Auto-Update: 2023-06-27T18:00:32.630488+00:00

This commit is contained in:
cad-safe-bot 2023-06-27 18:00:36 +00:00
parent a24715143f
commit 97bcba6c6a
135 changed files with 2344 additions and 378 deletions

View File

@ -2,19 +2,76 @@
"id": "CVE-2020-21174",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-20T15:15:11.030",
"lastModified": "2023-06-20T15:49:08.960",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-27T17:35:02.413",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "File Upload vulenrability in liufee CMS v.2.0.7.1 allows a remote attacker to execute arbitrary code via the image suffix function."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:feehi:feehicms:2.0.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8BDECBF4-6272-4580-9B44-B2D6EDFF0DE0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/liufee/cms/issues/44",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
}
]
}

View File

@ -2,19 +2,76 @@
"id": "CVE-2020-21246",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-20T15:15:11.073",
"lastModified": "2023-06-20T15:49:08.960",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-27T17:33:03.503",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in YiiCMS v.1.0 allows a remote attacker to execute arbitrary code via the news function."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:yiicms_project:yiicms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FE5A8EB2-1DFA-4832-A074-31866A7B7CDE"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/yongshengli/yiicms/issues/6",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch"
]
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2020-21252",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-20T15:15:11.117",
"lastModified": "2023-06-20T15:49:08.960",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-27T17:32:35.853",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Cross Site Request Forgery vulnerability in Neeke HongCMS 3.0.0 allows a remote attacker to execute arbitrary code and escalate privileges via the updateusers parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hongcms_project:hongcms:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B8D6DB5-CC3D-4315-92A2-72E06A9AB4F3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Neeke/HongCMS/issues/13",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-30203",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-27T14:15:09.667",
"lastModified": "2023-06-27T14:15:09.667",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-30205",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-27T14:15:09.737",
"lastModified": "2023-06-27T14:15:09.737",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0823",
"sourceIdentifier": "security@zyxel.com.tw",
"published": "2022-06-09T16:15:08.160",
"lastModified": "2022-06-15T16:04:26.180",
"lastModified": "2023-06-27T16:10:09.157",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-203"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0833",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-03-28T18:15:09.893",
"lastModified": "2022-04-04T18:08:41.407",
"lastModified": "2023-06-27T16:38:36.147",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,8 +65,22 @@
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0871",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-03-11T12:15:07.667",
"lastModified": "2022-03-22T13:44:09.813",
"lastModified": "2023-06-27T16:40:25.093",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -92,7 +92,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "CWE-862"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0932",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-03-11T15:15:09.857",
"lastModified": "2022-03-18T15:54:05.863",
"lastModified": "2023-06-27T16:40:05.607",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -92,7 +92,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "CWE-862"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0952",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-05-02T16:15:08.637",
"lastModified": "2022-05-09T17:23:54.613",
"lastModified": "2023-06-27T16:21:53.877",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,8 +65,22 @@
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-0959",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-03-16T15:15:16.213",
"lastModified": "2022-03-28T13:20:38.540",
"lastModified": "2023-06-27T16:39:57.140",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -68,6 +68,10 @@
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
},
{
"lang": "en",
"value": "CWE-434"

