mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2023-04-28T18:00:24.105902+00:00
This commit is contained in:
parent
f6f51c1ec8
commit
96b4c4be14
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-7580",
|
||||
"sourceIdentifier": "productcert@siemens.com",
|
||||
"published": "2020-06-10T17:15:12.347",
|
||||
"lastModified": "2022-12-13T17:15:13.803",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-04-28T17:06:39.047",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -87,7 +87,6 @@
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
@ -129,6 +128,12 @@
|
||||
"criteria": "cpe:2.3:a:siemens:simatic_prosave:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB7752CF-D754-4A78-999B-45FE379E03DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:simatic_s7-1500_software_controller:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "21.8",
|
||||
"matchCriteriaId": "658E1A3F-29D6-48D2-BCCE-0BCC41AC49F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:siemens:simatic_step_7:*:*:*:*:*:*:*:*",
|
||||
@ -318,33 +323,6 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:siemens:simatic_s7-150_firmware:*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8DEB4A1E-F86C-44E8-A66F-8D08530FD02B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:siemens:simatic_s7-150:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2A627998-5949-4583-8E08-4A2146B1AF95"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
20
CVE-2022/CVE-2022-316xx/CVE-2022-31643.json
Normal file
20
CVE-2022/CVE-2022-316xx/CVE-2022-31643.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2022-31643",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-04-28T16:15:09.640",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A potential security vulnerability has been identified in the system BIOS for certain HP PC products which may allow loss of integrity. HP is releasing firmware updates to mitigate the potential vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hp.com/us-en/document/ish_7013183-7013209-16/hpsbhf03812",
|
||||
"source": "hp-security-alert@hp.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-0834",
|
||||
"sourceIdentifier": "security@hypr.com",
|
||||
"published": "2023-04-28T15:15:10.573",
|
||||
"lastModified": "2023-04-28T15:15:10.573",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-1477",
|
||||
"sourceIdentifier": "security@hypr.com",
|
||||
"published": "2023-04-28T15:15:10.633",
|
||||
"lastModified": "2023-04-28T15:15:10.633",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
20
CVE-2023/CVE-2023-15xx/CVE-2023-1526.json
Normal file
20
CVE-2023/CVE-2023-15xx/CVE-2023-1526.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-1526",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-04-28T17:15:42.973",
|
||||
"lastModified": "2023-04-28T17:43:00.630",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain DesignJet and PageWide XL TAA compliant models may have risk of potential information disclosure if the hard disk drive is physically removed from the printer."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hp.com/us-en/document/ish_7869666-7869691-16/hpsbpi03837",
|
||||
"source": "hp-security-alert@hp.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2370",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-28T14:15:10.807",
|
||||
"lastModified": "2023-04-28T14:15:10.807",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:28.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2371",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-28T14:15:10.863",
|
||||
"lastModified": "2023-04-28T14:15:10.863",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2372",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-28T14:15:10.917",
|
||||
"lastModified": "2023-04-28T14:15:10.917",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2373",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-28T14:15:10.977",
|
||||
"lastModified": "2023-04-28T14:15:10.977",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2374",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-28T15:15:10.847",
|
||||
"lastModified": "2023-04-28T15:15:10.847",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-2375",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-28T15:15:10.903",
|
||||
"lastModified": "2023-04-28T15:15:10.903",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
88
CVE-2023/CVE-2023-23xx/CVE-2023-2376.json
Normal file
88
