From 8a572bc01d6240e0ffea3f8bcd5be79d6f3458d4 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ren=C3=A9=20Helmke?= Date: Tue, 16 May 2023 14:00:28 +0200 Subject: [PATCH] Auto-Update: 2023-05-16T12:00:25.432193+00:00 --- CVE-2001/CVE-2001-08xx/CVE-2001-0897.json | 564 ++++++++++++++- CVE-2016/CVE-2016-97xx/CVE-2016-9777.json | 21 +- CVE-2017/CVE-2017-75xx/CVE-2017-7548.json | 171 ++--- CVE-2018/CVE-2018-168xx/CVE-2018-16872.json | 14 +- CVE-2018/CVE-2018-168xx/CVE-2018-16884.json | 115 +++- CVE-2018/CVE-2018-185xx/CVE-2018-18559.json | 89 ++- CVE-2018/CVE-2018-38xx/CVE-2018-3864.json | 16 +- CVE-2018/CVE-2018-38xx/CVE-2018-3866.json | 16 +- CVE-2018/CVE-2018-39xx/CVE-2018-3903.json | 16 +- CVE-2018/CVE-2018-39xx/CVE-2018-3904.json | 16 +- CVE-2018/CVE-2018-39xx/CVE-2018-3905.json | 14 +- CVE-2018/CVE-2018-39xx/CVE-2018-3907.json | 22 +- CVE-2018/CVE-2018-39xx/CVE-2018-3916.json | 14 +- CVE-2018/CVE-2018-39xx/CVE-2018-3918.json | 14 +- CVE-2019/CVE-2019-69xx/CVE-2019-6974.json | 51 +- CVE-2019/CVE-2019-72xx/CVE-2019-7225.json | 10 +- CVE-2019/CVE-2019-90xx/CVE-2019-9012.json | 15 +- CVE-2019/CVE-2019-90xx/CVE-2019-9013.json | 15 +- CVE-2020/CVE-2020-157xx/CVE-2020-15777.json | 15 +- CVE-2020/CVE-2020-256xx/CVE-2020-25643.json | 42 +- CVE-2020/CVE-2020-277xx/CVE-2020-27784.json | 44 +- CVE-2020/CVE-2020-277xx/CVE-2020-27786.json | 42 +- CVE-2021/CVE-2021-08xx/CVE-2021-0877.json | 4 +- CVE-2021/CVE-2021-226xx/CVE-2021-22600.json | 57 +- CVE-2021/CVE-2021-252xx/CVE-2021-25220.json | 715 +++++++++++++++++++- CVE-2021/CVE-2021-318xx/CVE-2021-31888.json | 399 ++++++++++- CVE-2021/CVE-2021-336xx/CVE-2021-33621.json | 33 +- CVE-2021/CVE-2021-350xx/CVE-2021-35039.json | 25 +- CVE-2021/CVE-2021-36xx/CVE-2021-3653.json | 47 +- CVE-2021/CVE-2021-41xx/CVE-2021-4197.json | 35 +- CVE-2022/CVE-2022-18xx/CVE-2022-1882.json | 44 +- CVE-2022/CVE-2022-19xx/CVE-2022-1943.json | 38 +- CVE-2022/CVE-2022-19xx/CVE-2022-1998.json | 20 +- CVE-2022/CVE-2022-232xx/CVE-2022-23222.json | 13 +- CVE-2022/CVE-2022-235xx/CVE-2022-23548.json | 10 +- CVE-2022/CVE-2022-27xx/CVE-2022-2795.json | 14 +- CVE-2022/CVE-2022-322xx/CVE-2022-32250.json | 56 +- CVE-2022/CVE-2022-349xx/CVE-2022-34918.json | 28 +- CVE-2022/CVE-2022-359xx/CVE-2022-35917.json | 8 +- CVE-2022/CVE-2022-35xx/CVE-2022-3526.json | 15 +- CVE-2022/CVE-2022-369xx/CVE-2022-36946.json | 49 +- CVE-2022/CVE-2022-415xx/CVE-2022-41553.json | 14 +- CVE-2022/CVE-2022-417xx/CVE-2022-41717.json | 8 +- CVE-2022/CVE-2022-417xx/CVE-2022-41723.json | 32 +- CVE-2022/CVE-2022-417xx/CVE-2022-41727.json | 12 +- CVE-2022/CVE-2022-42xx/CVE-2022-4285.json | 5 +- CVE-2022/CVE-2022-446xx/CVE-2022-44640.json | 40 +- CVE-2022/CVE-2022-462xx/CVE-2022-46265.json | 7 +- CVE-2022/CVE-2022-479xx/CVE-2022-47939.json | 25 +- CVE-2022/CVE-2022-479xx/CVE-2022-47941.json | 18 +- CVE-2022/CVE-2022-479xx/CVE-2022-47942.json | 18 +- CVE-2022/CVE-2022-479xx/CVE-2022-47943.json | 25 +- CVE-2023/CVE-2023-17xx/CVE-2023-1729.json | 4 +- CVE-2023/CVE-2023-206xx/CVE-2023-20673.json | 4 +- CVE-2023/CVE-2023-206xx/CVE-2023-20694.json | 4 +- CVE-2023/CVE-2023-206xx/CVE-2023-20695.json | 4 +- CVE-2023/CVE-2023-206xx/CVE-2023-20696.json | 4 +- CVE-2023/CVE-2023-206xx/CVE-2023-20697.json | 4 +- CVE-2023/CVE-2023-206xx/CVE-2023-20698.json | 4 +- CVE-2023/CVE-2023-206xx/CVE-2023-20699.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20700.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20701.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20703.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20704.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20705.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20706.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20707.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20708.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20709.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20710.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20711.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20717.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20718.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20719.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20720.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20721.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20722.json | 4 +- CVE-2023/CVE-2023-207xx/CVE-2023-20726.json | 4 +- CVE-2023/CVE-2023-209xx/CVE-2023-20914.json | 4 +- CVE-2023/CVE-2023-209xx/CVE-2023-20930.json | 4 +- CVE-2023/CVE-2023-211xx/CVE-2023-21102.json | 4 +- CVE-2023/CVE-2023-211xx/CVE-2023-21103.json | 4 +- CVE-2023/CVE-2023-211xx/CVE-2023-21104.json | 4 +- CVE-2023/CVE-2023-211xx/CVE-2023-21106.json | 4 +- CVE-2023/CVE-2023-211xx/CVE-2023-21107.json | 4 +- CVE-2023/CVE-2023-211xx/CVE-2023-21109.json | 4 +- CVE-2023/CVE-2023-211xx/CVE-2023-21110.json | 4 +- CVE-2023/CVE-2023-211xx/CVE-2023-21111.json | 4 +- CVE-2023/CVE-2023-211xx/CVE-2023-21112.json | 4 +- CVE-2023/CVE-2023-211xx/CVE-2023-21116.json | 4 +- CVE-2023/CVE-2023-211xx/CVE-2023-21117.json | 4 +- CVE-2023/CVE-2023-211xx/CVE-2023-21118.json | 4 +- CVE-2023/CVE-2023-21xx/CVE-2023-2124.json | 4 +- CVE-2023/CVE-2023-21xx/CVE-2023-2161.json | 4 +- CVE-2023/CVE-2023-236xx/CVE-2023-23641.json | 55 ++ CVE-2023/CVE-2023-236xx/CVE-2023-23657.json | 55 ++ CVE-2023/CVE-2023-236xx/CVE-2023-23673.json | 4 +- CVE-2023/CVE-2023-236xx/CVE-2023-23676.json | 4 +- CVE-2023/CVE-2023-237xx/CVE-2023-23703.json | 55 ++ CVE-2023/CVE-2023-237xx/CVE-2023-23709.json | 55 ++ CVE-2023/CVE-2023-237xx/CVE-2023-23720.json | 55 ++ CVE-2023/CVE-2023-237xx/CVE-2023-23727.json | 4 +- CVE-2023/CVE-2023-24xx/CVE-2023-2499.json | 4 +- CVE-2023/CVE-2023-25xx/CVE-2023-2548.json | 4 +- CVE-2023/CVE-2023-27xx/CVE-2023-2700.json | 4 +- CVE-2023/CVE-2023-27xx/CVE-2023-2708.json | 4 +- CVE-2023/CVE-2023-27xx/CVE-2023-2710.json | 4 +- CVE-2023/CVE-2023-299xx/CVE-2023-29961.json | 4 +- CVE-2023/CVE-2023-311xx/CVE-2023-31131.json | 4 +- CVE-2023/CVE-2023-311xx/CVE-2023-31145.json | 4 +- CVE-2023/CVE-2023-320xx/CVE-2023-32068.json | 4 +- CVE-2023/CVE-2023-323xx/CVE-2023-32308.json | 4 +- CVE-2023/CVE-2023-323xx/CVE-2023-32309.json | 4 +- CVE-2023/CVE-2023-323xx/CVE-2023-32313.json | 4 +- CVE-2023/CVE-2023-323xx/CVE-2023-32314.json | 4 +- CVE-2023/CVE-2023-329xx/CVE-2023-32955.json | 4 +- CVE-2023/CVE-2023-329xx/CVE-2023-32956.json | 4 +- README.md | 134 +++- 118 files changed, 3178 insertions(+), 621 deletions(-) create mode 100644 CVE-2023/CVE-2023-236xx/CVE-2023-23641.json create mode 100644 CVE-2023/CVE-2023-236xx/CVE-2023-23657.json create mode 100644 CVE-2023/CVE-2023-237xx/CVE-2023-23703.json create mode 100644 CVE-2023/CVE-2023-237xx/CVE-2023-23709.json create mode 100644 CVE-2023/CVE-2023-237xx/CVE-2023-23720.json diff --git a/CVE-2001/CVE-2001-08xx/CVE-2001-0897.json b/CVE-2001/CVE-2001-08xx/CVE-2001-0897.json index ef349101867..8c739225165 100644 --- a/CVE-2001/CVE-2001-08xx/CVE-2001-0897.json +++ b/CVE-2001/CVE-2001-08xx/CVE-2001-0897.json @@ -2,8 +2,8 @@ "id": "CVE-2001-0897", "sourceIdentifier": "cve@mitre.org", "published": "2001-11-15T05:00:00.000", - "lastModified": "2016-10-18T02:12:56.730", - "vulnStatus": "Modified", + "lastModified": "2023-05-16T11:09:02.377", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -58,9 +58,553 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:*:*:*:*:*:*:*:*", - "versionEndIncluding": "5.47e", - "matchCriteriaId": "CB3A00E1-8302-4B4C-9BA3-72BBE5BED240" + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9273BCD-A439-426F-AA8C-7194B9A993F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC26B64-FC02-45F2-A263-9E011945A3E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "08AB5674-453A-433A-8219-35F456611461" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.01:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6486FB-B5F8-4DDA-B42B-98A07C7BE14F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.02:*:*:*:*:*:*:*", + "matchCriteriaId": "A23809E5-50FB-4CF0-A72D-EBF37C01781F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.03:*:*:*:*:*:*:*", + "matchCriteriaId": "AB495093-00E6-4C1F-B544-9D2D965F0E47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.04:*:*:*:*:*:*:*", + "matchCriteriaId": "127135A5-A776-424C-B5F1-9BC3238CF213" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.05:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FAFE51-8E79-453E-870D-B369EE29D36A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.10:*:*:*:*:*:*:*", + "matchCriteriaId": "87C217B8-5732-430F-ACD6-99CF2B2027D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:2.11:*:*:*:*:*:*:*", + "matchCriteriaId": "474CF5E7-4C77-473B-950B-7B1FC399725C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "326C13A5-F302-418C-85E1-C333325E229E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:3.01:*:*:*:*:*:*:*", + "matchCriteriaId": "88C02339-7393-46D7-9DA4-3228DF837582" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:3.02:*:*:*:*:*:*:*", + "matchCriteriaId": "DA8097F7-5A17-40E7-8CD2-231291253BA8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "2A28920A-EF18-4160-9DC1-0DC7D1CFD61E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "1382D86F-0A84-46B6-B5E7-E9ED3FBFB57C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "A80A0BE7-A823-4AC1-9B84-2D7F910FA16E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:3.75:*:*:*:*:*:*:*", + "matchCriteriaId": "3D0055FF-C2E8-443A-B567-23ED37A3F95B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2EAD48EC-5B61-4EC8-A128-3E6C59FF2EB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.01:*:*:*:*:*:*:*", + "matchCriteriaId": "6BAAB97D-7381-4447-B8E4-EB7EFD27547C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.02:*:*:*:*:*:*:*", + "matchCriteriaId": "B2CD2691-F351-4D11-8EFC-8F86EB6A6B68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.03:*:*:*:*:*:*:*", + "matchCriteriaId": "1D0CED1F-7C87-4156-8466-C4CB67839072" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.04:*:*:*:*:*:*:*", + "matchCriteriaId": "16ECB78B-36C6-49FE-AC76-5F3C49989422" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.05:*:*:*:*:*:*:*", + "matchCriteriaId": "E529724F-68AB-4BC9-90E9-1719A67C7972" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.06:*:*:*:*:*:*:*", + "matchCriteriaId": "553AD514-8315-4A53-A985-CADDFCDD2F95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.07:*:*:*:*:*:*:*", + "matchCriteriaId": "3A3C3B5B-2EEA-466C-9944-A11370AAA446" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.50:*:*:*:*:*:*:*", + "matchCriteriaId": "591E5018-66DF-4F8B-8EE9-2459C9142BC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.51:*:*:*:*:*:*:*", + "matchCriteriaId": "1D3E9916-DCF8-47E9-8C1D-571D9423178E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.52:*:*:*:*:*:*:*", + "matchCriteriaId": "96C0DEAA-F0F7-4E98-A901-49D8B6B8C35B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.53:*:*:*:*:*:*:*", + "matchCriteriaId": "C4E36013-DFB5-4D6B-B933-653E00B1AD4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.75:*:*:*:*:*:*:*", + "matchCriteriaId": "C2E8CE07-A4BD-4E61-88CD-8E72AE0A3577" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.80:*:*:*:*:*:*:*", + "matchCriteriaId": "E19C4427-ABF7-47B0-8C18-9A9D7E093BB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.81:*:*:*:*:*:*:*", + "matchCriteriaId": "E779CE38-A887-4484-A319-AE177A2FC33C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.82:*:*:*:*:*:*:*", + "matchCriteriaId": "296780D8-88A9-4B4E-98BA-138CB702D846" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.83:*:*:*:*:*:*:*", + "matchCriteriaId": "BABCB8BB-89B8-4711-9CEE-069DBCB372C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.84:*:*:*:*:*:*:*", + "matchCriteriaId": "E255B370-054C-4BED-A00D-FD088BEE9B9B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.85:*:*:*:*:*:*:*", + "matchCriteriaId": "6F99A2D1-E071-4E99-AD0F-DAEA5A57CA31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:4.86:*:*:*:*:*:*:*", + "matchCriteriaId": "06743824-C01A-44A1-A75A-36F0719D83BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.00:*:*:*:*:*:*:*", + "matchCriteriaId": "85540AB5-815E-4B1E-912C-07B8F7A2112C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.01:*:*:*:*:*:*:*", + "matchCriteriaId": "48E6BB74-AEF9-4B8E-967F-1867969994FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.02:*:*:*:*:*:*:*", + "matchCriteriaId": "7F219F48-41A2-4373-AD6F-B86C7194DC31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.05:-:*:*:*:*:*:*", + "matchCriteriaId": "064000B6-2B45-48F9-ACE7-96D4A872C37B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.05:a:*:*:*:*:*:*", + "matchCriteriaId": "AB6C89B1-FA6F-4578-881F-A0990E6F5013" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.06:-:*:*:*:*:*:*", + "matchCriteriaId": "2ABD4153-05AA-4BD3-8667-A59D0A9F90DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.06:a:*:*:*:*:*:*", + "matchCriteriaId": "B684B4A5-3BAB-43DD-9BC7-034BAD426784" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.07:*:*:*:*:*:*:*", + "matchCriteriaId": "0C52CA83-3B52-4C87-92B1-E45424A2556B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.08:*:*:*:*:*:*:*", + "matchCriteriaId": "24356CBC-CACF-49B4-8063-6060801205D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.09:*:*:*:*:*:*:*", + "matchCriteriaId": "34855C05-1FFD-436C-87AB-EC5344D229E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.10:*:*:*:*:*:*:*", + "matchCriteriaId": "A530F3D9-0872-40C3-B2E2-052DAD2C5268" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.11:*:*:*:*:*:*:*", + "matchCriteriaId": "CEDA5D94-8E1C-4F3B-B09B-3B5BFFA6B801" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.12:*:*:*:*:*:*:*", + "matchCriteriaId": "68B5870D-53AD-4F13-8AAA-85DD277857B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.13:*:*:*:*:*:*:*", + "matchCriteriaId": "9FB03DE5-A890-4D4A-A436-66AC29C10EF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.14:*:*:*:*:*:*:*", + "matchCriteriaId": "358BA26A-5F81-4C33-BA46-BFAD09DAB74D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.15:*:*:*:*:*:*:*", + "matchCriteriaId": "79C09870-2EB7-4648-A015-C615911D5DF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.16:*:*:*:*:*:*:*", + "matchCriteriaId": "DFDF474B-BF27-44D8-857B-772EF651A7B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.17:*:*:*:*:*:*:*", + "matchCriteriaId": "4ABFDB1B-2A64-4AB9-AAD5-8E81EDC5F0A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.18:*:*:*:*:*:*:*", + "matchCriteriaId": "FF3EE5A2-C82A-427A-88CF-CED24440550A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.19:*:*:*:*:*:*:*", + "matchCriteriaId": "DDC496C6-F120-49B9-A852-9F692D5EDA34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.20:*:*:*:*:*:*:*", + "matchCriteriaId": "5AEF11EA-F515-4F75-BCA5-C1632FBA8B55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.25:*:*:*:*:*:*:*", + "matchCriteriaId": "DD5BEA29-DE63-4B0D-A037-96109930BDD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.26:*:*:*:*:*:*:*", + "matchCriteriaId": "9B14FEA3-C2F2-4690-8EF3-07978A29C452" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.27:*:*:*:*:*:*:*", + "matchCriteriaId": "C4304FE2-84DE-452E-91B1-0E12C9AB8B09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.28:*:*:*:*:*:*:*", + "matchCriteriaId": "18C97E41-6A7F-41EF-8801-BBEDCD5F88F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:-:*:*:*:*:*:*", + "matchCriteriaId": "B7E3A8D6-F692-4316-ABA8-DC431B47AD36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:a:*:*:*:*:*:*", + "matchCriteriaId": "4B6F88B0-A4B6-4EC1-A29D-FA99CFC711EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:b:*:*:*:*:*:*", + "matchCriteriaId": "C9C5D600-EC5B-4D62-B21A-962DED1F31CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.30:-:*:*:*:*:*:*", + "matchCriteriaId": "07C71232-9C46-4034-84CD-63F9A44D1EFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.30:a:*:*:*:*:*:*", + "matchCriteriaId": "04CDE5BC-A8F8-43A4-B716-DAA918F241DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.31:*:*:*:*:*:*:*", + "matchCriteriaId": "51F72F6D-F8B2-41AD-ABA1-15205D3CF0C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.32:*:*:*:*:*:*:*", + "matchCriteriaId": "0B50B140-28FB-442E-A998-C791C4B554A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.33:*:*:*:*:*:*:*", + "matchCriteriaId": "671C1290-9C59-4822-AEC6-04143B770BC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.34:-:*:*:*:*:*:*", + "matchCriteriaId": "C8ADD31B-C5A8-4299-B9C4-7577F7EC4378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.34:a:*:*:*:*:*:*", + "matchCriteriaId": "E9BCCE31-C166-49A7-972D-527AB89AEFCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.35:*:*:*:*:*:*:*", + "matchCriteriaId": "EC2FFC74-4F52-4549-8B3C-FD83364F6B5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.36:-:*:*:*:*:*:*", + "matchCriteriaId": "C9D6A017-E229-445C-A4A1-07E8DBA8FDE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.36:a:*:*:*:*:*:*", + "matchCriteriaId": "A0E39F77-08F8-4939-89F9-88B5FC254A4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.37:*:*:*:*:*:*:*", + "matchCriteriaId": "729977A6-7E1D-409F-B74F-21FCB469A265" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:-:*:*:*:*:*:*", + "matchCriteriaId": "5009EDAC-EE9E-49F2-B717-3AD12D675A58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:a:*:*:*:*:*:*", + "matchCriteriaId": "FA861D32-8E30-41ED-93D7-54BA46B96429" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:b:*:*:*:*:*:*", + "matchCriteriaId": "D69D4949-926A-4209-9769-C91F390AE931" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:c:*:*:*:*:*:*", + "matchCriteriaId": "F366C2A8-2396-4ADA-98A2-2C727F6BB2F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:d:*:*:*:*:*:*", + "matchCriteriaId": "B3B9B13E-98BC-4B2F-A46E-2EF2A4C51A4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:-:*:*:*:*:*:*", + "matchCriteriaId": "99EBE73C-CF78-4123-B5BC-A719B0317CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:a:*:*:*:*:*:*", + "matchCriteriaId": "2A7202ED-8BA1-40B4-A8EF-CB638FEF8FB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:b:*:*:*:*:*:*", + "matchCriteriaId": "5C15A0BE-87B3-4D3C-B9A5-5731661D8577" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:c:*:*:*:*:*:*", + "matchCriteriaId": "3E701F44-F1AA-4BB9-A2BB-A89CA82E54C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.40:*:*:*:*:*:*:*", + "matchCriteriaId": "39018D43-F8A4-49F4-90BC-464648DB55C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:-:*:*:*:*:*:*", + "matchCriteriaId": "81224635-60DF-4C4F-9ABF-3FBCDE769C65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:a:*:*:*:*:*:*", + "matchCriteriaId": "6954C7A9-4AE4-4374-AD35-C78ABAD6D13F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:b:*:*:*:*:*:*", + "matchCriteriaId": "337E61B7-4A9B-42A8-8C8D-E8A8644A599E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.42:-:*:*:*:*:*:*", + "matchCriteriaId": "6F4A2A10-E274-4DAB-83ED-5603FA4A1744" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.42:a:*:*:*:*:*:*", + "matchCriteriaId": "036C0212-3ABE-4435-897F-5ADD4EA47F4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:-:*:*:*:*:*:*", + "matchCriteriaId": "76FBE583-898B-4EA3-9406-D01B0C6D2E84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:a:*:*:*:*:*:*", + "matchCriteriaId": "53598A0B-F14C-43B6-B554-73910DD4D6BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:b:*:*:*:*:*:*", + "matchCriteriaId": "5641CF25-DE69-4412-A930-E844641E54B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:c:*:*:*:*:*:*", + "matchCriteriaId": "EA38A770-062D-4987-871C-BF12D2415473" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:d:*:*:*:*:*:*", + "matchCriteriaId": "F7044A6E-347A-44E9-9EB6-BEF0D6191B75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:-:*:*:*:*:*:*", + "matchCriteriaId": "7FE4CFA8-FE00-4D82-99FB-154763BC7B3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:a:*:*:*:*:*:*", + "matchCriteriaId": "D3F14DF9-3ACE-4117-9AF3-AFB75B6F6C0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:b:*:*:*:*:*:*", + "matchCriteriaId": "BCAF1620-D289-419D-8DC9-2237BFF3D9DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:-:*:*:*:*:*:*", + "matchCriteriaId": "1867E969-B4BB-4F30-9435-03E3311D453C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:a:*:*:*:*:*:*", + "matchCriteriaId": "06300271-726B-4725-ABCD-6F7F0D1D9163" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:b:*:*:*:*:*:*", + "matchCriteriaId": "8CAABC7E-ADAB-4234-AC09-3A269830D50F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:c:*:*:*:*:*:*", + "matchCriteriaId": "2E7C092C-2B1A-4D95-89F4-3C752DE0F542" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.46:-:*:*:*:*:*:*", + "matchCriteriaId": "954827B7-14BA-470F-A40A-2EF3B5818314" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.46:a:*:*:*:*:*:*", + "matchCriteriaId": "11E88097-2945-4046-83B0-93C11B995400" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:-:*:*:*:*:*:*", + "matchCriteriaId": "F974F8FB-A8EB-41CF-A370-B4743F56CA66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:a:*:*:*:*:*:*", + "matchCriteriaId": "C8C476D5-BE6B-4292-B358-8565E940459D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:b:*:*:*:*:*:*", + "matchCriteriaId": "BF77674A-01AD-456B-B17E-2DFCA43319C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:c:*:*:*:*:*:*", + "matchCriteriaId": "34E0C561-2F6E-474B-BCFE-15B24A2657C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:d:*:*:*:*:*:*", + "matchCriteriaId": "FA9C9EA8-140A-49F7-BF57-82CABB733D4D" } ] } @@ -70,11 +614,17 @@ "references": [ { "url": "http://marc.info/?l=bugtraq&m=100586033530341&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] }, { "url": "http://marc.info/?l=bugtraq&m=100586541317940&w=2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2016/CVE-2016-97xx/CVE-2016-9777.json b/CVE-2016/CVE-2016-97xx/CVE-2016-9777.json index b57d227bbc7..d402918af2a 100644 --- a/CVE-2016/CVE-2016-97xx/CVE-2016-9777.json +++ b/CVE-2016/CVE-2016-97xx/CVE-2016-9777.json @@ -2,8 +2,8 @@ "id": "CVE-2016-9777", "sourceIdentifier": "secalert@redhat.com", "published": "2016-12-28T07:59:00.510", - "lastModified": "2016-12-31T02:59:40.157", - "vulnStatus": "Modified", + "lastModified": "2023-05-16T11:09:07.767", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "LOW", @@ -85,8 +85,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "4.8.11", - "matchCriteriaId": "00B2C5A0-53C6-4A5A-A79A-9A213FA01EE5" + "versionStartIncluding": "4.8", + "versionEndExcluding": "4.8.12", + "matchCriteriaId": "DC8CAAEA-FB80-41CC-BECF-346FCF47EFF1" } ] } @@ -119,7 +120,11 @@ }, { "url": "http://www.securityfocus.com/bid/94640", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1400804", diff --git a/CVE-2017/CVE-2017-75xx/CVE-2017-7548.json b/CVE-2017/CVE-2017-75xx/CVE-2017-7548.json index 492d58bc40b..1f3db1734b6 100644 --- a/CVE-2017/CVE-2017-75xx/CVE-2017-7548.json +++ b/CVE-2017/CVE-2017-75xx/CVE-2017-7548.json @@ -2,8 +2,8 @@ "id": "CVE-2017-7548", "sourceIdentifier": "secalert@redhat.com", "published": "2017-08-16T18:29:00.287", - "lastModified": "2019-10-03T00:03:26.223", - "vulnStatus": "Modified", + "lastModified": "2023-05-16T11:09:13.220", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -94,68 +94,24 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.4:*:*:*:*:*:*:*", - "matchCriteriaId": "77D1323D-3096-4D0F-823A-ECAC9017646D" + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.4", + "versionEndExcluding": "9.4.13", + "matchCriteriaId": "E370B696-649E-48B8-A358-7544057FC82E" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.4.1:*:*:*:*:*:*:*", - "matchCriteriaId": "8A587AF3-5E70-4455-8621-DFD048207DE2" + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.5", + "versionEndExcluding": "9.5.8", + "matchCriteriaId": "1EC050F6-E045-4605-8739-32D657632606" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.4.2:*:*:*:*:*:*:*", - "matchCriteriaId": "526AFF26-B3EC-41C3-AC4C-85BFA3F99AC8" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.4.3:*:*:*:*:*:*:*", - "matchCriteriaId": "89D2CAB7-C3D9-4F21-B902-2E498D00EFEB" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.4.4:*:*:*:*:*:*:*", - "matchCriteriaId": "88797795-8B1C-455F-8C52-6169B2E47D53" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.4.5:*:*:*:*:*:*:*", - "matchCriteriaId": "DBDE0CC8-F1DF-4723-8FCB-9A33EA8B12D3" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.4.6:*:*:*:*:*:*:*", - "matchCriteriaId": "90F13667-019B-49DF-929C-3D376FCDE6E4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.4.7:*:*:*:*:*:*:*", - "matchCriteriaId": "B9E20AA3-C0D3-492C-AF3B-9F61550E6983" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "251C78CA-EEC0-49A8-A3D2-3C86D16CCB7F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.4.9:*:*:*:*:*:*:*", - "matchCriteriaId": "AB443A75-2466-4164-A71B-9203933CB0D6" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.4.10:*:*:*:*:*:*:*", - "matchCriteriaId": "B02839D4-EE7D-4D42-8934-322E46B643D4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.4.11:*:*:*:*:*:*:*", - "matchCriteriaId": "B1BAE807-A21F-4980-B64E-911F5E9B16BF" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.4.12:*:*:*:*:*:*:*", - "matchCriteriaId": "46ED9A2E-8169-4470-AE61-54829B11BDAB" + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.6", + "versionEndExcluding": "9.6.4", + "matchCriteriaId": "D5F2A1D5-D7F7-4216-9B28-E7A32DFE0A78" } ] } @@ -169,73 +125,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*", - "matchCriteriaId": "9FF7FC5B-C9E3-4109-B3D6-9AC06F75DCB3" + "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.5.1.:*:*:*:*:*:*:*", - "matchCriteriaId": "F2DF5BA0-6D8E-416E-B441-1A2D8624FD54" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*", - "matchCriteriaId": "9EF74623-EF0E-455D-ADEB-9E336B539D86" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*", - "matchCriteriaId": "FACD7AB7-34E9-4DFC-A788-7B9BF745D780" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*", - "matchCriteriaId": "F8E8AEBB-9968-458D-8EE4-2725BBE1A53F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*", - "matchCriteriaId": "7ECC17E6-C5FF-4B63-807A-26E5E6932C5C" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*", - "matchCriteriaId": "7DB72357-B16D-488A-995C-2703CCEC1D8F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*", - "matchCriteriaId": "B9671475-BC67-436F-B2B1-5128347B3C64" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*", - "matchCriteriaId": "7040466B-2A7D-4E75-8E4F-FA70D4A7E014" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "44887DE9-506B-46E3-922C-7B3C14B0AF33" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*", - "matchCriteriaId": "D1250F15-7A05-452A-8958-3B1B32B326E1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*", - "matchCriteriaId": "A18FEF31-B528-46A8-AAA8-63B30D5A10EC" + "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252" } ] } @@ -245,11 +141,17 @@ "references": [ { "url": "http://www.debian.org/security/2017/dsa-3935", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.debian.org/security/2017/dsa-3936", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://www.securityfocus.com/bid/100276", @@ -269,15 +171,24 @@ }, { "url": "https://access.redhat.com/errata/RHSA-2017:2677", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2017:2678", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.gentoo.org/glsa/201710-06", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.postgresql.org/about/news/1772/", diff --git a/CVE-2018/CVE-2018-168xx/CVE-2018-16872.json b/CVE-2018/CVE-2018-168xx/CVE-2018-16872.json index b3717543327..4c8271b46ff 100644 --- a/CVE-2018/CVE-2018-168xx/CVE-2018-16872.json +++ b/CVE-2018/CVE-2018-168xx/CVE-2018-16872.json @@ -2,8 +2,8 @@ "id": "CVE-2018-16872", "sourceIdentifier": "secalert@redhat.com", "published": "2018-12-13T21:29:00.260", - "lastModified": "2023-02-12T23:32:31.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T10:48:42.370", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -246,11 +246,17 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGCFIFSIWUREEQQOZDZFBYKWZHXCWBZN/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KJMTVGDLA654HNCDGLCUEIP36SNJEKK7/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://seclists.org/bugtraq/2019/May/76", diff --git a/CVE-2018/CVE-2018-168xx/CVE-2018-16884.json b/CVE-2018/CVE-2018-168xx/CVE-2018-16884.json index 0fc08d8f11c..74343d72726 100644 --- a/CVE-2018/CVE-2018-168xx/CVE-2018-16884.json +++ b/CVE-2018/CVE-2018-168xx/CVE-2018-16884.json @@ -2,8 +2,8 @@ "id": "CVE-2018-16884", "sourceIdentifier": "secalert@redhat.com", "published": "2018-12-18T22:29:04.713", - "lastModified": "2023-02-13T04:52:34.713", - "vulnStatus": "Modified", + "lastModified": "2023-05-16T10:49:27.070", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -35,7 +35,9 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.9 - }, + } + ], + "cvssMetricV30": [ { "source": "secalert@redhat.com", "type": "Secondary", @@ -114,8 +116,45 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", - "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.7", + "versionEndExcluding": "3.16.65", + "matchCriteriaId": "BF7B0E80-3E3F-4B73-AC57-4D6989EF9805" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.17", + "versionEndExcluding": "3.19.133", + "matchCriteriaId": "BC4A8868-C1A2-4426-8ADC-36ADEEFA54B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.151", + "matchCriteriaId": "C6FA30C2-06D9-4FC0-A64A-4D30FBF34810" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.94", + "matchCriteriaId": "2AF1D6FF-6D18-4CEB-B3A5-21FCF8A36055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.16", + "matchCriteriaId": "CD130255-0E04-4A26-94E8-CF4C39A962B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "4.20.3", + "matchCriteriaId": "FB066CC3-3C28-424B-A71C-352F4947F7FB" } ] } @@ -188,31 +227,52 @@ }, { "url": "https://access.redhat.com/errata/RHSA-2019:1873", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2019:1891", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2019:2696", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2019:2730", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2019:3309", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2019:3517", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2020:0204", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16884", @@ -286,23 +346,38 @@ }, { "url": "https://usn.ubuntu.com/3980-1/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/3980-2/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/3981-1/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://usn.ubuntu.com/3981-2/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.oracle.com/security-alerts/cpuApr2021.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-185xx/CVE-2018-18559.json b/CVE-2018/CVE-2018-185xx/CVE-2018-18559.json index 0343c496f5b..43965dcec14 100644 --- a/CVE-2018/CVE-2018-185xx/CVE-2018-18559.json +++ b/CVE-2018/CVE-2018-185xx/CVE-2018-18559.json @@ -2,8 +2,8 @@ "id": "CVE-2018-18559", "sourceIdentifier": "cve@mitre.org", "published": "2018-10-22T16:29:00.360", - "lastModified": "2019-05-14T23:29:07.497", - "vulnStatus": "Modified", + "lastModified": "2023-05-16T11:14:50.353", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -89,8 +89,58 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "4.19", - "matchCriteriaId": "AF8125D1-648B-4421-B0FC-089A20CBB248" + "versionStartIncluding": "3.2.95", + "versionEndExcluding": "3.2.100", + "matchCriteriaId": "0CA0EF67-DAA8-439C-88DA-06F8CED463BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.14.58", + "versionEndExcluding": "3.15", + "matchCriteriaId": "2AF75D2A-CD18-4268-B498-BF26EF757A28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.18.25", + "versionEndExcluding": "3.18.88", + "matchCriteriaId": "AF5005A4-042F-4BA0-8BB9-FBC748AAA337" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.14", + "versionEndExcluding": "4.1.49", + "matchCriteriaId": "C3CB4132-667D-46CF-91D0-5F4E8F686F9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.7", + "versionEndExcluding": "4.3", + "matchCriteriaId": "9A1E09B0-F11F-4A94-BF71-6A4FF66A7A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3.1", + "versionEndExcluding": "4.4.106", + "matchCriteriaId": "9431D0C6-E29C-42D5-A3C3-B70B23A6A240" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.70", + "matchCriteriaId": "C1EB15B3-5BB0-46B9-9F22-B39D1F6DAFED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.7", + "matchCriteriaId": "F8509BD8-B51C-4F0D-A278-08E03E83B254" } ] } @@ -171,23 +221,38 @@ }, { "url": "https://access.redhat.com/errata/RHSA-2019:1170", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2019:1190", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2019:3967", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2019:4159", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2020:0174", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://blogs.securiteam.com/index.php/archives/3731", diff --git a/CVE-2018/CVE-2018-38xx/CVE-2018-3864.json b/CVE-2018/CVE-2018-38xx/CVE-2018-3864.json index bdc84c1a47a..8c8c8e22757 100644 --- a/CVE-2018/CVE-2018-38xx/CVE-2018-3864.json +++ b/CVE-2018/CVE-2018-38xx/CVE-2018-3864.json @@ -2,8 +2,8 @@ "id": "CVE-2018-3864", "sourceIdentifier": "talos-cna@cisco.com", "published": "2018-09-20T15:29:00.663", - "lastModified": "2022-04-19T18:15:18.223", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:14:43.867", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -35,7 +35,9 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 - }, + } + ], + "cvssMetricV30": [ { "source": "talos-cna@cisco.com", "type": "Secondary", @@ -90,7 +92,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-120" } ] } diff --git a/CVE-2018/CVE-2018-38xx/CVE-2018-3866.json b/CVE-2018/CVE-2018-38xx/CVE-2018-3866.json index 9a6372b2aef..2fb40b7508d 100644 --- a/CVE-2018/CVE-2018-38xx/CVE-2018-3866.json +++ b/CVE-2018/CVE-2018-38xx/CVE-2018-3866.json @@ -2,8 +2,8 @@ "id": "CVE-2018-3866", "sourceIdentifier": "talos-cna@cisco.com", "published": "2018-08-23T22:29:00.370", - "lastModified": "2022-04-19T18:15:18.353", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:12:16.177", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -35,7 +35,9 @@ }, "exploitabilityScore": 3.1, "impactScore": 6.0 - }, + } + ], + "cvssMetricV30": [ { "source": "talos-cna@cisco.com", "type": "Secondary", @@ -90,7 +92,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } diff --git a/CVE-2018/CVE-2018-39xx/CVE-2018-3903.json b/CVE-2018/CVE-2018-39xx/CVE-2018-3903.json index fb1a99175e1..2ab0f165b37 100644 --- a/CVE-2018/CVE-2018-39xx/CVE-2018-3903.json +++ b/CVE-2018/CVE-2018-39xx/CVE-2018-3903.json @@ -2,8 +2,8 @@ "id": "CVE-2018-3903", "sourceIdentifier": "talos-cna@cisco.com", "published": "2018-08-23T15:29:01.210", - "lastModified": "2022-04-19T18:15:21.140", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:09:30.940", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -35,7 +35,9 @@ }, "exploitabilityScore": 3.1, "impactScore": 6.0 - }, + } + ], + "cvssMetricV30": [ { "source": "talos-cna@cisco.com", "type": "Secondary", @@ -90,7 +92,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } diff --git a/CVE-2018/CVE-2018-39xx/CVE-2018-3904.json b/CVE-2018/CVE-2018-39xx/CVE-2018-3904.json index 3eb14d9523f..92346c8ce0a 100644 --- a/CVE-2018/CVE-2018-39xx/CVE-2018-3904.json +++ b/CVE-2018/CVE-2018-39xx/CVE-2018-3904.json @@ -2,8 +2,8 @@ "id": "CVE-2018-3904", "sourceIdentifier": "talos-cna@cisco.com", "published": "2018-08-27T15:29:01.027", - "lastModified": "2022-04-19T18:15:21.207", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:13:40.870", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -35,7 +35,9 @@ }, "exploitabilityScore": 3.1, "impactScore": 6.0 - }, + } + ], + "cvssMetricV30": [ { "source": "talos-cna@cisco.com", "type": "Secondary", @@ -90,7 +92,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } diff --git a/CVE-2018/CVE-2018-39xx/CVE-2018-3905.json b/CVE-2018/CVE-2018-39xx/CVE-2018-3905.json index 990841237b3..1cf718096bb 100644 --- a/CVE-2018/CVE-2018-39xx/CVE-2018-3905.json +++ b/CVE-2018/CVE-2018-39xx/CVE-2018-3905.json @@ -2,8 +2,8 @@ "id": "CVE-2018-3905", "sourceIdentifier": "talos-cna@cisco.com", "published": "2018-08-23T15:29:01.333", - "lastModified": "2022-04-19T18:15:21.273", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:10:27.970", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -35,7 +35,9 @@ }, "exploitabilityScore": 3.1, "impactScore": 6.0 - }, + } + ], + "cvssMetricV30": [ { "source": "talos-cna@cisco.com", "type": "Secondary", diff --git a/CVE-2018/CVE-2018-39xx/CVE-2018-3907.json b/CVE-2018/CVE-2018-39xx/CVE-2018-3907.json index 86dc938f6d6..d54ab2402b9 100644 --- a/CVE-2018/CVE-2018-39xx/CVE-2018-3907.json +++ b/CVE-2018/CVE-2018-39xx/CVE-2018-3907.json @@ -2,8 +2,8 @@ "id": "CVE-2018-3907", "sourceIdentifier": "talos-cna@cisco.com", "published": "2018-08-24T00:29:00.210", - "lastModified": "2022-04-19T18:15:21.