Auto-Update: 2023-05-31T14:00:27.749582+00:00

This commit is contained in:
cad-safe-bot 2023-05-31 14:00:31 +00:00
parent 66a62feba5
commit 738a78f2f1
129 changed files with 1471 additions and 383 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2012-10015", "id": "CVE-2012-10015",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T00:15:09.417", "published": "2023-05-31T00:15:09.417",
"lastModified": "2023-05-31T00:15:09.417", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2014-125103", "id": "CVE-2014-125103",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T03:15:09.077", "published": "2023-05-31T03:15:09.077",
"lastModified": "2023-05-31T03:15:09.077", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2015-10107", "id": "CVE-2015-10107",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T03:15:09.157", "published": "2023-05-31T03:15:09.157",
"lastModified": "2023-05-31T03:15:09.157", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3067", "id": "CVE-2018-3067",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-07-18T13:29:08.053", "published": "2018-07-18T13:29:08.053",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T12:31:24.783",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.11", "versionEndIncluding": "8.0.11",
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3073", "id": "CVE-2018-3073",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-07-18T13:29:08.303", "published": "2018-07-18T13:29:08.303",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T12:31:27.497",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "LOW", "privilegesRequired": "LOW",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.11", "versionEndIncluding": "8.0.11",
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3074", "id": "CVE-2018-3074",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-07-18T13:29:08.350", "published": "2018-07-18T13:29:08.350",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T12:31:30.227",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "HIGH", "attackComplexity": "HIGH",
"privilegesRequired": "LOW", "privilegesRequired": "LOW",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.11", "versionEndIncluding": "8.0.11",
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3075", "id": "CVE-2018-3075",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-07-18T13:29:08.397", "published": "2018-07-18T13:29:08.397",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:39:57.593",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.11", "versionEndIncluding": "8.0.11",
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3078", "id": "CVE-2018-3078",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-07-18T13:29:08.523", "published": "2018-07-18T13:29:08.523",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:40:12.753",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.11", "versionEndIncluding": "8.0.11",
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
} }
] ]
} }
@ -136,6 +137,7 @@
"url": "http://www.securityfocus.com/bid/104772", "url": "http://www.securityfocus.com/bid/104772",
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",
"tags": [ "tags": [
"Broken Link",
"Third Party Advisory", "Third Party Advisory",
"VDB Entry" "VDB Entry"
] ]
@ -144,6 +146,7 @@
"url": "http://www.securitytracker.com/id/1041294", "url": "http://www.securitytracker.com/id/1041294",
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",
"tags": [ "tags": [
"Broken Link",
"Third Party Advisory", "Third Party Advisory",
"VDB Entry" "VDB Entry"
] ]

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3079", "id": "CVE-2018-3079",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-07-18T13:29:08.587", "published": "2018-07-18T13:29:08.587",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:40:39.297",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.11", "versionEndIncluding": "8.0.11",
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
} }
] ]
} }
@ -136,6 +137,7 @@
"url": "http://www.securityfocus.com/bid/104772", "url": "http://www.securityfocus.com/bid/104772",
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",
"tags": [ "tags": [
"Broken Link",
"Third Party Advisory", "Third Party Advisory",
"VDB Entry" "VDB Entry"
] ]
@ -144,6 +146,7 @@
"url": "http://www.securitytracker.com/id/1041294", "url": "http://www.securitytracker.com/id/1041294",
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",
"tags": [ "tags": [
"Broken Link",
"Third Party Advisory", "Third Party Advisory",
"VDB Entry" "VDB Entry"
] ]

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3080", "id": "CVE-2018-3080",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-07-18T13:29:08.633", "published": "2018-07-18T13:29:08.633",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:38:18.223",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.11", "versionEndIncluding": "8.0.11",
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
} }
] ]
} }
@ -136,6 +137,7 @@
"url": "http://www.securityfocus.com/bid/104772", "url": "http://www.securityfocus.com/bid/104772",
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",
"tags": [ "tags": [
"Broken Link",
"Third Party Advisory", "Third Party Advisory",
"VDB Entry" "VDB Entry"
] ]
@ -144,6 +146,7 @@
"url": "http://www.securitytracker.com/id/1041294", "url": "http://www.securitytracker.com/id/1041294",
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",
"tags": [ "tags": [
"Broken Link",
"Third Party Advisory", "Third Party Advisory",
"VDB Entry" "VDB Entry"
] ]

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3082", "id": "CVE-2018-3082",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-07-18T13:29:08.727", "published": "2018-07-18T13:29:08.727",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:38:02.883",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.11", "versionEndIncluding": "8.0.11",
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
} }
] ]
} }
@ -136,6 +137,7 @@
"url": "http://www.securityfocus.com/bid/104772", "url": "http://www.securityfocus.com/bid/104772",
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",
"tags": [ "tags": [
"Broken Link",
"Third Party Advisory", "Third Party Advisory",
"VDB Entry" "VDB Entry"
] ]
@ -144,6 +146,7 @@
"url": "http://www.securitytracker.com/id/1041294", "url": "http://www.securitytracker.com/id/1041294",
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",
"tags": [ "tags": [
"Broken Link",
