Auto-Update: 2023-05-10T14:00:24.359526+00:00

This commit is contained in:
René Helmke 2023-05-10 16:00:27 +02:00
parent 535787e3ac
commit 8f21ac0176
67 changed files with 6823 additions and 152 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-27856",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T11:15:09.587",
"lastModified": "2023-05-10T11:15:09.587",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-32970",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:09.950",
"lastModified": "2023-05-10T09:15:09.950",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-33961",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T10:15:09.490",
"lastModified": "2023-05-10T10:15:09.490",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4008",
"sourceIdentifier": "security@octopus.com",
"published": "2023-05-10T06:15:09.000",
"lastModified": "2023-05-10T06:15:09.000",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -0,0 +1,55 @@
{
"id": "CVE-2022-45846",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T12:15:09.943",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "Cross-Site Request Forgery (CSRF) vulnerability in Nickys Image Map Pro for WordPress - Interactive SVG Image Map Builder plugin <\u00a05.6.9 versions."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/image-map-pro-wordpress/wordpress-image-map-pro-premium-plugin-5-5-0-multiple-cross-site-request-forgery-csrf-vulnerabilities?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46817",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T10:15:10.223",
"lastModified": "2023-05-10T10:15:10.223",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46819",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T10:15:10.437",
"lastModified": "2023-05-10T10:15:10.437",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-46861",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T10:15:10.537",
"lastModified": "2023-05-10T10:15:10.537",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47137",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T11:15:09.967",
"lastModified": "2023-05-10T11:15:09.967",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47423",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T11:15:10.157",
"lastModified": "2023-05-10T11:15:10.157",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47436",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T11:15:10.307",
"lastModified": "2023-05-10T11:15:10.307",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47441",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T11:15:10.597",
"lastModified": "2023-05-10T11:15:10.597",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47587",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T11:15:11.027",
"lastModified": "2023-05-10T11:15:11.027",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47590",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T11:15:11.337",
"lastModified": "2023-05-10T11:15:11.337",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47600",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T11:15:11.667",
"lastModified": "2023-05-10T11:15:11.667",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47606",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T11:15:12.100",
"lastModified": "2023-05-10T11:15:12.100",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,23 +2,84 @@
"id": "CVE-2022-47876",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-02T20:15:10.537",
"lastModified": "2023-05-05T19:15:15.337",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-10T13:54:33.687",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "The integrator in Jedox GmbH Jedox 2020.2.5 allows remote authenticated users to create Jobs to execute arbitrary code via Groovy-scripts."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jedox:jedox:2020.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3CD31D96-EC95-4111-A9A8-504144689CFF"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/172155/Jedox-2020.2.5-Groovy-Scripts-Remote-Code-Execution.html",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://docs.syslifters.com/assets/vulnerability-disclosure/Vulnerability-Disclosure-Jedox-Jedox-04-2023.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,59 @@
{
"id": "CVE-2023-1732",
"sourceIdentifier": "cna@cloudflare.com",
"published": "2023-05-10T12:15:10.523",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "When sampling randomness for a shared secret, the implementation of Kyber and FrodoKEM, did not check whether crypto/rand.Read()\u00a0returns an error. In rare deployment cases (error thrown by the Read()\u00a0function), this could lead to a predictable shared secret.\n\nThe tkn20 and blindrsa components did not check whether enough randomness was returned from the user provided randomness source. Typically the user provides crypto/rand.Reader, which in the vast majority of cases will always return the right number random bytes. In the cases where it does not, or the user provides a source that does not, the blinding for blindrsa is weak and integrity of the plaintext is not ensured in tkn20.\n\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@cloudflare.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "cna@cloudflare.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"references": [
{
"url": "https://github.com/cloudflare/circl/security/advisories/GHSA-2q89-485c-9j2x",
"source": "cna@cloudflare.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22361",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:10.800",