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:13:15.893", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -29,13 +29,15 @@ "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", - "availabilityImpact": "NONE", - "baseScore": 8.6, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, - "impactScore": 4.0 - }, + "impactScore": 5.8 + } + ], + "cvssMetricV30": [ { "source": "talos-cna@cisco.com", "type": "Secondary", diff --git a/CVE-2018/CVE-2018-39xx/CVE-2018-3916.json b/CVE-2018/CVE-2018-39xx/CVE-2018-3916.json index 38021094965..53ebb9a152b 100644 --- a/CVE-2018/CVE-2018-39xx/CVE-2018-3916.json +++ b/CVE-2018/CVE-2018-39xx/CVE-2018-3916.json @@ -2,8 +2,8 @@ "id": "CVE-2018-3916", "sourceIdentifier": "talos-cna@cisco.com", "published": "2018-08-28T20:29:00.873", - "lastModified": "2022-04-19T18:15:22.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:14:32.013", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -35,7 +35,9 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 - }, + } + ], + "cvssMetricV30": [ { "source": "talos-cna@cisco.com", "type": "Secondary", diff --git a/CVE-2018/CVE-2018-39xx/CVE-2018-3918.json b/CVE-2018/CVE-2018-39xx/CVE-2018-3918.json index c434c0699cf..e4760505ee4 100644 --- a/CVE-2018/CVE-2018-39xx/CVE-2018-3918.json +++ b/CVE-2018/CVE-2018-39xx/CVE-2018-3918.json @@ -2,8 +2,8 @@ "id": "CVE-2018-3918", "sourceIdentifier": "talos-cna@cisco.com", "published": "2018-08-27T15:29:01.137", - "lastModified": "2022-04-19T18:15:22.187", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:13:47.367", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -35,7 +35,9 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 - }, + } + ], + "cvssMetricV30": [ { "source": "talos-cna@cisco.com", "type": "Secondary", diff --git a/CVE-2019/CVE-2019-69xx/CVE-2019-6974.json b/CVE-2019/CVE-2019-69xx/CVE-2019-6974.json index 2875693c8ec..3814f50b4c7 100644 --- a/CVE-2019/CVE-2019-69xx/CVE-2019-6974.json +++ b/CVE-2019/CVE-2019-69xx/CVE-2019-6974.json @@ -2,7 +2,7 @@ "id": "CVE-2019-6974", "sourceIdentifier": "cve@mitre.org", "published": "2019-02-15T15:29:00.250", - "lastModified": "2022-04-05T20:40:44.977", + "lastModified": "2023-05-16T11:14:56.237", "vulnStatus": "Analyzed", "descriptions": [ { @@ -89,8 +89,51 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.10", + "versionEndExcluding": "3.16.64", + "matchCriteriaId": "93BC7269-F57C-4804-9143-0C81DAE4E50E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.17", + "versionEndExcluding": "3.18.136", + "matchCriteriaId": "63E05151-6508-41BE-89E8-7D43ACC0DBCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.19", + "versionEndExcluding": "4.4.176", + "matchCriteriaId": "C6769A3C-ABE7-412B-B0BA-A5D9CC063683" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.156", + "matchCriteriaId": "A293D608-B6FE-4E0A-92C4-FE04DD5D3FB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.99", + "matchCriteriaId": "F48AF79A-FA29-4687-B78E-4EABA7F5223B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.21", + "matchCriteriaId": "17817ACA-7271-47C1-B371-DA15D00516EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", "versionEndExcluding": "4.20.8", - "matchCriteriaId": "4DF2BBFB-2F62-45DF-9473-3D4451ECDD99" + "matchCriteriaId": "D24491DB-D4DD-4719-B553-28E8508833A4" } ] } @@ -488,7 +531,9 @@ "url": "http://www.securityfocus.com/bid/107127", "source": "cve@mitre.org", "tags": [ - "Broken Link" + "Broken Link", + "Third Party Advisory", + "VDB Entry" ] }, { diff --git a/CVE-2019/CVE-2019-72xx/CVE-2019-7225.json b/CVE-2019/CVE-2019-72xx/CVE-2019-7225.json index b61b66abbcb..0792fe4a0ba 100644 --- a/CVE-2019/CVE-2019-72xx/CVE-2019-7225.json +++ b/CVE-2019/CVE-2019-72xx/CVE-2019-7225.json @@ -2,8 +2,8 @@ "id": "CVE-2019-7225", "sourceIdentifier": "cve@mitre.org", "published": "2019-06-27T17:15:15.770", - "lastModified": "2019-10-09T23:51:57.357", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:15:00.720", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", diff --git a/CVE-2019/CVE-2019-90xx/CVE-2019-9012.json b/CVE-2019/CVE-2019-90xx/CVE-2019-9012.json index 23842ad5c5a..586cf472c3e 100644 --- a/CVE-2019/CVE-2019-90xx/CVE-2019-9012.json +++ b/CVE-2019/CVE-2019-90xx/CVE-2019-9012.json @@ -2,8 +2,8 @@ "id": "CVE-2019-9012", "sourceIdentifier": "cve@mitre.org", "published": "2019-08-15T18:15:23.477", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:15:49.487", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -160,7 +160,10 @@ "references": [ { "url": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=12938&token=b9eb30f53246dc57b2e7cb302356a05547148fa2&download=", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.us-cert.gov/ics/advisories/icsa-19-213-03", diff --git a/CVE-2019/CVE-2019-90xx/CVE-2019-9013.json b/CVE-2019/CVE-2019-90xx/CVE-2019-9013.json index ce9f3f592d6..c5fe2cc6e35 100644 --- a/CVE-2019/CVE-2019-90xx/CVE-2019-9013.json +++ b/CVE-2019/CVE-2019-90xx/CVE-2019-9013.json @@ -2,8 +2,8 @@ "id": "CVE-2019-9013", "sourceIdentifier": "cve@mitre.org", "published": "2019-08-15T17:15:13.660", - "lastModified": "2020-08-24T17:37:01.140", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:15:45.683", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -15,13 +15,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -174,7 +174,10 @@ "references": [ { "url": "https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=12943&token=d097958a67ba382de688916f77e3013c0802fade&download=", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.us-cert.gov/ics/advisories/icsa-19-213-04", diff --git a/CVE-2020/CVE-2020-157xx/CVE-2020-15777.json b/CVE-2020/CVE-2020-157xx/CVE-2020-15777.json index a0400b7d0f9..047f7869766 100644 --- a/CVE-2020/CVE-2020-157xx/CVE-2020-15777.json +++ b/CVE-2020/CVE-2020-157xx/CVE-2020-15777.json @@ -2,8 +2,8 @@ "id": "CVE-2020-15777", "sourceIdentifier": "cve@mitre.org", "published": "2020-08-25T22:15:11.473", - "lastModified": "2020-11-09T22:15:12.960", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T10:53:55.200", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -96,11 +96,18 @@ "references": [ { "url": "https://docs.gradle.com/enterprise/maven-extension/#1_6", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://security.gradle.com/advisory/CVE-2020-15777", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-256xx/CVE-2020-25643.json b/CVE-2020/CVE-2020-256xx/CVE-2020-25643.json index cc180439f22..f8a51ca18a8 100644 --- a/CVE-2020/CVE-2020-256xx/CVE-2020-25643.json +++ b/CVE-2020/CVE-2020-256xx/CVE-2020-25643.json @@ -2,7 +2,7 @@ "id": "CVE-2020-25643", "sourceIdentifier": "secalert@redhat.com", "published": "2020-10-06T14:15:12.683", - "lastModified": "2022-10-25T16:55:22.367", + "lastModified": "2023-05-16T10:48:49.033", "vulnStatus": "Analyzed", "descriptions": [ { @@ -96,8 +96,44 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "5.8.13", - "matchCriteriaId": "CB3FD8E8-06B6-4E73-9337-49E751C7FD04" + "versionStartIncluding": "2.6.29", + "versionEndExcluding": "4.4.238", + "matchCriteriaId": "E9E5CC7A-87CD-4454-A66C-72D0F92361C1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.238", + "matchCriteriaId": "878A4477-4934-49C5-B2FA-BB98D5B2E8E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.200", + "matchCriteriaId": "28ACEA44-E1D1-4760-A4A5-5FE0A7EFA070" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.148", + "matchCriteriaId": "FBFAFB7B-8C46-465B-A829-55658AE4D00F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.68", + "matchCriteriaId": "9564CB60-DC32-450D-99F9-8CA6E070B049" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.8.12", + "matchCriteriaId": "5DFE9299-F6DC-440B-BC12-72FBAF4A02E9" }, { "vulnerable": true, diff --git a/CVE-2020/CVE-2020-277xx/CVE-2020-27784.json b/CVE-2020/CVE-2020-277xx/CVE-2020-27784.json index 6e7bf65337b..a5388023410 100644 --- a/CVE-2020/CVE-2020-277xx/CVE-2020-27784.json +++ b/CVE-2020/CVE-2020-277xx/CVE-2020-27784.json @@ -2,8 +2,8 @@ "id": "CVE-2020-27784", "sourceIdentifier": "secalert@redhat.com", "published": "2022-09-01T18:15:08.467", - "lastModified": "2023-03-03T18:40:00.033", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T10:51:13.530", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -70,8 +70,44 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndExcluding": "5.10", - "matchCriteriaId": "D61CA62B-157A-4415-B8FD-7C3C1208315D" + "versionStartIncluding": "4.1", + "versionEndExcluding": "4.4.241", + "matchCriteriaId": "6562CC02-020B-4BA1-8B62-116EE3BF3D8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.241", + "matchCriteriaId": "72EFD2ED-12E4-4AFD-B5BB-CB3293750BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.19.154", + "matchCriteriaId": "B952E0D7-4D70-4BBE-A15B-3435430BA7EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.73", + "matchCriteriaId": "647A7A2A-7AB0-4CD3-A6C8-4D3F52721743" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.8.17", + "matchCriteriaId": "ECB8F088-C63B-40C8-B27B-86F62F62C3E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.9.0", + "versionEndExcluding": "5.9.2", + "matchCriteriaId": "FA66D250-BE2A-4F96-B53E-CFBECEF46D83" } ] } diff --git a/CVE-2020/CVE-2020-277xx/CVE-2020-27786.json b/CVE-2020/CVE-2020-277xx/CVE-2020-27786.json index 2494684ad6c..970cb4e7e6e 100644 --- a/CVE-2020/CVE-2020-277xx/CVE-2020-27786.json +++ b/CVE-2020/CVE-2020-277xx/CVE-2020-27786.json @@ -2,7 +2,7 @@ "id": "CVE-2020-27786", "sourceIdentifier": "secalert@redhat.com", "published": "2020-12-11T05:15:12.263", - "lastModified": "2023-02-02T22:23:06.977", + "lastModified": "2023-05-16T10:49:08.213", "vulnStatus": "Analyzed", "descriptions": [ { @@ -84,8 +84,44 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.7:rc6:*:*:*:*:*:*", - "matchCriteriaId": "F1AB4A11-C03C-4ABB-B596-0EB3B0F1A8DF" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.4.224", + "matchCriteriaId": "C371AE92-D5FD-45E1-91D6-0EE05FA6D21C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.224", + "matchCriteriaId": "AA91BF70-8648-4C4E-B605-538BF8A2FC27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.181", + "matchCriteriaId": "06E32062-F304-482F-AF76-B675892181D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.124", + "matchCriteriaId": "16360395-8BB9-4929-ABD9-D4EEC5DF1F8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.42", + "matchCriteriaId": "514407C3-9A5E-4685-88D0-F8106DA8361E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.6.14", + "matchCriteriaId": "FA9116AC-779C-4BE7-92D1-757CC91A2355" } ] } diff --git a/CVE-2021/CVE-2021-08xx/CVE-2021-0877.json b/CVE-2021/CVE-2021-08xx/CVE-2021-0877.json index 090b7ed33d5..2870e55bc09 100644 --- a/CVE-2021/CVE-2021-08xx/CVE-2021-0877.json +++ b/CVE-2021/CVE-2021-08xx/CVE-2021-0877.json @@ -2,8 +2,8 @@ "id": "CVE-2021-0877", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:10.163", - "lastModified": "2023-05-15T22:15:10.163", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-226xx/CVE-2021-22600.json b/CVE-2021/CVE-2021-226xx/CVE-2021-22600.json index 6bbf0fb8433..4d6dbf4f48c 100644 --- a/CVE-2021/CVE-2021-226xx/CVE-2021-22600.json +++ b/CVE-2021/CVE-2021-226xx/CVE-2021-22600.json @@ -2,7 +2,7 @@ "id": "CVE-2021-22600", "sourceIdentifier": "cve-coordination@google.com", "published": "2022-01-26T14:15:08.123", - "lastModified": "2023-02-02T16:14:45.667", + "lastModified": "2023-05-16T10:47:38.063", "vulnStatus": "Analyzed", "cisaExploitAdd": "2022-04-11", "cisaActionDue": "2022-05-02", @@ -120,52 +120,37 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.14.175", + "versionEndExcluding": "4.14.259", + "matchCriteriaId": "A5D643C3-1A06-488D-9837-CE4011D7A22D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.114", + "versionEndExcluding": "4.19.222", + "matchCriteriaId": "7A938BE1-F655-40D2-9CD3-A00308B35DEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.4.29", "versionEndExcluding": "5.4.168", - "matchCriteriaId": "B6C785C7-EEE2-4E48-A03B-86DF3D2449B1" + "matchCriteriaId": "FEADDB96-5D2F-463E-94A1-DB604CB44C44" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.10", + "versionStartIncluding": "5.5.14", "versionEndExcluding": "5.10.88", - "matchCriteriaId": "EB4181F8-6C8B-4641-A13A-D558F76ABA69" + "matchCriteriaId": "9FADFAA6-11EF-467D-B365-2E2D18304156" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.15", + "versionStartIncluding": "5.11", "versionEndExcluding": "5.15.11", - "matchCriteriaId": "7A70FD7B-2EDC-4C3B-ADE0-880AA759CDD7" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:-:*:*:*:*:*:*", - "matchCriteriaId": "FF588A58-013F-4DBF-A3AB-70EC054B1892" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc1:*:*:*:*:*:*", - "matchCriteriaId": "357AA433-37E8-4323-BFB2-3038D6E4B414" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc2:*:*:*:*:*:*", - "matchCriteriaId": "A73429BA-C2D9-4D0C-A75F-06A1CA8B3983" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc3:*:*:*:*:*:*", - "matchCriteriaId": "F621B5E3-E99D-49E7-90B9-EC3B77C95383" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc4:*:*:*:*:*:*", - "matchCriteriaId": "F7BFDCAA-1650-49AA-8462-407DD593F94F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.16:rc5:*:*:*:*:*:*", - "matchCriteriaId": "6EC9882F-866D-4ACB-8FBC-213D8D8436C8" + "matchCriteriaId": "11274E95-438A-449A-B100-01B2B0046669" } ] } diff --git a/CVE-2021/CVE-2021-252xx/CVE-2021-25220.json b/CVE-2021/CVE-2021-252xx/CVE-2021-25220.json index 650c0d49065..fd0be2c776e 100644 --- a/CVE-2021/CVE-2021-252xx/CVE-2021-25220.json +++ b/CVE-2021/CVE-2021-252xx/CVE-2021-25220.json @@ -2,7 +2,7 @@ "id": "CVE-2021-25220", "sourceIdentifier": "security-officer@isc.org", "published": "2022-03-23T13:15:07.680", - "lastModified": "2022-11-28T18:14:39.543", + "lastModified": "2023-05-16T10:59:43.300", "vulnStatus": "Analyzed", "descriptions": [ { @@ -410,6 +410,719 @@ ] } ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.3", + "matchCriteriaId": "ECFE39BF-15FB-4129-9D8C-4F28DABB5D83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*", + "matchCriteriaId": "59006503-B2CA-4F79-AC13-7C5615A74CE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "11B5CC5A-1959-4113-BFCF-E4BA63D918C1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "33F08A33-EF80-4D86-9A9A-9DF147B9B6D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "AF24ACBD-5F84-47B2-BFF3-E9A56666269C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "3935A586-41BD-4FA5-9596-DED6F0864777" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*", + "matchCriteriaId": "B83FB539-BD7C-4BEE-9022-098F73902F38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*", + "matchCriteriaId": "7659AC36-A5EA-468A-9793-C1EC914D36F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*", + "matchCriteriaId": "E0E018E1-568E-40F2-ADA5-F71509811879" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*", + "matchCriteriaId": "122B09A3-299A-421C-9A6B-B3FEED8E19FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r2-s7:*:*:*:*:*:*", + "matchCriteriaId": "55F3E730-83F2-43C2-B6DC-77BAABB2F01D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "B9295AF3-A883-47C3-BAF8-3D82F719733E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "F09D3262-394A-43D1-A4ED-8887FCB20F87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D3FEA876-302D-4F07-94E6-237C669538F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "B011854A-932C-4D5C-B469-71F72608DFCB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "94A44054-B47B-453C-BF0F-9E071EFF6542" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "CA3A4806-59AB-43D6-BFE3-A6DCE098335C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.3:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "45DA4D89-1362-421F-8218-585CE5D60E81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*", + "matchCriteriaId": "9B342307-98CF-45C9-9F08-5EB06C679B79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "DC743EE4-8833-452A-94DB-655BF139F883" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "FE96A8EA-FFE3-4D8F-9266-21899149D634" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "C12A75C6-2D00-4202-B861-00FF71585FA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*", + "matchCriteriaId": "70FF3DD4-14CB-435D-8529-0480EB853F60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*", + "matchCriteriaId": "84429093-AB3C-4C05-B8FA-87D94091820F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "4DCFA774-96EF-4018-82CF-95C807025C24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "76022948-4B07-43CB-824C-44E1AB3537CB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "25446F60-5CB9-4923-BCE8-609AE3CFDFBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*", + "matchCriteriaId": "A23E5CEA-EFF5-4641-BC47-BA2D0859F0EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*", + "matchCriteriaId": "760E2418-B945-4467-BDAC-7702DDF4C4EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*", + "matchCriteriaId": "98097AB6-56CB-42E4-96B4-ABBD4F36553C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s6:*:*:*:*:*:*", + "matchCriteriaId": "7844B380-7986-4B71-B1AE-22D46E5007D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r2-s7:*:*:*:*:*:*", + "matchCriteriaId": "7EF24AFC-D359-4132-A133-1F6680F7BE46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "758275F3-9457-45A2-8F57-65DCD659FC1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "B46CB928-78B5-4D60-B747-9A0988C7060D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "ED73BF1A-96E4-49F1-A6AA-7B29DAA6C112" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0886EFA6-47E3-4C1D-A278-D3891A487FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "A209EE6F-E676-4172-8FF3-4E03748DEB13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "EC395200-9A69-468A-8461-D2219B34AA0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "08584FCD-4593-4590-A988-C862295E618A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "1BF7792C-51FF-4C6E-B5E7-F87738FE4B35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:19.4:r3-s8:*:*:*:*:*:*", + "matchCriteriaId": "E69B0ED4-898D-4D7A-9711-8DB00EE3197B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*", + "matchCriteriaId": "D4CF52CF-F911-4615-9171-42F84429149F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "CD07B7E2-F5C2-4610-9133-FDA9E66DFF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "D3C23AEB-34DE-44FB-8D64-E69D6E8B7401" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "18DB9401-5A51-4BB3-AC2F-58F58F1C788C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*", + "matchCriteriaId": "06F53DA5-59AE-403C-9B1E-41CE267D8BB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "3332262F-81DA-4D78-99C9-514CADA46611" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "B46B63A2-1518-4A29-940C-F05624C9658D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "8E0D4959-3865-42A7-98CD-1103EBD84528" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*", + "matchCriteriaId": "3A58292B-814C-49E7-8D6D-BE26EFB9ADDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "681AE183-7183-46E7-82EA-28C398FA1C3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8A6E9627-8BF1-4BE8-844B-EE8F1C9478F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "0A80F23B-CD13-4745-BA92-67C23B297A18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "67D4004B-1233-4258-9C7A-F05189146B44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "69E33F24-D480-4B5F-956D-D435A551CBE7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*", + "matchCriteriaId": "03009CC1-21AC-4A46-A747-D0C67FCD41DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "5C9BC697-C7C9-447D-9EBD-E9711462583E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "7B80433B-57B1-49EF-B1A1-83781D6102E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "A352BB7A-6F17-4E64-BC02-1A7E4CD42653" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "05D8427C-CDDE-4B2F-9CB8-41B9137660E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "F3DC01F2-6DFE-4A8E-9962-5E59AA965935" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "7DA0E196-925E-4056-B411-E158702D5D4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E33A522F-E35C-4473-9CBD-9C6E5A831086" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "E9AE26EB-699B-4B10-87E2-9E731B820F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "A29E0070-47E9-43DD-9303-C732FE8CC851" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.3:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "A5E7E8D2-5D08-492E-84FC-8803E50F2CA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*", + "matchCriteriaId": "6FDB5B7D-FB37-47E3-8678-B9ED578CCA5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "625BA7E6-D2AD-4A48-9B94-24328BE5B06A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F462F4E3-762C-429F-8D25-5521100DD37C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "C0BC9DAC-D6B5-4C5E-8C73-6E550D9A30F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "689FE1AE-7A85-4FB6-AB02-E732F23581B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "79E56DAC-75AD-4C81-9835-634B40C15DA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "A0040FE2-7ECD-4755-96CE-E899BA298E0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "076AB086-BB79-4583-AAF7-A5233DFB2F95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "72E2DDF6-01DF-4880-AB60-B3DA3281E88D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "561C1113-3D59-4DD9-ADA7-3C9ECC4632EC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78C6D8A0-92D3-4FD3-BCC1-CC7C87B76317" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "927EAB8B-EC3B-4B12-85B9-5517EBA49A30" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CEBF85C-736A-4E7D-956A-3E8210D4F70B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD647C15-A686-4C8F-A766-BC29404C0FED" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45AB1622-1AED-4CD7-98F1-67779CDFC321" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89276D88-3B8D-4168-A2CD-0920297485F2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E020556B-693F-4963-BA43-3164AB50FA49" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB0D31FF-0812-42B8-B25E-03C35EC1B021" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB5AB24B-2B43-43DD-AE10-F758B4B19F2A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80F9DC32-5ADF-4430-B1A6-357D0B29DB78" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B82D4C4-7A65-409A-926F-33C054DCBFBA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "746C3882-2A5B-4215-B259-EB1FD60C513D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE535749-F4CE-4FFA-B23D-BF09C92481E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDE64EC0-7E42-43AF-A8FA-1A233BD3E3BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2305DA9D-E6BA-48F4-80CF-9E2DE7661B2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06A03463-6B1D-4DBA-9E89-CAD5E899B98B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3AA8999C-8AE4-416F-BA2A-B1A21F33B4D7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCC5F6F5-4347-49D3-909A-27A3A96D36C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56BA6B86-D3F4-4496-AE46-AC513C6560FA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ABA347C-3EF3-4F75-B4D1-54590A57C2BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FDDC897-747F-44DD-9599-7266F9B5B7B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62FC145A-D477-4C86-89E7-F70F52773801" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06685D0E-A075-49A5-9EF4-34F0F795C8C6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52F0B735-8C49-4B08-950A-296C9CDE43CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CA098D-CBE4-4E62-9EC0-43E1B6098710" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66F474D4-79B6-4525-983C-9A9011BD958B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AA424D4-4DBF-4E8C-96B8-E37741B5403E" + } + ] + } + ] } ], "references": [ diff --git a/CVE-2021/CVE-2021-318xx/CVE-2021-31888.json b/CVE-2021/CVE-2021-318xx/CVE-2021-31888.json index d7f06abbb41..4342a293493 100644 --- a/CVE-2021/CVE-2021-318xx/CVE-2021-31888.json +++ b/CVE-2021/CVE-2021-318xx/CVE-2021-31888.json @@ -2,8 +2,8 @@ "id": "CVE-2021-31888", "sourceIdentifier": "productcert@siemens.com", "published": "2021-11-09T12:15:09.640", - "lastModified": "2022-05-20T13:15:13.210", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T10:50:54.340", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -93,11 +93,6 @@ "operator": "OR", "negate": false, "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:siemens:capital_vstar:*:*:*:*:*:*:*:*", - "matchCriteriaId": "3EC45D63-0FB7-4995-AF45-B41F6EF6A9E2" - }, { "vulnerable": true, "criteria": "cpe:2.3:a:siemens:nucleus_net:*:*:*:*:*:*:*:*", @@ -106,8 +101,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:siemens:nucleus_readystart_v3:*:*:*:*:*:*:*:*", - "versionEndExcluding": "2017.02.1", - "matchCriteriaId": "769372D0-68B3-47F3-B13B-43EAAF7E822D" + "versionEndExcluding": "2017.02.4", + "matchCriteriaId": "C2F36C9F-E4F4-4678-B82D-361F4818B66C" }, { "vulnerable": true, @@ -181,8 +176,15 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:siemens:apogee_pxc_compact_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "105A6FFB-1176-4021-868D-3D6CE77113B2" + "criteria": "cpe:2.3:o:siemens:apogee_pxc_compact_firmware:*:*:*:*:p2_ethernet:*:*:*", + "versionEndExcluding": "2.8.19", + "matchCriteriaId": "DB03E262-4378-4E0F-9263-19D1392CCC8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:apogee_pxc_compact_firmware:*:*:*:*:bacnet:*:*:*", + "versionEndExcluding": "3.5.4", + "matchCriteriaId": "C7F539A7-092A-452D-AAEF-A18CAB76EF39" } ] }, @@ -208,8 +210,15 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:siemens:apogee_pxc_modular_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "C6BE40AF-B7A4-498A-943E-11AA9393A3D6" + "criteria": "cpe:2.3:o:siemens:apogee_pxc_modular_firmware:*:*:*:*:p2_ethernet:*:*:*", + "versionEndExcluding": "2.8.19", + "matchCriteriaId": "32FAA115-303A-43BF-BB07-153269A82769" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:apogee_pxc_modular_firmware:*:*:*:*:bacnet:*:*:*", + "versionEndExcluding": "3.5.4", + "matchCriteriaId": "AD5099CC-0908-4CB8-A152-869B1678F484" } ] }, @@ -236,7 +245,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:siemens:talon_tc_compact_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "0CA14719-C655-4BED-AE8D-B9C983847AE4" + "versionEndExcluding": "3.5.4", + "matchCriteriaId": "46B9BC93-293E-4D1F-BA10-4E79DCF472FB" } ] }, @@ -263,7 +273,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:siemens:talon_tc_modular_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "1F3470FD-BEBE-465F-A189-F4CEDD0F6815" + "versionEndExcluding": "3.5.4", + "matchCriteriaId": "90E02740-938E-421A-97F9-DAC9A96F048B" } ] }, @@ -289,8 +300,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:siemens:apogee_modular_building_controller_firmware:*:*:*:*:*:*:*:*", - "matchCriteriaId": "60FAD4D8-54FA-4721-954E-4AD77020B189" + "criteria": "cpe:2.3:o:siemens:desigo_pxc00-e.d_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3", + "versionEndExcluding": "6.30.016", + "matchCriteriaId": "7F55E48E-BFB9-436A-9586-696D910C0122" } ] }, @@ -300,8 +313,356 @@ "cpeMatch": [ { "vulnerable": false, - "criteria": "cpe:2.3:h:siemens:apogee_modular_building_controller:-:*:*:*:*:*:*:*", - "matchCriteriaId": "B5F978E7-3DD9-4948-BFFB-E7273003477B" + "criteria": "cpe:2.3:h:siemens:desigo_pxc00-e.d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1727849-2FD8-40A2-91D3-E0C9662B45BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:desigo_pxc00-u_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3", + "versionEndExcluding": "6.30.016", + "matchCriteriaId": "9B62759D-843B-48FC-82CB-1A8562C6BAFD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:desigo_pxc00-u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD39D011-8AE2-46FE-9207-C110E2FBC07C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:desigo_pxc001-e.d_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3", + "versionEndExcluding": "6.30.016", + "matchCriteriaId": "A9FA1D60-CB76-4F9F-AF50-F044938E24F7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:desigo_pxc001-e.d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DCC50C13-FA05-4459-BA1E-482D886B842B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:desigo_pxc12-e.d_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3", + "versionEndExcluding": "6.30.016", + "matchCriteriaId": "E759F7F2-A0EA-4A93-9BE7-56754F3DB71E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:desigo_pxc12-e.d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DDA404C0-FD6D-47CC-950C-E5DCC993C8E6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:desigo_pxc22-e.d_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3", + "versionEndExcluding": "6.30.016", + "matchCriteriaId": "06588CEC-2291-4870-84D9-6A61614D954F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:desigo_pxc22-e.d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A4D84CE-07AB-4305-9C48-54392772D4EB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:desigo_pxc22.1-e.d_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3", + "versionEndExcluding": "6.30.016", + "matchCriteriaId": "43E08A74-3DAF-4022-9FF2-9ADA4426161E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:desigo_pxc22.1-e.d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E67F374-BF75-4334-A6D5-AB570E0A70D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:desigo_pxc36.1-e.d_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3", + "versionEndExcluding": "6.30.016", + "matchCriteriaId": "875BF593-DC7B-4416-983D-E69C48F5F3EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:desigo_pxc36.1-e.d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CA7EF94-2EE2-4B53-A544-F675306DF84F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:desigo_pxc50-e.d_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3", + "versionEndExcluding": "6.30.016", + "matchCriteriaId": "60970078-7799-458D-983C-AD012FFA4241" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:desigo_pxc50-e.d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B73C4D39-A600-460B-A9A4-A954A58EDB17" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:desigo_pxc64-u_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3", + "versionEndExcluding": "6.30.016", + "matchCriteriaId": "30E702A4-7D43-4277-9885-52AA26EB526B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:desigo_pxc64-u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88DBB445-0A82-4DE8-B2CB-0CDD06A7E413" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:desigo_pxc100-e.d_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3", + "versionEndExcluding": "6.30.016", + "matchCriteriaId": "4D3E8389-DC09-4E20-9406-8AACE31E4503" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:desigo_pxc100-e.d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4EC2CE6-D918-4D78-A135-34E25C82E40B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:desigo_pxc128-u_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3", + "versionEndExcluding": "6.30.016", + "matchCriteriaId": "C5E933BA-6FBA-445C-AC3E-F866E606A34D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:desigo_pxc128-u:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7E1693F-D78F-4AC1-9304-3A5D64F5AEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:desigo_pxc200-e.d_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3", + "versionEndExcluding": "6.30.016", + "matchCriteriaId": "182DB746-FDA5-4856-BE6C-C84E0EFF7BFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:desigo_pxc200-e.d:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A602EDAE-72D4-4546-8C41-BBBECE2FD328" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:desigo_pxm20-e_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.3", + "versionEndExcluding": "6.30.016", + "matchCriteriaId": "7A58E17E-5986-4EEF-93BF-0596AA1E7F46" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:desigo_pxm20-e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D7DD189-AEC3-4CB8-9337-876B8C8F2322" } ] } diff --git a/CVE-2021/CVE-2021-336xx/CVE-2021-33621.json b/CVE-2021/CVE-2021-336xx/CVE-2021-33621.json index d04f2482709..bbffb0a4b43 100644 --- a/CVE-2021/CVE-2021-336xx/CVE-2021-33621.json +++ b/CVE-2021/CVE-2021-336xx/CVE-2021-33621.