"Third Party Advisory", "Third Party Advisory",
"VDB Entry" "VDB Entry"
] ]

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3084", "id": "CVE-2018-3084",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-07-18T13:29:08.773", "published": "2018-07-18T13:29:08.773",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:37:00.937",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL", "attackVector": "LOCAL",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "LOW", "privilegesRequired": "LOW",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.11", "versionEndIncluding": "8.0.11",
"matchCriteriaId": "DDEE23D7-FFEF-4D55-99B2-F21DD644D6EA" "matchCriteriaId": "479CC153-372A-4F84-BDD3-6C9E40406030"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3137", "id": "CVE-2018-3137",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-10-17T01:31:16.400", "published": "2018-10-17T01:31:16.400",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:36:45.487",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "LOW", "privilegesRequired": "LOW",
@ -86,8 +86,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.12", "versionEndIncluding": "8.0.12",
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3145", "id": "CVE-2018-3145",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-10-17T01:31:17.120", "published": "2018-10-17T01:31:17.120",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:36:40.643",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "LOW", "privilegesRequired": "LOW",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.12", "versionEndIncluding": "8.0.12",
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-3170", "id": "CVE-2018-3170",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-10-17T01:31:19.463", "published": "2018-10-17T01:31:19.463",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:36:29.623",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -77,6 +77,7 @@
], ],
"configurations": [ "configurations": [
{ {
"operator": "AND",
"nodes": [ "nodes": [
{ {
"operator": "OR", "operator": "OR",
@ -85,8 +86,69 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.12", "versionEndIncluding": "8.0.12",
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"versionStartIncluding": "9.4",
"matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.3",
"matchCriteriaId": "53E6AC9E-CD46-4386-8975-E256E65469AA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
} }
] ]
} }
@ -120,7 +182,10 @@
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20181018-0002/", "url": "https://security.netapp.com/advisory/ntap-20181018-0002/",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3182", "id": "CVE-2018-3182",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-10-17T01:31:20.587", "published": "2018-10-17T01:31:20.587",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:32:59.687",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "LOW", "privilegesRequired": "LOW",
@ -77,6 +77,7 @@
], ],
"configurations": [ "configurations": [
{ {
"operator": "AND",
"nodes": [ "nodes": [
{ {
"operator": "OR", "operator": "OR",
@ -85,8 +86,69 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.12", "versionEndIncluding": "8.0.12",
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.3",
"matchCriteriaId": "53E6AC9E-CD46-4386-8975-E256E65469AA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"versionStartIncluding": "9.4",
"matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3186", "id": "CVE-2018-3186",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-10-17T01:31:20.963", "published": "2018-10-17T01:31:20.963",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:21:53.060",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -77,6 +77,7 @@
], ],
"configurations": [ "configurations": [
{ {
"operator": "AND",
"nodes": [ "nodes": [
{ {
"operator": "OR", "operator": "OR",
@ -85,8 +86,69 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.12", "versionEndIncluding": "8.0.12",
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.3",
"matchCriteriaId": "53E6AC9E-CD46-4386-8975-E256E65469AA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"versionStartIncluding": "9.4",
"matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3195", "id": "CVE-2018-3195",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-10-17T01:31:21.807", "published": "2018-10-17T01:31:21.807",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:22:09.633",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -77,6 +77,7 @@
], ],
"configurations": [ "configurations": [
{ {
"operator": "AND",
"nodes": [ "nodes": [
{ {
"operator": "OR", "operator": "OR",
@ -85,8 +86,69 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.12", "versionEndIncluding": "8.0.12",
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.3",
"matchCriteriaId": "53E6AC9E-CD46-4386-8975-E256E65469AA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"versionStartIncluding": "9.4",
"matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3203", "id": "CVE-2018-3203",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-10-17T01:31:22.480", "published": "2018-10-17T01:31:22.480",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:24:12.860",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "LOW", "privilegesRequired": "LOW",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.12", "versionEndIncluding": "8.0.12",
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3212", "id": "CVE-2018-3212",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-10-17T01:31:23.307", "published": "2018-10-17T01:31:23.307",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:24:10.307",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.12", "versionEndIncluding": "8.0.12",
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3279", "id": "CVE-2018-3279",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-10-17T01:31:28.993", "published": "2018-10-17T01:31:28.993",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:24:07.750",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -86,8 +86,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.12", "versionEndIncluding": "8.0.12",
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3280", "id": "CVE-2018-3280",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-10-17T01:31:29.087", "published": "2018-10-17T01:31:29.087",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:24:05.677",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -86,8 +86,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.12", "versionEndIncluding": "8.0.12",