CVE-2023/CVE-2023-23xx/CVE-2023-2376.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-2376",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-28T16:15:09.933",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. It has been classified as critical. Affected is an unknown function of the component Web Management Interface. The manipulation of the argument dpi leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227652."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/leetsun/IoT/tree/main/EdgeRouterX/CI/8",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227652",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227652",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-23xx/CVE-2023-2377.json
Normal file
88
CVE-2023/CVE-2023-23xx/CVE-2023-2377.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-2377",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-28T16:15:10.003",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the component Web Management Interface. The manipulation of the argument name leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227653 was assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/leetsun/IoT/tree/main/EdgeRouterX/CI/9",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227653",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227653",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-23xx/CVE-2023-2378.json
Normal file
88
CVE-2023/CVE-2023-23xx/CVE-2023-2378.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-2378",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-28T16:15:10.063",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. It has been rated as critical. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation of the argument suffix-rate-up leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227654 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL",
|
||||
"baseScore": 6.5
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/leetsun/IoT/tree/main/EdgeRouterX/CI/4",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227654",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227654",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-23xx/CVE-2023-2379.json
Normal file
88
CVE-2023/CVE-2023-23xx/CVE-2023-2379.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-2379",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-28T17:15:43.067",
|
||||
"lastModified": "2023-04-28T17:43:00.630",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in Ubiquiti EdgeRouter X up to 2.0.9-hotfix.6. This affects an unknown part of the component Web Service. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227655."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 7.8
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-404"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/leetsun/IoT/tree/main/EdgeRouterX/DoS",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227655",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227655",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-23xx/CVE-2023-2380.json
Normal file
88
CVE-2023/CVE-2023-23xx/CVE-2023-2380.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-2380",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-28T17:15:43.130",
|
||||
"lastModified": "2023-04-28T17:43:00.630",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in Netgear SRX5308 up to 4.3.5-3. Affected is an unknown function. The manipulation leads to denial of service. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-227658 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "COMPLETE",
|
||||
"baseScore": 6.8
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-404"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/17",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227658",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227658",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-23xx/CVE-2023-2381.json
Normal file
88
CVE-2023/CVE-2023-23xx/CVE-2023-2381.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-2381",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-28T17:15:43.187",
|
||||
"lastModified": "2023-04-28T17:43:00.630",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file scgi-bin/platform.cgi?page=bandwidth_profile.htm of the component Web Management Interface. The manipulation of the argument BandWidthProfile.ProfileName leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-227659. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/6",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227659",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227659",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
88
CVE-2023/CVE-2023-23xx/CVE-2023-2382.json
Normal file
88
CVE-2023/CVE-2023-23xx/CVE-2023-2382.json
Normal file
@ -0,0 +1,88 @@
|
||||
{
|