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1052",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-03-24T13:15:07.837",
"lastModified": "2022-03-31T18:56:17.973",
"lastModified": "2023-06-27T16:39:05.690",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -92,7 +92,7 @@
"description": [
{
"lang": "en",
"value": "CWE-125"
"value": "CWE-787"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1077",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-03-29T06:15:07.507",
"lastModified": "2022-04-04T20:02:18.787",
"lastModified": "2023-06-27T16:38:28.317",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-425"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1092",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-04-25T16:16:08.310",
"lastModified": "2022-05-12T14:14:31.857",
"lastModified": "2023-06-27T16:22:04.763",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,8 +65,22 @@
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1203",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-05-30T09:15:09.050",
"lastModified": "2022-11-16T17:23:21.230",
"lastModified": "2023-06-27T16:13:49.553",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,8 +65,22 @@
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1238",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-04-06T10:15:08.200",
"lastModified": "2022-04-14T14:45:15.603",
"lastModified": "2023-06-27T16:38:13.430",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -87,8 +87,18 @@
},
"weaknesses": [
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1256",
"sourceIdentifier": "psirt@mcafee.com",
"published": "2022-04-14T15:15:07.943",
"lastModified": "2022-04-23T02:22:18.863",
"lastModified": "2023-06-27T16:22:23.443",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -85,8 +85,18 @@
},
"weaknesses": [
{
"source": "psirt@mcafee.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
},
{
"source": "psirt@mcafee.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1511",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-04-28T15:15:09.637",
"lastModified": "2022-05-06T18:56:42.457",
"lastModified": "2023-06-27T16:22:00.897",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -92,7 +92,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "CWE-862"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1516",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-05-05T15:15:07.953",
"lastModified": "2022-12-08T20:02:48.387",
"lastModified": "2023-06-27T16:21:46.207",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-416"
"value": "CWE-476"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1570",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-06-08T10:15:09.790",
"lastModified": "2022-06-15T14:39:34.643",
"lastModified": "2023-06-27T16:13:22.243",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,8 +65,22 @@
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1589",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-05-30T09:15:10.157",
"lastModified": "2022-06-08T15:22:13.977",
"lastModified": "2023-06-27T16:13:43.517",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,8 +65,22 @@
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1598",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-06-08T10:15:09.953",
"lastModified": "2022-06-15T15:15:27.637",
"lastModified": "2023-06-27T16:13:17.203",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,8 +65,18 @@
},
"weaknesses": [
{
"source": "contact@wpscan.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
},
{
"source": "contact@wpscan.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-1629",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-05-10T14:15:08.530",
"lastModified": "2023-05-03T12:15:22.957",
"vulnStatus": "Modified",
"lastModified": "2023-06-27T16:21:30.427",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -164,7 +164,11 @@
"references": [
{
"url": "http://seclists.org/fulldisclosure/2022/Oct/28",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2022/Oct/41",
@ -207,7 +211,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202305-16",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT213488",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1649",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-05-10T17:15:07.993",
"lastModified": "2022-05-16T16:27:22.627",
"lastModified": "2023-06-27T16:20:42.480",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -92,7 +92,7 @@
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-476"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1661",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2022-06-02T14:15:33.070",
"lastModified": "2022-06-09T19:36:15.897",
"lastModified": "2023-06-27T16:13:26.807",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -85,8 +85,18 @@
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1714",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-05-13T15:15:08.733",
"lastModified": "2022-05-23T18:35:39.780",
"lastModified": "2023-06-27T16:18:34.593",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -92,7 +92,7 @@
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-125"
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-1769",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-05-17T17:15:08.153",
"lastModified": "2023-05-03T12:15:28.663",
"vulnStatus": "Modified",
"lastModified": "2023-06-27T16:18:28.207",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -169,7 +169,11 @@
"references": [
{
"url": "http://seclists.org/fulldisclosure/2022/Oct/28",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2022/Oct/41",
@ -227,7 +231,10 @@
},
{
"url": "https://security.gentoo.org/glsa/202305-16",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://support.apple.com/kb/HT213488",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1810",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-05-23T12:16:16.490",
"lastModified": "2022-05-30T00:33:26.277",
"lastModified": "2023-06-27T16:17:50.367",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -92,7 +92,7 @@
"description": [
{
"lang": "en",
"value": "CWE-732"
"value": "CWE-639"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-1811",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-05-23T16:16:06.963",
"lastModified": "2022-06-02T22:57:49.140",
