xx/CVE-2023-33962.json +++ b/CVE-2023/CVE-2023-339xx/CVE-2023-33962.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33962", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-30T22:15:10.933", - "lastModified": "2023-05-30T22:15:10.933", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34151.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34151.json index f1a9af31ffb..dce52f81bce 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34151.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34151.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34151", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-30T22:15:11.000", - "lastModified": "2023-05-30T22:15:11.000", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34152.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34152.json index 266dd9f59c8..d7a0b0e691a 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34152.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34152.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34152", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-30T22:15:11.070", - "lastModified": "2023-05-30T22:15:11.070", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34153.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34153.json index 159c1bcdd14..bf4c2def750 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34153.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34153.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34153", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-30T22:15:11.143", - "lastModified": "2023-05-30T22:15:11.143", - "vulnStatus": "Received", + "lastModified": "2023-05-31T13:02:26.480", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 08add7b2eea..0d3d3df16c3 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-31T12:00:25.729941+00:00 +2023-05-31T14:00:27.749582+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-31T10:15:09.577000+00:00 +2023-05-31T13:59:37.380000+00:00 ``` ### Last Data Feed Release @@ -29,20 +29,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -216487 +216498 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `11` -* [CVE-2023-2909](CVE-2023/CVE-2023-29xx/CVE-2023-2909.json) (`2023-05-31T10:15:09.577`) +* [CVE-2023-30285](CVE-2023/CVE-2023-302xx/CVE-2023-30285.json) (`2023-05-31T12:15:09.410`) +* [CVE-2023-3007](CVE-2023/CVE-2023-30xx/CVE-2023-3007.json) (`2023-05-31T12:15:09.550`) +* [CVE-2023-3008](CVE-2023/CVE-2023-30xx/CVE-2023-3008.json) (`2023-05-31T12:15:09.640`) +* [CVE-2023-33485](CVE-2023/CVE-2023-334xx/CVE-2023-33485.json) (`2023-05-31T13:15:09.637`) +* [CVE-2023-33486](CVE-2023/CVE-2023-334xx/CVE-2023-33486.json) (`2023-05-31T13:15:09.697`) +* [CVE-2023-33487](CVE-2023/CVE-2023-334xx/CVE-2023-33487.json) (`2023-05-31T13:15:09.753`) +* [CVE-2023-33507](CVE-2023/CVE-2023-335xx/CVE-2023-33507.json) (`2023-05-31T13:15:09.880`) +* [CVE-2023-33508](CVE-2023/CVE-2023-335xx/CVE-2023-33508.json) (`2023-05-31T13:15:09.960`) +* [CVE-2023-33509](CVE-2023/CVE-2023-335xx/CVE-2023-33509.json) (`2023-05-31T13:15:10.220`) +* [CVE-2023-33736](CVE-2023/CVE-2023-337xx/CVE-2023-33736.json) (`2023-05-31T13:15:10.270`) +* [CVE-2023-3009](CVE-2023/CVE-2023-30xx/CVE-2023-3009.json) (`2023-05-31T13:15:10.367`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `117` +* [CVE-2023-2435](CVE-2023/CVE-2023-24xx/CVE-2023-2435.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-2436](CVE-2023/CVE-2023-24xx/CVE-2023-2436.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-2545](CVE-2023/CVE-2023-25xx/CVE-2023-2545.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-2547](CVE-2023/CVE-2023-25xx/CVE-2023-2547.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-2549](CVE-2023/CVE-2023-25xx/CVE-2023-2549.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-2987](CVE-2023/CVE-2023-29xx/CVE-2023-2987.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-1661](CVE-2023/CVE-2023-16xx/CVE-2023-1661.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-2434](CVE-2023/CVE-2023-24xx/CVE-2023-2434.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-2836](CVE-2023/CVE-2023-28xx/CVE-2023-2836.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-25539](CVE-2023/CVE-2023-255xx/CVE-2023-25539.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-26131](CVE-2023/CVE-2023-261xx/CVE-2023-26131.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-2304](CVE-2023/CVE-2023-23xx/CVE-2023-2304.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-2749](CVE-2023/CVE-2023-27xx/CVE-2023-2749.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-3003](CVE-2023/CVE-2023-30xx/CVE-2023-3003.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-3004](CVE-2023/CVE-2023-30xx/CVE-2023-3004.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-3005](CVE-2023/CVE-2023-30xx/CVE-2023-3005.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-2909](CVE-2023/CVE-2023-29xx/CVE-2023-2909.json) (`2023-05-31T13:02:26.480`) +* [CVE-2023-31779](CVE-2023/CVE-2023-317xx/CVE-2023-31779.json) (`2023-05-31T13:38:31.893`) +* [CVE-2023-2854](CVE-2023/CVE-2023-28xx/CVE-2023-2854.json) (`2023-05-31T13:46:36.100`) +* [CVE-2023-2855](CVE-2023/CVE-2023-28xx/CVE-2023-2855.json) (`2023-05-31T13:46:47.347`) +* [CVE-2023-2858](CVE-2023/CVE-2023-28xx/CVE-2023-2858.json) (`2023-05-31T13:47:28.550`) +* [CVE-2023-2857](CVE-2023/CVE-2023-28xx/CVE-2023-2857.json) (`2023-05-31T13:47:35.877`) +* [CVE-2023-31098](CVE-2023/CVE-2023-310xx/CVE-2023-31098.json) (`2023-05-31T13:55:07.513`) +* [CVE-2023-33751](CVE-2023/CVE-2023-337xx/CVE-2023-33751.json) (`2023-05-31T13:58:58.493`) +* [CVE-2023-33750](CVE-2023/CVE-2023-337xx/CVE-2023-33750.json) (`2023-05-31T13:59:37.380`) ## Download and Usage