||||
"id": "CVE-2023-2382",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-04-28T17:15:43.240",
|
||||
"lastModified": "2023-04-28T17:43:00.630",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. Affected by this issue is some unknown functionality of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument sysLogInfo.serverName leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227660. NOTE: The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 3.3
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/leetsun/IoT/tree/main/Netgear-SRX5308/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.227660",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.227660",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26876",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-21T15:15:07.160",
|
||||
"lastModified": "2023-04-28T11:15:08.770",
|
||||
"lastModified": "2023-04-28T16:15:09.780",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -65,6 +65,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/172059/Piwigo-13.5.0-SQL-Injection.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2023/Apr/13",
|
||||
"source": "cve@mitre.org"
|
||||
|
20
CVE-2023/CVE-2023-279xx/CVE-2023-27971.json
Normal file
20
CVE-2023/CVE-2023-279xx/CVE-2023-27971.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-27971",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-04-28T16:15:09.840",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow and/or Elevation of Privilege."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hp.com/us-en/document/ish_7919962-7920003-16/hpsbpi03839",
|
||||
"source": "hp-security-alert@hp.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-279xx/CVE-2023-27972.json
Normal file
20
CVE-2023/CVE-2023-279xx/CVE-2023-27972.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-27972",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-04-28T16:15:09.890",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow and/or Remote Code Execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hp.com/us-en/document/ish_7920078-7920104-16/hpsbpi03840",
|
||||
"source": "hp-security-alert@hp.com"
|
||||
}
|
||||
]
|
||||
}
|
20
CVE-2023/CVE-2023-279xx/CVE-2023-27973.json
Normal file
20
CVE-2023/CVE-2023-279xx/CVE-2023-27973.json
Normal file
@ -0,0 +1,20 @@
|
||||
{
|
||||
"id": "CVE-2023-27973",
|
||||
"sourceIdentifier": "hp-security-alert@hp.com",
|
||||
"published": "2023-04-28T17:15:43.023",
|
||||
"lastModified": "2023-04-28T17:43:00.630",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Certain HP LaserJet Pro print products are potentially vulnerable to Heap Overflow and/or Remote Code Execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hp.com/us-en/document/ish_7920137-7920161-16/hpsbpi03841",
|
||||
"source": "hp-security-alert@hp.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28471",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T14:15:10.307",
|
||||
"lastModified": "2023-04-28T14:15:10.307",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:28.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28472",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T14:15:10.407",
|
||||
"lastModified": "2023-04-28T14:15:10.407",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:28.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28473",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T14:15:10.447",
|
||||
"lastModified": "2023-04-28T14:15:10.447",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:28.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28474",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T14:15:10.487",
|
||||
"lastModified": "2023-04-28T14:15:10.487",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:28.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28475",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T14:15:10.523",
|
||||
"lastModified": "2023-04-28T14:15:10.523",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:28.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28476",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T14:15:10.557",
|
||||
"lastModified": "2023-04-28T14:15:10.557",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:28.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28477",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T14:15:10.597",
|
||||
"lastModified": "2023-04-28T14:15:10.597",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:28.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28819",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T14:15:10.657",
|
||||