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33621", "sourceIdentifier": "cve@mitre.org", "published": "2022-11-18T23:15:18.987", - "lastModified": "2023-01-12T19:38:03.190", + "lastModified": "2023-05-16T11:02:59.923", "vulnStatus": "Analyzed", "descriptions": [ { @@ -101,6 +101,37 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.7.0", + "versionEndExcluding": "2.7.7", + "matchCriteriaId": "3553CC40-CE13-48A8-B959-0C0B96F1FAD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.0.5", + "matchCriteriaId": "3047B1E3-1CB1-4270-AB66-CF194AECB87E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.0", + "versionEndExcluding": "3.1.3", + "matchCriteriaId": "576D85B3-8EA3-42F8-89FE-316057C9971D" + } + ] + } + ] } ], "references": [ diff --git a/CVE-2021/CVE-2021-350xx/CVE-2021-35039.json b/CVE-2021/CVE-2021-350xx/CVE-2021-35039.json index 016d2c9958f..934294bb137 100644 --- a/CVE-2021/CVE-2021-350xx/CVE-2021-35039.json +++ b/CVE-2021/CVE-2021-350xx/CVE-2021-35039.json @@ -2,7 +2,7 @@ "id": "CVE-2021-35039", "sourceIdentifier": "cve@mitre.org", "published": "2021-07-07T01:15:07.517", - "lastModified": "2021-12-06T17:03:19.833", + "lastModified": "2023-05-16T10:59:26.917", "vulnStatus": "Analyzed", "descriptions": [ { @@ -86,8 +86,29 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.196", + "matchCriteriaId": "F3CAB837-7D38-4934-AD4F-195CEFD754E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.129", + "matchCriteriaId": "3BA224A1-00EE-4171-B259-921A4A3E2A26" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.47", + "matchCriteriaId": "7E7C0CCD-69D3-4E4B-A278-9DA1DC6464ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", "versionEndExcluding": "5.12.14", - "matchCriteriaId": "EC1030E9-F8FE-4F40-88D4-7CD501054679" + "matchCriteriaId": "AE921D8E-1E68-4B26-B8BB-2C48BF1BE23C" } ] } diff --git a/CVE-2021/CVE-2021-36xx/CVE-2021-3653.json b/CVE-2021/CVE-2021-36xx/CVE-2021-3653.json index e1163ed495c..41b208a2ecc 100644 --- a/CVE-2021/CVE-2021-36xx/CVE-2021-3653.json +++ b/CVE-2021/CVE-2021-36xx/CVE-2021-3653.json @@ -2,7 +2,7 @@ "id": "CVE-2021-3653", "sourceIdentifier": "secalert@redhat.com", "published": "2021-09-29T20:15:08.617", - "lastModified": "2022-03-31T19:45:45.900", + "lastModified": "2023-05-16T10:49:00.723", "vulnStatus": "Analyzed", "descriptions": [ { @@ -96,13 +96,50 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.6.30", - "versionEndExcluding": "5.14", - "matchCriteriaId": "6744C838-9E4F-41D0-AC28-6CD84B04F6A2" + "versionEndExcluding": "4.4.282", + "matchCriteriaId": "6C604847-F398-40D1-AB26-04FAED3AF5D9" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.14:-:*:*:*:*:*:*", - "matchCriteriaId": "6A05198E-F8FA-4517-8D0E-8C95066AED38" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5", + "versionEndExcluding": "4.9.281", + "matchCriteriaId": "286C2303-8862-4B89-BF52-0EB83C7C067C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.245", + "matchCriteriaId": "05DE70B5-762A-4042-8465-8690F02688FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.205", + "matchCriteriaId": "5DFB089B-C0CD-422B-9182-497E5451AD10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.142", + "matchCriteriaId": "BABFD545-0405-4B3C-89BF-B7B0A9A5DCDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.60", + "matchCriteriaId": "58120FFF-3B1B-4287-A7D3-657641443823" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.13.12", + "matchCriteriaId": "C31610D4-4A14-453C-8ECC-AFF86AC4D24D" }, { "vulnerable": true, diff --git a/CVE-2021/CVE-2021-41xx/CVE-2021-4197.json b/CVE-2021/CVE-2021-41xx/CVE-2021-4197.json index e5616718526..89e5e23b432 100644 --- a/CVE-2021/CVE-2021-41xx/CVE-2021-4197.json +++ b/CVE-2021/CVE-2021-41xx/CVE-2021-4197.json @@ -2,7 +2,7 @@ "id": "CVE-2021-4197", "sourceIdentifier": "secalert@redhat.com", "published": "2022-03-23T20:15:10.200", - "lastModified": "2023-02-03T23:59:45.990", + "lastModified": "2023-05-16T10:59:49.960", "vulnStatus": "Analyzed", "descriptions": [ { @@ -96,8 +96,37 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndExcluding": "5.17", - "matchCriteriaId": "A37A8EE9-3F14-4C7A-A882-DA8A6AD1897C" + "versionStartIncluding": "4.2", + "versionEndExcluding": "4.14.276", + "matchCriteriaId": "DD281643-091B-454C-A61A-FD71E28F0C80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.238", + "matchCriteriaId": "FA28527A-11D3-41D2-9C4C-ECAC0D6A4A2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.189", + "matchCriteriaId": "8CB6E8F5-C2B1-46F3-A807-0F6104AC340F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.111", + "matchCriteriaId": "96258501-7BCE-4C55-8A38-8AC9D327626D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.14", + "matchCriteriaId": "0B1B7704-C975-4762-A70D-54C594766ED7" } ] } diff --git a/CVE-2022/CVE-2022-18xx/CVE-2022-1882.json b/CVE-2022/CVE-2022-18xx/CVE-2022-1882.json index 950caad182c..2673a64f4d2 100644 --- a/CVE-2022/CVE-2022-18xx/CVE-2022-1882.json +++ b/CVE-2022/CVE-2022-18xx/CVE-2022-1882.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1882", "sourceIdentifier": "secalert@redhat.com", "published": "2022-05-26T17:15:08.830", - "lastModified": "2022-10-27T16:37:18.837", + "lastModified": "2023-05-16T10:50:30.120", "vulnStatus": "Analyzed", "descriptions": [ { @@ -96,43 +96,23 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndExcluding": "5.18", - "matchCriteriaId": "FE93544F-B946-47CF-9697-FBF3484FCB92" + "versionStartIncluding": "5.10.106", + "versionEndExcluding": "5.10.134", + "matchCriteriaId": "FBC8D988-D646-44BA-9409-C31DC962EB9F" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*", - "matchCriteriaId": "6AD94161-84BB-42E6-9882-4FC0C42E9FC1" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.29", + "versionEndExcluding": "5.15.58", + "matchCriteriaId": "12CFE2A9-84BE-40EA-A0C3-1E7F3BDE518F" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*", - "matchCriteriaId": "7AB06DDF-3C2B-416D-B448-E990D8FF67A9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*", - "matchCriteriaId": "EAE6C6C5-4D21-4C04-897C-70CBBB3D7B91" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*", - "matchCriteriaId": "DA5F085D-52F3-4EE2-8353-455D1A6FE073" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*", - "matchCriteriaId": "D6EE5B78-0D83-4715-893C-ABD69B49E7FC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc6:*:*:*:*:*:*", - "matchCriteriaId": "EE723F14-047B-4FCF-B109-E0542EDFB063" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc7:*:*:*:*:*:*", - "matchCriteriaId": "2FCFCE58-5118-4D05-864E-C82CF20EABE5" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16.15", + "versionEndExcluding": "5.18.15", + "matchCriteriaId": "030744E8-AA64-4843-A7FF-CD0525472E2A" } ] } diff --git a/CVE-2022/CVE-2022-19xx/CVE-2022-1943.json b/CVE-2022/CVE-2022-19xx/CVE-2022-1943.json index 8094b9b69ed..e08b3b1d71d 100644 --- a/CVE-2022/CVE-2022-19xx/CVE-2022-1943.json +++ b/CVE-2022/CVE-2022-19xx/CVE-2022-1943.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1943", "sourceIdentifier": "secalert@redhat.com", "published": "2022-06-02T14:15:34.157", - "lastModified": "2023-02-02T19:22:46.710", + "lastModified": "2023-05-16T10:47:50.740", "vulnStatus": "Analyzed", "descriptions": [ { @@ -95,38 +95,16 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndExcluding": "5.18", - "matchCriteriaId": "FE93544F-B946-47CF-9697-FBF3484FCB92" + "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.40", + "matchCriteriaId": "FA13A06E-7213-4625-89D2-C81F9D0C07C8" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc1:*:*:*:*:*:*", - "matchCriteriaId": "6AD94161-84BB-42E6-9882-4FC0C42E9FC1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc2:*:*:*:*:*:*", - "matchCriteriaId": "7AB06DDF-3C2B-416D-B448-E990D8FF67A9" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc3:*:*:*:*:*:*", - "matchCriteriaId": "EAE6C6C5-4D21-4C04-897C-70CBBB3D7B91" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc4:*:*:*:*:*:*", - "matchCriteriaId": "DA5F085D-52F3-4EE2-8353-455D1A6FE073" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc5:*:*:*:*:*:*", - "matchCriteriaId": "D6EE5B78-0D83-4715-893C-ABD69B49E7FC" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.18:rc6:*:*:*:*:*:*", - "matchCriteriaId": "EE723F14-047B-4FCF-B109-E0542EDFB063" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.8", + "matchCriteriaId": "6A05E0E7-6FCD-4133-9436-366BF4A173AE" } ] } diff --git a/CVE-2022/CVE-2022-19xx/CVE-2022-1998.json b/CVE-2022/CVE-2022-19xx/CVE-2022-1998.json index 0228d008180..303c15ae051 100644 --- a/CVE-2022/CVE-2022-19xx/CVE-2022-1998.json +++ b/CVE-2022/CVE-2022-19xx/CVE-2022-1998.json @@ -2,7 +2,7 @@ "id": "CVE-2022-1998", "sourceIdentifier": "secalert@redhat.com", "published": "2022-06-09T15:15:09.327", - "lastModified": "2022-10-05T15:16:46.450", + "lastModified": "2023-05-16T10:50:19.783", "vulnStatus": "Analyzed", "descriptions": [ { @@ -96,19 +96,23 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.1", - "versionEndExcluding": "5.17", - "matchCriteriaId": "D317AE96-8138-498A-BDD7-2617EE8093BC" + "versionStartIncluding": "5.10.46", + "versionEndExcluding": "5.10.97", + "matchCriteriaId": "25F32A49-4930-472C-B4C1-9CA94FE77887" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", - "matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.12.12", + "versionEndExcluding": "5.15.20", + "matchCriteriaId": "36182661-FAEB-44BD-9458-9560399D42E6" }, { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", - "matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16.0", + "versionEndExcluding": "5.16.6", + "matchCriteriaId": "64A4B4C0-519F-4651-A076-4CEAB004FDC6" } ] } diff --git a/CVE-2022/CVE-2022-232xx/CVE-2022-23222.json b/CVE-2022/CVE-2022-232xx/CVE-2022-23222.json index 3873131955d..8458e0ceef7 100644 --- a/CVE-2022/CVE-2022-232xx/CVE-2022-23222.json +++ b/CVE-2022/CVE-2022-232xx/CVE-2022-23222.json @@ -2,7 +2,7 @@ "id": "CVE-2022-23222", "sourceIdentifier": "cve@mitre.org", "published": "2022-01-14T08:15:07.353", - "lastModified": "2022-10-14T12:01:36.107", + "lastModified": "2023-05-16T10:59:32.267", "vulnStatus": "Analyzed", "descriptions": [ { @@ -87,8 +87,15 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.8.0", - "versionEndIncluding": "5.15.14", - "matchCriteriaId": "6DE79CB3-0EFD-4C0F-AC48-BEFC1B252D71" + "versionEndExcluding": "5.15.37", + "matchCriteriaId": "BB81FD55-CFE5-42D0-9707-ED9D25271020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.11", + "matchCriteriaId": "0D327234-5D4A-43DC-A6DF-BCA0CEBEC039" } ] } diff --git a/CVE-2022/CVE-2022-235xx/CVE-2022-23548.json b/CVE-2022/CVE-2022-235xx/CVE-2022-23548.json index dcc8ba9d1d2..4c52123572d 100644 --- a/CVE-2022/CVE-2022-235xx/CVE-2022-23548.json +++ b/CVE-2022/CVE-2022-235xx/CVE-2022-23548.json @@ -2,8 +2,8 @@ "id": "CVE-2022-23548", "sourceIdentifier": "security-advisories@github.com", "published": "2023-01-05T19:15:09.423", - "lastModified": "2023-01-18T20:34:34.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:15:56.813", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -56,7 +56,7 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -66,12 +66,12 @@ ] }, { - "source": "nvd@nist.gov", + "source": "security-advisories@github.com", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-79" + "value": "CWE-1333" } ] } diff --git a/CVE-2022/CVE-2022-27xx/CVE-2022-2795.json b/CVE-2022/CVE-2022-27xx/CVE-2022-2795.json index f88a3a01360..e8d9804190a 100644 --- a/CVE-2022/CVE-2022-27xx/CVE-2022-2795.json +++ b/CVE-2022/CVE-2022-27xx/CVE-2022-2795.json @@ -2,8 +2,8 @@ "id": "CVE-2022-2795", "sourceIdentifier": "security-officer@isc.org", "published": "2022-09-21T11:15:09.470", - "lastModified": "2022-11-03T20:44:27.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:01:14.677", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -21,7 +21,7 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -29,12 +29,12 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" }, "exploitabilityScore": 3.9, - "impactScore": 3.6 + "impactScore": 1.4 }, { "source": "security-officer@isc.org", diff --git a/CVE-2022/CVE-2022-322xx/CVE-2022-32250.json b/CVE-2022/CVE-2022-322xx/CVE-2022-32250.json index 0da1eea670e..67e23d87011 100644 --- a/CVE-2022/CVE-2022-322xx/CVE-2022-32250.json +++ b/CVE-2022/CVE-2022-322xx/CVE-2022-32250.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32250", "sourceIdentifier": "cve@mitre.org", "published": "2022-06-02T21:15:07.973", - "lastModified": "2022-09-09T20:39:06.987", + "lastModified": "2023-05-16T11:00:01.340", "vulnStatus": "Analyzed", "descriptions": [ { @@ -86,8 +86,58 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "5.18.1", - "matchCriteriaId": "2F861244-9CA5-4190-ADE4-1E988564FEA8" + "versionStartIncluding": "4.1", + "versionEndExcluding": "4.9.318", + "matchCriteriaId": "2EF4A158-12E0-4F0E-BC1B-6E0CB17693A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.283", + "matchCriteriaId": "D6823775-2653-4644-A0D4-4E6E68F10C65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.247", + "matchCriteriaId": "B8CFA0F4-2D75-41F4-9753-87944A08B53B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.198", + "matchCriteriaId": "3EC49633-14DE-4EBD-BB80-76AE2E3EABB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.120", + "matchCriteriaId": "92818976-ECCC-4744-9287-E2CF4B2C4131" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.45", + "matchCriteriaId": "08D699AD-F4CE-4BDD-A97E-4997299C7712" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.13", + "matchCriteriaId": "192FC54B-5367-49D6-B410-0285F14665B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.18", + "versionEndExcluding": "5.18.2", + "matchCriteriaId": "9FF255A1-64F4-4E31-AF44-C92FB8773BA2" } ] } diff --git a/CVE-2022/CVE-2022-349xx/CVE-2022-34918.json b/CVE-2022/CVE-2022-349xx/CVE-2022-34918.json index a9dd36a97f2..9c429bfc166 100644 --- a/CVE-2022/CVE-2022-349xx/CVE-2022-34918.json +++ b/CVE-2022/CVE-2022-349xx/CVE-2022-34918.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34918", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-04T21:15:07.730", - "lastModified": "2022-10-26T17:05:18.910", + "lastModified": "2023-05-16T11:00:06.063", "vulnStatus": "Analyzed", "descriptions": [ { @@ -86,9 +86,23 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "5.8.0", - "versionEndIncluding": "5.18.9", - "matchCriteriaId": "15135088-6455-4FD5-937E-8343E9223D77" + "versionStartIncluding": "4.1", + "versionEndExcluding": "5.10.130", + "matchCriteriaId": "D9DE8CDD-0E52-4402-9991-5CAF6A133E21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.54", + "matchCriteriaId": "B2197EF1-3D9C-4EBA-9F94-6C8668E719B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.11", + "matchCriteriaId": "622F881E-3317-4653-9558-86008C2FBFD2" } ] } @@ -287,7 +301,8 @@ "url": "http://packetstormsecurity.com/files/168191/Kernel-Live-Patch-Security-Notice-LSN-0089-1.html", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { @@ -295,7 +310,8 @@ "source": "cve@mitre.org", "tags": [ "Exploit", - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { diff --git a/CVE-2022/CVE-2022-359xx/CVE-2022-35917.json b/CVE-2022/CVE-2022-359xx/CVE-2022-35917.json index 4e4c129e38d..33a3b9ea1ee 100644 --- a/CVE-2022/CVE-2022-359xx/CVE-2022-35917.json +++ b/CVE-2022/CVE-2022-359xx/CVE-2022-35917.json @@ -2,8 +2,8 @@ "id": "CVE-2022-35917", "sourceIdentifier": "security-advisories@github.com", "published": "2022-08-01T22:15:10.157", - "lastModified": "2022-08-10T14:33:11.080", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:00:41.427", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -79,9 +79,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:solana:pay:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:solanalabs:pay:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.2.1", - "matchCriteriaId": "F36A6396-C07B-4CF7-BF84-3183529B506F" + "matchCriteriaId": "BA0D8FFF-0C7B-45CE-B3FD-FF53A6147F8B" } ] } diff --git a/CVE-2022/CVE-2022-35xx/CVE-2022-3526.json b/CVE-2022/CVE-2022-35xx/CVE-2022-3526.json index a3ec54a7e91..731d2f2d082 100644 --- a/CVE-2022/CVE-2022-35xx/CVE-2022-3526.json +++ b/CVE-2022/CVE-2022-35xx/CVE-2022-3526.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3526", "sourceIdentifier": "cna@vuldb.com", "published": "2022-10-16T19:15:09.770", - "lastModified": "2022-10-19T04:36:32.737", + "lastModified": "2023-05-16T10:50:44.877", "vulnStatus": "Analyzed", "descriptions": [ { @@ -93,8 +93,17 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", - "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.13", + "versionEndExcluding": "5.15.35", + "matchCriteriaId": "153CA16D-E467-453C-8C1E-BA57B4F8A154" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.17.4", + "matchCriteriaId": "E22C86CB-06CD-4D16-AB2A-F21EE8199262" } ] } diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36946.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36946.json index 32d674f9873..55c06fbec2e 100644 --- a/CVE-2022/CVE-2022-369xx/CVE-2022-36946.json +++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36946.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36946", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-27T20:15:08.643", - "lastModified": "2022-10-27T14:14:10.227", + "lastModified": "2023-05-16T11:00:09.920", "vulnStatus": "Analyzed", "descriptions": [ { @@ -60,8 +60,51 @@ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndIncluding": "5.18.14", - "matchCriteriaId": "ABF7248B-E964-4678-9323-06AF633A3E28" + "versionStartIncluding": "2.6.14", + "versionEndExcluding": "4.9.326", + "matchCriteriaId": "9220F971-9877-4B46-8E78-6C63F9EEC17A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.291", + "matchCriteriaId": "3BBC7E43-6161-4F21-977C-5BB7792C6C94" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.255", + "matchCriteriaId": "0F412385-907C-4CAD-9E5B-CC397DEE5783" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.209", + "matchCriteriaId": "8A22815E-5E13-479C-8A92-BACF21F911EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.135", + "matchCriteriaId": "BB550DF5-C3A3-4009-A61F-C7293D5A081D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.59", + "matchCriteriaId": "79909FF8-3A4D-4569-8AB9-60BACD5CCD5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.16", + "matchCriteriaId": "F120BA4D-7528-41C4-960F-9133D4EFB5B8" } ] } diff --git a/CVE-2022/CVE-2022-415xx/CVE-2022-41553.json b/CVE-2022/CVE-2022-415xx/CVE-2022-41553.json index b1e202ca0fc..0abe60cf36b 100644 --- a/CVE-2022/CVE-2022-415xx/CVE-2022-41553.json +++ b/CVE-2022/CVE-2022-415xx/CVE-2022-41553.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41553", "sourceIdentifier": "hirt@hitachi.co.jp", "published": "2022-11-01T03:15:10.963", - "lastModified": "2023-01-17T05:15:12.827", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:02:33.867", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -87,8 +87,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:hitachi:infrastructure_analytics_advisor:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.9.0-00", - "matchCriteriaId": "361C95FA-B803-4A75-91B4-A1EF3BDF6DAC" + "versionStartIncluding": "2.0.0-00", + "versionEndIncluding": "4.4.0-00", + "matchCriteriaId": "7BC509D6-6EB5-4050-B0A8-776B489C8AD9" } ] }, @@ -138,7 +139,10 @@ "references": [ { "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2022-134/index.html", - "source": "hirt@hitachi.co.jp" + "source": "hirt@hitachi.co.jp", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-417xx/CVE-2022-41717.json b/CVE-2022/CVE-2022-417xx/CVE-2022-41717.json index e64336e57d8..e43deb04ea8 100644 --- a/CVE-2022/CVE-2022-417xx/CVE-2022-41717.json +++ b/CVE-2022/CVE-2022-417xx/CVE-2022-41717.