"lastModified": "2023-06-27T16:14:48.967",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -92,7 +92,7 @@
"description": [
{
"lang": "en",
"value": "CWE-79"
"value": "CWE-434"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-20683",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2022-04-15T15:15:12.667",
"lastModified": "2022-04-26T18:25:27.013",
"lastModified": "2023-06-27T16:22:11.083",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -92,7 +92,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-787"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-20699",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2022-02-10T18:15:08.980",
"lastModified": "2022-05-12T19:36:43.907",
"lastModified": "2023-06-27T16:37:59.953",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2022-03-03",
"cisaActionDue": "2022-03-17",
@ -96,7 +96,7 @@
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-1284"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2019",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-06-09T16:15:08.753",
"lastModified": "2022-06-15T17:37:09.397",
"lastModified": "2023-06-27T16:09:57.397",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2062",
"sourceIdentifier": "security@huntr.dev",
"published": "2022-06-13T12:15:08.107",
"lastModified": "2022-06-17T19:30:02.763",
"lastModified": "2023-06-27T16:09:47.227",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -92,7 +92,7 @@
"description": [
{
"lang": "en",
"value": "CWE-918"
"value": "CWE-209"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39081",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-01-04T10:15:10.707",
"lastModified": "2023-01-10T17:44:07.400",
"lastModified": "2023-06-27T17:48:15.163",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
"value": "CWE-276"
"value": "CWE-862"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39082",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-01-04T10:15:10.760",
"lastModified": "2023-01-10T17:45:19.300",
"lastModified": "2023-06-27T17:52:48.607",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
"value": "CWE-276"
"value": "CWE-862"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39083",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-01-04T10:15:10.847",
"lastModified": "2023-01-10T17:46:27.143",
"lastModified": "2023-06-27T17:52:54.503",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
"value": "CWE-276"
"value": "CWE-862"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39084",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-01-04T10:15:10.910",
"lastModified": "2023-01-10T17:47:10.620",
"lastModified": "2023-06-27T17:52:57.840",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
"value": "CWE-276"
"value": "CWE-862"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39085",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-01-04T10:15:10.967",
"lastModified": "2023-01-10T17:58:01.967",
"lastModified": "2023-06-27T17:47:34.140",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
"value": "CWE-276"
"value": "CWE-862"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39086",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-01-04T10:15:11.023",
"lastModified": "2023-01-10T17:58:33.343",
"lastModified": "2023-06-27T17:47:46.057",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
"value": "CWE-276"
"value": "CWE-862"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39087",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-01-04T10:15:11.080",
"lastModified": "2023-01-10T17:58:55.383",
"lastModified": "2023-06-27T17:47:53.420",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
"value": "CWE-276"
"value": "CWE-862"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39088",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-01-04T10:15:11.140",
"lastModified": "2023-01-10T17:59:17.160",
"lastModified": "2023-06-27T17:47:57.033",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -41,7 +41,7 @@
"description": [
{
"lang": "en",
"value": "CWE-276"
"value": "CWE-862"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39301",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-10-19T14:15:09.747",
"lastModified": "2022-10-20T19:46:39.757",
"lastModified": "2023-06-27T17:20:06.290",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-79"
"value": "CWE-434"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39327",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-10-25T17:15:56.150",
"lastModified": "2022-10-28T19:25:49.087",
"lastModified": "2023-06-27T17:20:17.873",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "CWE-78"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39340",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-10-25T17:15:56.213",
"lastModified": "2022-10-26T00:51:04.547",
"lastModified": "2023-06-27T17:20:41.077",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "CWE-862"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39341",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-10-25T17:15:56.273",
"lastModified": "2022-10-26T00:51:40.153",
"lastModified": "2023-06-27T17:26:27.037",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39342",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-10-25T17:15:56.333",
"lastModified": "2022-10-26T00:52:04.137",
"lastModified": "2023-06-27T17:27:07.260",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39356",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-11-02T17:15:17.520",
"lastModified": "2022-11-04T15:00:37.910",
"lastModified": "2023-06-27T17:27:11.653",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -61,7 +61,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39370",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-11-03T16:15:10.000",
"lastModified": "2022-11-03T18:39:47.567",
"lastModified": "2023-06-27T17:27:16.027",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -61,7 +61,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39392",
"sourceIdentifier": "security-advisories@github.com",
"published": "2022-11-10T20:15:11.133",
"lastModified": "2022-11-16T02:42:12.203",
"lastModified": "2023-06-27T17:27:31.237",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -59,6 +59,10 @@
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-787"