"lastModified": "2023-04-28T14:15:10.657",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:28.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28820",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T14:15:10.703",
|
||||
"lastModified": "2023-04-28T14:15:10.703",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:28.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-28821",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T14:15:10.753",
|
||||
"lastModified": "2023-04-28T14:15:10.753",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:28.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29515",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-19T00:15:08.347",
|
||||
"lastModified": "2023-04-19T12:39:47.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-28T17:23:18.680",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -46,18 +66,64 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.10.11",
|
||||
"matchCriteriaId": "A3CD7FFB-D491-4B7D-839D-D567B0C00E59"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4.8",
|
||||
"matchCriteriaId": "AD2B185D-F8A6-49EB-B485-744F234B8730"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.5",
|
||||
"versionEndExcluding": "14.10.1",
|
||||
"matchCriteriaId": "A0694EEC-0251-47D7-A062-7C257C408225"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/commit/e73b890623efa604adc484ad82f37e31596fe1a6",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-44h9-xxvx-pg6x",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-20190",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29516",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-19T00:15:08.423",
|
||||
"lastModified": "2023-04-19T12:39:47.563",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-28T17:26:30.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -46,18 +66,64 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.10.11",
|
||||
"matchCriteriaId": "A3CD7FFB-D491-4B7D-839D-D567B0C00E59"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4.8",
|
||||
"matchCriteriaId": "AD2B185D-F8A6-49EB-B485-744F234B8730"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.5",
|
||||
"versionEndExcluding": "14.10.1",
|
||||
"matchCriteriaId": "A0694EEC-0251-47D7-A062-7C257C408225"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/commit/aca1d677c58563bbe6e35c9e1c29fd8b12ebb996",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3989-4c6x-725f",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-20275",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29517",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-19T00:15:08.500",
|
||||
"lastModified": "2023-04-19T12:39:38.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-28T17:28:34.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -46,22 +66,78 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.10.11",
|
||||
"matchCriteriaId": "A3CD7FFB-D491-4B7D-839D-D567B0C00E59"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4.8",
|
||||
"matchCriteriaId": "AD2B185D-F8A6-49EB-B485-744F234B8730"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.5",
|
||||
"versionEndExcluding": "14.10.1",
|
||||
"matchCriteriaId": "A0694EEC-0251-47D7-A062-7C257C408225"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-m3c3-9qj7-7xmx",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-20324",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-20447",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-20449",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29518",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-19T00:15:08.570",
|
||||
"lastModified": "2023-04-19T12:39:38.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-28T17:40:38.730",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -46,18 +66,64 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.10.11",
|
||||
"matchCriteriaId": "A3CD7FFB-D491-4B7D-839D-D567B0C00E59"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4.8",
|
||||
"matchCriteriaId": "AD2B185D-F8A6-49EB-B485-744F234B8730"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.5",
|
||||
"versionEndExcluding": "14.10.1",
|
||||
"matchCriteriaId": "A0694EEC-0251-47D7-A062-7C257C408225"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/commit/3d055a0a5ec42fdebce4d71ee98f94553fdbfebf",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-px54-3w5j-qjg9",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-20283",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29519",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-19T00:15:08.647",
|
||||
"lastModified": "2023-04-19T12:39:38.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-28T17:47:31.907",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