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41717", "sourceIdentifier": "security@golang.org", "published": "2022-12-08T20:15:10.330", - "lastModified": "2022-12-12T17:50:10.480", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T10:51:31.647", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -68,9 +68,9 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:golang:http2:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*", "versionEndExcluding": "0.4.0", - "matchCriteriaId": "650A1E10-9601-4ED0-A823-C2984E5871BA" + "matchCriteriaId": "BBFC0CE7-CD35-4FCF-A37A-DBC5D6DA16D2" } ] } diff --git a/CVE-2022/CVE-2022-417xx/CVE-2022-41723.json b/CVE-2022/CVE-2022-417xx/CVE-2022-41723.json index e1c547ed358..3fd29479d10 100644 --- a/CVE-2022/CVE-2022-417xx/CVE-2022-41723.json +++ b/CVE-2022/CVE-2022-417xx/CVE-2022-41723.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41723", "sourceIdentifier": "security@golang.org", "published": "2023-02-28T18:15:09.980", - "lastModified": "2023-04-22T03:15:08.577", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T10:50:02.067", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -66,15 +66,15 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:golang:hpack:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:golang:hpack:*:*:*:*:*:go:*:*", "versionEndExcluding": "0.7.0", - "matchCriteriaId": "BBBBFDFB-0394-49D9-AD41-3585763FA9EC" + "matchCriteriaId": "CA68ED61-191E-4903-B65D-CBA7A0370B8E" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:golang:http2:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:golang:http2:*:*:*:*:*:go:*:*", "versionEndExcluding": "0.7.0", - "matchCriteriaId": "F6F2BD4C-EEB4-471E-8811-C58CFA030F64" + "matchCriteriaId": "3EBDC12D-E7B0-4138-B6B1-709E61703629" } ] } @@ -113,19 +113,31 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MA5XS5DAOJ5PKKNG5TUXKPQOFHT5VBC/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RGW7GE2Z32ZT47UFAQFDRQE33B7Q7LMT/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RLBQ3A7ROLEQXQLXFDLNJ7MYPKG5GULE/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XX3IMUTZKRQ73PBZM4E2JP4BKYH4C6XE/", - "source": "security@golang.org" + "source": "security@golang.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://pkg.go.dev/vuln/GO-2023-1571", diff --git a/CVE-2022/CVE-2022-417xx/CVE-2022-41727.json b/CVE-2022/CVE-2022-417xx/CVE-2022-41727.json index 3e693f45f0a..575f376b062 100644 --- a/CVE-2022/CVE-2022-417xx/CVE-2022-41727.json +++ b/CVE-2022/CVE-2022-417xx/CVE-2022-41727.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41727", "sourceIdentifier": "security@golang.org", "published": "2023-02-28T18:15:10.200", - "lastModified": "2023-03-10T00:15:40.187", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T11:03:32.193", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -65,14 +65,14 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:golang:image:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:golang:image:*:*:*:*:*:go:*:*", "versionEndExcluding": "0.5.0", - "matchCriteriaId": "8024048A-7618-45D1-868C-0E739C6181DB" + "matchCriteriaId": "0F6F1ACD-0877-4166-A546-4FFF4046AAE4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:golang:tiff:-:*:*:*:*:*:*:*", - "matchCriteriaId": "A262FD44-4DCC-435C-8FBF-357191243E5D" + "criteria": "cpe:2.3:a:golang:tiff:-:*:*:*:*:go:*:*", + "matchCriteriaId": "6799AD0E-4DCC-4BE8-B437-C3D68222F918" } ] } diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4285.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4285.json index a77a0ea23ca..5ef66e16e7c 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4285.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4285.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4285", "sourceIdentifier": "secalert@redhat.com", "published": "2023-01-27T18:15:15.977", - "lastModified": "2023-02-07T19:46:46.590", + "lastModified": "2023-05-16T11:03:27.867", "vulnStatus": "Analyzed", "descriptions": [ { @@ -56,8 +56,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.35", "versionEndExcluding": "2.39-7", - "matchCriteriaId": "6673DD07-0AF1-4FC3-8B8D-0CCC74D82C07" + "matchCriteriaId": "A7CFD0F7-6794-4E57-9B17-B7F0CDC5103C" } ] } diff --git a/CVE-2022/CVE-2022-446xx/CVE-2022-44640.json b/CVE-2022/CVE-2022-446xx/CVE-2022-44640.json index 00815794c4e..99ff23514c7 100644 --- a/CVE-2022/CVE-2022-446xx/CVE-2022-44640.json +++ b/CVE-2022/CVE-2022-446xx/CVE-2022-44640.json @@ -2,8 +2,8 @@ "id": "CVE-2022-44640", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-25T05:15:11.103", - "lastModified": "2023-02-16T14:15:17.567", - "vulnStatus": "Modified", + "lastModified": "2023-05-16T11:03:18.913", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -62,6 +62,37 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15.0", + "versionEndExcluding": "4.15.3", + "matchCriteriaId": "760EE8B5-7BCD-4BBD-81B8-3E12651AEA71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.16.0", + "versionEndExcluding": "4.16.8", + "matchCriteriaId": "10AA6759-95FC-47A6-AA92-342893A2B23E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.17.0", + "versionEndExcluding": "4.17.4", + "matchCriteriaId": "96E911B3-B4DD-451C-9579-74559328F89F" + } + ] + } + ] } ], "references": [ @@ -74,7 +105,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20230216-0008/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-462xx/CVE-2022-46265.json b/CVE-2022/CVE-2022-462xx/CVE-2022-46265.json index ba211c79dc0..e1e77438375 100644 --- a/CVE-2022/CVE-2022-462xx/CVE-2022-46265.json +++ b/CVE-2022/CVE-2022-462xx/CVE-2022-46265.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46265", "sourceIdentifier": "productcert@siemens.com", "published": "2022-12-13T16:15:25.263", - "lastModified": "2023-04-11T10:15:17.897", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2023-05-16T10:51:00.093", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -86,7 +86,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:siemens:polarion_alm:*:*:*:*:*:*:*:*", - "matchCriteriaId": "8524B7BF-389F-458A-9354-FD5D3063DE2C" + "versionEndExcluding": "2304.0", + "matchCriteriaId": "0B04B897-3DD0-4715-9BE0-D5AF4E008B14" } ] } diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47939.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47939.json index 8df994767a5..6c00dd235d3 100644 --- a/CVE-2022/CVE-2022-479xx/CVE-2022-47939.json +++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47939.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47939", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-23T16:15:12.290", - "lastModified": "2023-03-30T23:15:06.347", - "vulnStatus": "Modified", + "lastModified": "2023-05-16T11:03:04.080", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -57,8 +57,22 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.61", + "matchCriteriaId": "C95FAD7E-9653-4C03-B54B-72E835223C4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.18", + "matchCriteriaId": "5B42E453-8837-49D0-A5EF-03F818A6DC11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", "versionEndExcluding": "5.19.2", - "matchCriteriaId": "ADD77CA1-C3A0-455D-A3FD-DA80DE3555B3" + "matchCriteriaId": "A1A2A5A5-4598-4D7E-BA07-4660398D6C8F" } ] } @@ -102,7 +116,10 @@ }, { "url": "https://www.secpod.com/blog/zero-day-server-message-block-smb-server-in-linux-kernel-5-15-has-a-critical-vulnerability-patch-ksmbd-immediately/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1690/", diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47941.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47941.json index 85c9189151b..995fd87a071 100644 --- a/CVE-2022/CVE-2022-479xx/CVE-2022-47941.json +++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47941.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47941", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-23T16:15:12.710", - "lastModified": "2023-01-23T18:55:08.683", + "lastModified": "2023-05-16T11:03:07.537", "vulnStatus": "Analyzed", "descriptions": [ { @@ -57,8 +57,22 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.61", + "matchCriteriaId": "C95FAD7E-9653-4C03-B54B-72E835223C4B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.18", + "matchCriteriaId": "5B42E453-8837-49D0-A5EF-03F818A6DC11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", "versionEndExcluding": "5.19.2", - "matchCriteriaId": "ADD77CA1-C3A0-455D-A3FD-DA80DE3555B3" + "matchCriteriaId": "A1A2A5A5-4598-4D7E-BA07-4660398D6C8F" } ] } diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47942.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47942.json index 994e2527a70..38f3deda0da 100644 --- a/CVE-2022/CVE-2022-479xx/CVE-2022-47942.json +++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47942.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47942", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-23T16:15:12.863", - "lastModified": "2023-01-23T18:54:51.420", + "lastModified": "2023-05-16T11:03:10.667", "vulnStatus": "Analyzed", "descriptions": [ { @@ -57,8 +57,22 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.62", + "matchCriteriaId": "71F188B5-F7A2-4F91-B40B-02ACCA3184A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.18", + "matchCriteriaId": "5B42E453-8837-49D0-A5EF-03F818A6DC11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", "versionEndExcluding": "5.19.2", - "matchCriteriaId": "ADD77CA1-C3A0-455D-A3FD-DA80DE3555B3" + "matchCriteriaId": "A1A2A5A5-4598-4D7E-BA07-4660398D6C8F" } ] } diff --git a/CVE-2022/CVE-2022-479xx/CVE-2022-47943.json b/CVE-2022/CVE-2022-479xx/CVE-2022-47943.json index 8dd747951a2..c55544cae0d 100644 --- a/CVE-2022/CVE-2022-479xx/CVE-2022-47943.json +++ b/CVE-2022/CVE-2022-479xx/CVE-2022-47943.json @@ -2,8 +2,8 @@ "id": "CVE-2022-47943", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-23T17:15:08.993", - "lastModified": "2023-02-16T14:15:18.083", - "vulnStatus": "Modified", + "lastModified": "2023-05-16T11:03:14.360", + "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", @@ -57,8 +57,22 @@ "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.15", + "versionEndExcluding": "5.15.62", + "matchCriteriaId": "71F188B5-F7A2-4F91-B40B-02ACCA3184A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.18.18", + "matchCriteriaId": "5B42E453-8837-49D0-A5EF-03F818A6DC11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", "versionEndExcluding": "5.19.2", - "matchCriteriaId": "ADD77CA1-C3A0-455D-A3FD-DA80DE3555B3" + "matchCriteriaId": "A1A2A5A5-4598-4D7E-BA07-4660398D6C8F" } ] } @@ -102,7 +116,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20230216-0006/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-1691/", diff --git a/CVE-2023/CVE-2023-17xx/CVE-2023-1729.json b/CVE-2023/CVE-2023-17xx/CVE-2023-1729.json index 61e0c163c64..eb8914b3b52 100644 --- a/CVE-2023/CVE-2023-17xx/CVE-2023-1729.json +++ b/CVE-2023/CVE-2023-17xx/CVE-2023-1729.json @@ -2,8 +2,8 @@ "id": "CVE-2023-1729", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-15T22:15:10.350", - "lastModified": "2023-05-15T22:15:10.350", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20673.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20673.json index d789da4a60c..ab7c3e80a49 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20673.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20673.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20673", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.427", - "lastModified": "2023-05-15T22:15:10.427", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20694.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20694.json index c012ce1875c..a2464d61022 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20694.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20694.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20694", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.480", - "lastModified": "2023-05-15T22:15:10.480", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20695.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20695.json index dbd38880320..9e6b44ed3d4 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20695.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20695.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20695", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.523", - "lastModified": "2023-05-15T22:15:10.523", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20696.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20696.json index a784e9ecec3..9b058bcd270 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20696.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20696.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20696", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.563", - "lastModified": "2023-05-15T22:15:10.563", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20697.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20697.json index cb70e6a913b..6d8b7ae3427 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20697.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20697.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20697", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.603", - "lastModified": "2023-05-15T22:15:10.603", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20698.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20698.json index a63c0f075b5..e920df5b915 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20698.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20698.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20698", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.647", - "lastModified": "2023-05-15T22:15:10.647", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20699.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20699.json index 4ba839be741..0172b00c01c 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20699.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20699.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20699", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.690", - "lastModified": "2023-05-15T22:15:10.690", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20700.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20700.json index b0974634a69..9289cf1e270 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20700.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20700.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20700", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.743", - "lastModified": "2023-05-15T22:15:10.743", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20701.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20701.json index be713154195..8908b61d856 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20701.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20701.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20701", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.787", - "lastModified": "2023-05-15T22:15:10.787", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20703.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20703.json index 0abb92c3545..01ce3fccde4 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20703.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20703.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20703", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.830", - "lastModified": "2023-05-15T22:15:10.830", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20704.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20704.json index dd864f7ee1c..2d482d18ec8 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20704.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20704.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20704", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.870", - "lastModified": "2023-05-15T22:15:10.870", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20705.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20705.json index dc1f68ea508..c98e02b3b04 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20705.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20705.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20705", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.910", - "lastModified": "2023-05-15T22:15:10.910", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20706.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20706.json index beb391b5a38..42b8db1f6af 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20706.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20706.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20706", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.947", - "lastModified": "2023-05-15T22:15:10.947", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20707.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20707.json index 56f94a7c95f..0900df7e9d6 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20707.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20707.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20707", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.993", - "lastModified": "2023-05-15T22:15:10.993", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20708.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20708.json index cf887f44a1b..2acad89353f 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20708.