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3285", "id": "CVE-2018-3285",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-10-17T01:31:29.557", "published": "2018-10-17T01:31:29.557",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:21:46.333",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -86,8 +86,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.12", "versionEndIncluding": "8.0.12",
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-3286", "id": "CVE-2018-3286",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2018-10-17T01:31:29.650", "published": "2018-10-17T01:31:29.650",
"lastModified": "2019-10-03T00:03:26.223", "lastModified": "2023-05-31T13:19:27.850",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "LOW", "privilegesRequired": "LOW",
@ -86,8 +86,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.12", "versionEndIncluding": "8.0.12",
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-2494", "id": "CVE-2019-2494",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2019-01-16T19:30:34.000", "published": "2019-01-16T19:30:34.000",
"lastModified": "2020-08-24T17:37:01.140", "lastModified": "2023-05-31T13:19:34.920",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.13", "versionEndIncluding": "8.0.13",
"matchCriteriaId": "C54A1D84-9347-4806-888B-80F4C7B248CD" "matchCriteriaId": "C743C44C-2E97-4E5E-8C76-FC0E666BA115"
} }
] ]
} }
@ -112,15 +113,24 @@
}, },
{ {
"url": "https://access.redhat.com/errata/RHSA-2019:2484", "url": "https://access.redhat.com/errata/RHSA-2019:2484",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://access.redhat.com/errata/RHSA-2019:2511", "url": "https://access.redhat.com/errata/RHSA-2019:2511",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20190118-0002/", "url": "https://security.netapp.com/advisory/ntap-20190118-0002/",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-2495", "id": "CVE-2019-2495",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2019-01-16T19:30:34.017", "published": "2019-01-16T19:30:34.017",
"lastModified": "2020-08-24T17:37:01.140", "lastModified": "2023-05-31T13:19:47.317",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.13", "versionEndIncluding": "8.0.13",
"matchCriteriaId": "C54A1D84-9347-4806-888B-80F4C7B248CD" "matchCriteriaId": "C743C44C-2E97-4E5E-8C76-FC0E666BA115"
} }
] ]
} }
@ -112,15 +113,24 @@
}, },
{ {
"url": "https://access.redhat.com/errata/RHSA-2019:2484", "url": "https://access.redhat.com/errata/RHSA-2019:2484",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://access.redhat.com/errata/RHSA-2019:2511", "url": "https://access.redhat.com/errata/RHSA-2019:2511",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20190118-0002/", "url": "https://security.netapp.com/advisory/ntap-20190118-0002/",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-2502", "id": "CVE-2019-2502",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2019-01-16T19:30:34.577", "published": "2019-01-16T19:30:34.577",
"lastModified": "2020-08-24T17:37:01.140", "lastModified": "2023-05-31T13:20:03.287",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -77,6 +77,7 @@
], ],
"configurations": [ "configurations": [
{ {
"operator": "AND",
"nodes": [ "nodes": [
{ {
"operator": "OR", "operator": "OR",
@ -85,8 +86,69 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.13", "versionEndIncluding": "8.0.13",
"matchCriteriaId": "C54A1D84-9347-4806-888B-80F4C7B248CD" "matchCriteriaId": "C743C44C-2E97-4E5E-8C76-FC0E666BA115"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.3",
"matchCriteriaId": "53E6AC9E-CD46-4386-8975-E256E65469AA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1BE6C1F-2565-4E97-92AA-16563E5660A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"versionStartIncluding": "9.4",
"matchCriteriaId": "AAEB3A7A-59C9-47C8-B792-343717F1555B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BDFB1169-41A0-4A86-8E4F-FDA9730B1E94"
} }
] ]
} }
@ -112,15 +174,24 @@
}, },
{ {
"url": "https://access.redhat.com/errata/RHSA-2019:2484", "url": "https://access.redhat.com/errata/RHSA-2019:2484",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://access.redhat.com/errata/RHSA-2019:2511", "url": "https://access.redhat.com/errata/RHSA-2019:2511",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20190118-0002/", "url": "https://security.netapp.com/advisory/ntap-20190118-0002/",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-2513", "id": "CVE-2019-2513",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2019-01-16T19:30:35.047", "published": "2019-01-16T19:30:35.047",
"lastModified": "2020-08-24T17:37:01.140", "lastModified": "2023-05-31T13:20:17.260",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N",
"attackVector": "LOCAL", "attackVector": "LOCAL",
"attackComplexity": "HIGH", "attackComplexity": "HIGH",
"privilegesRequired": "LOW", "privilegesRequired": "LOW",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "8.0.13", "versionEndExcluding": "8.0.13",
"matchCriteriaId": "CF4C29BD-0792-4A51-A63B-A53EDA193AFC" "matchCriteriaId": "759CBC31-3FC8-41A7-BB4D-76A973A4BE0D"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-2535", "id": "CVE-2019-2535",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2019-01-16T19:30:35.737", "published": "2019-01-16T19:30:35.737",
"lastModified": "2023-01-31T17:42:19.717", "lastModified": "2023-05-31T12:55:12.843",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.13", "versionEndIncluding": "8.0.13",
"matchCriteriaId": "C54A1D84-9347-4806-888B-80F4C7B248CD" "matchCriteriaId": "C743C44C-2E97-4E5E-8C76-FC0E666BA115"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-2743", "id": "CVE-2019-2743",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2019-07-23T23:15:38.537", "published": "2019-07-23T23:15:38.537",
"lastModified": "2020-08-24T17:37:01.140", "lastModified": "2023-05-31T12:55:31.907",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "HIGH", "attackComplexity": "HIGH",
"privilegesRequired": "LOW", "privilegesRequired": "LOW",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.12", "versionEndIncluding": "8.0.12",
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
} }
] ]
} }
@ -104,11 +105,17 @@
}, },
{ {