@ -46,18 +66,64 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.10.11",
|
||||
"matchCriteriaId": "A3CD7FFB-D491-4B7D-839D-D567B0C00E59"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.4.8",
|
||||
"matchCriteriaId": "AD2B185D-F8A6-49EB-B485-744F234B8730"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.5",
|
||||
"versionEndExcluding": "14.10.2",
|
||||
"matchCriteriaId": "E472CD99-824B-4235-B9AB-2740FB40F601"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/commit/5e8725b4272cd3e5be09d3ca84273be2da6869c1",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-3hjg-cghv-22ww",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.xwiki.org/browse/XWIKI-20364",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,23 +2,82 @@
|
||||
"id": "CVE-2023-29586",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-19T15:15:06.857",
|
||||
"lastModified": "2023-04-19T16:04:03.120",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-04-28T17:45:46.740",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Code Sector TeraCopy 3.9.7 does not perform proper access validation on the source folder during a copy operation. This leads to Arbitrary File Read by allowing any user to copy any directory in the system to a directory they control."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:codesector:teracopy:3.9.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0C91FC0C-0327-4322-BDE4-DC25EBE39FCE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cwe.mitre.org/data/definitions/285.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Technical Description"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://securityandstuff.com/posts/teracopy_arbitrary_read/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-29815",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T15:15:10.737",
|
||||
"lastModified": "2023-04-28T15:15:10.737",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30123",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T14:15:11.047",
|
||||
"lastModified": "2023-04-28T14:15:11.047",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30125",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T14:15:11.083",
|
||||
"lastModified": "2023-04-28T14:15:11.083",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-30183",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-28T14:15:11.117",
|
||||
"lastModified": "2023-04-28T14:15:11.117",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
59
CVE-2023/CVE-2023-308xx/CVE-2023-30853.json
Normal file
59
CVE-2023/CVE-2023-308xx/CVE-2023-30853.json
Normal file
@ -0,0 +1,59 @@
|
||||
{
|
||||
"id": "CVE-2023-30853",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-28T16:15:10.127",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Gradle Build Action allows users to execute a Gradle Build in their GitHub Actions workflow. A vulnerability impacts GitHub workflows using the Gradle Build Action prior to version 2.4.2 that have executed the Gradle Build Tool with the configuration cache enabled, potentially exposing secrets configured for the repository.\n\nSecrets configured for GitHub Actions are normally passed to the Gradle Build Tool via environment variables. Due to the way that the Gradle Build Tool records these environment variables, they may be persisted into an entry in the GitHub Actions cache. This data stored in the GitHub Actions cache can be read by a GitHub Actions workflow running in an untrusted context, such as that running for a Pull Request submitted by a developer via a repository fork.\n\nThis vulnerability was discovered internally through code review, and we have not seen any evidence of it being exploited in the wild. However, in addition to upgrading the Gradle Build Action, affected users should delete any potentially vulnerable cache entries and may choose to rotate any potentially affected secrets.\n\nGradle Build Action v2.4.2 and newer no longer saves this sensitive data for later use, preventing ongoing leakage of secrets via the GitHub Actions Cache.\n\nWhile upgrading to the latest version of the Gradle Build Action will prevent leakage of secrets going forward, additional actions may be required due to current or previous GitHub Actions Cache entries containing this information.\n\nCurrent cache entries will remain vulnerable until they are forcibly deleted or they expire naturally after 7 days of not being used. Potentially vulnerable entries can be easily identified in the GitHub UI by searching for a cache entry with key matching `configuration-cache-*`. The maintainers recommend that users of the Gradle Build Action inspect their list of cache entries and manually delete any that match this pattern.