"lastModified": "2023-05-10T06:15:10.800",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22441",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:11.160",
"lastModified": "2023-05-10T06:15:11.160",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22696",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:12.717",
"lastModified": "2023-05-10T09:15:12.717",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22711",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T08:15:09.767",
"lastModified": "2023-05-10T08:15:09.767",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23578",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:11.430",
"lastModified": "2023-05-10T06:15:11.430",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23701",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T08:15:10.980",
"lastModified": "2023-05-10T08:15:10.980",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23786",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T08:15:11.087",
"lastModified": "2023-05-10T08:15:11.087",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23788",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T08:15:11.163",
"lastModified": "2023-05-10T08:15:11.163",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23789",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T08:15:11.230",
"lastModified": "2023-05-10T08:15:11.230",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23794",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:12.997",
"lastModified": "2023-05-10T09:15:12.997",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23812",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T08:15:11.310",
"lastModified": "2023-05-10T08:15:11.310",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23873",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:13.217",
"lastModified": "2023-05-10T09:15:13.217",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23901",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:11.727",
"lastModified": "2023-05-10T06:15:11.727",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-23906",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:12.007",
"lastModified": "2023-05-10T06:15:12.007",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24392",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T08:15:11.390",
"lastModified": "2023-05-10T08:15:11.390",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24406",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:13.417",
"lastModified": "2023-05-10T09:15:13.417",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24418",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T08:15:11.470",
"lastModified": "2023-05-10T08:15:11.470",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-24586",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:12.310",
"lastModified": "2023-05-10T06:15:12.310",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25070",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:12.497",
"lastModified": "2023-05-10T06:15:12.497",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25072",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:13.030",
"lastModified": "2023-05-10T06:15:13.030",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25184",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:13.427",
"lastModified": "2023-05-10T06:15:13.427",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-26126",
"sourceIdentifier": "report@snyk.io",
"published": "2023-05-10T05:15:08.860",
"lastModified": "2023-05-10T05:15:08.860",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2614",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-10T06:15:15.007",
"lastModified": "2023-05-10T06:15:15.007",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2615",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-10T06:15:16.380",
"lastModified": "2023-05-10T06:15:16.380",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2616",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-05-10T05:15:11.877",
"lastModified": "2023-05-10T05:15:11.877",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2617",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-10T06:15:16.853",
"lastModified": "2023-05-10T06:15:16.853",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2618",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-10T06:15:17.577",
"lastModified": "2023-05-10T06:15:17.577",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2619",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-10T06:15:17.990",
"lastModified": "2023-05-10T06:15:17.990",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27385",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:13.680",
"lastModified": "2023-05-10T06:15:13.680",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27419",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:13.653",
"lastModified": "2023-05-10T09:15:13.653",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27455",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:13.923",
"lastModified": "2023-05-10T09:15:13.923",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27510",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:13.807",
"lastModified": "2023-05-10T06:15:13.807",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27527",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:13.953",
"lastModified": "2023-05-10T06:15:13.953",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27888",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:14.077",