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20708.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20708", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.033", - "lastModified": "2023-05-15T22:15:11.033", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20709.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20709.json index f60ef47f96b..d2ba7dd16ab 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20709.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20709.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20709", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.073", - "lastModified": "2023-05-15T22:15:11.073", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20710.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20710.json index 6d36921490b..0fc04bbf757 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20710.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20710.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20710", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.113", - "lastModified": "2023-05-15T22:15:11.113", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20711.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20711.json index ff056b4dc22..eb7e1abb96e 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20711.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20711.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20711", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.150", - "lastModified": "2023-05-15T22:15:11.150", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20717.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20717.json index 469b623dc04..1b016b88b30 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20717.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20717.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20717", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.190", - "lastModified": "2023-05-15T22:15:11.190", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20718.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20718.json index df811de01d3..9a1737d44be 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20718.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20718.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20718", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.230", - "lastModified": "2023-05-15T22:15:11.230", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20719.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20719.json index 8ca770b58be..d7ed7a58a79 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20719.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20719.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20719", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.273", - "lastModified": "2023-05-15T22:15:11.273", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20720.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20720.json index f8900a48293..4542fe7bf3f 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20720.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20720.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20720", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.313", - "lastModified": "2023-05-15T22:15:11.313", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20721.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20721.json index 00b717cef0a..aef0c9ea025 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20721.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20721.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20721", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.350", - "lastModified": "2023-05-15T22:15:11.350", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20722.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20722.json index d9567e660a0..89dcac4c7ab 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20722.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20722.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20722", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.390", - "lastModified": "2023-05-15T22:15:11.390", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20726.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20726.json index 0e846b08241..3c688e46a1c 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20726.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20726.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20726", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.433", - "lastModified": "2023-05-15T22:15:11.433", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20914.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20914.json index a69346b8bbd..e12d06a3a3d 100644 --- a/CVE-2023/CVE-2023-209xx/CVE-2023-20914.json +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20914.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20914", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.473", - "lastModified": "2023-05-15T22:15:11.473", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20930.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20930.json index be8d1cef78e..b8f1f7d7960 100644 --- a/CVE-2023/CVE-2023-209xx/CVE-2023-20930.json +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20930.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20930", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.513", - "lastModified": "2023-05-15T22:15:11.513", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21102.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21102.json index 547abc94bb3..4f066c3b1a6 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21102.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21102.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21102", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.623", - "lastModified": "2023-05-15T22:15:11.623", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21103.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21103.json index 703c9b29b56..c33eb878ca5 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21103.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21103.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21103", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.687", - "lastModified": "2023-05-15T22:15:11.687", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21104.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21104.json index f44709bc5c2..f6804ba7a7e 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21104.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21104.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21104", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.737", - "lastModified": "2023-05-15T22:15:11.737", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21106.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21106.json index f5ac9580f39..aca747ed0dc 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21106.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21106.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21106", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.777", - "lastModified": "2023-05-15T22:15:11.777", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21107.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21107.json index e1ab7e9f8ad..05750924ac5 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21107.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21107.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21107", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.830", - "lastModified": "2023-05-15T22:15:11.830", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21109.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21109.json index 031f1720412..e5f2670bfdf 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21109.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21109.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21109", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.870", - "lastModified": "2023-05-15T22:15:11.870", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21110.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21110.json index 554ea59d349..23ad53d025d 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21110.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21110.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21110", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.910", - "lastModified": "2023-05-15T22:15:11.910", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21111.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21111.json index e2e09520b39..541f4842e26 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21111.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21111.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21111", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.950", - "lastModified": "2023-05-15T22:15:11.950", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21112.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21112.json index 432d074f310..5d64f0d2a42 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21112.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21112.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21112", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.987", - "lastModified": "2023-05-15T22:15:11.987", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21116.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21116.json index ad0024f7175..fb4574d1e9b 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21116.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21116.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21116", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:12.027", - "lastModified": "2023-05-15T22:15:12.027", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21117.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21117.json index b06e7076dc1..6af35ded08a 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21117.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21117.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21117", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:12.067", - "lastModified": "2023-05-15T22:15:12.067", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21118.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21118.json index 79aa1090bb3..fbeedbf87eb 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21118.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21118.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21118", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:12.107", - "lastModified": "2023-05-15T22:15:12.107", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2124.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2124.json index 55030b0d72a..ffbfb8c0f48 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2124.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2124.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2124", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-15T22:15:12.150", - "lastModified": "2023-05-15T22:15:12.150", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2161.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2161.json index b5e320bf0c3..a3dce69e17c 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2161.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2161.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2161", "sourceIdentifier": "cybersecurity@se.com", "published": "2023-05-16T05:15:09.357", - "lastModified": "2023-05-16T05:15:09.357", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-236xx/CVE-2023-23641.json b/CVE-2023/CVE-2023-236xx/CVE-2023-23641.json new file mode 100644 index 00000000000..9d5519fde14 --- /dev/null +++ b/CVE-2023/CVE-2023-236xx/CVE-2023-23641.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23641", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-16T10:15:09.277", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in WPmanage Uji Popup plugin <=\u00a01.4.3 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/uji-popup/wordpress-uji-popup-plugin-1-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-236xx/CVE-2023-23657.json b/CVE-2023/CVE-2023-236xx/CVE-2023-23657.json new file mode 100644 index 00000000000..48827d97152 --- /dev/null +++ b/CVE-2023/CVE-2023-236xx/CVE-2023-23657.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23657", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-16T10:15:09.350", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Richard Leishman t/a Webforward Mail Subscribe List plugin <=\u00a02.1.9 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/mail-subscribe-list/wordpress-mail-subscribe-list-plugin-2-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-236xx/CVE-2023-23673.json b/CVE-2023/CVE-2023-236xx/CVE-2023-23673.json index 68746f9a35c..ef881d22def 100644 --- a/CVE-2023/CVE-2023-236xx/CVE-2023-23673.json +++ b/CVE-2023/CVE-2023-236xx/CVE-2023-23673.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23673", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-16T09:15:09.313", - "lastModified": "2023-05-16T09:15:09.313", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-236xx/CVE-2023-23676.json b/CVE-2023/CVE-2023-236xx/CVE-2023-23676.json index 14c0f0f22e5..b15d7e36213 100644 --- a/CVE-2023/CVE-2023-236xx/CVE-2023-23676.json +++ b/CVE-2023/CVE-2023-236xx/CVE-2023-23676.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23676", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-16T09:15:09.720", - "lastModified": "2023-05-16T09:15:09.720", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23703.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23703.json new file mode 100644 index 00000000000..75e6d2bf4f8 --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23703.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23703", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-16T10:15:09.407", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Tyche Softwares Arconix Shortcodes plugin <=\u00a02.1.7 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/arconix-shortcodes/wordpress-arconix-shortcodes-plugin-2-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23709.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23709.json new file mode 100644 index 00000000000..87582652e03 --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23709.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23709", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-16T10:15:09.467", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Denis WPJAM Basic plugin <=\u00a06.2.1 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wpjam-basic/wordpress-wpjam-basic-plugin-6-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23720.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23720.json new file mode 100644 index 00000000000..47f124e18e5 --- /dev/null +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23720.json @@ -0,0 +1,55 @@ +{ + "id": "CVE-2023-23720", + "sourceIdentifier": "audit@patchstack.com", + "published": "2023-05-16T10:15:09.530", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", + "descriptions": [ + { + "lang": "en", + "value": "Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in NetReviews SAS Verified Reviews (Avis V\u00e9rifi\u00e9s) plugin <=\u00a02.3.13 versions." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/netreviews/wordpress-verified-reviews-avis-verifies-plugin-2-3-12-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-237xx/CVE-2023-23727.json b/CVE-2023/CVE-2023-237xx/CVE-2023-23727.json index 65e7385aff3..62845dce56c 100644 --- a/CVE-2023/CVE-2023-237xx/CVE-2023-23727.json +++ b/CVE-2023/CVE-2023-237xx/CVE-2023-23727.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23727", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-16T09:15:09.807", - "lastModified": "2023-05-16T09:15:09.807", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2499.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2499.json index 3c3c641d8db..2b8eaa8c232 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2499.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2499.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2499", "sourceIdentifier": "security@wordfence.com", "published": "2023-05-16T09:15:09.890", - "lastModified": "2023-05-16T09:15:09.890", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2548.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2548.json index 29e76ea72a2..14e8b563fcf 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2548.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2548.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2548", "sourceIdentifier": "security@wordfence.com", "published": "2023-05-16T09:15:09.963", - "lastModified": "2023-05-16T09:15:09.963", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2700.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2700.json index 1151f479b1f..cfb0622eb0f 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2700.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2700.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2700", "sourceIdentifier": "secalert@redhat.com", "published": "2023-05-15T22:15:12.207", - "lastModified": "2023-05-15T22:15:12.207", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2708.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2708.json index 81f8570f3d8..926fb116758 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2708.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2708.