\n\nWhile maintainers have not seen any evidence of this vulnerability being exploited, they recommend cycling any repository secrets if you cannot be certain that these have not been compromised. Compromise could occur if a user runs a GitHub Actions workflow for a pull request attempting to exploit this data. \nWarning signs to look for in a pull request include:\n- Making changes to GitHub Actions workflow files in a way that may attempt to read/extract data from the Gradle User Home or `<project-root>/.gradle` directories.\n- Making changes to Gradle build files or other executable files that may be invoked by a GitHub Actions workflow, in a way that may attempt to read/extract information from these locations.\n\nSome workarounds to limit the impact of this vulnerability are available:\n- If the Gradle project does not opt-in to using the configuration cache, then it is not vulnerable. \n- If the Gradle project does opt-in to using the configuration-cache by default, then the `--no-configuration-cache` command-line argument can be used to disable this feature in a GitHub Actions workflow.\n\nIn any case, we recommend that users carefully inspect any pull request before approving the execution of GitHub Actions workflows. It may be prudent to require approval for all PRs from external contributors."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gradle/gradle-build-action/releases/tag/v2.4.2",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gradle/gradle-build-action/security/advisories/GHSA-h3qr-39j9-4r5v",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
55
CVE-2023/CVE-2023-308xx/CVE-2023-30854.json
Normal file
55
CVE-2023/CVE-2023-308xx/CVE-2023-30854.json
Normal file
@ -0,0 +1,55 @@
|
||||
{
|
||||
"id": "CVE-2023-30854",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-28T16:15:10.200",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "AVideo is an open source video platform. Prior to version 12.4, an OS Command Injection vulnerability in an authenticated endpoint `/plugin/CloneSite/cloneClient.json.php` allows attackers to achieve Remote Code Execution. This issue is fixed in version 12.4."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/WWBN/AVideo/security/advisories/GHSA-6vrj-ph27-qfp3",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
67
CVE-2023/CVE-2023-308xx/CVE-2023-30856.json
Normal file
67
CVE-2023/CVE-2023-308xx/CVE-2023-30856.json
Normal file
@ -0,0 +1,67 @@
|
||||
{
|
||||
"id": "CVE-2023-30856",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2023-04-28T16:15:10.260",
|
||||
"lastModified": "2023-04-28T17:06:22.820",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "eDEX-UI is a science fiction terminal emulator. Versions 2.2.8 and prior are vulnerable to cross-site websocket hijacking. When running eDEX-UI and browsing the web, a malicious website can connect to eDEX's internal terminal control websocket, and send arbitrary commands to the shell. The project has been archived since 2021, and as of time of publication there are no plans to patch this issue and release a new version. Some workarounds are available, including shutting down eDEX-UI when browsing the web and ensuring the eDEX terminal runs with lowest possible privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW",
|
||||
"baseScore": 8.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1385"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-346"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://christian-schneider.net/CrossSiteWebSocketHijacking.html",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/GitSquared/edex-ui/blob/04a00c4079908788b371c6ecdefff96d0d9950f8/src/classes/terminal.class.js#L458",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/GitSquared/edex-ui/security/advisories/GHSA-q8xc-f2wf-ffh9",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
103
README.md
103
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2023-04-28T16:00:26.234533+00:00
|
||||
2023-04-28T18:00:24.105902+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2023-04-28T15:56:21.157000+00:00
|
||||
2023-04-28T17:47:31.907000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -29,67 +29,64 @@ Download and Changelog: [Click](releases/latest)
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
213755
|
||||
213770
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `22`
|
||||
Recently added CVEs: `15`
|
||||
|
||||
* [CVE-2023-0834](CVE-2023/CVE-2023-08xx/CVE-2023-0834.json) (`2023-04-28T15:15:10.573`)