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39803",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:15.120",
"lastModified": "2022-10-12T19:54:59.487",
"lastModified": "2023-06-27T16:37:09.723",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39804",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:15.327",
"lastModified": "2022-10-12T20:01:13.087",
"lastModified": "2023-06-27T17:16:44.390",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39805",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:15.543",
"lastModified": "2022-10-12T20:01:31.223",
"lastModified": "2023-06-27T17:16:48.887",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39806",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:15.750",
"lastModified": "2022-10-12T20:01:45.927",
"lastModified": "2023-06-27T17:16:53.210",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39808",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:16.173",
"lastModified": "2022-10-12T20:02:16.643",
"lastModified": "2023-06-27T17:19:56.367",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39857",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2022-10-07T15:15:20.717",
"lastModified": "2022-10-07T20:53:01.277",
"lastModified": "2023-06-27T16:13:16.047",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39860",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2022-10-07T15:15:21.017",
"lastModified": "2022-10-12T01:11:29.860",
"lastModified": "2023-06-27T16:13:24.203",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39862",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2022-10-07T15:15:21.290",
"lastModified": "2022-10-12T01:44:22.677",
"lastModified": "2023-06-27T16:13:42.383",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39864",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2022-10-07T15:15:21.727",
"lastModified": "2022-10-11T22:57:52.267",
"lastModified": "2023-06-27T16:13:48.267",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39865",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2022-10-07T15:15:21.883",
"lastModified": "2022-10-11T19:47:52.433",
"lastModified": "2023-06-27T16:14:25.387",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39866",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2022-10-07T15:15:21.983",
"lastModified": "2022-10-11T19:40:22.277",
"lastModified": "2023-06-27T16:15:55.140",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39867",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2022-10-07T15:15:22.097",
"lastModified": "2022-10-11T19:39:28.773",
"lastModified": "2023-06-27T16:16:01.497",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39868",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2022-10-07T15:15:22.240",
"lastModified": "2022-10-11T19:34:01.253",
"lastModified": "2023-06-27T16:16:05.830",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39877",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2022-10-07T15:15:23.810",
"lastModified": "2022-10-09T02:21:43.740",
"lastModified": "2023-06-27T16:25:35.270",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39879",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2022-11-09T22:15:16.897",
"lastModified": "2022-11-10T15:20:12.820",
"lastModified": "2023-06-27T16:26:57.103",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -61,7 +61,7 @@
"description": [
{
"lang": "en",
"value": "CWE-862"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-39902",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2022-12-08T16:15:12.340",
"lastModified": "2022-12-10T03:08:54.303",
"lastModified": "2023-06-27T16:30:04.827",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -61,7 +61,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "NVD-CWE-Other"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41170",
"sourceIdentifier": "cna@sap.com",
"published": "2022-10-11T21:15:17.437",
"lastModified": "2022-10-12T19:58:00.177",
"lastModified": "2023-06-27T16:06:54.550",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -40,8 +40,22 @@
},
"weaknesses": [
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "cna@sap.com",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4115",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.077",
"lastModified": "2023-06-27T14:15:10.077",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0588",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.150",
"lastModified": "2023-06-27T14:15:10.150",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0873",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.213",
"lastModified": "2023-06-27T14:15:10.213",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1166",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.277",
"lastModified": "2023-06-27T14:15:10.277",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1891",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.340",
"lastModified": "2023-06-27T14:15:10.340",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2032",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.417",
"lastModified": "2023-06-27T14:15:10.417",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2068",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.477",
"lastModified": "2023-06-27T14:15:10.477",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2178",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.540",
"lastModified": "2023-06-27T14:15:10.540",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2326",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.600",
"lastModified": "2023-06-27T14:15:10.600",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2482",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.663",
"lastModified": "2023-06-27T14:15:10.663",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2580",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.730",
"lastModified": "2023-06-27T14:15:10.730",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2592",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.790",
"lastModified": "2023-06-27T14:15:10.790",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2601",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.847",
"lastModified": "2023-06-27T14:15:10.847",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:35.267",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2605",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.910",
"lastModified": "2023-06-27T14:15:10.910",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:35.267",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2623",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:10.967",
"lastModified": "2023-06-27T14:15:10.967",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:35.267",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2624",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.030",
"lastModified": "2023-06-27T14:15:11.030",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:35.267",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2627",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.090",
"lastModified": "2023-06-27T14:15:11.090",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:35.267",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2628",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.153",
"lastModified": "2023-06-27T14:15:11.153",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:35.267",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2711",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.267",
"lastModified": "2023-06-27T14:15:11.267",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:35.267",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2743",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.373",
"lastModified": "2023-06-27T14:15:11.373",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:35.267",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2744",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.433",
"lastModified": "2023-06-27T14:15:11.433",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:35.267",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2795",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.493",
"lastModified": "2023-06-27T14:15:11.493",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:35.267",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2818",
"sourceIdentifier": "security@proofpoint.com",
"published": "2023-06-27T15:15:10.350",
"lastModified": "2023-06-27T15:15:10.350",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:35.267",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2842",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.567",
"lastModified": "2023-06-27T14:15:11.567",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:35.267",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2877",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.633",
"lastModified": "2023-06-27T14:15:11.633",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:35.267",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2996",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-27T14:15:11.723",
"lastModified": "2023-06-27T14:15:11.723",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:35.267",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-3132",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-27T03:15:09.913",
"lastModified": "2023-06-27T03:15:09.913",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:38.897",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The MainWP Child plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.4.1.1 due to insufficient controls on the storage of back-up files. This makes it possible for unauthenticated attackers to extract sensitive data including the entire installations database if a backup occurs and the deletion of the back-up files fail."
},
{
"lang": "es",
"value": "El plugin MainWP Child para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n sensible hasta la versi\u00f3n 4.4.1.1 inclusive, debido a controles insuficientes en el almacenamiento de archivos de copia de seguridad. Esto hace posible que atacantes no autenticados extraigan informaci\u00f3n sensible, incluyendo la base de datos completa de las instalaciones, si se produce una copia de seguridad y falla la eliminaci\u00f3n de los archivos de copia de seguridad. "
}
],
"metrics": {