"url": "https://support.f5.com/csp/article/K03444640", "url": "https://support.f5.com/csp/article/K03444640",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://support.f5.com/csp/article/K03444640?utm_source=f5support&utm_medium=RSS", "url": "https://support.f5.com/csp/article/K03444640?utm_source=f5support&utm_medium=RSS",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-2746", "id": "CVE-2019-2746",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2019-07-23T23:15:38.757", "published": "2019-07-23T23:15:38.757",
"lastModified": "2020-08-24T17:37:01.140", "lastModified": "2023-05-31T12:55:40.497",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "LOW", "privilegesRequired": "LOW",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.12", "versionEndIncluding": "8.0.12",
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
} }
] ]
} }
@ -104,11 +105,17 @@
}, },
{ {
"url": "https://support.f5.com/csp/article/K03444640", "url": "https://support.f5.com/csp/article/K03444640",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://support.f5.com/csp/article/K03444640?utm_source=f5support&utm_medium=RSS", "url": "https://support.f5.com/csp/article/K03444640?utm_source=f5support&utm_medium=RSS",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-2747", "id": "CVE-2019-2747",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2019-07-23T23:15:38.820", "published": "2019-07-23T23:15:38.820",
"lastModified": "2020-08-24T17:37:01.140", "lastModified": "2023-05-31T12:55:49.017",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "HIGH", "privilegesRequired": "HIGH",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.12", "versionEndIncluding": "8.0.12",
"matchCriteriaId": "41858E5B-484D-44EB-B287-9EEB4EB39DFA" "matchCriteriaId": "106FA614-55B8-4D90-B654-47EE199E7CC1"
} }
] ]
} }
@ -104,11 +105,17 @@
}, },
{ {
"url": "https://support.f5.com/csp/article/K03444640", "url": "https://support.f5.com/csp/article/K03444640",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://support.f5.com/csp/article/K03444640?utm_source=f5support&utm_medium=RSS", "url": "https://support.f5.com/csp/article/K03444640?utm_source=f5support&utm_medium=RSS",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2019-2822", "id": "CVE-2019-2822",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2019-07-23T23:15:43.710", "published": "2019-07-23T23:15:43.710",
"lastModified": "2020-08-24T17:37:01.140", "lastModified": "2023-05-31T12:55:55.143",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -15,13 +15,13 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV30": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "HIGH", "attackComplexity": "HIGH",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
@ -85,8 +85,9 @@
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndIncluding": "8.0.16", "versionEndIncluding": "8.0.16",
"matchCriteriaId": "B72AD7BD-9028-43DD-929C-4670655BBC70" "matchCriteriaId": "7FB3C333-CFE6-452F-8E1D-1C1090460804"
} }
] ]
} }
@ -104,11 +105,17 @@
}, },
{ {
"url": "https://support.f5.com/csp/article/K02585438", "url": "https://support.f5.com/csp/article/K02585438",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://support.f5.com/csp/article/K02585438?utm_source=f5support&utm_medium=RSS", "url": "https://support.f5.com/csp/article/K02585438?utm_source=f5support&utm_medium=RSS",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-31233", "id": "CVE-2021-31233",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T01:15:42.983", "published": "2023-05-31T01:15:42.983",
"lastModified": "2023-05-31T01:15:42.983", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-39071", "id": "CVE-2022-39071",
"sourceIdentifier": "psirt@zte.com.cn", "sourceIdentifier": "psirt@zte.com.cn",
"published": "2023-05-30T23:15:09.273", "published": "2023-05-30T23:15:09.273",
"lastModified": "2023-05-30T23:15:09.273", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-39074", "id": "CVE-2022-39074",
"sourceIdentifier": "psirt@zte.com.cn", "sourceIdentifier": "psirt@zte.com.cn",
"published": "2023-05-30T23:15:09.393", "published": "2023-05-30T23:15:09.393",
"lastModified": "2023-05-30T23:15:09.393", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-39075", "id": "CVE-2022-39075",
"sourceIdentifier": "psirt@zte.com.cn", "sourceIdentifier": "psirt@zte.com.cn",
"published": "2023-05-30T23:15:09.447", "published": "2023-05-30T23:15:09.447",
"lastModified": "2023-05-30T23:15:09.447", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47525", "id": "CVE-2022-47525",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.600", "published": "2023-05-31T00:15:09.600",
"lastModified": "2023-05-31T00:15:09.600", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47526", "id": "CVE-2022-47526",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.647", "published": "2023-05-31T00:15:09.647",
"lastModified": "2023-05-31T00:15:09.647", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0779", "id": "CVE-2023-0779",
"sourceIdentifier": "vulnerabilities@zephyrproject.org", "sourceIdentifier": "vulnerabilities@zephyrproject.org",
"published": "2023-05-30T21:15:08.987", "published": "2023-05-30T21:15:08.987",
"lastModified": "2023-05-30T22:15:09.457", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1661", "id": "CVE-2023-1661",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2023-05-31T04:15:09.893", "published": "2023-05-31T04:15:09.893",
"lastModified": "2023-05-31T04:15:09.893", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23562", "id": "CVE-2023-23562",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T01:15:43.057", "published": "2023-05-31T01:15:43.057",
"lastModified": "2023-05-31T01:15:43.057", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2304", "id": "CVE-2023-2304",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2023-05-31T05:15:10.260", "published": "2023-05-31T05:15:10.260",
"lastModified": "2023-05-31T05:15:10.260", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-2434", "id": "CVE-2023-2434",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2023-05-31T04:15:10.070", "published": "2023-05-31T04:15:10.070",
"lastModified": "2023-05-31T04:15:10.070", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Nested Pages plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'reset' function in versions up to, and including, 3.2.3. This makes it possible for authenticated attackers, with editor-level permissions and above, to reset plugin settings." "value": "The Nested Pages plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'reset' function in versions up to, and including, 3.2.3. This makes it possible for authenticated attackers, with editor-level permissions and above, to reset plugin settings."