|
||||
* [CVE-2023-1477](CVE-2023/CVE-2023-14xx/CVE-2023-1477.json) (`2023-04-28T15:15:10.633`)
|
||||
* [CVE-2023-2370](CVE-2023/CVE-2023-23xx/CVE-2023-2370.json) (`2023-04-28T14:15:10.807`)
|
||||
* [CVE-2023-2371](CVE-2023/CVE-2023-23xx/CVE-2023-2371.json) (`2023-04-28T14:15:10.863`)
|
||||
* [CVE-2023-2372](CVE-2023/CVE-2023-23xx/CVE-2023-2372.json) (`2023-04-28T14:15:10.917`)
|
||||
* [CVE-2023-2373](CVE-2023/CVE-2023-23xx/CVE-2023-2373.json) (`2023-04-28T14:15:10.977`)
|
||||
* [CVE-2023-2374](CVE-2023/CVE-2023-23xx/CVE-2023-2374.json) (`2023-04-28T15:15:10.847`)
|
||||
* [CVE-2023-2375](CVE-2023/CVE-2023-23xx/CVE-2023-2375.json) (`2023-04-28T15:15:10.903`)
|
||||
* [CVE-2023-28471](CVE-2023/CVE-2023-284xx/CVE-2023-28471.json) (`2023-04-28T14:15:10.307`)
|
||||
* [CVE-2023-28472](CVE-2023/CVE-2023-284xx/CVE-2023-28472.json) (`2023-04-28T14:15:10.407`)
|
||||
* [CVE-2023-28473](CVE-2023/CVE-2023-284xx/CVE-2023-28473.json) (`2023-04-28T14:15:10.447`)
|
||||
* [CVE-2023-28474](CVE-2023/CVE-2023-284xx/CVE-2023-28474.json) (`2023-04-28T14:15:10.487`)
|
||||
* [CVE-2023-28475](CVE-2023/CVE-2023-284xx/CVE-2023-28475.json) (`2023-04-28T14:15:10.523`)
|
||||
* [CVE-2023-28476](CVE-2023/CVE-2023-284xx/CVE-2023-28476.json) (`2023-04-28T14:15:10.557`)
|
||||
* [CVE-2023-28477](CVE-2023/CVE-2023-284xx/CVE-2023-28477.json) (`2023-04-28T14:15:10.597`)
|
||||
* [CVE-2023-28819](CVE-2023/CVE-2023-288xx/CVE-2023-28819.json) (`2023-04-28T14:15:10.657`)
|
||||
* [CVE-2023-28820](CVE-2023/CVE-2023-288xx/CVE-2023-28820.json) (`2023-04-28T14:15:10.703`)
|
||||
* [CVE-2023-28821](CVE-2023/CVE-2023-288xx/CVE-2023-28821.json) (`2023-04-28T14:15:10.753`)
|
||||
* [CVE-2023-29815](CVE-2023/CVE-2023-298xx/CVE-2023-29815.json) (`2023-04-28T15:15:10.737`)
|
||||
* [CVE-2023-30123](CVE-2023/CVE-2023-301xx/CVE-2023-30123.json) (`2023-04-28T14:15:11.047`)
|
||||
* [CVE-2023-30125](CVE-2023/CVE-2023-301xx/CVE-2023-30125.json) (`2023-04-28T14:15:11.083`)
|
||||
* [CVE-2023-30183](CVE-2023/CVE-2023-301xx/CVE-2023-30183.json) (`2023-04-28T14:15:11.117`)
|
||||
* [CVE-2022-31643](CVE-2022/CVE-2022-316xx/CVE-2022-31643.json) (`2023-04-28T16:15:09.640`)
|
||||
* [CVE-2023-1526](CVE-2023/CVE-2023-15xx/CVE-2023-1526.json) (`2023-04-28T17:15:42.973`)
|
||||
* [CVE-2023-2376](CVE-2023/CVE-2023-23xx/CVE-2023-2376.json) (`2023-04-28T16:15:09.933`)
|
||||
* [CVE-2023-2377](CVE-2023/CVE-2023-23xx/CVE-2023-2377.json) (`2023-04-28T16:15:10.003`)
|
||||
* [CVE-2023-2378](CVE-2023/CVE-2023-23xx/CVE-2023-2378.json) (`2023-04-28T16:15:10.063`)
|
||||
* [CVE-2023-2379](CVE-2023/CVE-2023-23xx/CVE-2023-2379.json) (`2023-04-28T17:15:43.067`)
|
||||
* [CVE-2023-2380](CVE-2023/CVE-2023-23xx/CVE-2023-2380.json) (`2023-04-28T17:15:43.130`)
|
||||
* [CVE-2023-2381](CVE-2023/CVE-2023-23xx/CVE-2023-2381.json) (`2023-04-28T17:15:43.187`)
|
||||
* [CVE-2023-2382](CVE-2023/CVE-2023-23xx/CVE-2023-2382.json) (`2023-04-28T17:15:43.240`)
|
||||
* [CVE-2023-27971](CVE-2023/CVE-2023-279xx/CVE-2023-27971.json) (`2023-04-28T16:15:09.840`)
|
||||
* [CVE-2023-27972](CVE-2023/CVE-2023-279xx/CVE-2023-27972.json) (`2023-04-28T16:15:09.890`)
|
||||
* [CVE-2023-27973](CVE-2023/CVE-2023-279xx/CVE-2023-27973.json) (`2023-04-28T17:15:43.023`)
|
||||
* [CVE-2023-30853](CVE-2023/CVE-2023-308xx/CVE-2023-30853.json) (`2023-04-28T16:15:10.127`)
|
||||
* [CVE-2023-30854](CVE-2023/CVE-2023-308xx/CVE-2023-30854.json) (`2023-04-28T16:15:10.200`)
|
||||
* [CVE-2023-30856](CVE-2023/CVE-2023-308xx/CVE-2023-30856.json) (`2023-04-28T16:15:10.260`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `26`
|
||||
Recently modified CVEs: `30`
|
||||
|
||||
* [CVE-2022-38583](CVE-2022/CVE-2022-385xx/CVE-2022-38583.json) (`2023-04-28T14:11:00.307`)
|
||||
* [CVE-2022-41397](CVE-2022/CVE-2022-413xx/CVE-2022-41397.json) (`2023-04-28T14:11:00.307`)
|
||||
* [CVE-2022-41398](CVE-2022/CVE-2022-413xx/CVE-2022-41398.json) (`2023-04-28T14:11:00.307`)
|
||||
* [CVE-2022-41399](CVE-2022/CVE-2022-413xx/CVE-2022-41399.json) (`2023-04-28T14:11:00.307`)
|
||||
* [CVE-2022-41400](CVE-2022/CVE-2022-414xx/CVE-2022-41400.json) (`2023-04-28T14:11:00.307`)
|
||||
* [CVE-2022-47522](CVE-2022/CVE-2022-475xx/CVE-2022-47522.json) (`2023-04-28T14:27:12.360`)
|
||||
* [CVE-2023-2017](CVE-2023/CVE-2023-20xx/CVE-2023-2017.json) (`2023-04-28T14:27:32.923`)
|
||||
* [CVE-2023-2251](CVE-2023/CVE-2023-22xx/CVE-2023-2251.json) (`2023-04-28T15:15:10.790`)
|
||||
* [CVE-2023-2367](CVE-2023/CVE-2023-23xx/CVE-2023-2367.json) (`2023-04-28T14:11:00.307`)
|
||||
* [CVE-2023-2368](CVE-2023/CVE-2023-23xx/CVE-2023-2368.json) (`2023-04-28T14:11:00.307`)