"lastModified": "2023-05-10T06:15:14.077",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27889",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:14.280",
"lastModified": "2023-05-10T06:15:14.280",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27918",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:14.547",
"lastModified": "2023-05-10T06:15:14.547",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27919",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-10T06:15:14.753",
"lastModified": "2023-05-10T06:15:14.753",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28092",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-05-01T15:15:09.357",
"lastModified": "2023-05-01T20:07:26.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-10T13:51:15.777",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
},
{
"source": "security-alert@hpe.com",
"type": "Secondary",
@ -34,10 +54,81 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:integrated_lights-out_firmware:1.05:*:*:*:*:*:*:*",
"matchCriteriaId": "669BABDD-65EC-44AB-833C-AFF4224EB356"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hp:integrated_lights-out:6:*:*:*:*:*:*:*",
"matchCriteriaId": "F211ABF9-9617-43CF-9DC5-E46CB0518B7E"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:hp:proliant_rl300_firmware:1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0CCE84C1-7EF8-4460-8417-A1A769933E41"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:hp:proliant_rl300:gen_11:*:*:*:*:*:*:*",
"matchCriteriaId": "4E35165C-B5B8-47E2-829C-AE0187F3BBE2"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbhf04472en_us",
"source": "security-alert@hpe.com"
"source": "security-alert@hpe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28932",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T08:15:11.553",
"lastModified": "2023-05-10T08:15:11.553",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29101",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:14.147",
"lastModified": "2023-05-10T09:15:14.147",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30746",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T09:15:14.360",
"lastModified": "2023-05-10T09:15:14.360",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-30777",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-10T06:15:18.520",
"lastModified": "2023-05-10T06:15:18.520",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32568",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T05:15:11.990",
"lastModified": "2023-05-10T05:15:11.990",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32569",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T05:15:12.103",
"lastModified": "2023-05-10T05:15:12.103",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32570",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T05:15:12.190",
"lastModified": "2023-05-10T05:15:12.190",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32573",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-10T06:15:19.070",
"lastModified": "2023-05-10T06:15:19.070",
"vulnStatus": "Received",
"lastModified": "2023-05-10T13:06:16.563",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2023-05-10T12:00:23.821662+00:00
2023-05-10T14:00:24.359526+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2023-05-10T11:15:12.100000+00:00
2023-05-10T13:54:33.687000+00:00
```
### Last Data Feed Release
@ -29,32 +29,85 @@ Download and Changelog: [Click](releases/latest)
### Total Number of included CVEs
```plain
214722
214724
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `2`
* [CVE-2022-27856](CVE-2022/CVE-2022-278xx/CVE-2022-27856.json) (`2023-05-10T11:15:09.587`)
* [CVE-2022-33961](CVE-2022/CVE-2022-339xx/CVE-2022-33961.json) (`2023-05-10T10:15:09.490`)
* [CVE-2022-46817](CVE-2022/CVE-2022-468xx/CVE-2022-46817.json) (`2023-05-10T10:15:10.223`)
* [CVE-2022-46819](CVE-2022/CVE-2022-468xx/CVE-2022-46819.json) (`2023-05-10T10:15:10.437`)
* [CVE-2022-46861](CVE-2022/CVE-2022-468xx/CVE-2022-46861.json) (`2023-05-10T10:15:10.537`)
* [CVE-2022-47137](CVE-2022/CVE-2022-471xx/CVE-2022-47137.json) (`2023-05-10T11:15:09.967`)
* [CVE-2022-47423](CVE-2022/CVE-2022-474xx/CVE-2022-47423.json) (`2023-05-10T11:15:10.157`)
* [CVE-2022-47436](CVE-2022/CVE-2022-474xx/CVE-2022-47436.json) (`2023-05-10T11:15:10.307`)
* [CVE-2022-47441](CVE-2022/CVE-2022-474xx/CVE-2022-47441.json) (`2023-05-10T11:15:10.597`)
* [CVE-2022-47587](CVE-2022/CVE-2022-475xx/CVE-2022-47587.json) (`2023-05-10T11:15:11.027`)
* [CVE-2022-47590](CVE-2022/CVE-2022-475xx/CVE-2022-47590.json) (`2023-05-10T11:15:11.337`)
* [CVE-2022-47600](CVE-2022/CVE-2022-476xx/CVE-2022-47600.json) (`2023-05-10T11:15:11.667`)
* [CVE-2022-47606](CVE-2022/CVE-2022-476xx/CVE-2022-47606.json) (`2023-05-10T11:15:12.100`)
* [CVE-2022-45846](CVE-2022/CVE-2022-458xx/CVE-2022-45846.json) (`2023-05-10T12:15:09.943`)
* [CVE-2023-1732](CVE-2023/CVE-2023-17xx/CVE-2023-1732.json) (`2023-05-10T12:15:10.523`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `64`
* [CVE-2022-27856](CVE-2022/CVE-2022-278xx/CVE-2022-27856.json) (`2023-05-10T13:06:16.563`)
* [CVE-2022-32970](CVE-2022/CVE-2022-329xx/CVE-2022-32970.json) (`2023-05-10T13:06:16.563`)
* [CVE-2022-33961](CVE-2022/CVE-2022-339xx/CVE-2022-33961.json) (`2023-05-10T13:06:16.563`)
* [CVE-2022-4008](CVE-2022/CVE-2022-40xx/CVE-2022-4008.json) (`2023-05-10T13:06:16.563`)
* [CVE-2022-46817](CVE-2022/CVE-2022-468xx/CVE-2022-46817.json) (`2023-05-10T13:06:16.563`)
* [CVE-2022-46819](CVE-2022/CVE-2022-468xx/CVE-2022-46819.json) (`2023-05-10T13:06:16.563`)
* [CVE-2022-46861](CVE-2022/CVE-2022-468xx/CVE-2022-46861.json) (`2023-05-10T13:06:16.563`)