},
{
"lang": "es",
"value": "El plugin Nested Pages para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a la falta de capacidad de comprobaci\u00f3n de la funci\u00f3n \"reset\" en las versiones hasta la 3.2.3 inclusive. Esto hace posible que atacantes autenticados, con permisos de nivel de editor y superiores, restablezcan la configuraci\u00f3n del plugin. "
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2435", "id": "CVE-2023-2435",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2023-05-31T03:15:09.313", "published": "2023-05-31T03:15:09.313",
"lastModified": "2023-05-31T03:15:09.313", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2436", "id": "CVE-2023-2436",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2023-05-31T03:15:09.380", "published": "2023-05-31T03:15:09.380",
"lastModified": "2023-05-31T03:15:09.380", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-25539", "id": "CVE-2023-25539",
"sourceIdentifier": "security_alert@emc.com", "sourceIdentifier": "security_alert@emc.com",
"published": "2023-05-31T05:15:09.537", "published": "2023-05-31T05:15:09.537",
"lastModified": "2023-05-31T05:15:09.537", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "\nDell NetWorker 19.6.1.2, contains an OS command injection Vulnerability in the NetWorker client. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. This is a high severity vulnerability as the exploitation allows an attacker to take complete control of a system, so Dell recommends customers to upgrade at the earliest opportunity.\n\n" "value": "\nDell NetWorker 19.6.1.2, contains an OS command injection Vulnerability in the NetWorker client. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. This is a high severity vulnerability as the exploitation allows an attacker to take complete control of a system, so Dell recommends customers to upgrade at the earliest opportunity.\n\n"
},
{
"lang": "es",
"value": "Dell NetWorker v19.6.1.2 contiene una vulnerabilidad de inyecci\u00f3n de comandos del sistema operativo en el cliente NetWorker. Un atacante remoto no autenticado podr\u00eda explotar potencialmente esta vulnerabilidad, llevando a la ejecuci\u00f3n de comandos arbitrarios del sistema operativo en el sistema operativo subyacente de la aplicaci\u00f3n, con los privilegios de la aplicaci\u00f3n vulnerable. Se trata de una vulnerabilidad de alta gravedad, ya que su explotaci\u00f3n permite a un atacante hacerse con el control total de un sistema, por lo que Dell recomienda a los clientes que actualicen lo antes posible. "
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2545", "id": "CVE-2023-2545",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2023-05-31T03:15:09.443", "published": "2023-05-31T03:15:09.443",
"lastModified": "2023-05-31T03:15:09.443", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-2547", "id": "CVE-2023-2547",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2023-05-31T03:15:09.510", "published": "2023-05-31T03:15:09.510",
"lastModified": "2023-05-31T03:15:09.510", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Feather Login Page plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteUser' function in versions starting from 1.0.7 up to, and including, 1.1.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete the temp user generated by the plugin." "value": "The Feather Login Page plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'deleteUser' function in versions starting from 1.0.7 up to, and including, 1.1.1. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to delete the temp user generated by the plugin."
},
{
"lang": "es",
"value": "El plugin Feather Login Page para WordPress es vulnerable a la p\u00e9rdida no autorizada de datos debido a una falta de capacidad de comprobaci\u00f3n en la funci\u00f3n \"deleteUser\" en las versiones a partir de la 1.0.7 hasta la 1.1.1 inclusive. Esto hace posible que atacantes autenticados con permisos de nivel de suscriptor y superiores, eliminen el usuario temporal generado por el plugin. "
} }
], ],
"metrics": { "metrics": {

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-2549", "id": "CVE-2023-2549",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2023-05-31T03:15:09.577", "published": "2023-05-31T03:15:09.577",
"lastModified": "2023-05-31T03:15:09.577", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Feather Login Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions starting from 1.0.7 up to, and including, 1.1.1. This is due to missing nonce validation in the 'createTempAccountLink' function. This makes it possible for unauthenticated attackers to create a new user with administrator role via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. An attacker can leverage CVE-2023-2545 to get the login link or request a password reset to the new user's email address." "value": "The Feather Login Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions starting from 1.0.7 up to, and including, 1.1.1. This is due to missing nonce validation in the 'createTempAccountLink' function. This makes it possible for unauthenticated attackers to create a new user with administrator role via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. An attacker can leverage CVE-2023-2545 to get the login link or request a password reset to the new user's email address."