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2708", "sourceIdentifier": "security@wordfence.com", "published": "2023-05-16T03:15:09.063", - "lastModified": "2023-05-16T03:15:09.063", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-27xx/CVE-2023-2710.json b/CVE-2023/CVE-2023-27xx/CVE-2023-2710.json index c0460d8dc62..24c95dbc3b4 100644 --- a/CVE-2023/CVE-2023-27xx/CVE-2023-2710.json +++ b/CVE-2023/CVE-2023-27xx/CVE-2023-2710.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2710", "sourceIdentifier": "security@wordfence.com", "published": "2023-05-16T03:15:09.147", - "lastModified": "2023-05-16T03:15:09.147", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29961.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29961.json index 596f16b7667..fc2d15e7321 100644 --- a/CVE-2023/CVE-2023-299xx/CVE-2023-29961.json +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29961.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29961", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-16T01:15:09.067", - "lastModified": "2023-05-16T01:15:09.067", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31131.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31131.json index 9fa1c840213..36a128c2a03 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31131.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31131.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31131", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-15T22:15:12.273", - "lastModified": "2023-05-15T22:15:12.273", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-311xx/CVE-2023-31145.json b/CVE-2023/CVE-2023-311xx/CVE-2023-31145.json index c99e6facc87..a20337ea964 100644 --- a/CVE-2023/CVE-2023-311xx/CVE-2023-31145.json +++ b/CVE-2023/CVE-2023-311xx/CVE-2023-31145.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31145", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-15T21:15:09.293", - "lastModified": "2023-05-15T21:15:09.293", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32068.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32068.json index 3493ab0fdb3..ed56d5a54fe 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32068.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32068.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32068", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-15T21:15:09.367", - "lastModified": "2023-05-15T21:15:09.367", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32308.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32308.json index 1fcb10362d0..60df1654051 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32308.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32308.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32308", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-15T21:15:09.530", - "lastModified": "2023-05-15T21:15:09.530", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32309.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32309.json index a21407a0ae8..63bdfed08dd 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32309.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32309.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32309", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-15T21:15:09.607", - "lastModified": "2023-05-15T21:15:09.607", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32313.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32313.json index b8cd4485b7c..87051ac1346 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32313.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32313.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32313", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-15T20:15:09.070", - "lastModified": "2023-05-15T20:15:09.070", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-323xx/CVE-2023-32314.json b/CVE-2023/CVE-2023-323xx/CVE-2023-32314.json index fab56255885..02d667de47b 100644 --- a/CVE-2023/CVE-2023-323xx/CVE-2023-32314.json +++ b/CVE-2023/CVE-2023-323xx/CVE-2023-32314.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32314", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-15T20:15:09.177", - "lastModified": "2023-05-15T20:15:09.177", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32955.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32955.json index ce6c3a5c6e0..6e71f0242fc 100644 --- a/CVE-2023/CVE-2023-329xx/CVE-2023-32955.json +++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32955.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32955", "sourceIdentifier": "security@synology.com", "published": "2023-05-16T08:15:08.490", - "lastModified": "2023-05-16T08:15:08.490", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32956.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32956.json index ee3646740f9..bae2fa568a3 100644 --- a/CVE-2023/CVE-2023-329xx/CVE-2023-32956.json +++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32956.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32956", "sourceIdentifier": "security@synology.com", "published": "2023-05-16T08:15:08.743", - "lastModified": "2023-05-16T08:15:08.743", - "vulnStatus": "Received", + "lastModified": "2023-05-16T10:46:36.147", + "vulnStatus": "Awaiting Analysis", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 919bb13ec91..ad56fd46415 100644 --- a/README.md +++ b/README.md @@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2023-05-16T10:00:25.984031+00:00 +2023-05-16T12:00:25.432193+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2023-05-16T09:15:09.963000+00:00 +2023-05-16T11:15:56.813000+00:00 ``` ### Last Data Feed Release @@ -29,26 +29,136 @@ Download and Changelog: [Click](releases/latest) ### Total Number of included CVEs ```plain -215346 +215351 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `5` -* [CVE-2023-23673](CVE-2023/CVE-2023-236xx/CVE-2023-23673.json) (`2023-05-16T09:15:09.313`) -* [CVE-2023-23676](CVE-2023/CVE-2023-236xx/CVE-2023-23676.json) (`2023-05-16T09:15:09.720`) -* [CVE-2023-23727](CVE-2023/CVE-2023-237xx/CVE-2023-23727.json) (`2023-05-16T09:15:09.807`) -* [CVE-2023-2499](CVE-2023/CVE-2023-24xx/CVE-2023-2499.json) (`2023-05-16T09:15:09.890`) -* [CVE-2023-2548](CVE-2023/CVE-2023-25xx/CVE-2023-2548.json) (`2023-05-16T09:15:09.963`) -* [CVE-2023-32955](CVE-2023/CVE-2023-329xx/CVE-2023-32955.json) (`2023-05-16T08:15:08.490`) -* [CVE-2023-32956](CVE-2023/CVE-2023-329xx/CVE-2023-32956.json) (`2023-05-16T08:15:08.743`) +* [CVE-2023-23641](CVE-2023/CVE-2023-236xx/CVE-2023-23641.json) (`2023-05-16T10:15:09.277`) +* [CVE-2023-23657](CVE-2023/CVE-2023-236xx/CVE-2023-23657.json) (`2023-05-16T10:15:09.350`) +* [CVE-2023-23703](CVE-2023/CVE-2023-237xx/CVE-2023-23703.json) (`2023-05-16T10:15:09.407`) +* [CVE-2023-23709](CVE-2023/CVE-2023-237xx/CVE-2023-23709.json) (`2023-05-16T10:15:09.467`) +* [CVE-2023-23720](CVE-2023/CVE-2023-237xx/CVE-2023-23720.json) (`2023-05-16T10:15:09.530`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `112` +* [CVE-2001-0897](CVE-2001/CVE-2001-08xx/CVE-2001-0897.json) (`2023-05-16T11:09:02.377`) +* [CVE-2016-9777](CVE-2016/CVE-2016-97xx/CVE-2016-9777.json) (`2023-05-16T11:09:07.767`) +* [CVE-2017-7548](CVE-2017/CVE-2017-75xx/CVE-2017-7548.json) (`2023-05-16T11:09:13.220`) +* [CVE-2018-16872](CVE-2018/CVE-2018-168xx/CVE-2018-16872.json) (`2023-05-16T10:48:42.370`) +* [CVE-2018-16884](CVE-2018/CVE-2018-168xx/CVE-2018-16884.json) (`2023-05-16T10:49:27.070`) +* [CVE-2018-18559](CVE-2018/CVE-2018-185xx/CVE-2018-18559.json) (`2023-05-16T11:14:50.353`) +* [CVE-2018-3864](CVE-2018/CVE-2018-38xx/CVE-2018-3864.json) (`2023-05-16T11:14:43.867`) +* [CVE-2018-3866](CVE-2018/CVE-2018-38xx/CVE-2018-3866.json) (`2023-05-16T11:12:16.177`) +* [CVE-2018-3903](CVE-2018/CVE-2018-39xx/CVE-2018-3903.json) (`2023-05-16T11:09:30.940`) +* [CVE-2018-3904](CVE-2018/CVE-2018-39xx/CVE-2018-3904.json) (`2023-05-16T11:13:40.870`) +* [CVE-2018-3905](CVE-2018/CVE-2018-39xx/CVE-2018-3905.json) (`2023-05-16T11:10:27.970`) +* [CVE-2018-3907](CVE-2018/CVE-2018-39xx/CVE-2018-3907.json) (`2023-05-16T11:13:15.893`) +* [CVE-2018-3916](CVE-2018/CVE-2018-39xx/CVE-2018-3916.json) (`2023-05-16T11:14:32.013`) +* [CVE-2018-3918](CVE-2018/CVE-2018-39xx/CVE-2018-3918.json) (`2023-05-16T11:13:47.367`) +* [CVE-2019-6974](CVE-2019/CVE-2019-69xx/CVE-2019-6974.json) (`2023-05-16T11:14:56.237`) +* [CVE-2019-7225](CVE-2019/CVE-2019-72xx/CVE-2019-7225.json) (`2023-05-16T11:15:00.720`) +* [CVE-2019-9012](CVE-2019/CVE-2019-90xx/CVE-2019-9012.json) (`2023-05-16T11:15:49.487`) +* [CVE-2019-9013](CVE-2019/CVE-2019-90xx/CVE-2019-9013.json) (`2023-05-16T11:15:45.683`) +* [CVE-2020-15777](CVE-2020/CVE-2020-157xx/CVE-2020-15777.json) (`2023-05-16T10:53:55.200`) +* [CVE-2020-25643](CVE-2020/CVE-2020-256xx/CVE-2020-25643.json) (`2023-05-16T10:48:49.033`) +* [CVE-2020-27784](CVE-2020/CVE-2020-277xx/CVE-2020-27784.json) (`2023-05-16T10:51:13.530`) +* [CVE-2020-27786](CVE-2020/CVE-2020-277xx/CVE-2020-27786.json) (`2023-05-16T10:49:08.213`) +* [CVE-2021-0877](CVE-2021/CVE-2021-08xx/CVE-2021-0877.json) (`2023-05-16T10:46:36.147`) +* [CVE-2021-22600](CVE-2021/CVE-2021-226xx/CVE-2021-22600.json) (`2023-05-16T10:47:38.063`) +* [CVE-2021-25220](CVE-2021/CVE-2021-252xx/CVE-2021-25220.json) (`2023-05-16T10:59:43.300`) +* [CVE-2021-31888](CVE-2021/CVE-2021-318xx/CVE-2021-31888.json) (`2023-05-16T10:50:54.340`) +* [CVE-2021-33621](CVE-2021/CVE-2021-336xx/CVE-2021-33621.json) (`2023-05-16T11:02:59.923`) +* [CVE-2021-35039](CVE-2021/CVE-2021-350xx/CVE-2021-35039.json) (`2023-05-16T10:59:26.917`) +* [CVE-2021-3653](CVE-2021/CVE-2021-36xx/CVE-2021-3653.json) (`2023-05-16T10:49:00.723`) +* [CVE-2021-4197](CVE-2021/CVE-2021-41xx/CVE-2021-4197.json) (`2023-05-16T10:59:49.960`) +* [CVE-2022-1882](CVE-2022/CVE-2022-18xx/CVE-2022-1882.json) (`2023-05-16T10:50:30.120`) +* [CVE-2022-1943](CVE-2022/CVE-2022-19xx/CVE-2022-1943.json) (`2023-05-16T10:47:50.740`) +* [CVE-2022-1998](CVE-2022/CVE-2022-19xx/CVE-2022-1998.json) (`2023-05-16T10:50:19.783`) +* [CVE-2022-23222](CVE-2022/CVE-2022-232xx/CVE-2022-23222.json) (`2023-05-16T10:59:32.267`) +* [CVE-2022-23548](CVE-2022/CVE-2022-235xx/CVE-2022-23548.json) (`2023-05-16T11:15:56.813`) +* [CVE-2022-2795](CVE-2022/CVE-2022-27xx/CVE-2022-2795.json) (`2023-05-16T11:01:14.677`) +* [CVE-2022-32250](CVE-2022/CVE-2022-322xx/CVE-2022-32250.json) (`2023-05-16T11:00:01.340`) +* [CVE-2022-34918](CVE-2022/CVE-2022-349xx/CVE-2022-34918.json) (`2023-05-16T11:00:06.063`) +* [CVE-2022-3526](CVE-2022/CVE-2022-35xx/CVE-2022-3526.json) (`2023-05-16T10:50:44.877`) +* [CVE-2022-35917](CVE-2022/CVE-2022-359xx/CVE-2022-35917.json) (`2023-05-16T11:00:41.427`) +* [CVE-2022-36946](CVE-2022/CVE-2022-369xx/CVE-2022-36946.json) (`2023-05-16T11:00:09.920`) +* [CVE-2022-41553](CVE-2022/CVE-2022-415xx/CVE-2022-41553.json) (`2023-05-16T11:02:33.867`) +* [CVE-2022-41717](CVE-2022/CVE-2022-417xx/CVE-2022-41717.json) (`2023-05-16T10:51:31.647`) +* [CVE-2022-41723](CVE-2022/CVE-2022-417xx/CVE-2022-41723.json) (`2023-05-16T10:50:02.067`) +* [CVE-2022-41727](CVE-2022/CVE-2022-417xx/CVE-2022-41727.json) (`2023-05-16T11:03:32.193`) +* [CVE-2022-4285](CVE-2022/CVE-2022-42xx/CVE-2022-4285.json) (`2023-05-16T11:03:27.867`) +* [CVE-2022-44640](CVE-2022/CVE-2022-446xx/CVE-2022-44640.json) (`2023-05-16T11:03:18.913`) +* [CVE-2022-46265](CVE-2022/CVE-2022-462xx/CVE-2022-46265.json) (`2023-05-16T10:51:00.093`) +* [CVE-2022-47939](CVE-2022/CVE-2022-479xx/CVE-2022-47939.json) (`2023-05-16T11:03:04.080`) +* [CVE-2022-47941](CVE-2022/CVE-2022-479xx/CVE-2022-47941.json) (`2023-05-16T11:03:07.537`) +* [CVE-2022-47942](CVE-2022/CVE-2022-479xx/CVE-2022-47942.json) (`2023-05-16T11:03:10.667`) +* [CVE-2022-47943](CVE-2022/CVE-2022-479xx/CVE-2022-47943.json) (`2023-05-16T11:03:14.360`) +* [CVE-2023-1729](CVE-2023/CVE-2023-17xx/CVE-2023-1729.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20673](CVE-2023/CVE-2023-206xx/CVE-2023-20673.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20694](CVE-2023/CVE-2023-206xx/CVE-2023-20694.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20695](CVE-2023/CVE-2023-206xx/CVE-2023-20695.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20696](CVE-2023/CVE-2023-206xx/CVE-2023-20696.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20697](CVE-2023/CVE-2023-206xx/CVE-2023-20697.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20698](CVE-2023/CVE-2023-206xx/CVE-2023-20698.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20699](CVE-2023/CVE-2023-206xx/CVE-2023-20699.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20700](CVE-2023/CVE-2023-207xx/CVE-2023-20700.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20701](CVE-2023/CVE-2023-207xx/CVE-2023-20701.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20703](CVE-2023/CVE-2023-207xx/CVE-2023-20703.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20704](CVE-2023/CVE-2023-207xx/CVE-2023-20704.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20705](CVE-2023/CVE-2023-207xx/CVE-2023-20705.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20706](CVE-2023/CVE-2023-207xx/CVE-2023-20706.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20707](CVE-2023/CVE-2023-207xx/CVE-2023-20707.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20708](CVE-2023/CVE-2023-207xx/CVE-2023-20708.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20709](CVE-2023/CVE-2023-207xx/CVE-2023-20709.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20710](CVE-2023/CVE-2023-207xx/CVE-2023-20710.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20711](CVE-2023/CVE-2023-207xx/CVE-2023-20711.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20717](CVE-2023/CVE-2023-207xx/CVE-2023-20717.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20718](CVE-2023/CVE-2023-207xx/CVE-2023-20718.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20719](CVE-2023/CVE-2023-207xx/CVE-2023-20719.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20720](CVE-2023/CVE-2023-207xx/CVE-2023-20720.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20721](CVE-2023/CVE-2023-207xx/CVE-2023-20721.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20722](CVE-2023/CVE-2023-207xx/CVE-2023-20722.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20726](CVE-2023/CVE-2023-207xx/CVE-2023-20726.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20914](CVE-2023/CVE-2023-209xx/CVE-2023-20914.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-20930](CVE-2023/CVE-2023-209xx/CVE-2023-20930.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-21102](CVE-2023/CVE-2023-211xx/CVE-2023-21102.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-21103](CVE-2023/CVE-2023-211xx/CVE-2023-21103.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-21104](CVE-2023/CVE-2023-211xx/CVE-2023-21104.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-21106](CVE-2023/CVE-2023-211xx/CVE-2023-21106.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-21107](CVE-2023/CVE-2023-211xx/CVE-2023-21107.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-21109](CVE-2023/CVE-2023-211xx/CVE-2023-21109.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-21110](CVE-2023/CVE-2023-211xx/CVE-2023-21110.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-21111](CVE-2023/CVE-2023-211xx/CVE-2023-21111.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-21112](CVE-2023/CVE-2023-211xx/CVE-2023-21112.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-21116](CVE-2023/CVE-2023-211xx/CVE-2023-21116.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-21117](CVE-2023/CVE-2023-211xx/CVE-2023-21117.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-21118](CVE-2023/CVE-2023-211xx/CVE-2023-21118.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-2124](CVE-2023/CVE-2023-21xx/CVE-2023-2124.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-2161](CVE-2023/CVE-2023-21xx/CVE-2023-2161.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-23673](CVE-2023/CVE-2023-236xx/CVE-2023-23673.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-23676](CVE-2023/CVE-2023-236xx/CVE-2023-23676.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-23727](CVE-2023/CVE-2023-237xx/CVE-2023-23727.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-2499](CVE-2023/CVE-2023-24xx/CVE-2023-2499.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-2548](CVE-2023/CVE-2023-25xx/CVE-2023-2548.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-2700](CVE-2023/CVE-2023-27xx/CVE-2023-2700.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-2708](CVE-2023/CVE-2023-27xx/CVE-2023-2708.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-2710](CVE-2023/CVE-2023-27xx/CVE-2023-2710.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-29961](CVE-2023/CVE-2023-299xx/CVE-2023-29961.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-31131](CVE-2023/CVE-2023-311xx/CVE-2023-31131.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-31145](CVE-2023/CVE-2023-311xx/CVE-2023-31145.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-32068](CVE-2023/CVE-2023-320xx/CVE-2023-32068.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-32308](CVE-2023/CVE-2023-323xx/CVE-2023-32308.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-32309](CVE-2023/CVE-2023-323xx/CVE-2023-32309.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-32313](CVE-2023/CVE-2023-323xx/CVE-2023-32313.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-32314](CVE-2023/CVE-2023-323xx/CVE-2023-32314.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-32955](CVE-2023/CVE-2023-329xx/CVE-2023-32955.json) (`2023-05-16T10:46:36.147`) +* [CVE-2023-32956](CVE-2023/CVE-2023-329xx/CVE-2023-32956.json) (`2023-05-16T10:46:36.147`) ## Download and Usage