* [CVE-2022-47137](CVE-2022/CVE-2022-471xx/CVE-2022-47137.json) (`2023-05-10T13:06:16.563`)
* [CVE-2022-47423](CVE-2022/CVE-2022-474xx/CVE-2022-47423.json) (`2023-05-10T13:06:16.563`)
* [CVE-2022-47436](CVE-2022/CVE-2022-474xx/CVE-2022-47436.json) (`2023-05-10T13:06:16.563`)
* [CVE-2022-47441](CVE-2022/CVE-2022-474xx/CVE-2022-47441.json) (`2023-05-10T13:06:16.563`)
* [CVE-2022-47587](CVE-2022/CVE-2022-475xx/CVE-2022-47587.json) (`2023-05-10T13:06:16.563`)
* [CVE-2022-47590](CVE-2022/CVE-2022-475xx/CVE-2022-47590.json) (`2023-05-10T13:06:16.563`)
* [CVE-2022-47600](CVE-2022/CVE-2022-476xx/CVE-2022-47600.json) (`2023-05-10T13:06:16.563`)
* [CVE-2022-47606](CVE-2022/CVE-2022-476xx/CVE-2022-47606.json) (`2023-05-10T13:06:16.563`)
* [CVE-2022-47876](CVE-2022/CVE-2022-478xx/CVE-2022-47876.json) (`2023-05-10T13:54:33.687`)
* [CVE-2023-0683](CVE-2023/CVE-2023-06xx/CVE-2023-0683.json) (`2023-05-10T13:24:14.720`)
* [CVE-2023-22361](CVE-2023/CVE-2023-223xx/CVE-2023-22361.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-22441](CVE-2023/CVE-2023-224xx/CVE-2023-22441.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-22696](CVE-2023/CVE-2023-226xx/CVE-2023-22696.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-22711](CVE-2023/CVE-2023-227xx/CVE-2023-22711.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-23578](CVE-2023/CVE-2023-235xx/CVE-2023-23578.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-23701](CVE-2023/CVE-2023-237xx/CVE-2023-23701.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-23786](CVE-2023/CVE-2023-237xx/CVE-2023-23786.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-23788](CVE-2023/CVE-2023-237xx/CVE-2023-23788.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-23789](CVE-2023/CVE-2023-237xx/CVE-2023-23789.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-23794](CVE-2023/CVE-2023-237xx/CVE-2023-23794.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-23812](CVE-2023/CVE-2023-238xx/CVE-2023-23812.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-23873](CVE-2023/CVE-2023-238xx/CVE-2023-23873.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-23901](CVE-2023/CVE-2023-239xx/CVE-2023-23901.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-23906](CVE-2023/CVE-2023-239xx/CVE-2023-23906.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-24392](CVE-2023/CVE-2023-243xx/CVE-2023-24392.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-24406](CVE-2023/CVE-2023-244xx/CVE-2023-24406.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-24418](CVE-2023/CVE-2023-244xx/CVE-2023-24418.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-24586](CVE-2023/CVE-2023-245xx/CVE-2023-24586.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-25070](CVE-2023/CVE-2023-250xx/CVE-2023-25070.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-25072](CVE-2023/CVE-2023-250xx/CVE-2023-25072.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-25184](CVE-2023/CVE-2023-251xx/CVE-2023-25184.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-25492](CVE-2023/CVE-2023-254xx/CVE-2023-25492.json) (`2023-05-10T13:37:50.410`)
* [CVE-2023-26126](CVE-2023/CVE-2023-261xx/CVE-2023-26126.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-2614](CVE-2023/CVE-2023-26xx/CVE-2023-2614.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-2615](CVE-2023/CVE-2023-26xx/CVE-2023-2615.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-2616](CVE-2023/CVE-2023-26xx/CVE-2023-2616.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-2617](CVE-2023/CVE-2023-26xx/CVE-2023-2617.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-2618](CVE-2023/CVE-2023-26xx/CVE-2023-2618.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-2619](CVE-2023/CVE-2023-26xx/CVE-2023-2619.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-27385](CVE-2023/CVE-2023-273xx/CVE-2023-27385.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-27419](CVE-2023/CVE-2023-274xx/CVE-2023-27419.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-27455](CVE-2023/CVE-2023-274xx/CVE-2023-27455.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-27510](CVE-2023/CVE-2023-275xx/CVE-2023-27510.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-27527](CVE-2023/CVE-2023-275xx/CVE-2023-27527.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-27888](CVE-2023/CVE-2023-278xx/CVE-2023-27888.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-27889](CVE-2023/CVE-2023-278xx/CVE-2023-27889.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-27918](CVE-2023/CVE-2023-279xx/CVE-2023-27918.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-27919](CVE-2023/CVE-2023-279xx/CVE-2023-27919.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-28092](CVE-2023/CVE-2023-280xx/CVE-2023-28092.json) (`2023-05-10T13:51:15.777`)
* [CVE-2023-28932](CVE-2023/CVE-2023-289xx/CVE-2023-28932.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-29101](CVE-2023/CVE-2023-291xx/CVE-2023-29101.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-30746](CVE-2023/CVE-2023-307xx/CVE-2023-30746.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-30777](CVE-2023/CVE-2023-307xx/CVE-2023-30777.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-32568](CVE-2023/CVE-2023-325xx/CVE-2023-32568.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-32569](CVE-2023/CVE-2023-325xx/CVE-2023-32569.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-32570](CVE-2023/CVE-2023-325xx/CVE-2023-32570.json) (`2023-05-10T13:06:16.563`)
* [CVE-2023-32573](CVE-2023/CVE-2023-325xx/CVE-2023-32573.json) (`2023-05-10T13:06:16.563`)
## Download and Usage