},
{
"lang": "es",
"value": "El plugin Feather Login Page para WordPress es vulnerable a Cross-Site Request Forgery en versiones desde la 1.0.7 hasta la 1.1.1 inclusive. Esto es debido a la falta de validaci\u00f3n nonce en la funci\u00f3n \"createTempAccountLink\". Esto hace posible que atacantes no autenticados puedan crear un nuevo usuario con rol de administrador a trav\u00e9s de una petici\u00f3n falsificada, pudiendo enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace. Un atacante puede aprovechar la vulnerabilidad \"CVE-2023-2545\" para obtener el enlace de inicio de sesi\u00f3n o solicitar un restablecimiento de contrase\u00f1a a la direcci\u00f3n de correo electr\u00f3nico del nuevo usuario. "
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26131", "id": "CVE-2023-26131",
"sourceIdentifier": "report@snyk.io", "sourceIdentifier": "report@snyk.io",
"published": "2023-05-31T05:15:10.180", "published": "2023-05-31T05:15:10.180",
"lastModified": "2023-05-31T05:15:10.180", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2612", "id": "CVE-2023-2612",
"sourceIdentifier": "security@ubuntu.com", "sourceIdentifier": "security@ubuntu.com",
"published": "2023-05-31T00:15:10.257", "published": "2023-05-31T00:15:10.257",
"lastModified": "2023-05-31T00:15:10.257", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-2749", "id": "CVE-2023-2749",
"sourceIdentifier": "security@asustor.com", "sourceIdentifier": "security@asustor.com",
"published": "2023-05-31T09:15:10.490", "published": "2023-05-31T09:15:10.490",
"lastModified": "2023-05-31T09:15:10.490", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Download Center fails to properly validate the file path submitted by a user, An attacker can exploit this vulnerability to gain unauthorized access to sensitive files or directories without appropriate permission restrictions. Download Center on ADM 4.0 and above will be affected. Affected products and versions include: Download Center 1.1.5.r1280 and below. " "value": "Download Center fails to properly validate the file path submitted by a user, An attacker can exploit this vulnerability to gain unauthorized access to sensitive files or directories without appropriate permission restrictions. Download Center on ADM 4.0 and above will be affected. Affected products and versions include: Download Center 1.1.5.r1280 and below. "
},
{
"lang": "es",
"value": "Download Center no valida correctamente la ruta de archivo enviada por un usuario. Un atacante puede aprovechar esta vulnerabilidad para obtener acceso no autorizado a archivos o directorios confidenciales sin las restricciones de permisos adecuadas. Download Center se ve afectado en ADM 4.0 y en versiones superiores. Los productos y versiones afectados incluyen: Download Center v1.1.5.r1280 e inferiores. "
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28344", "id": "CVE-2023-28344",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.697", "published": "2023-05-31T00:15:09.697",
"lastModified": "2023-05-31T00:15:09.697", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28345", "id": "CVE-2023-28345",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.747", "published": "2023-05-31T00:15:09.747",
"lastModified": "2023-05-31T00:15:09.747", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28346", "id": "CVE-2023-28346",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.793", "published": "2023-05-31T00:15:09.793",
"lastModified": "2023-05-31T00:15:09.793", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28347", "id": "CVE-2023-28347",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.840", "published": "2023-05-31T00:15:09.840",
"lastModified": "2023-05-31T00:15:09.840", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28348", "id": "CVE-2023-28348",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.887", "published": "2023-05-31T00:15:09.887",
"lastModified": "2023-05-31T00:15:09.887", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28349", "id": "CVE-2023-28349",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.933", "published": "2023-05-31T00:15:09.933",
"lastModified": "2023-05-31T00:15:09.933", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28350", "id": "CVE-2023-28350",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:09.980", "published": "2023-05-31T00:15:09.980",
"lastModified": "2023-05-31T00:15:09.980", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28351", "id": "CVE-2023-28351",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:10.023", "published": "2023-05-31T00:15:10.023",
"lastModified": "2023-05-31T00:15:10.023", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28352", "id": "CVE-2023-28352",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:10.063", "published": "2023-05-31T00:15:10.063",
"lastModified": "2023-05-31T00:15:10.063", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28353", "id": "CVE-2023-28353",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:10.107", "published": "2023-05-31T00:15:10.107",
"lastModified": "2023-05-31T00:15:10.107", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-2836", "id": "CVE-2023-2836",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2023-05-31T04:15:10.200", "published": "2023-05-31T04:15:10.200",
"lastModified": "2023-05-31T04:15:10.200", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The CRM Perks Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form settings in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled." "value": "The CRM Perks Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form settings in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
},
{
"lang": "es",
"value": "El plugin CRM Perks Forms para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s de la configuraci\u00f3n de formularios en versiones hasta la v1.1.1 inclusive debido a la insuficiente sanitizaci\u00f3n de entrada y escape de salida. Esto hace posible que atacantes autenticados, con permisos de nivel de administrador y superiores, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. Esto s\u00f3lo afecta a las instalaciones mutisitio y a las instalaciones en las que se ha deshabilitado \"unfiltered _html\". "
} }
], ],
"metrics": { "metrics": {

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2854", "id": "CVE-2023-2854",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:17.643", "published": "2023-05-26T21:15:17.643",
"lastModified": "2023-05-29T03:54:24.223", "lastModified": "2023-05-31T13:46:36.100",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -17,20 +17,20 @@
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL", "attackVector": "LOCAL",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