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2023-32339",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2023-06-27T17:15:09.547",
"lastModified": "2023-06-27T17:15:09.547",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "IBM Business Automation Workflow is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 255587."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://https://www.ibm.com/support/pages/node/6998727",
"source": "psirt@us.ibm.com"
},
{
"url": "https://https://www.ibm.com/support/pages/node/7001291",
"source": "psirt@us.ibm.com"
},
{
"url": "https://www.ibm.com/support/pages/node/6998727",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,15 +2,41 @@
"id": "CVE-2023-3291",
"sourceIdentifier": "security@huntr.dev",
"published": "2023-06-16T02:15:08.473",
"lastModified": "2023-06-16T03:19:08.410",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-27T17:53:10.120",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.2.2."
},
{
"lang": "es",
"value": "Desbordamiento de b\u00fafer de pila en el repositorio gpac/gpac de GitHub en versiones anteriores a 2.2.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -36,8 +62,18 @@
},
"weaknesses": [
{
"source": "security@huntr.dev",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "security@huntr.dev",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,14 +82,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.2.2",
"matchCriteriaId": "DBF31B7B-F4C7-40C0-9245-09FECA1A8164"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/gpac/gpac/commit/6a748ccc3f76ff10e3ae43014967ea4b0c088aaf",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://huntr.dev/bounties/526954e6-8683-4697-bfa2-886c3204a1d5",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33213",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-06-19T13:15:09.743",
"lastModified": "2023-06-20T07:12:55.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-27T16:41:03.113",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -46,10 +66,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gvectors:wpview:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.0",
"matchCriteriaId": "8CAA6D48-B83D-4676-9127-D594F4C7C116"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wpview/wordpress-wpview-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,19 +2,75 @@
"id": "CVE-2023-3315",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2023-06-19T21:15:42.177",
"lastModified": "2023-06-20T07:12:55.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-27T17:08:44.067",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "Missing permission checks in Jenkins Team Concert Plugin 2.4.1 and earlier allow attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jenkins:team_concert:*:*:*:*:*:jenkins:*:*",
"versionEndIncluding": "2.4.1",
"matchCriteriaId": "762B4B5C-F87C-4D42-B623-5937FD6E686B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2023-06-14/#SECURITY-2932",
"source": "jenkinsci-cert@googlegroups.com"
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3318",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-19T13:15:10.173",
"lastModified": "2023-06-20T07:12:55.493",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-06-27T17:24:02.027",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -11,6 +11,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
@ -71,18 +93,49 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:resort_management_system_project:resort_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5B55CF24-0E9F-4CEA-BAF7-6E26AB8C599E"
}
]
}
]
}
],
"references": [
{
"url": "https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3318",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.231937",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.231937",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,12 +2,16 @@
"id": "CVE-2023-3371",
"sourceIdentifier": "security@wordfence.com",
"published": "2023-06-27T02:15:09.657",
"lastModified": "2023-06-27T02:15:09.657",
"vulnStatus": "Received",
"lastModified": "2023-06-27T16:15:41.447",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "The User Registration plugin for WordPress is vulnerable to Sensitive Information Exposure due to hardcoded encryption key on the 'lock_content_form_handler' and 'display_password_form' function in versions up to, and including, 3.7.3. This makes it possible for unauthenticated attackers to decrypt and view the password protected content."
},
{
"lang": "es",
"value": "El plugin User Registration para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial debido a la clave de cifrado embebida en las funciones \"lock_content_form_handler\" y \"display_password_form\" en versiones hasta la 3.7.3 inclusive. Esto hace posible que atacantes no autenticados descifren y vean el contenido protegido por contrase\u00f1a. "
}
],
"metrics": {

View File

@ -0,0 +1,67 @@
{
"id": "CVE-2023-34098",
"sourceIdentifier": "security-advisories@github.com",
"published": "2023-06-27T17:15:09.683",
"lastModified": "2023-06-27T17:15:09.683",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Shopware is an open source e-commerce software. Due to an incorrect configuration in the `.htaccess` file, the configuration file of the Javascript could be read in production environments (`themes/package-lock.json`). With this information, the specific Shopware version in a deployment might be determined by an attacker, which could be used for further attacks. Users are advised to update to version 5.7.18. There are no known workarounds for this vulnerability.\n"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-06-2023",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/shopware/shopware/security/advisories/GHSA-q97c-2mh3-pgw9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/shopware5/shopware/commit/b3518c8d9562a38615d638f31f79829f6e2f4b6a",
"source": "security-advisories@github.com"
},
{
"url": "https://www.shopware.com/en/changelog-sw5/#5-7-18",
"source": "security-advisories@github.com"
}
]
}

Some files were not shown because too many files have changed in this diff Show More