|
||||
* [CVE-2023-2369](CVE-2023/CVE-2023-23xx/CVE-2023-2369.json) (`2023-04-28T14:11:00.307`)
|
||||
* [CVE-2023-24831](CVE-2023/CVE-2023-248xx/CVE-2023-24831.json) (`2023-04-28T15:56:21.157`)
|
||||
* [CVE-2023-24911](CVE-2023/CVE-2023-249xx/CVE-2023-24911.json) (`2023-04-28T15:03:11.910`)
|
||||
* [CVE-2023-24922](CVE-2023/CVE-2023-249xx/CVE-2023-24922.json) (`2023-04-28T15:02:47.330`)
|
||||
* [CVE-2023-27043](CVE-2023/CVE-2023-270xx/CVE-2023-27043.json) (`2023-04-28T15:15:10.683`)
|
||||
* [CVE-2023-28141](CVE-2023/CVE-2023-281xx/CVE-2023-28141.json) (`2023-04-28T14:04:12.760`)
|
||||
* [CVE-2023-28959](CVE-2023/CVE-2023-289xx/CVE-2023-28959.json) (`2023-04-28T14:28:28.117`)
|
||||
* [CVE-2023-28960](CVE-2023/CVE-2023-289xx/CVE-2023-28960.json) (`2023-04-28T14:28:54.407`)
|
||||
* [CVE-2023-28961](CVE-2023/CVE-2023-289xx/CVE-2023-28961.json) (`2023-04-28T14:31:23.330`)
|
||||
* [CVE-2023-28962](CVE-2023/CVE-2023-289xx/CVE-2023-28962.json) (`2023-04-28T14:32:26.480`)
|
||||
* [CVE-2023-28972](CVE-2023/CVE-2023-289xx/CVE-2023-28972.json) (`2023-04-28T14:23:37.820`)
|
||||
* [CVE-2023-28973](CVE-2023/CVE-2023-289xx/CVE-2023-28973.json) (`2023-04-28T14:24:26.443`)
|
||||
* [CVE-2023-28974](CVE-2023/CVE-2023-289xx/CVE-2023-28974.json) (`2023-04-28T14:25:05.283`)
|
||||
* [CVE-2023-28975](CVE-2023/CVE-2023-289xx/CVE-2023-28975.json) (`2023-04-28T14:02:05.840`)
|
||||
* [CVE-2023-30024](CVE-2023/CVE-2023-300xx/CVE-2023-30024.json) (`2023-04-28T14:11:00.307`)
|
||||
* [CVE-2023-30769](CVE-2023/CVE-2023-307xx/CVE-2023-30769.json) (`2023-04-28T14:28:03.417`)
|
||||
* [CVE-2020-7580](CVE-2020/CVE-2020-75xx/CVE-2020-7580.json) (`2023-04-28T17:06:39.047`)
|
||||
* [CVE-2023-0834](CVE-2023/CVE-2023-08xx/CVE-2023-0834.json) (`2023-04-28T17:06:22.820`)
|
||||
* [CVE-2023-1477](CVE-2023/CVE-2023-14xx/CVE-2023-1477.json) (`2023-04-28T17:06:22.820`)
|
||||
* [CVE-2023-2370](CVE-2023/CVE-2023-23xx/CVE-2023-2370.json) (`2023-04-28T17:06:28.060`)
|
||||
* [CVE-2023-2371](CVE-2023/CVE-2023-23xx/CVE-2023-2371.json) (`2023-04-28T17:06:22.820`)
|
||||
* [CVE-2023-2372](CVE-2023/CVE-2023-23xx/CVE-2023-2372.json) (`2023-04-28T17:06:22.820`)
|
||||
* [CVE-2023-2373](CVE-2023/CVE-2023-23xx/CVE-2023-2373.json) (`2023-04-28T17:06:22.820`)
|
||||
* [CVE-2023-2374](CVE-2023/CVE-2023-23xx/CVE-2023-2374.json) (`2023-04-28T17:06:22.820`)
|
||||
* [CVE-2023-2375](CVE-2023/CVE-2023-23xx/CVE-2023-2375.json) (`2023-04-28T17:06:22.820`)
|
||||
* [CVE-2023-26876](CVE-2023/CVE-2023-268xx/CVE-2023-26876.json) (`2023-04-28T16:15:09.780`)
|
||||
* [CVE-2023-28471](CVE-2023/CVE-2023-284xx/CVE-2023-28471.json) (`2023-04-28T17:06:28.060`)
|
||||
* [CVE-2023-28472](CVE-2023/CVE-2023-284xx/CVE-2023-28472.json) (`2023-04-28T17:06:28.060`)
|
||||
* [CVE-2023-28473](CVE-2023/CVE-2023-284xx/CVE-2023-28473.json) (`2023-04-28T17:06:28.060`)
|
||||
* [CVE-2023-28474](CVE-2023/CVE-2023-284xx/CVE-2023-28474.json) (`2023-04-28T17:06:28.060`)
|
||||
* [CVE-2023-28475](CVE-2023/CVE-2023-284xx/CVE-2023-28475.json) (`2023-04-28T17:06:28.060`)
|
||||
* [CVE-2023-28476](CVE-2023/CVE-2023-284xx/CVE-2023-28476.json) (`2023-04-28T17:06:28.060`)
|
||||
* [CVE-2023-28477](CVE-2023/CVE-2023-284xx/CVE-2023-28477.json) (`2023-04-28T17:06:28.060`)
|
||||
* [CVE-2023-28819](CVE-2023/CVE-2023-288xx/CVE-2023-28819.json) (`2023-04-28T17:06:28.060`)
|
||||
* [CVE-2023-28820](CVE-2023/CVE-2023-288xx/CVE-2023-28820.json) (`2023-04-28T17:06:28.060`)
|
||||
* [CVE-2023-28821](CVE-2023/CVE-2023-288xx/CVE-2023-28821.json) (`2023-04-28T17:06:28.060`)
|
||||
* [CVE-2023-29515](CVE-2023/CVE-2023-295xx/CVE-2023-29515.json) (`2023-04-28T17:23:18.680`)
|
||||
* [CVE-2023-29516](CVE-2023/CVE-2023-295xx/CVE-2023-29516.json) (`2023-04-28T17:26:30.910`)
|
||||
* [CVE-2023-29517](CVE-2023/CVE-2023-295xx/CVE-2023-29517.json) (`2023-04-28T17:28:34.287`)
|
||||
* [CVE-2023-29518](CVE-2023/CVE-2023-295xx/CVE-2023-29518.json) (`2023-04-28T17:40:38.730`)
|
||||
* [CVE-2023-29519](CVE-2023/CVE-2023-295xx/CVE-2023-29519.json) (`2023-04-28T17:47:31.907`)
|
||||
* [CVE-2023-29586](CVE-2023/CVE-2023-295xx/CVE-2023-29586.json) (`2023-04-28T17:45:46.740`)
|
||||
* [CVE-2023-29815](CVE-2023/CVE-2023-298xx/CVE-2023-29815.json) (`2023-04-28T17:06:22.820`)
|
||||
* [CVE-2023-30123](CVE-2023/CVE-2023-301xx/CVE-2023-30123.json) (`2023-04-28T17:06:22.820`)
|
||||
* [CVE-2023-30125](CVE-2023/CVE-2023-301xx/CVE-2023-30125.json) (`2023-04-28T17:06:22.820`)
|
||||
* [CVE-2023-30183](CVE-2023/CVE-2023-301xx/CVE-2023-30183.json) (`2023-04-28T17:06:22.820`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
Loading…
x
Reference in New Issue
Block a user