"userInteraction": "REQUIRED", "userInteraction": "REQUIRED",
"scope": "UNCHANGED", "scope": "UNCHANGED",
"confidentialityImpact": "HIGH", "confidentialityImpact": "NONE",
"integrityImpact": "HIGH", "integrityImpact": "NONE",
"availabilityImpact": "HIGH", "availabilityImpact": "HIGH",
"baseScore": 7.8, "baseScore": 5.5,
"baseSeverity": "HIGH" "baseSeverity": "MEDIUM"
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 5.9 "impactScore": 3.6
}, },
{ {
"source": "cve@gitlab.com", "source": "cve@gitlab.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2855", "id": "CVE-2023-2855",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:17.757", "published": "2023-05-26T21:15:17.757",
"lastModified": "2023-05-29T03:54:44.930", "lastModified": "2023-05-31T13:46:47.347",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -17,20 +17,20 @@
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL", "attackVector": "LOCAL",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
"userInteraction": "REQUIRED", "userInteraction": "REQUIRED",
"scope": "UNCHANGED", "scope": "UNCHANGED",
"confidentialityImpact": "HIGH", "confidentialityImpact": "NONE",
"integrityImpact": "HIGH", "integrityImpact": "NONE",
"availabilityImpact": "HIGH", "availabilityImpact": "HIGH",
"baseScore": 7.8, "baseScore": 5.5,
"baseSeverity": "HIGH" "baseSeverity": "MEDIUM"
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 5.9 "impactScore": 3.6
}, },
{ {
"source": "cve@gitlab.com", "source": "cve@gitlab.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2857", "id": "CVE-2023-2857",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:18.273", "published": "2023-05-26T21:15:18.273",
"lastModified": "2023-05-29T03:58:32.140", "lastModified": "2023-05-31T13:47:35.877",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -17,20 +17,20 @@
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL", "attackVector": "LOCAL",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
"userInteraction": "REQUIRED", "userInteraction": "REQUIRED",
"scope": "UNCHANGED", "scope": "UNCHANGED",
"confidentialityImpact": "HIGH", "confidentialityImpact": "NONE",
"integrityImpact": "HIGH", "integrityImpact": "NONE",
"availabilityImpact": "HIGH", "availabilityImpact": "HIGH",
"baseScore": 7.8, "baseScore": 5.5,
"baseSeverity": "HIGH" "baseSeverity": "MEDIUM"
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 5.9 "impactScore": 3.6
}, },
{ {
"source": "cve@gitlab.com", "source": "cve@gitlab.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2858", "id": "CVE-2023-2858",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-26T21:15:18.633", "published": "2023-05-26T21:15:18.633",
"lastModified": "2023-05-29T03:58:57.950", "lastModified": "2023-05-31T13:47:28.550",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
@ -17,20 +17,20 @@
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL", "attackVector": "LOCAL",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "NONE",
"userInteraction": "REQUIRED", "userInteraction": "REQUIRED",
"scope": "UNCHANGED", "scope": "UNCHANGED",
"confidentialityImpact": "HIGH", "confidentialityImpact": "NONE",
"integrityImpact": "HIGH", "integrityImpact": "NONE",
"availabilityImpact": "HIGH", "availabilityImpact": "HIGH",
"baseScore": 7.8, "baseScore": 5.5,
"baseSeverity": "HIGH" "baseSeverity": "MEDIUM"
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 5.9 "impactScore": 3.6
}, },
{ {
"source": "cve@gitlab.com", "source": "cve@gitlab.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29726", "id": "CVE-2023-29726",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-30T23:15:09.513", "published": "2023-05-30T23:15:09.513",
"lastModified": "2023-05-30T23:15:09.513", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29727", "id": "CVE-2023-29727",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-30T23:15:09.563", "published": "2023-05-30T23:15:09.563",
"lastModified": "2023-05-30T23:15:09.563", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29728", "id": "CVE-2023-29728",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-30T23:15:09.607", "published": "2023-05-30T23:15:09.607",
"lastModified": "2023-05-30T23:15:09.607", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29738", "id": "CVE-2023-29738",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-30T23:15:09.653", "published": "2023-05-30T23:15:09.653",
"lastModified": "2023-05-30T23:15:09.653", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29739", "id": "CVE-2023-29739",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-30T23:15:09.700", "published": "2023-05-30T23:15:09.700",
"lastModified": "2023-05-30T23:15:09.700", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29740", "id": "CVE-2023-29740",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-30T23:15:09.750", "published": "2023-05-30T23:15:09.750",
"lastModified": "2023-05-30T23:15:09.750", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29741", "id": "CVE-2023-29741",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-30T23:15:09.793", "published": "2023-05-30T23:15:09.793",
"lastModified": "2023-05-30T23:15:09.793", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29742", "id": "CVE-2023-29742",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:10.153", "published": "2023-05-31T00:15:10.153",
"lastModified": "2023-05-31T00:15:10.153", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29743", "id": "CVE-2023-29743",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-30T23:15:09.840", "published": "2023-05-30T23:15:09.840",
"lastModified": "2023-05-30T23:15:09.840", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29745", "id": "CVE-2023-29745",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T00:15:10.200", "published": "2023-05-31T00:15:10.200",
"lastModified": "2023-05-31T00:15:10.200", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2909", "id": "CVE-2023-2909",
"sourceIdentifier": "security@asustor.com", "sourceIdentifier": "security@asustor.com",
"published": "2023-05-31T10:15:09.577", "published": "2023-05-31T10:15:09.577",
"lastModified": "2023-05-31T10:15:09.577", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2929", "id": "CVE-2023-2929",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:09.997", "published": "2023-05-30T22:15:09.997",
"lastModified": "2023-05-30T22:15:09.997", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2930", "id": "CVE-2023-2930",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.067", "published": "2023-05-30T22:15:10.067",
"lastModified": "2023-05-30T22:15:10.067", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2931", "id": "CVE-2023-2931",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.117", "published": "2023-05-30T22:15:10.117",
"lastModified": "2023-05-30T22:15:10.117", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2932", "id": "CVE-2023-2932",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.167", "published": "2023-05-30T22:15:10.167",
"lastModified": "2023-05-30T22:15:10.167", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2933", "id": "CVE-2023-2933",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.210", "published": "2023-05-30T22:15:10.210",
"lastModified": "2023-05-30T22:15:10.210", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2934", "id": "CVE-2023-2934",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.257", "published": "2023-05-30T22:15:10.257",
"lastModified": "2023-05-30T22:15:10.257", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2935", "id": "CVE-2023-2935",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.307", "published": "2023-05-30T22:15:10.307",
"lastModified": "2023-05-30T22:15:10.307", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2936", "id": "CVE-2023-2936",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.350", "published": "2023-05-30T22:15:10.350",
"lastModified": "2023-05-30T22:15:10.350", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2937", "id": "CVE-2023-2937",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.393", "published": "2023-05-30T22:15:10.393",
"lastModified": "2023-05-30T22:15:10.393", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2938", "id": "CVE-2023-2938",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.433", "published": "2023-05-30T22:15:10.433",
"lastModified": "2023-05-30T22:15:10.433", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2939", "id": "CVE-2023-2939",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.477", "published": "2023-05-30T22:15:10.477",
"lastModified": "2023-05-30T22:15:10.477", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2940", "id": "CVE-2023-2940",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.527", "published": "2023-05-30T22:15:10.527",
"lastModified": "2023-05-30T22:15:10.527", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2941", "id": "CVE-2023-2941",
"sourceIdentifier": "chrome-cve-admin@google.com", "sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-05-30T22:15:10.570", "published": "2023-05-30T22:15:10.570",
"lastModified": "2023-05-30T22:15:10.570", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2952", "id": "CVE-2023-2952",
"sourceIdentifier": "cve@gitlab.com", "sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-30T23:15:09.887", "published": "2023-05-30T23:15:09.887",
"lastModified": "2023-05-30T23:15:09.887", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2953", "id": "CVE-2023-2953",
"sourceIdentifier": "secalert@redhat.com", "sourceIdentifier": "secalert@redhat.com",
"published": "2023-05-30T22:15:10.613", "published": "2023-05-30T22:15:10.613",
"lastModified": "2023-05-30T22:15:10.613", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-2987", "id": "CVE-2023-2987",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2023-05-31T03:15:09.643", "published": "2023-05-31T03:15:09.643",
"lastModified": "2023-05-31T03:15:09.643", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The Wordapp plugin for WordPress is vulnerable to authorization bypass due to an use of insufficiently unique cryptographic signature on the 'wa_pdx_op_config_set' function in versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to the plugin to change the 'validation_token' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation." "value": "The Wordapp plugin for WordPress is vulnerable to authorization bypass due to an use of insufficiently unique cryptographic signature on the 'wa_pdx_op_config_set' function in versions up to, and including, 1.5.0. This makes it possible for unauthenticated attackers to the plugin to change the 'validation_token' in the plugin config, providing access to the plugin's remote control functionalities, such as creating an admin access URL, which can be used for privilege escalation."
},
{
"lang": "es",
"value": "El plugin Wordapp para WordPress es vulnerable a una omisi\u00f3n de autorizaci\u00f3n debido al uso de una firma criptogr\u00e1fica insuficientemente \u00fanica en la funci\u00f3n \"wa_pdx_op_config_set\" en versiones hasta la 1.5.0 inclusive. Esto hace posible que atacantes no autenticados al plugin cambien el \"validation_token\" en la configuraci\u00f3n del plugin, proporcionando acceso a las funcionalidades de control remoto del plugin, como la creaci\u00f3n de una URL de acceso de administrador, que puede ser utilizada para la esclada de privilegios. "
} }
], ],
"metrics": { "metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2998", "id": "CVE-2023-2998",
"sourceIdentifier": "security@huntr.dev", "sourceIdentifier": "security@huntr.dev",
"published": "2023-05-31T01:15:43.103", "published": "2023-05-31T01:15:43.103",
"lastModified": "2023-05-31T01:15:43.103", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2999", "id": "CVE-2023-2999",
"sourceIdentifier": "security@huntr.dev", "sourceIdentifier": "security@huntr.dev",
"published": "2023-05-31T01:15:43.163", "published": "2023-05-31T01:15:43.163",
"lastModified": "2023-05-31T01:15:43.163", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30197", "id": "CVE-2023-30197",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T01:15:43.223", "published": "2023-05-31T01:15:43.223",
"lastModified": "2023-05-31T01:15:43.223", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -0,0 +1,28 @@
{
"id": "CVE-2023-30285",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T12:15:09.410",
"lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "An issue in Deviniti Issue Sync Synchronization v3.5.2 for Jira allows attackers to obtain the login credentials of a user via a crafted request sent to /rest/synchronizer/1.0/technicalUser."
}
],
"metrics": {},
"references": [
{
"url": "http://deviniti.com",
"source": "cve@mitre.org"
},
{
"url": "http://issue.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/D23K4N/CVE/blob/main/CVE-2023-30285.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3003", "id": "CVE-2023-3003",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T09:15:10.600", "published": "2023-05-31T09:15:10.600",
"lastModified": "2023-05-31T09:15:10.600", "lastModified": "2023-05-31T13:02:26.480",
"vulnStatus": "Received", "vulnStatus": "Awaiting Analysis",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

Some files were not shown because too many files have changed in this diff Show More